Sample records for wells definitions key

  1. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Wayne Moe

    2013-05-01T23:59:59.000Z

    This document provides key definitions, plant capabilities, and inputs and assumptions related to the Next Generation Nuclear Plant to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor. These definitions, capabilities, and assumptions were extracted from a number of NGNP Project sources such as licensing related white papers, previously issued requirement documents, and preapplication interactions with the Nuclear Regulatory Commission (NRC).

  2. NGNP: High Temperature Gas-Cooled Reactor Key Definitions, Plant Capabilities, and Assumptions

    SciTech Connect (OSTI)

    Phillip Mills

    2012-02-01T23:59:59.000Z

    This document is intended to provide a Next Generation Nuclear Plant (NGNP) Project tool in which to collect and identify key definitions, plant capabilities, and inputs and assumptions to be used in ongoing efforts related to the licensing and deployment of a high temperature gas-cooled reactor (HTGR). These definitions, capabilities, and assumptions are extracted from a number of sources, including NGNP Project documents such as licensing related white papers [References 1-11] and previously issued requirement documents [References 13-15]. Also included is information agreed upon by the NGNP Regulatory Affairs group's Licensing Working Group and Configuration Council. The NGNP Project approach to licensing an HTGR plant via a combined license (COL) is defined within the referenced white papers and reference [12], and is not duplicated here.

  3. Amyloid Treatment and Research Program key research findings: Definition of the electron microscopic structure and x-ray diffraction pattern of amyloid

    E-Print Network [OSTI]

    Finzi, Adrien

    , which for the first time defined the biochemical nature and source of the amyloid fibril in this form microscopic structure and x-ray diffraction pattern of amyloid fibrils in 1967, providing key insight of amyloidosis. Characterization of the protein deposits in dialysis-associated amyloidosis as 2- microglobulin

  4. Communication Definitions... general definition

    E-Print Network [OSTI]

    Jones, Ian L.

    Communication Definitions... general definition "the process of conveying information from a sender to a receiver with the use of a medium in which the communicated information is understood the same way by both sender and receiver" (Wikipedia)! Biological communication Action by one organism (individual

  5. U.S. Geothermal Announces More Test Results From the Neal Hot Springs Production Well and a Key Addition to Senior Staff

    Broader source: Energy.gov [DOE]

    U.S. Geothermal Inc. ("U.S. Geothermal"), a renewable energy company focused on the production of electricity from geothermal energy, announced today results from a second, higher rate flow test of the first full size production well (NHS-1) at the Neal Hot Springs Project.

  6. Definition and Validation of the Key

    E-Print Network [OSTI]

    Utrecht, Universiteit

    of information and computing sciences, utrecht university technical report UU-CS-2005-041 www.cs.uu.nl #12 Sciences Utrecht University Utrecht, The Netherlands slinger.jansen@cs.uu.nl Sjaak Brinkkemper Institute for Information and Computing Sciences Utrecht University Utrecht, The Netherlands s.brinkkemper@cs.uu.nl ABSTRACT

  7. ACKNOWLEDGEMENTS ..................................................................................4 DEFINITIONS OF KEY TERMS .........................................................................6

    E-Print Network [OSTI]

    Escher, Christine

    ) means the chemical compound containing one atom of carbon and two atoms of oxygen. (2) "Carbon dioxide) "Global Warming Potential factor" (GWP) means the radiative forcing impact of one mass-based unit. For instance, methane (CH4) has a GWP of 23, meaning that every gram of methane will trap 23 times as much

  8. 2010 Manufacturing Energy and Carbon Footprints: Definitions...

    Broader source: Energy.gov (indexed) [DOE]

    key terms and details assumptions and references used in the Manufacturing Energy and Carbon Footprints (2010 MECS) Definitions and Assumptions for the Manufacturing Energy and...

  9. Definitions Calibration

    E-Print Network [OSTI]

    Weinberger, Hans

    Definitions Calibration Parameter Dynamics Monte Carlo Simulation Concluding Remarks Using the SABR Model Jason Vinar Ameriprise Workshop 2012 Jason Vinar Using the SABR Model #12;Definitions Calibration which attempts to capture the volatility smile. This project will consist of Calibrating the SABR model

  10. Key distributionKey distribution Key distribution, symmetric encryption

    E-Print Network [OSTI]

    Fisher, Michael

    COMP 522 Key distributionKey distribution COMP 522 Key distribution, symmetric encryption From in a secure way and must keep the key secure" · Important issue: how to distribute secret keys? COMP 522 Key distribution, manual delivery For two parties A and B: · A key could be created by A and delivered physically

  11. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20T23:59:59.000Z

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  12. Entropy and Energy: Toward a Definition of Physical Sustainability

    E-Print Network [OSTI]

    Hermanowicz, Slawomir W

    2005-01-01T23:59:59.000Z

    of entropy-energy definition of sustainability as well asand Energy: Toward a Definition of Physical Sustainabilityto assess the sustainability is based on the energy. This

  13. Hanford wells

    SciTech Connect (OSTI)

    Chamness, M.A.; Merz, J.K.

    1993-08-01T23:59:59.000Z

    Records describing wells located on or near the Hanford Site have been maintained by Pacific Northwest Laboratory and the operating contractor, Westinghouse Hanford Company. In support of the Ground-Water Surveillance Project, portions of the data contained in these records have been compiled into the following report, which is intended to be used by those needing a condensed, tabular summary of well location and basic construction information. The wells listed in this report were constructed over a period of time spanning almost 70 years. Data included in this report were retrieved from the Hanford Envirorunental Information System (HEIS) database and supplemented with information not yet entered into HEIS. While considerable effort has been made to obtain the most accurate and complete tabulations possible of the Hanford Site wells, omissions and errors may exist. This document does not include data on lithologic logs, ground-water analyses, or specific well completion details.

  14. Vocabulary of Definitions | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Definitions Vocabulary of Definitions 800 Terms for Surface Chemical Analysis - ISO This information is provided through the cooperation of EMSL and the ASTM E42...

  15. Dimensions of Wellness Staying Well

    E-Print Network [OSTI]

    Fernandez, Eduardo

    to protect your physical health by eating a well-balanced diet, getting plenty of physical activity-evaluation and self-assessment. Wellness involves continually learning and making changes to enhance your state) A state in which your mind is engaged in lively interaction with the world around you. Intellectual

  16. Quantum Public-Key Encryption with Information Theoretic Security

    E-Print Network [OSTI]

    Jiangyou Pan; Li Yang

    2012-02-20T23:59:59.000Z

    We propose a definition for the information theoretic security of a quantum public-key encryption scheme, and present bit-oriented and two-bit-oriented encryption schemes satisfying our security definition via the introduction of a new public-key algorithm structure. We extend the scheme to a multi-bitoriented one, and conjecture that it is also information theoretically secure, depending directly on the structure of our new algorithm.

  17. Monitoring well

    DOE Patents [OSTI]

    Hubbell, Joel M. (Idaho Falls, ID); Sisson, James B. (Idaho Falls, ID)

    1999-01-01T23:59:59.000Z

    A monitoring well including a conduit defining a passageway, the conduit having a proximal and opposite, distal end; a coupler connected in fluid flowing relationship with the passageway; and a porous housing borne by the coupler and connected in fluid flowing relation thereto.

  18. Monitoring well

    DOE Patents [OSTI]

    Hubbell, J.M.; Sisson, J.B.

    1999-06-29T23:59:59.000Z

    A monitoring well is described which includes: a conduit defining a passageway, the conduit having a proximal and opposite, distal end; a coupler connected in fluid flowing relationship with the passageway; and a porous housing borne by the coupler and connected in fluid flowing relation thereto. 8 figs.

  19. Monitoring well

    DOE Patents [OSTI]

    Hubbell, Joel M. (Idaho Falls, ID); Sisson, James B. (Idaho Falls, ID)

    2002-01-01T23:59:59.000Z

    The present invention relates to a monitoring well which includes an enclosure defining a cavity and a water reservoir enclosed within the cavity and wherein the reservoir has an inlet and an outlet. The monitoring well further includes a porous housing borne by the enclosure and which defines a fluid chamber which is oriented in fluid communication with the outlet of the reservoir, and wherein the porous housing is positioned in an earthen soil location below-grade. A geophysical monitoring device is provided and mounted in sensing relation relative to the fluid chamber of the porous housing; and a coupler is selectively moveable relative to the outlet of reservoir to couple the porous housing and water reservoir in fluid communication. An actuator is coupled in force transmitting relation relative to the coupler to selectively position the coupler in a location to allow fluid communication between the reservoir and the fluid chamber defined by the porous housing.

  20. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-02-15T23:59:59.000Z

    The use and management of certificate-based public key cryptography for the Department of Energy (DOE) requires the establishment of a public key infrastructure (PKI). This chapter defines the policy related to roles, requirements, and responsibilities for establishing and maintaining a DOE PKI and the documentation necessary to ensure that all certificates are managed in a manner that maintains the overall trust required to support a viable PKI. Canceled by DOE N 251.112.

  1. The Web Services Vision Definition of Web Services

    E-Print Network [OSTI]

    Cheverst, Keith

    1 The Web Services Vision Overview Definition of Web Services Key concepts Difference from traditional web model Context Service-oriented architecture Distributed computing Overview Microsoft .NET vision Web Services Difference from traditional web model Context Service-oriented architecture

  2. Key Milestones/Outlook

    Broader source: Energy.gov [DOE]

    Key Milestones/Outlook per the Department of Energy 2015 Congressional Budget Request, Environmental Management, March 2014

  3. Definitions of dwelling

    E-Print Network [OSTI]

    Olgyay, Victor W. (Victor Wayne)

    1986-01-01T23:59:59.000Z

    Home is an elusive concept. In one manner it is highly specific and individual in its definition, and in other aspects it is ubiquitous, present in our every act. In this thesis I explore several possible definitions of ...

  4. NIH WORKING DEFINITION OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY

    E-Print Network [OSTI]

    Rau, Don C.

    NIH WORKING DEFINITION OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY July 17, 2000 The following working definition of bioinformatics and computational biology were developed by the BISTIC Definition Liu Preamble Bioinformatics and computational biology are rooted in life sciences as well as computer

  5. Quantum dense key distribution

    SciTech Connect (OSTI)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G. [Istituto Elettrotecnico Nazionale G. Ferraris, Strada delle Cacce 91, 10135 Torino (Italy); ELSAG SpA, Via Puccini 2, 16154, Genova (Italy)

    2004-03-01T23:59:59.000Z

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  6. Key Events Timeline

    Broader source: Energy.gov [DOE]

    This document lists key events beginning with the April 20 fire on the Deepwater Horizon through July 28th. Updated July 28, 2010.

  7. Key Request (Last) (First)

    E-Print Network [OSTI]

    Carrington, Emily

    will be accessing. For Johnson Hall exterior door access bring a copy of this form to the Earth & Space SciencesKey Request Form Name: (Last) (First) Contact Info Keys Cardswipe UW Email: Hitchcock Exterior Door Room:_________ Room:_________ Johnson Room:_________ Room:_________ Kincaid Exterior Door Room

  8. Optical key system

    DOE Patents [OSTI]

    Hagans, Karla G. (Livermore, CA); Clough, Robert E. (Danville, CA)

    2000-01-01T23:59:59.000Z

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  9. Three key elements necessary for successful testing

    SciTech Connect (OSTI)

    Ehlig-Economides, C.A.; Hegeman, P. (Schlumberger Oilfield Services, Houston, TX (United States)); Clark, G. (Schlumberger Oilfield Services, Aberdeen (United Kingdom))

    1994-07-25T23:59:59.000Z

    Real-time surface readout during data acquisition, downhole shutting, and appropriate pressure gauges are three key elements for successful well tests. These elements are often overlooked in designing and implementing a successful well test. This second in a series of three articles on well testing shows how these elements affected the testing of an example well. Also reviewed are the capabilities of several new testing tools and techniques.

  10. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C¸amtepe1 of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered-chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  11. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    E-Print Network [OSTI]

    Bystroff, Chris

    Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. C� amtepe of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered­chain sizes. 1 Introduction and Problem Definition In this work, we consider a sensor network in which sensor

  12. Genomic definition of species

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Drmanac, R.

    1991-07-01T23:59:59.000Z

    The subject of this paper is the definition of species based on the assumption that genome is the fundamental level for the origin and maintenance of biological diversity. For this view to be logically consistent it is necessary to assume the existence and operation of the new law which we call genome law. For this reason the genome law is included in the explanation of species phenomenon presented here even if its precise formulation and elaboration are left for the future. The intellectual underpinnings of this definition can be traced to Goldschmidt. We wish to explore some philosophical aspects of the definition of species in terms of the genome. The point of proposing the definition on these grounds is that any real advance in evolutionary theory has to be correct in both its philosophy and its science.

  13. Cryptographic Key Management System

    SciTech Connect (OSTI)

    No, author

    2014-02-21T23:59:59.000Z

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene#12;ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  14. Demand Response in the U.S.- Key trends and federal facility participation

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—provides demand response (DR) definition, current status of DR in the United States, key DR trends, and federal participation issues.

  15. Do Well, Be Well with Diabetes

    E-Print Network [OSTI]

    Do Well, Be Well with Diabetes Do Well, Be Well with Diabetes Lesson Topics ·WhatisDiabetes? ·Nutrition­FirstSteptoDiabetesManagement ·OneDiabetesDiet­NoLongertheSoleOption ·ManagingYourBloodGlucose ·NutritionalLabels ·DiabetesandExercise ·ForGoodMeasureatHomeandEatingOut ·DiabetesMedicines ·Preventingand

  16. Bioenergy Key Publications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand SustainedBio-OilBioenergy 2015 AgendaBioenergyKEY

  17. NETL: Key Staff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgenda Workshop AgendaGraphic of aEnergy SystemsKey

  18. NSR Key Number Retrieval

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota PriusNSR Key Number Retrieval Pease

  19. Key-shift transmission

    SciTech Connect (OSTI)

    Nemoto, S.

    1989-03-07T23:59:59.000Z

    A key-shift transmission is described, characterized by the speed-change shaft being divided into a pair of trough-shaped shaft halves each having an arched inner surface which defines a part of a cylindrical bore extending axially through the speed-change shaft thereby the shaft being formed into a hollow shaft, and by each of the shaft halves including a pair of flattened end surfaces which extend axially of each shaft half at both sides of the inner surface, one of the end surfaces having thereon an axially elongated projection and the other of the end surfaces having herein an axially elongated recess of a depth smaller than the height of the projection. The pair of shaft halves are engaged to each other co-rotatably by fitting the projections of the respective shaft halves into the recesses of the respective shaft halves so as to form in an outer surface of the speed-change shaft a pair of elongated axial grooves which are located radially outwardly of the elongated projections of the respective shaft halves and between the flattened end surfaces of the respective shaft halves. A pair of the shift keys are disposed within the pair of elongated axial grooves.

  20. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  1. Power/Privilege Definitions

    E-Print Network [OSTI]

    Sheridan, Jennifer

    Major; People's Institute for Survival and Beyond, New Orleans 2. Power is the ability to define reality and to convince other people that it is their definition. ~ Dr. Wade Nobles 3. Power is the capacity to act. 4 different cultures. [JL] RACISM Racism is race prejudice plus power [See Racist]. People's Institute calls

  2. 3 Library Regulations Definitions

    E-Print Network [OSTI]

    Mottram, Nigel

    3 Library Regulations Definitions In Regulation 3: 'Library' means the University Library as defined in Regulation 3.1; 'Library staff' means the staff of the University Library; 'Librarian' means the University Librarian and Head of Information Resources Directorate or nominee; `Library Committee' means

  3. Definitions Numbered Space

    E-Print Network [OSTI]

    Behmer, Spencer T.

    Definitions · Numbered Space ­ a single space marked with a number and reserved for a single permit 24/7 · Unnumbered Space ­ a space which can be used by any customer allowed to park in that lot. High Low Average Question 4: If I buy a staff permit for an UNNUMBERED* space in a non-gated surface

  4. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  5. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key Terms

  6. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key TermsCrude

  7. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key TermsCrudeAPI

  8. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions Key

  9. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions KeyReceipts by

  10. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions KeyReceipts

  11. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInput Definitions Key

  12. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputs & Utilization Definitions Key

  13. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions Key Terms

  14. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions Key

  15. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions KeyPrices,

  16. Definitions and motivation More theory

    E-Print Network [OSTI]

    Duval, Art

    Definitions and motivation Examples More theory The Importance of being Equivalent: The Ubiquity of being Equivalent: #12;Definitions and motivation Examples More theory Fractions Geometry Real life Equivalent: #12;Definitions and motivation Examples More theory Fractions Geometry Real life Summary Equality

  17. Motivation and definitions Dimension theory

    E-Print Network [OSTI]

    Climenhaga, Vaughn

    Motivation and definitions Dimension theory Results: old and new Multifractal analysis of Birkhoff averages #12;Motivation and definitions Dimension theory Results: old and new Outline 1 Motivation and definitions A multifractal decomposition Example 2 Dimension theory Quantifying level sets A dynamically

  18. Definitions and motivation More theory

    E-Print Network [OSTI]

    Duval, Art

    Definitions and motivation Examples More theory Equivalence relations in mathematics, K-16+ Art;Definitions and motivation Examples More theory Fractions Geometry Real life One reason fractions are hard 2 3 Duval Equivalence relations in mathematics, K-16+ #12;Definitions and motivation Examples More theory

  19. INVERSE SPECTRAL AND SCATTERING THEORY FOR THE HALF-LINE LEFT DEFINITE

    E-Print Network [OSTI]

    INVERSE SPECTRAL AND SCATTERING THEORY FOR THE HALF-LINE LEFT DEFINITE STURM-LIOUVILLE PROBLEM C will prove some uniqueness results for inverse spec- tral theory and inverse scattering for the left definite is via the inverse spectral theory for the left definite problem, which also is not very well developed

  20. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a...

  1. Soot Nanostructure: Definition, Quantification, and Implications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Soot Nanostructure: Definition, Quantification, and Implications Soot Nanostructure: Definition, Quantification, and Implications 2004 Diesel Engine Emissions Reduction (DEER)...

  2. Regulations of Wells (Florida)

    Broader source: Energy.gov [DOE]

    The Department of Environmental Protection regulates the construction, repair, and abandonment of wells, as well as the persons and businesses undertaking such practices. Governing boards of water...

  3. Groundwater and Wells (Nebraska)

    Broader source: Energy.gov [DOE]

    This section describes regulations relating to groundwater protection, water wells, and water withdrawals, and requires the registration of all water wells in the state.

  4. Interpreting Horizontal Well Flow Profiles and Optimizing Well Performance by Downhole Temperature and Pressure Data

    E-Print Network [OSTI]

    Li, Zhuoyi

    2011-02-22T23:59:59.000Z

    be used to obtain downhole flow conditions, which is key information to control and optimize horizontal well production. However, the fluid flow in the reservoir is often multiphase and complex, which makes temperature and pressure interpretation very...

  5. Notes and Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxideDocumentationThreeNewsfuelNotes and Definitions

  6. Diversity & Flexibility Key to Sustainability

    Broader source: Energy.gov [DOE]

    Plenary V: Biofuels and Sustainability: Acknowledging Challenges and Confronting MisconceptionsDiversity & Flexibility Key to SustainabilityDavid Babson, Senior Fuels Engineer, Union of...

  7. Proof and Definition in Logic and Type Theory Proof and Definition in Logic and Type Theory

    E-Print Network [OSTI]

    Adams, Robin

    Proof and Definition in Logic and Type Theory Proof and Definition in Logic and Type Theory Robin questions. #12;Proof and Definition in Logic and Type Theory Definition and Proof Definition and proof -- but they are not in predicate logic or type theory. #12;Proof and Definition in Logic and Type Theory Methods of Definition

  8. Answering Key Fuel Cycle Questions

    SciTech Connect (OSTI)

    Steven J. Piet; Brent W. Dixon; J. Stephen Herring; David E. Shropshire; Mary Lou Dunzik-Gougar

    2003-10-01T23:59:59.000Z

    The Advanced Fuel Cycle Initiative (AFCI) program has both “outcome” and “process” goals because it must address both waste already accumulating as well as completing the fuel cycle in connection with advanced nuclear power plant concepts. The outcome objectives are waste geological repository capacity and cost, energy security and sustainability, proliferation resistance, fuel cycle economics, and safety. The process objectives are readiness to proceed and adaptability and robustness in the face of uncertainties. A classic decision-making approach to such a multi-attribute problem would be to weight individual quantified criteria and calculate an overall figure of merit. This is inappropriate for several reasons. First, the goals are not independent. Second, the importance of different goals varies among stakeholders. Third, the importance of different goals is likely to vary with time, especially the “energy future.” Fourth, some key considerations are not easily or meaningfully quantifiable at present. Instead, at this point, we have developed 16 questions the AFCI program should answer and suggest an approach of determining for each whether relevant options improve meeting each of the program goals. We find that it is not always clear which option is best for a specific question and specific goal; this helps identify key issues for future work. In general, we suggest attempting to create as many win-win decisions (options that are attractive or neutral to most goals) as possible. Thus, to help clarify why the program is exploring the options it is, and to set the stage for future narrowing of options, we have developed 16 questions, as follows: · What are the AFCI program goals? · Which potential waste disposition approaches do we plan for? · What are the major separations, transmutation, and fuel options? · How do we address proliferation resistance? · Which potential energy futures do we plan for? · What potential external triggers do we plan for? · Should we separate uranium? · If we separate uranium, should we recycle it, store it or dispose of it? · Is it practical to plan to fabricate and handle “hot” fuel? · Which transuranic elements (TRU) should be separated and transmuted? · Of those TRU separated, which should be transmuted together? · Should we separate and/or transmute Cs and Sr isotopes that dominate near-term repository heating? · Should we separate and/or transmute very long-lived Tc and I isotopes? · Which separation technology? · What mix of transmutation technologies? · What fuel technology best supports the above decisions?

  9. Underground Wells (Oklahoma)

    Broader source: Energy.gov [DOE]

    Class I, III, IV and V injection wells require a permit issued by the Executive Director of the Department of Environmental Quality; Class V injection wells utilized in the remediation of...

  10. Plugging Abandoned Water Wells

    E-Print Network [OSTI]

    Lesikar, Bruce J.

    2002-02-28T23:59:59.000Z

    This brochure explains the threat of abandoned water wells to groundwater resources and the responsibility and liability of Texas property owners. It offers information to landowners on ways to plug such wells....

  11. Horizontal well circulation tool

    SciTech Connect (OSTI)

    Not Available

    1990-11-06T23:59:59.000Z

    This patent describes an apparatus for securement onto one end of a continuous length of remedial tubing introducible into a subterranean well and concentrically insertable through production tubing previously positioned within the well. The well having a deviated configuration including an entry portion communicating with a curved portion extending downwardly in the well from the entry portion, and a generally linear end portion traversable with a production formation.

  12. Key Physical Mechanisms in Nanostructured Solar Cells

    SciTech Connect (OSTI)

    Dr Stephan Bremner

    2010-07-21T23:59:59.000Z

    The objective of the project was to study both theoretically and experimentally the excitation, recombination and transport properties required for nanostructured solar cells to deliver energy conversion efficiencies well in excess of conventional limits. These objectives were met by concentrating on three key areas, namely, investigation of physical mechanisms present in nanostructured solar cells, characterization of loss mechanisms in nanostructured solar cells and determining the properties required of nanostructured solar cells in order to achieve high efficiency and the design implications.

  13. Tomography increases key rates of quantum-key-distribution protocols

    E-Print Network [OSTI]

    Shun Watanabe; Ryutaroh Matsumoto; Tomohiko Uyematsu

    2008-07-22T23:59:59.000Z

    We construct a practically implementable classical processing for the BB84 protocol and the six-state protocol that fully utilizes the accurate channel estimation method, which is also known as the quantum tomography. Our proposed processing yields at least as high key rate as the standard processing by Shor and Preskill. We show two examples of quantum channels over which the key rate of our proposed processing is strictly higher than the standard processing. In the second example, the BB84 protocol with our proposed processing yields a positive key rate even though the so-called error rate is higher than the 25% limit.

  14. Quantum key distribution with key extracted from basis information

    E-Print Network [OSTI]

    Xiongfeng Ma

    2014-10-20T23:59:59.000Z

    In conventional quantum key distribution protocols, the secure key is normally extracted from the measurement outcomes of the system. Here, a different approach is proposed, where the secure key is extracted from the measurement bases, rather than outcomes. Compared to the original Bennett-Brassard-1984 protocol, the proposed protocol involves no hardware change but modifications in data postprocessing. We show that this protocol is more robust against detector efficiency attacks and photon-number-splitting attacks when practical detectors and photon sources are used.

  15. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  16. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  17. Social Media Ad Metrics Definitions

    E-Print Network [OSTI]

    Collins, Gary S.

    these metrics to encourage growth through consistency. Social media speaks to a new way of understanding howSocial Media Ad Metrics Definitions Released May 2009 #12;Social Media Metrics Definitions © 2008 & Social Media Committee. About the IAB's User-Generated Content & Social Media Committee: The User

  18. GRAPH THEORY STUDY GUIDE 1. Definitions

    E-Print Network [OSTI]

    Cooper, Joshua N.

    GRAPH THEORY STUDY GUIDE 1. Definitions Definition 1 (Partition of A). A set A = A1, ..., Ak. Definition 2 (Vertex set). The set of vertices in a graph denoted by V (G). Definition 3 (Edge set). The set of edges in a graph denoted by E(G). Definition 4 (Order). the number of vertices of a graph G written |G

  19. Plugging Abandoned Water Wells 

    E-Print Network [OSTI]

    Lesikar, Bruce J.

    2002-02-28T23:59:59.000Z

    is one of our state?s most precious resources. Groundwater from aquifers (underground layers of porous rock or sand containing water, into which wells can be drilled) supplies over half of the water used in the state. Protecting the quality of this vital... of Licensing and Regulation (TDLR). Abandoned wells are a threat to our water supply An abandoned well is a direct channel from the surface to the aquifer below. Contaminants that enter a well are introduced directly into the aquifer with no opportunity...

  20. Stimulation Technologies for Deep Well Completions

    SciTech Connect (OSTI)

    Stephen Wolhart

    2005-06-30T23:59:59.000Z

    The Department of Energy (DOE) is sponsoring the Deep Trek Program targeted at improving the economics of drilling and completing deep gas wells. Under the DOE program, Pinnacle Technologies conducted a study to evaluate the stimulation of deep wells. The objective of the project was to review U.S. deep well drilling and stimulation activity, review rock mechanics and fracture growth in deep, high-pressure/temperature wells and evaluate stimulation technology in several key deep plays. This report documents results from this project.

  1. Penrose Well Temperatures

    SciTech Connect (OSTI)

    Christopherson, Karen

    2013-03-15T23:59:59.000Z

    Penrose Well Temperatures Geothermal waters have been encountered in several wells near Penrose in Fremont County, Colorado. Most of the wells were drilled for oil and gas exploration and, in a few cases, production. This ESRI point shapefile utilizes data from 95 wells in and around the Penrose area provided by the Colorado Oil and Gas Conservation Commission (COGCC) database at http://cogcc.state.co.us/ . Temperature data from the database were used to calculate a temperature gradient for each well. This information was then used to estimate temperatures at various depths. Projection: UTM Zone 13 NAD27 Extent: West -105.224871 East -105.027633 North 38.486269 South 38.259507 Originators: Colorado Oil and Gas Conservation Commission (COGCC) Karen Christopherson

  2. Geothermal well stimulation

    SciTech Connect (OSTI)

    Sinclair, A.R.; Pittard, F.J.; Hanold, R.J.

    1980-01-01T23:59:59.000Z

    All available data on proppants and fluids were examined to determine areas in technology that need development for 300 to 500/sup 0/F (150/sup 0/ to 265/sup 0/C) hydrothermal wells. While fluid properties have been examined well into the 450/sup 0/F range, proppants have not been previously tested at elevated temperatures except in a few instances. The latest test data at geothermal temperatures is presented and some possible proppants and fluid systems that can be used are shown. Also discussed are alternative stimulation techniques for geothermal wells.

  3. Isobaric groundwater well

    DOE Patents [OSTI]

    Hubbell, Joel M. (Idaho Falls, ID); Sisson, James B. (Idaho Falls, ID)

    1999-01-01T23:59:59.000Z

    A method of measuring a parameter in a well, under isobaric conditions, including such parameters as hydraulic gradient, pressure, water level, soil moisture content and/or aquifer properties the method as presented comprising providing a casing having first and second opposite ends, and a length between the ends, the casing supporting a transducer having a reference port; placing the casing lengthwise into the well, second end first, with the reference port vented above the water table in the well; and sealing the first end. A system is presented for measuring a parameter in a well, the system comprising a casing having first and second opposite ends, and a length between the ends and being configured to be placed lengthwise into a well second end first; a transducer, the transducer having a reference port, the reference port being vented in the well above the water table, the casing being screened across and above the water table; and a sealing member sealing the first end. In one embodiment, the transducer is a tensiometer transducer and in other described embodiments, another type transducer is used in addition to a tensiometer.

  4. One-way quantum key distribution: Simple upper bound on the secret key rate

    SciTech Connect (OSTI)

    Moroder, Tobias; Luetkenhaus, Norbert [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany); Institute for Quantum Computing, University of Waterloo, 200 University Avenue West, Waterloo, Ontario, N2L 3G1 (Canada); Curty, Marcos [Institute of Theoretical Physics I and Max-Planck Research Group, Institute of Optics, Information and Photonics, University Erlangen-Nuremberg, Staudtstrasse 7, 91058 Erlangen (Germany)

    2006-11-15T23:59:59.000Z

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  5. Subsurface well apparatus

    SciTech Connect (OSTI)

    Rubbo, R.B.; Bangert, D.S.

    1993-07-13T23:59:59.000Z

    An apparatus is described for completing a subterranean well, comprising: a tubular conduit portion made up within a tubular conduit string of the type extending from a point near the surface of the earth to a remote point downwardly within said well and which is in contact with a fluid source within said well, said tubular conduit portion forming an imperforate wall and defining a central bore radially inward and further defining an exterior surface; an activating fluid body in communication with, and disposed at least in-part within, said central bore of tubular conduit portion; signal generating means including at least one sensor member coupled to said exterior surface of said tubular conduit portion for detecting circumferential stress in said imperforate wall defined by said tubular conduit portion and for producing an output signal corresponding thereto; a well bore tool disposed exteriorly of said tubular conduit portion, and including an actuating member for performing at least one desired completion function; and control means responsive to a predetermined output signal from said signal generating means for selectively activating said well bore tool and causing said actuating member to perform at least one desired completion function.

  6. Review of sour service definitions

    SciTech Connect (OSTI)

    McIntyre, D.R.; Boah, J.K. [Saudi Aramco, Dhahran (Saudi Arabia)

    1996-08-01T23:59:59.000Z

    Case histories and laboratory test data are presented to compare the predictive utility of NACE MR0175 with three alternatives. With some exceptions, the MR0175 definition is useful and conservative for most cases. The definition based on water phase pH and hydrogen sulfide (H{sub 2}S) partial pressure, proposed in European Federation of Corrosion (EFC) pub. 16, is not recommended since it does not predict sulfide stress cracking (SSC) in refining environments and presents higher risk of SSC of sweet service materials in certain Arabian Gulf production environments. A modified definition of sour service is proposed, which uses the MR0175 definition except in cases of very low water phase pH. 47 refs., 4 figs., 1 tab.

  7. Crop Insurance Terms and Definitions

    E-Print Network [OSTI]

    Stokes, Kenneth; Waller, Mark L.; Outlaw, Joe; Barnaby, G. A. Art

    2008-10-17T23:59:59.000Z

    This publication is a glossary of terms used by the crop insurance industry. There are definitions for terms used in crop insurance documents and for terms pertaining to coverage levels, farming, reports, units and parties to contracts....

  8. Thermal indicator for wells

    DOE Patents [OSTI]

    Gaven, Jr., Joseph V. (Oakton, VA); Bak, Chan S. (Newbury Park, CA)

    1983-01-01T23:59:59.000Z

    Minute durable plate-like thermal indicators are employed for precision measuring static and dynamic temperatures of well drilling fluids. The indicators are small enough and sufficiently durable to be circulated in the well with drilling fluids during the drilling operation. The indicators include a heat resistant indicating layer, a coacting meltable solid component and a retainer body which serves to unitize each indicator and which may carry permanent indicator identifying indicia. The indicators are recovered from the drilling fluid at ground level by known techniques.

  9. Spacer for deep wells

    SciTech Connect (OSTI)

    Klein, G. D.

    1984-10-23T23:59:59.000Z

    A spacer for use in a deep well that is to have a submersible pump situated downhole and with a string of tubing attached to the pump for delivering the pumped fluid. The pump is electrically driven, and power is supplied via an armored cable which parallels the string of tubing. Spacers are clamped to the cable and have the tubing running through an eccentrically located passage in each spacer. The outside dimensions of a spacer fit freely inside any casing in the well.

  10. Key Issues | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey Issues Key

  11. Stimulation Technologies for Deep Well Completions

    SciTech Connect (OSTI)

    None

    2003-09-30T23:59:59.000Z

    The Department of Energy (DOE) is sponsoring the Deep Trek Program targeted at improving the economics of drilling and completing deep gas wells. Under the DOE program, Pinnacle Technologies is conducting a study to evaluate the stimulation of deep wells. The objective of the project is to assess U.S. deep well drilling & stimulation activity, review rock mechanics & fracture growth in deep, high pressure/temperature wells and evaluate stimulation technology in several key deep plays. An assessment of historical deep gas well drilling activity and forecast of future trends was completed during the first six months of the project; this segment of the project was covered in Technical Project Report No. 1. The second progress report covers the next six months of the project during which efforts were primarily split between summarizing rock mechanics and fracture growth in deep reservoirs and contacting operators about case studies of deep gas well stimulation.

  12. STIMULATION TECHNOLOGIES FOR DEEP WELL COMPLETIONS

    SciTech Connect (OSTI)

    Stephen Wolhart

    2003-06-01T23:59:59.000Z

    The Department of Energy (DOE) is sponsoring a Deep Trek Program targeted at improving the economics of drilling and completing deep gas wells. Under the DOE program, Pinnacle Technologies is conducting a project to evaluate the stimulation of deep wells. The objective of the project is to assess U.S. deep well drilling & stimulation activity, review rock mechanics & fracture growth in deep, high pressure/temperature wells and evaluate stimulation technology in several key deep plays. Phase 1 was recently completed and consisted of assessing deep gas well drilling activity (1995-2007) and an industry survey on deep gas well stimulation practices by region. Of the 29,000 oil, gas and dry holes drilled in 2002, about 300 were drilled in the deep well; 25% were dry, 50% were high temperature/high pressure completions and 25% were simply deep completions. South Texas has about 30% of these wells, Oklahoma 20%, Gulf of Mexico Shelf 15% and the Gulf Coast about 15%. The Rockies represent only 2% of deep drilling. Of the 60 operators who drill deep and HTHP wells, the top 20 drill almost 80% of the wells. Six operators drill half the U.S. deep wells. Deep drilling peaked at 425 wells in 1998 and fell to 250 in 1999. Drilling is expected to rise through 2004 after which drilling should cycle down as overall drilling declines.

  13. Well valve control system

    SciTech Connect (OSTI)

    Schwendemann, K.L.; McCracken, O.W.; Mondon, C.G.; Wortham, L.C.

    1987-01-13T23:59:59.000Z

    A system is described for controlling well testing through an upper and lower test string with a subsea test tree connected therebetween and latch means to release the upper test string from the subsea test tree comprising: a. first and second selectively programmable microprocessor means; b. means for storing system operating limits in each microprocessor means; c. means for changing the operating limits in response to changes in well conditions; d. means for communicating operating fluid pressure to the subsurface test tree and the latch means; e. solenoid pilot valves controlling the flow of the operating fluid pressure to the subsea test tree and the latch means; f. the first microprocessor means located at a central control console; g. the second microprocessor means located near the solenoid valves; h. means for transmitting signals between the first and second microprocessor means and validating the accuracy of the signals; and i. electronic circuits to control operation of the solenoid valves in response to validated signals.

  14. Shock Chlorination of Wells

    E-Print Network [OSTI]

    McFarland, Mark L.; Dozier, Monty

    2003-06-11T23:59:59.000Z

    method) will be necessary to ensure the safety of the water supply. Shock chlorination introduces very high levels of chlorine into a water system. During the disinfec- tion process, water from the system is not suitable for consumption and neither people... system or other continuous disinfection sys- tem. For more information about wellhead protection, see the Tex-A-Syst rural water well assessment pub- lications (B-6023 through B-6032) available from Texas Cooperative Extension. 3 This publication...

  15. Decontaminating Flooded Wells

    E-Print Network [OSTI]

    Boellstorff, Diana; Dozier, Monty; Provin, Tony; Dictson, Nikkoal; McFarland, Mark L.

    2005-09-30T23:59:59.000Z

    ER-011 6-06 Mark L. McFarland, Associate Professor and Extension Water Resources Specialist; Diane E. Boellstorff, Program Specialist Water Quality; Tony L. Provin, Associate Professor and Extension Soil Chemist; Monty C. Dozier, Assistant... and local hospitals may also test water samples for bacteria. The cost of the test ranges from $8 to $30, depending on the lab. Well disinfection does not eliminate hydrocarbons (fuels, oils), pesticides, heavy metals or other types of nonbiological...

  16. Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud- sociated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof

  17. Security Notions for Quantum Public-Key Cryptography

    E-Print Network [OSTI]

    Takeshi Koshiba

    2007-02-19T23:59:59.000Z

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  18. DEFINITIONS / KEY WORDS POSSIBLE DUTIES EXAMPLE TITLE NAMES A person who works to someone else's

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    these types of jobs are identified using only Custodian, Janitor, Housekeeper, etc. 1,2 Apprentice Apprentice Woodworker, Apprentice Weaver, Apprentice Blacksmith, etc 1,2 Office / Admin. Manage ment assist in training an apprentice or managing other workers. A highly skilled workman, artisan

  19. Key Opportunities and Challenges for Program Sustainability ...

    Energy Savers [EERE]

    Key Opportunities and Challenges for Program Sustainability Key Opportunities and Challenges for Program Sustainability Better Buildings Neighborhood Program, Peer Exchange Call:...

  20. A theory of jet definition

    E-Print Network [OSTI]

    Fyodor V. Tkachov

    2000-01-11T23:59:59.000Z

    A systematic framework for jet definition is developed from first principles of physical measurement, quantum field theory, and QCD. A jet definition is found which: is theoretically optimal in regard of both minimization of detector errors and inversion of hadronization; is similar to a cone algorithm with dynamically negotiated jet shapes and positions found via shape observables that generalize the thrust to any number of axes; involves no ad hoc conventions; allows a fast computer implementation [hep-ph/9912415]. The framework offers an array of options for systematic construction of quasi-optimal observables for specific applications.

  1. Development Wells At Salt Wells Area (Nevada Bureau of Mines...

    Open Energy Info (EERE)

    Salt Wells Area (Nevada Bureau of Mines and Geology, 2009) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Development Wells At Salt Wells Area...

  2. NREL: Energy Analysis - Key Activities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster To contactK-12BSM -JEDI JobsKey

  3. Key Activities | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov.Energy02.pdf7 OPAMEnergyInvestigativeCoggin AboutofKathleen HoganKenKeyAbout

  4. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyThe

  5. Key Activities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005 at IowaSecretaryDepartmentJointof Energy 30,ANDNovember 17,KeyTheThe

  6. Quantum Key Distribution with Qubit Pairs

    E-Print Network [OSTI]

    Mohd Asad Siddiqui; Tabish Qureshi

    2014-07-17T23:59:59.000Z

    We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob, each in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob's secure key in order to match Alice's secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

  7. Well Monitoring Systems for EGS

    Broader source: Energy.gov (indexed) [DOE]

    cost for well stimulation and improves reservoir tracking. * Well stimulation through hydro-fracturing is very expensive - Our system can be in the well before stimulation,...

  8. COLLEGE AVE CAMPUS (CAC) KEY PICK UP

    E-Print Network [OSTI]

    COLLEGE AVE CAMPUS (CAC) KEY PICK UP NOTE TO ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You in and key pick up. If you are unable to pick up your key by 5:00 p.m. on September 1st , please make prior in Clothier Hall on CAC. Keys not picked up during the above-noted hours can be picked up at the Housing

  9. Entropy and Energy: Toward a Definition of Physical Sustainability

    E-Print Network [OSTI]

    Hermanowicz, Slawomir W

    2005-01-01T23:59:59.000Z

    usefulness of entropy-energy definition of sustainability asEntropy and Energy: Toward a Definition of Physicaland energy should be included in the desired definition of

  10. A Natural Definition of Random Language Keith Wansbrough*

    E-Print Network [OSTI]

    Wansbrough, Keith

    Introduction Algorithmic Information Theory (AIT) provides definitions of randomness for strings A Natural Definition of Random Language Keith Wansbrough* October 13, 1995 Abstract We propose a natural definition

  11. Single-Well and Cross-Well Seismic At Salt Wells Area (Bureau...

    Open Energy Info (EERE)

    Seismic At Salt Wells Area (Bureau of Land Management, 2009) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Activity: Single-Well and Cross-Well Seismic...

  12. LBNL-63807, REV. 1 International Experience with Key

    E-Print Network [OSTI]

    -setting agreement programs calls for establishment of a coordinated set of policies that provide strong economic incentives as well as technical and financial support to participating industries. The key program elements protocols, development of incentives and supporting policies, monitoring progress toward targets

  13. Well-pump alignment system

    DOE Patents [OSTI]

    Drumheller, Douglas S. (Cedar Crest, NM)

    1998-01-01T23:59:59.000Z

    An improved well-pump for geothermal wells, an alignment system for a well-pump, and to a method for aligning a rotor and stator within a well-pump, wherein the well-pump has a whistle assembly formed at a bottom portion thereof, such that variations in the frequency of the whistle, indicating misalignment, may be monitored during pumping.

  14. Key Workplace Documents Federal Publications

    E-Print Network [OSTI]

    recognized labor standards and the cross-border movement of workers have been addressed by international organizations, as well as in U.S. trade legislation and recent trade agreements. #12;1 International Cooperation and the transboundary movement of workers--have been addressed by the International Labour Organization (ILO), the World

  15. Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid Turner David3 |A Sign In About | Careers |

  16. Definitions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITIONPortal Decision Support forDeep InsightsLANS

  17. Well Permits (District of Columbia)

    Broader source: Energy.gov [DOE]

    Well permits are required for the installation of wells in private and public space. Wells are defined as any trest hole, shaft, or soil excavation created by any means including, but not limited...

  18. Quantum Key Distribution with Screening and Analyzing

    E-Print Network [OSTI]

    Won-Ho Kye

    2006-10-04T23:59:59.000Z

    We propose a quantum key distribution scheme by using screening angles and analyzing detectors which enable to notice the presence of Eve who eavesdrops the quantum channel, as the revised protocol of the recent quantum key distribution [Phys. Rev. Lett. 95, 040501 (2005)]. We discuss the security of the proposed quantum key distribution against various attacks including impersonation attack and Trojan Horse attack.

  19. Lightweight Key Establishment for Distributed Networking Environments

    E-Print Network [OSTI]

    Martin, Keith

    / COSIC Seminar 2007 Keith Martin #12;Lightweight Key Establishment/Introduction The plan 1. Wireless sensor networks 2. A key establishment framework 3. Key establishment for grids COSIC Seminar 2007 Keith Establishment/Wireless sensor networks The "classical" scenario COSIC Seminar 2007 Keith Martin #12;Lightweight

  20. Robert Keys Jr Oral History

    E-Print Network [OSTI]

    Keys, Robert Jr; Nelson, Ben

    2009-12-07T23:59:59.000Z

    -island cruise for several days. Got to visit Patmos and Crete and also Ephesus in Turkey. So that was very good. We only spent a couple hours in Ephesus and you could easily spend a whole day there. Next time I go we’ll have to make sure we spend all day... there, but there’s a lot to see in Ephesus. So I guess those would be the highlights that come off the top of my head. Me: Yeah, that’s great. I guess is there anything else you’d like to share before we finish this up. DRK: Has it been an hour...

  1. Well-pump alignment system

    DOE Patents [OSTI]

    Drumheller, D.S.

    1998-10-20T23:59:59.000Z

    An improved well-pump for geothermal wells, an alignment system for a well-pump, and to a method for aligning a rotor and stator within a well-pump are disclosed, wherein the well-pump has a whistle assembly formed at a bottom portion thereof, such that variations in the frequency of the whistle, indicating misalignment, may be monitored during pumping. 6 figs.

  2. 13 Lyapunov stability Definition 13.1 (Positive definite). We say that V (x, y) is positive definite, if V (x, y) 0

    E-Print Network [OSTI]

    Karageorgis, Paschalis

    13 Lyapunov stability Definition 13.1 (Positive definite). We say that V (x, y) is positive definite, if V (x, y) 0 at all points and if equality holds only at the origin. Definition 13.2 (Lyapunov functions). Suppose that V (x, y) is continuous and positive definite. Then we say that V is a Lyapunov

  3. Consortium for Petroleum & Natural Gas Stripper Wells

    SciTech Connect (OSTI)

    Joel L. Morrison; Sharon L. Elder

    2007-03-31T23:59:59.000Z

    The Pennsylvania State University, under contract to the U.S. Department of Energy (DOE), National Energy Technology Laboratory (NETL), established a national industry-driven Stripper Well Consortium (SWC) that is focused on improving the production performance of domestic petroleum and/or natural gas stripper wells. The SWC represents a partnership between U.S. petroleum and natural gas producers, trade associations, state funding agencies, academia, and the NETL. This document serves as the twelfth quarterly technical progress report for the SWC. Key activities for this reporting period included: (1) Drafting and releasing the 2007 Request for Proposals; (2) Securing a meeting facility, scheduling and drafting plans for the 2007 Spring Proposal Meeting; (3) Conducting elections and announcing representatives for the four 2007-2008 Executive Council seats; (4) 2005 Final Project Reports; (5) Personal Digital Assistant Workshops scheduled; and (6) Communications and outreach.

  4. Efficiency in Quantum Key Distribution Protocols with Entangled Gaussian States

    E-Print Network [OSTI]

    C. Rodó; O. Romero-Isart; K. Eckert; A. Sanpera

    2007-03-21T23:59:59.000Z

    Quantum key distribution (QKD) refers to specific quantum strategies which permit the secure distribution of a secret key between two parties that wish to communicate secretly. Quantum cryptography has proven unconditionally secure in ideal scenarios and has been successfully implemented using quantum states with finite (discrete) as well as infinite (continuous) degrees of freedom. Here, we analyze the efficiency of QKD protocols that use as a resource entangled gaussian states and gaussian operations only. In this framework, it has already been shown that QKD is possible (M. Navascu\\'es et al. Phys. Rev. Lett. 94, 010502 (2005)) but the issue of its efficiency has not been considered. We propose a figure of merit (the efficiency $E$) to quantify the number of classical correlated bits that can be used to distill a key from a sample of $N$ entangled states. We relate the efficiency of the protocol to the entanglement and purity of the states shared between the parties.

  5. U.S. Department of Energy Project Definition Rating Index Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-07-22T23:59:59.000Z

    This Guide assists individuals and teams involved in conducting assessments of project definition (i.e., how well front-end planning has been conducted to define project scope) using a numerical project management tool developed by the Construction Industry Institute (CII), tailored for DOE use. Called the Project Definition Rating Index (PDRI), the PDRI is a simple but powerful tool that facilitates the measurement of the degree of scope definition for completeness for traditional construction projects, both nuclear and non-nuclear. No cancellations.

  6. Thermal well-test method

    DOE Patents [OSTI]

    Tsang, Chin-Fu (Albany, CA); Doughty, Christine A. (Berkeley, CA)

    1985-01-01T23:59:59.000Z

    A well-test method involving injection of hot (or cold) water into a groundwater aquifer, or injecting cold water into a geothermal reservoir. By making temperature measurements at various depths in one or more observation wells, certain properties of the aquifer are determined. These properties, not obtainable from conventional well test procedures, include the permeability anisotropy, and layering in the aquifer, and in-situ thermal properties. The temperature measurements at various depths are obtained from thermistors mounted in the observation wells.

  7. Horizontal well turbulizer and method

    SciTech Connect (OSTI)

    Hopmann, M.E.

    1990-03-20T23:59:59.000Z

    This patent describes an apparatus for securement onto one end of a continuous length of remedial tubing introduceable into a subterranean well and concentrically insertable through production tubing previously positioned within the well. The well having a deviated configuration including an entry portion communicating with a curved portion extending downwardly in the well from the entry portion, and a generally linear end portion traversable with a production formation.

  8. Counterfactual quantum key distribution with high efficiency

    SciTech Connect (OSTI)

    Sun Ying [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Beijing Electronic Science and Technology Institute, Beijing 100070 (China); Wen Qiaoyan [State Key Laboratory of Networking and SwitchingTechnology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-11-15T23:59:59.000Z

    In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.

  9. Florida Keys Electric Cooperative- Residential Rebate Program

    Broader source: Energy.gov [DOE]

    Florida Keys Electric Cooperative offers residential members rebates for installing energy efficient measures. To qualify for rebates, members must first call FKEC and make an appointment for a...

  10. Brain Receptor Structures Key to Future Therapeutics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brain Receptor Structures Key to Future Therapeutics Print With an aging population in America, it is more important than ever to discover ways to treat or prevent diseases...

  11. SELECTION AND TREATMENT OF STRIPPER GAS WELLS FOR PRODUCTION ENHANCEMENT, MOCANE-LAVERNE FIELD, OKLAHOMA

    SciTech Connect (OSTI)

    Scott Reeves; Buckley Walsh

    2003-08-01T23:59:59.000Z

    In 1996, Advanced Resources International (ARI) began performing R&D targeted at enhancing production and reserves from natural gas fields. The impetus for the effort was a series of field R&D projects in the early-to-mid 1990's, in eastern coalbed methane and gas shales plays, where well remediation and production enhancement had been successfully demonstrated. As a first step in the R&D effort, an assessment was made of the potential for restimulation to provide meaningful reserve additions to the U.S. gas resource base, and what technologies were needed to do so. That work concluded that: (1) A significant resource base did exist via restimulation (multiples of Tcf). (2) The greatest opportunities existed in non-conventional plays where completion practices were (relatively) complex and technology advancement was rapid. (3) Accurate candidate selection is the greatest single factor that contributes to a successful restimulation program. With these findings, a field-oriented program targeted at tight sand formations was initiated to develop and demonstrate successful candidate recognition technology. In that program, which concluded in 2001, nine wells were restimulated in the Green River, Piceance and East Texas basins, which in total added 2.9 Bcf of reserves at an average cost of $0.26/Mcf. In addition, it was found that in complex and heterogeneous reservoirs (such as tight sand formations), candidate selection procedures should involve a combination of fundamental engineering and advanced pattern recognition approaches, and that simple statistical methods for identifying candidate wells are not effective. In mid-2000, the U.S. Department of Energy (DOE) awarded ARI an R&D contract to determine if the methods employed in that project could also be applied to stripper gas wells. In addition, the ability of those approaches to identify more general production enhancement opportunities (beyond only restimulation), such as via artificial lift and compression, was also sought. A key challenge in this effort was that, whereas the earlier work suggested that better (producing) wells tended to make better restimulation candidates, stripper wells are by definition low-volume producers (either due to low pressure, low permeability, or both). Nevertheless, the potential application of this technology was believed to hold promise for enhancing production for the thousands of stripper gas wells that exist in the U.S. today. The overall procedure for the project was to select a field test site, apply the candidate recognition methodology to select wells for remediation, remediate them, and gauge project success based on the field results. This report summarizes the activities and results of that project.

  12. Temperature Prediction Model for Horizontal Well with Multiple Fractures in Shale Reservoir

    E-Print Network [OSTI]

    Yoshida, Nozomu

    2013-04-12T23:59:59.000Z

    Fracture diagnostics is a key technology for well performance prediction of a horizontal well in a shale reservoir. The combination of multiple fracture diagnostic techniques gives reliable results, and temperature data has potential to provide more...

  13. Well having inhibited microbial growth

    DOE Patents [OSTI]

    Lee, Brady D.; Dooley, Kirk J.

    2006-08-15T23:59:59.000Z

    The invention includes methods of inhibiting microbial growth in a well. A packing material containing a mixture of a first material and an antimicrobial agent is provided to at least partially fill a well bore. One or more access tubes are provided in an annular space around a casing within the well bore. The access tubes have a first terminal opening located at or above a ground surface and have a length that extends from the first terminal opening at least part of the depth of the well bore. The access tubes have a second terminal opening located within the well bore. An antimicrobial material is supplied into the well bore through the first terminal opening of the access tubes. The invention also includes well constructs.

  14. Definition RX Evaluate Kernels K-2d K-1d Change By definition undefined

    E-Print Network [OSTI]

    Theiler, James

    Definition RX Evaluate Kernels K-2d K-1d Change By def·i·ni·tion undefined Adventures in anomaly Alamos National Laboratory Research supported by the United States Department of Energy through the Los Alamos Laboratory Directed Research and Development (LDRD) Program. #12;Theiler LA-UR-14-24429 Definition

  15. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    SciTech Connect (OSTI)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01T23:59:59.000Z

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  16. Secure key distribution by swapping quantum entanglement

    SciTech Connect (OSTI)

    Song, Daegene [National Institute of Standards and Technology, 100 Bureau Drive, MS 8910, Gaithersburg, Maryland 20899 (United States)

    2004-03-01T23:59:59.000Z

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes.

  17. On quantum key distribution using ququarts

    SciTech Connect (OSTI)

    Kulik, S. P., E-mail: Sergei.Kulik@gmail.com; Shurupov, A. P. [Moscow State University (Russian Federation)

    2007-05-15T23:59:59.000Z

    A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

  18. A Natural Definition of Random Language Keith Wansbrough \\Lambda

    E-Print Network [OSTI]

    Wansbrough, Keith

    definition. 1 Introduction Algorithmic Information Theory (AIT) provides definitions of randomnessA Natural Definition of Random Language Keith Wansbrough \\Lambda October 13, 1995 Abstract We propose a natural definition of random language, based on the standard AIT definitions of random string

  19. Thermal well-test method

    DOE Patents [OSTI]

    Tsang, C.F.; Doughty, C.A.

    1984-02-24T23:59:59.000Z

    A well-test method involving injection of hot (or cold) water into a groundwater aquifer, or injecting cold water into a geothermal reservoir is disclosed. By making temperature measurements at various depths in one or more observation wells, certain properties of the aquifer are determined. These properties, not obtainable from conventional well test procedures, include the permeability anisotropy, and layering in the aquifer, and in-situ thermal properties. The temperature measurements at various depths are obtained from thermistors mounted in the observation wells.

  20. Well Monitoring System for EGS

    Broader source: Energy.gov (indexed) [DOE]

    Peer Review Well Monitoring Systems for EGS Principal Investigator Randy Normann Perma Works LLC May 19, 2010 This presentation does not contain any proprietary confidential, or...

  1. Information-Theoretic Key Agreement of Multiple Terminals -Part I: Source Model

    E-Print Network [OSTI]

    Anantharam, Venkat

    1 Information-Theoretic Key Agreement of Multiple Terminals - Part I: Source Model Amin Aminzadeh the widely studied source model. In the source model the terminals wishing to generate a secret key, as well of jointly distributed random variables, after which the terminals are allowed interactive authenticated

  2. Well descriptions for geothermal drilling

    SciTech Connect (OSTI)

    Carson, C.C.; Livesay, B.J.

    1981-01-01T23:59:59.000Z

    Generic well models have been constructed for eight major geothermal resource areas. The models define representative times and costs associated with the individual operations that can be expected during drilling and completion of geothermal wells. They were made for and have been used to evaluate the impacts of potential new technologies. Their nature, their construction, and their validation are discussed.

  3. Any realistic theory must be computationally realistic: a response to N. Gisin's definition of a Realistic Physics Theory

    E-Print Network [OSTI]

    Arkady Bolotin

    2014-01-14T23:59:59.000Z

    It is argued that the recent definition of a realistic physics theory by N. Gisin cannot be considered comprehensive unless it is supplemented with requirement that any realistic theory must be computationally realistic as well.

  4. Optimization of fractured well performance of horizontal gas wells

    E-Print Network [OSTI]

    Magalhaes, Fellipe Vieira

    2009-06-02T23:59:59.000Z

    In low-permeability gas reservoirs, horizontal wells have been used to increase the reservoir contact area, and hydraulic fracturing has been further extending the contact between wellbores and reservoirs. This thesis presents an approach...

  5. Consistent Query Answering Of Conjunctive Queries Under Primary Key Constraints

    E-Print Network [OSTI]

    Pema, Enela

    2014-01-01T23:59:59.000Z

    Queries and Primary Key Constraints . . . . . . . . . .of Employee w.r.t. the primary key SSN ? {name, salary} . .query answering under primary keys: a characterization of

  6. Captured key electrical safety lockout system

    SciTech Connect (OSTI)

    Darimont, Daniel E. (Aurora, IL)

    1995-01-01T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  7. Captured key electrical safety lockout system

    DOE Patents [OSTI]

    Darimont, D.E.

    1995-10-31T23:59:59.000Z

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  8. Experimental study of high speed polarization-coding quantum key distribution with sifted-key

    E-Print Network [OSTI]

    and links 1. C. H. Bennet and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing

  9. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  10. Quantum well multijunction photovoltaic cell

    DOE Patents [OSTI]

    Chaffin, R.J.; Osbourn, G.C.

    1983-07-08T23:59:59.000Z

    A monolithic, quantum well, multilayer photovoltaic cell comprises a p-n junction comprising a p-region on one side and an n-region on the other side, each of which regions comprises a series of at least three semiconductor layers, all p-type in the p-region and all n-type in the n-region; each of said series of layers comprising alternating barrier and quantum well layers, each barrier layer comprising a semiconductor material having a first bandgap and each quantum well layer comprising a semiconductor material having a second bandgap when in bulk thickness which is narrower than said first bandgap, the barrier layers sandwiching each quantum well layer and each quantum well layer being sufficiently thin that the width of its bandgap is between said first and second bandgaps, such that radiation incident on said cell and above an energy determined by the bandgap of the quantum well layers will be absorbed and will produce an electrical potential across said junction.

  11. Key Implications of the Global Economic Environment

    E-Print Network [OSTI]

    Lansky, Joshua

    Key Implications of the Global Economic Environment For PCT Filings: A Survey of the Issues DMI...............................................................................9 Annex 1: Incentives for Patent Filing: The Analytical Framework...........................11 I-1 Intellectual property, innovation, and economic growth.................................13 2-2 Individual

  12. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  13. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING FINE-TUNE THE FUNDAMENTALS DRIVE SAFELY WORK WEEK: FRIDAY an occasional refresher. In fact, most company fleet safety programs emphasize basic skills and defensive

  14. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  15. Pushing the Frontier of High-Definition Ion Mobility Spectrometry...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Frontier of High-Definition Ion Mobility Spectrometry Using FAIMS. Pushing the Frontier of High-Definition Ion Mobility Spectrometry Using FAIMS. Abstract: Differential ion...

  16. BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS

    E-Print Network [OSTI]

    BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS Running title: BLOCK the loss of positive definiteness in the approximate equations. Therefore previous analyses have

  17. Mathematical definition of quantum field theory on a manifold

    E-Print Network [OSTI]

    A. V. Stoyanovsky

    2009-11-21T23:59:59.000Z

    We give a mathematical definition of quantum field theory on a manifold, and definition of quantization of a classical field theory given by a variational principle.

  18. Multipartite secret key distillation and bound entanglement

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-25T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted GHZ structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with help of the privacy squeezing technique.

  19. Multipartite secret key distillation and bound entanglement

    SciTech Connect (OSTI)

    Augusiak, Remigiusz; Horodecki, Pawel [Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland) and ICFO-Institute Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona) (Spain); Faculty of Applied Physics and Mathematics, Gdansk University of Technology, Narutowicza 11/12, 80-952 Gdansk (Poland)

    2009-10-15T23:59:59.000Z

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  20. Effects of a Highway Improvement Project on Florida key Deer

    E-Print Network [OSTI]

    Parker, Israel D.; Braden, Anthony W.; Lopez, Roel R.; Silvy, Nova J.; Davis, Donald S.; Owen, Catherine B.

    2007-01-01T23:59:59.000Z

    the primary inter-island roadway in the Florida Keys. DVCsprimary source of mortality for the endangered Florida Key

  1. Definition of a 'Zero Net Energy' Community

    SciTech Connect (OSTI)

    Carlisle, N.; Van Geet, O.; Pless, S.

    2009-11-01T23:59:59.000Z

    This document provides a definition for a net zero-energy community. A community that offsets all of its energy use from renewables available within the community's built environment.

  2. Department of Bioengineering Definition of Biomedical Engineering

    E-Print Network [OSTI]

    is a discipline that advances knowledge in engineering, biology and medicine, and improves human health throughDepartment of Bioengineering Definition of Biomedical Engineering Biomedical engineering cross-disciplinary activities that integrate the engineering sciences with the biomedical sciences

  3. Quantal Definition of the Weak Equivalence Principle

    E-Print Network [OSTI]

    Abel Camacho; Arturo Camacho-Guardian

    2008-11-03T23:59:59.000Z

    The present work analyzes the meaning of the Weak Equivalence Principle in the context of quantum mechanics. A quantal definition for this principle is introduced. This definition does not require the concept of trajectory and relies upon the phase shift induced by a gravitational field in the context of a quantum interference experiment of two coherent beams of particles. In other words, it resorts to wave properties of the system and not to classical concepts as the idea of trajectory.

  4. ADVANCED CEMENTS FOR GEOTHERMAL WELLS

    SciTech Connect (OSTI)

    SUGAMA,T.

    2007-01-01T23:59:59.000Z

    Using the conventional well cements consisting of the calcium silicate hydrates (CaO-SiO{sub 2}-H{sub 2}O system) and calcium aluminum silicate hydrates (CaO-Al{sub 2}O{sub 3}-SiO{sub 2}-H{sub 2}O system) for the integrity of geothermal wells, the serious concern confronting the cementing industries was their poor performance in mechanically supporting the metallic well casing pipes and in mitigating the pipe's corrosion in very harsh geothermal reservoirs. These difficulties are particularly acute in two geological regions: One is the deep hot downhole area ({approx} 1700 m depth at temperatures of {approx} 320 C) that contains hyper saline water with high concentrations of CO{sub 2} (> 40,000 ppm) in conjunction with {approx} 100 ppm H{sub 2}S at a mild acid of pH {approx} 5.0; the other is the upper well region between the well's surface and {approx} 1000 m depth at temperatures up to 200 C. The specific environment of the latter region is characterized by highly concentrated H{sub 2}SO{sub 4} (pH < 1.5) brine containing at least 5000 ppm CO{sub 2}. When these conventional cements are emplaced in these harsh environments, their major shortcoming is their susceptibility to reactions with hot CO{sub 2} and H{sub 2}SO4, thereby causing their deterioration brought about by CO{sub 2}-catalyzed carbonation and acid-initiated erosion. Such degradation not only reduced rapidly the strength of cements, lowering the mechanical support of casing pipes, but also increased the extent of permeability of the brine through the cement layer, promoting the rate of the pipe's corrosion. Severely carbonated and acid eroded cements often impaired the integrity of a well in less than one year; in the worst cases, casings have collapsed within three months, leading to the need for costly and time-consuming repairs or redrilling operations. These were the reasons why the geothermal well drilling and cementing industries were concerned about using conventional well cements, and further their deterioration was a major impediment in expediting the development of geothermal energy resources.

  5. Sampling for Bacteria in Wells

    E-Print Network [OSTI]

    Lesikar, Bruce J.

    2001-11-15T23:59:59.000Z

    Sampling for Bacteria in Wells E-126 11/01 Water samples for bacteria tests must always be col- lected in a sterile container. The procedure for collect- ing a water sample is as follows: 1. Obtain a sterile container from a Health Department...

  6. Process for cementing geothermal wells

    DOE Patents [OSTI]

    Eilers, Louis H. (Inola, OK)

    1985-01-01T23:59:59.000Z

    A pumpable slurry of coal-filled furfuryl alcohol, furfural, and/or a low molecular weight mono- or copolymer thereof containing, preferably, a catalytic amount of a soluble acid catalyst is used to cement a casing in a geothermal well.

  7. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    SciTech Connect (OSTI)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15T23:59:59.000Z

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  8. Reference-frame-independent quantum key distribution

    SciTech Connect (OSTI)

    Laing, Anthony; Rarity, John G.; O'Brien, Jeremy L. [Centre for Quantum Photonics, H. H. Wills Physics Laboratory and Department of Electrical and Electronic Engineering, University of Bristol, BS8 1UB (United Kingdom); Scarani, Valerio [Centre for Quantum Technologies and Department of Physics, National University of Singapore (Singapore)

    2010-07-15T23:59:59.000Z

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three-dimensional qutrit case.

  9. A definition of thermodynamic entropy valid for non-equilibrium states and few-particle systems

    E-Print Network [OSTI]

    Gian Paolo Beretta; Enzo Zanchini

    2014-11-19T23:59:59.000Z

    From a new rigorous formulation of the general axiomatic foundations of thermodynamics we derive an operational definition of entropy that responds to the emergent need in many technological frameworks to understand and deploy thermodynamic entropy well beyond the traditional realm of equilibrium states of macroscopic systems. The new definition is achieved by avoiding to resort to the traditional concepts of "heat" (which restricts $a$ $priori$ the traditional definitions of entropy to the equilibrium domain) and of "thermal reservoir" (which restricts $in$ $practice$ our previous definitions of non-equilibrium entropy to the many-particle domain). The measurement procedure that defines entropy is free from intrinsic limitations and can be applied, $in$ $principle$, even to non-equilibrium states of few-particle systems, provided they are separable and uncorrelated. The construction starts from a previously developed set of carefully worded operational definitions for all the basic concepts. Then, through a new set of fully spelled-out fundamental hypotheses (four postulates and five assumptions) we derive the definitions of energy and entropy of any state, and of temperature of any stable equilibrium state. Finally, we prove the principle of entropy non-decrease, the additivity of entropy differences, the maximum entropy principle, and the impossibility of existence of a thermal reservoir.

  10. Quantum repeaters and quantum key distribution: the impact of entanglement distillation on the secret key rate

    E-Print Network [OSTI]

    Sylvia Bratzik; Silvestre Abruzzo; Hermann Kampermann; Dagmar Bruß

    2013-03-14T23:59:59.000Z

    We investigate quantum repeaters in the context of quantum key distribution. We optimize the secret key rate per memory per second with respect to different distillation protocols and distillation strategies. For this purpose, we also derive an analytical expression for the average number of entangled pairs created by the quantum repeater, including classical communication times for entanglement swapping and entanglement distillation. We investigate the impact of this classical communication time on the secret key rate. We finally study the effect of the detector efficiency on the secret key rate.

  11. A new well surveying tool

    E-Print Network [OSTI]

    Haghighi, Manuchehr Mehdizabeh

    1966-01-01T23:59:59.000Z

    A NEW WELL SURVEYING TOOL A Thesis By MANUCHEHR MEHDIZABEH HAGHIGHI Submitted to the Graduate College of the Texas ANM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major Subject: PETROLEUM... by Surveying Device for S and 19 , N and 41 . 21 3. Comparison of Measured Angles and Angles Indicated by Surveying Device for NE snd 9 , W and 45 . . . . . . . ~ 22 ABSTRNl T Ever since the advent of rotary drilling the petroleum industry has been...

  12. Rigorous and General Definition of Thermodynamic Entropy

    E-Print Network [OSTI]

    Gian Paolo Beretta; Enzo Zanchini

    2010-10-05T23:59:59.000Z

    The physical foundations of a variety of emerging technologies --- ranging from the applications of quantum entanglement in quantum information to the applications of nonequilibrium bulk and interface phenomena in microfluidics, biology, materials science, energy engineering, etc. --- require understanding thermodynamic entropy beyond the equilibrium realm of its traditional definition. This paper presents a rigorous logical scheme that provides a generalized definition of entropy free of the usual unnecessary assumptions which constrain the theory to the equilibrium domain. The scheme is based on carefully worded operative definitions for all the fundamental concepts employed, including those of system, property, state, isolated system, environment, process, separable system, system uncorrelated from its environment, and parameters of a system. The treatment considers also systems with movable internal walls and/or semipermeable walls, with chemical reactions and/or external force fields, and with small numbers of particles. The definition of reversible process is revised by introducing the new concept of scenario. The definition of entropy involves neither the concept of heat nor that of quasistatic process; it applies to both equilibrium and nonequilibrium states. The role of correlations on the domain of definition and on the additivity of energy and entropy is discussed: it is proved that energy is defined and additive for all separable systems, while entropy is defined and additive only for separable systems uncorrelated from their environment; decorrelation entropy is defined. The definitions of energy and entropy are extended rigorously to open systems. Finally, to complete the discussion, the existence of the fundamental relation for stable equilibrium states is proved, in our context, for both closed and open systems.

  13. On the Security of Public Key Protocols

    E-Print Network [OSTI]

    Danny Dolev; et al.

    1983-01-01T23:59:59.000Z

    Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an improperly designed protocol could be vulnerable to an active saboteur, one who may impersonate another user or alter the message being transmitted. Several models are formulated in which the security of protocols can be discussed precisely. Algorithms and characteri-zations that can be used to determine protocol security in these models are given.

  14. Key Renewable Energy Opportunities for Oklahoma Tribes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't YourTransport(FactDepartment ofLetter Report: I11IG002RTC3WASTE-TO-ENERGY:KenKeriKey IssuesKEY

  15. Numerical analysis of decoy state quantum key distribution protocols

    SciTech Connect (OSTI)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  16. Pottebaum et al. Event Definition for Intelligent Resource Management Event Definition for the Application of Event

    E-Print Network [OSTI]

    Paliouras, George

    of resource management (use case and demand side) and event processing (technology and supply side). MethodsPottebaum et al. Event Definition for Intelligent Resource Management Event Definition for the Application of Event Processing to Intelligent Resource Management Jens Pottebaum University of Paderborn, C

  17. Sampling for Bacteria in Wells 

    E-Print Network [OSTI]

    Lesikar, Bruce J.

    2001-11-15T23:59:59.000Z

    Sampling for Bacteria in Wells E-126 11/01 Water samples for bacteria tests must always be col- lected in a sterile container. The procedure for collect- ing a water sample is as follows: 1. Obtain a sterile container from a Health Department... immediately after collecting water sample. Refrigerate the sample and transport it to the laborato- ry (in an ice chest) as soon after collection as possible (six hours is best, but up to 30 hours). Many labs will not accept bacteria samples on Friday so check...

  18. Well Deepening | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTri GlobalJump to: navigation,Goff, 2002) |Weedpatch,Welcome NewWell

  19. Production Wells | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt Institute for EnergyWister|Production Wells (Redirected

  20. Observation Wells | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |JilinLuOpenNorth AmericaNorthwestOakdale Electric CoopWells Jump to:

  1. An efficient public key infrastructure revocation mechanism

    E-Print Network [OSTI]

    Collins, Tamara Lyn

    2000-01-01T23:59:59.000Z

    IMPLEMENTATION 35 PKI Structure Key/Certificate Storage in the Repository. PKI User Interface Communication Between Entities. User Interface to RA Communication . . RA to CA Communication CA to Repository Communication. User Interface to Repository... Communication. . . . 42 11 CA to Certificate Repository Communication. . . 43 12 User Interface to Certificate Repository Communication. . . . . . . 44 13 Certificate Creation Process. . . 46 14 Certificate Revocation Process. . 48 15 Certificate Retrieval...

  2. 2 Key Achievements 7 Greenhouse Gas Reduction

    E-Print Network [OSTI]

    Princeton University Reports Contents 2 Key Achievements 7 Greenhouse Gas Reduction Campus Energy was established in 2008, the University has invested $5.3 million in energy-savings projects, resulting in annual of a 5.2-megawatt solar collector field. · Audit the remaining 20 of the top 50 energy- consuming

  3. Roadmap for selected key measurements of LHCb

    E-Print Network [OSTI]

    The LHCb Collaboration; B. Adeva; M. Adinolfi; A. Affolder; Z. Ajaltouni; J. Albrecht; F. Alessio; M. Alexander; P. Alvarez Cartelle; A. A. Alves Jr; S. Amato; Y. Amhis; J. Amoraal; J. Anderson; O. Aquines Gutierrez; L. Arrabito; M. Artuso; E. Aslanides; G. Auriemma; S. Bachmann; Y. Bagaturia; D. S. Bailey; V. Balagura; W. Baldini; MdC. Barandela Pazos; R. J. Barlow; S. Barsuk; A. Bates; C. Bauer; Th. Bauer; A. Bay; I. Bediaga; K. Belous; I. Belyaev; M. Benayoun; G. Bencivenni; R. Bernet; M. -O. Bettler; A. Bizzeti; T. Blake; F. Blanc; C. Blanks; J. Blouw; S. Blusk; A. Bobrov; V. Bocci; A. Bondar; N. Bondar; W. Bonivento; S. Borghi; A. Borgia; E. Bos; T. J. V. Bowcock; C. Bozzi; J. Bressieux; S. Brisbane; M. Britsch; N. H. Brook; H. Brown; A. Büchler-Germann; J. Buytaert; J. -P. Cachemiche; S. Cadeddu; J. M. Caicedo Carvajal; O. Callot; M. Calvi; M. Calvo Gomez; A. Camboni; W. Cameron; P. Campana; A. Carbone; G. Carboni; A. Cardini; L. Carson; K. Carvalho Akiba; G. Casse; M. Cattaneo; M. Charles; Ph. Charpentier; A. Chlopik; P. Ciambrone; X. Cid Vidal; P. J. Clark; P. E. L. Clarke; M. Clemencic; H. V. Cliff; J. Closier; C. Coca; V. Coco; J. Cogan; P. Collins; F. Constantin; G. Conti; A. Contu; G. Corti; G. A. Cowan; B. D'Almagne; C. D'Ambrosio; D. G. d'Enterria; W. Da Silva; P. David; I. De Bonis; S. De Capua; M. De Cian; F. De Lorenzi; J. M. De Miranda; L. De Paula; P. De Simone; H. De Vries; D. Decamp; H. Degaudenzi; M. Deissenroth; L. Del Buono; C. Deplano; O. Deschamps; F. Dettori; J. Dickens; H. Dijkstra; M. Dima; S. Donleavy; A. C. dos Reis; A. Dovbnya; T. Du Pree; P. -Y. Duval; L. Dwyer; R. Dzhelyadin; C. Eames; S. Easo; U. Egede; V. Egorychev; F. Eisele; S. Eisenhardt; L. Eklund; D. Esperante Pereira; L. Estève; S. Eydelman; E. Fanchini; C. Färber; G. Fardell; C. Farinelli; S. Farry; V. Fave; V. Fernandez Albor; M. Ferro-Luzzi; S. Filippov; C. Fitzpatrick; F. Fontanelli; R. Forty; M. Frank; C. Frei; M. Frosini; J. L. Fungueirino Pazos; S. Furcas; A. Gallas Torreira; D. Galli; M. Gandelman; Y. Gao; J-C. Garnier; L. Garrido; C. Gaspar; N. Gauvin; M. Gersabeck; T. Gershon; Ph. Ghez; V. Gibson; Yu. Gilitsky; V. V. Gligorov; C. Göbel; D. Golubkov; A. Golutvin; A. Gomes; M. Grabalosa Gándara; R. Graciani Diaz; L. A. Granado Cardoso; E. Graugés; G. Graziani; A. Grecu; G. Guerrer; E. Gushchin; Yu. Guz; Z. Guzik; T. Gys; F. Hachon; G. Haefeli; S. C. Haines; T. Hampson; S. Hansmann-Menzemer; R. Harji; N. Harnew; P. F. Harrison; J. He; K. Hennessy; P. Henrard; J. A. Hernando Morata; A. Hicheur; E. Hicks; W. Hofmann; K. Holubyev; P. Hopchev; W. Hulsbergen; P. Hunt; T. Huse; R. S. Huston; D. Hutchcroft; V. Iakovenko; C. Iglesias Escudero; J. Imong; R. Jacobsson; M. Jahjah Hussein; E. Jans; F. Jansen; P. Jaton; B. Jean-Marie; M. John; C. R. Jones; B. Jost; F. Kapusta; T. M. Karbach; J. Keaveney; U. Kerzel; T. Ketel; A. Keune; S. Khalil; B. Khanji; Y. M. Kim; M. Knecht; J. Knopf; S. Koblitz; A. Konoplyannikov; P. Koppenburg; I. Korolko; A. Kozlinskiy; M. Krasowski; L. Kravchuk; P. Krokovny; K. Kruzelecki; M. Kucharczyk; I. Kudryashov; T. Kvaratskheliya; D. Lacarrere; A. Lai; R. W. Lambert; G. Lanfranchi; C. Langenbruch; T. Latham; R. Le Gac; R. Lefevre; A. Leflat; J. Lefrançois; O. Leroy; K. Lessnoff; L. Li; Y. Y. Li; J. Libby; M. Lieng; R. Lindner; S. Lindsey; C. Linn; B. Liu; G. Liu; J. H. Lopes; E. Lopez Asamar; J. Luisier; F. Machefert; I. Machikhiliyan; F. Maciuc; O. Maev; J. Magnin; A. Maier; R. M. D. Mamunur; G. Manca; G. Mancinelli; N. Mangiafave; U. Marconi; F. Marin; J. Marks; G. Martellotti; A. Martens; L. Martin; D. Martinez Santos; Z. Mathe; C. Matteuzzi; V. Matveev; A. Mazurov; G. McGregor; B. Mcharek; C. Mclean; R. McNulty; M. Merk; J. Merkel; M. Merkin; R. Messi; F. C. D. Metlica; J. Michalowski; S. Miglioranzi; M. -N. Minard; S. Monteil; D. Moran; J. V. Morris; R. Mountain; I. Mous; F. Muheim; R. Muresan; F. Murtas; B. Muryn; M. Musy; J. Mylroie-Smith; P. Naik; T. Nakada; R. Nandakumar; J. Nardulli; Z. Natkaniec; M. Nedos; M. Needham; N. Neufeld; L. Nicolas; S. Nies; V. Niess; N. Nikitin; A. Noor; A. Oblakowska-Mucha; V. Obraztsov; S. Oggero; O. Okhrimenko; R. Oldeman; M. Orlandea; A. Ostankov; J. Palacios; M. Palutan; J. Panman; A. Papadelis; A. Papanestis; M. Pappagallo; C. Parkes; G. Passaleva; G. D. Patel; M. Patel; S. K. Paterson; G. N. Patrick; E. Pauna; C. Pauna; C. Pavel; A. Pazos Alvarez; A. Pellegrino; G. Penso; M. Pepe Altarelli; S. Perazzini; D. L. Perego; A. Pérez-Calero Yzquierdo; E. Perez Trigo; P. Perret; G. Pessina; A. Petrella; A. Petrolini; B. Pietrzyk; D. Pinci; S. Playfer; M. Plo Casasus; G. Polok; A. Poluektov; E. Polycarpo; D. Popov; B. Popovici; S. Poss; C. Potterat; A. Powell; S. Pozzi; V. Pugatch; A. Puig Navarro; W. Qian; J. H. Rademacker; B. Rakotomiaramanana; I. Raniuk; G. Raven; S. Redford; W. Reece

    2010-11-23T23:59:59.000Z

    Six of the key physics measurements that will be made by the LHCb experiment, concerning CP asymmetries and rare B decays, are discussed in detail. The "road map" towards the precision measurements is presented, including the use of control channels and other techniques to understand the performance of the detector with the first data from the LHC.

  4. Key Management Challenges in Smart Grid

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL] [ORNL; Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC

    2012-01-01T23:59:59.000Z

    Agenda Awarded in February 2011 Team of industry and research organizations Project Objectives Address difficult issues Complexity Diversity of systems Scale Longevity of solution Participate in standards efforts and working groups Develop innovative key management solutions Modeling and simulation ORNL Cyber Security Econometric Enterprise System Demonstrate effectiveness of solution Demonstrate scalability

  5. CHEMICAL ABBREVIATION KEY ABBREVIATION CHEMICAL NAME HAZARDS

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Corrosive - base LiCl Lithium chloride Harmful MeOH Methanol Flammable #12;CHEMICAL ABBREVIATION KEY Irritant destain Methanol,acetic acid,H2O Flammable, Corrosive - acid DI H2O Deionized water DCM FeCl3 Iron(III) chloride Corrosive - acid FeSO4 Iron(II) sulfate Toxic H2O Water HCl Hydrochloric

  6. BACK TO BASICS: YOUR KEYS TO SAFE

    E-Print Network [OSTI]

    Kirschner, Denise

    BACK TO BASICS: YOUR KEYS TO SAFE DRIVING BUCKLE UP! Seat belts should never have time off DRIVE the back seat to the front seat.4 ·The back is the best place for pets. According to AAA, similar. Never place the shoulder portion under your arm or behind your back! ·Drivers should sit with at least

  7. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid and Maria Fernandez-Gimenez This paper discusses developments in our understanding about rangeland ecology and rangeland dynamics in the last 20 years. Before the late 1980's, the mainstream view in range ecology was that livestock

  8. Rangeland ecology: Key global research issues & questions

    E-Print Network [OSTI]

    1 Rangeland ecology: Key global research issues & questions Robin Reid1 and Maria Fernandez Ecology Lab 2Associate Professor Colorado State University, Fort Collins, Colorado, USA Global Issues and Questions in Rangeland Ecology · Despite the focus here on global issues, we need to recognize that Mongolia

  9. Key facts about Argonne National Laboratory

    E-Print Network [OSTI]

    Kemner, Ken

    Key facts about Argonne National Laboratory Argonne National Laboratory occupies 1,500 wooded acres in southeast DuPage County near Chicago. Mission Argonne's mission is to apply a unique blend of world needs of our nation. Argonne conducts R&D in many areas of basic and applied science and engineering

  10. www.defra.gov.uk Environmental Key

    E-Print Network [OSTI]

    ;Environmental Key Performance Indicators Reporting Guidelines for UK Business #12;Department for Environment with the Crown. This publication (excluding the logo) may be reproduced free of charge in any format or medium they operate in, and their impact on the environment, are most likely to prosper in the long-term. At the same

  11. Chemical and Petroleum Engineering Key and Lab Space Agreement

    E-Print Network [OSTI]

    Calgary, University of

    Chemical and Petroleum Engineering Key and Lab Space Agreement Key Holder Information Last Name and Petroleum Engineering remain the property of the Department. I agree to pay a deposit for the keys/Graduate Student Study space that has been assigned. Keys Any keys issued to me from the Department of Chemical

  12. Antitrust Evaluation of Horizontal Mergers: An Economic Alternative to Market Definition

    E-Print Network [OSTI]

    Sadoulet, Elisabeth

    Antitrust Evaluation of Horizontal Mergers: An Economic Alternative to Market Definition 25 between the two firm's products. We argue that our approach is well grounded in economics, workable, Economics and Regulation at Northwestern University and the FTC First Annual Microeconomic Conference

  13. 2014 Manufacturing Energy and Carbon Footprints: Definitions...

    Broader source: Energy.gov (indexed) [DOE]

    and Assumptions A number of key terms are used to interpret the manufacturing energy and carbon footprints. The terms associated with the energy footprint analysis are...

  14. Ultra Thin Quantum Well Materials

    SciTech Connect (OSTI)

    Dr Saeid Ghamaty

    2012-08-16T23:59:59.000Z

    This project has enabled Hi-Z technology Inc. (Hi-Z) to understand how to improve the thermoelectric properties of Si/SiGe Quantum Well Thermoelectric Materials. The research that was completed under this project has enabled Hi-Z Technology, Inc. (Hi-Z) to satisfy the project goal to understand how to improve thermoelectric conversion efficiency and reduce costs by fabricating ultra thin Si/SiGe quantum well (QW) materials and measuring their properties. In addition, Hi-Z gained critical new understanding on how thin film fabrication increases the silicon substrate's electrical conductivity, which is important new knowledge to develop critical material fabrication parameters. QW materials are constructed with alternate layers of an electrical conductor, SiGe and an electrical insulator, Si. Film thicknesses were varied, ranging from 2nm to 10nm where 10 nm was the original film thickness prior to this work. The optimum performance was determined at a Si and SiGe thickness of 4nm for an electrical current and heat flow parallel to the films, which was an important conclusion of this work. Essential new information was obtained on how the Si substrate electrical conductivity increases by up to an order of magnitude upon deposition of QW films. Test measurements and calculations are accurate and include both the quantum well and the substrate. The large increase in substrate electrical conductivity means that a larger portion of the electrical current passes through the substrate. The silicon substrate's increased electrical conductivity is due to inherent impurities and thermal donors which are activated during both molecular beam epitaxy and sputtering deposition of QW materials. Hi-Z's forward looking cost estimations based on future high performance QW modules, in which the best Seebeck coefficient and electrical resistivity are taken from separate samples predict that the electricity cost produced with a QW module could be achieved at <$0.35/W. This price would open many markets for waste heat recovery applications. By installing Hi-Z's materials in applications in which electricity could be produced from waste heat sources could result in significant energy savings as well as emissions reductions. For example, if QW thermoelectric generators could be introduced commercially in 2015, and assuming they could also capture an additional 0.1%/year of the available waste heat from the aluminum, steel, and iron industries, then by 2020, their use would lead to a 2.53 trillion Btu/year reduction in energy consumption. This translates to a $12.9 million/year energy savings, and 383.6 million lb's of CO2 emissions reduction per year. Additionally, Hi-Z would expect that the use of QW TE devices in the automotive, manufacturing, and energy generation industries would reduce the USA's petroleum and fossil fuel dependence, and thus significantly reduce emissions from CO2 and other polluting gasses such as NOx, SOx, and particulate matter (PM), etc.

  15. IMPROVED NATURAL GAS STORAGE WELL REMEDIATION

    SciTech Connect (OSTI)

    James C. Furness; Donald O. Johnson; Michael L. Wilkey; Lynn Furness; Keith Vanderlee; P. David Paulsen

    2001-12-01T23:59:59.000Z

    This report summarizes the research conducted during Budget Period One on the project ''Improved Natural Gas Storage Well Remediation''. The project team consisted of Furness-Newburge, Inc., the technology developer; TechSavants, Inc., the technology validator; and Nicor Technologies, Inc., the technology user. The overall objectives for the project were: (1) To develop, fabricate and test prototype laboratory devices using sonication and underwater plasma to remove scale from natural gas storage well piping and perforations; (2) To modify the laboratory devices into units capable of being used downhole; (3) To test the capability of the downhole units to remove scale in an observation well at a natural gas storage field; (4) To modify (if necessary) and field harden the units and then test the units in two pressurized injection/withdrawal gas storage wells; and (5) To prepare the project's final report. This report covers activities addressing objectives 1-3. Prototype laboratory units were developed, fabricated, and tested. Laboratory testing of the sonication technology indicated that low-frequency sonication was more effective than high-frequency (ultrasonication) at removing scale and rust from pipe sections and tubing. Use of a finned horn instead of a smooth horn improves energy dispersal and increases the efficiency of removal. The chemical data confirmed that rust and scale were removed from the pipe. The sonication technology showed significant potential and technical maturity to warrant a field test. The underwater plasma technology showed a potential for more effective scale and rust removal than the sonication technology. Chemical data from these tests also confirmed the removal of rust and scale from pipe sections and tubing. Focusing of the underwater plasma's energy field through the design and fabrication of a parabolic shield will increase the technology's efficiency. Power delivered to the underwater plasma unit by a sparkplug repeatedly was interrupted by sparkplug failure. The lifecycle for the plugs was less than 10 hours. An electrode feed system for delivering continuous power needs to be designed and developed. As a result, further work on the underwater plasma technology was terminated. It needs development of a new sparking system and a redesign of the pulsed power supply system to enable the unit to operate within a well diameter of less than three inches. Both of these needs were beyond the scope of the project. Meanwhile, the laboratory sonication unit was waterproofed and hardened, enabling the unit to be used as a field prototype, operating at temperatures to 350 F and depths of 15,000 feet. The field prototype was extensively tested at a field service company's test facility before taking it to the field site. The field test was run in August 2001 in a Nicor Gas storage field observation well at Pontiac, Illinois. Segmented bond logs, gamma ray neutron logs, water level measurements and water chemistry samples were obtained before and after the downhole demonstration. Fifteen tests were completed in the field. Results from the water chemistry analysis showed an increase in the range of calcium from 1755-1984 mg/l before testing to 3400-4028 mg/l after testing. For magnesium, the range increased from 285-296 mg/l to 461-480 mg/l. The change in pH from a range of 3.11-3.25 to 8.23-8.45 indicated a buffering of the acidic well water, probably due to the increased calcium available for buffering. The segmented bond logs showed no damage to the cement bond in the well and the gamma ray neutron log showed no increase in the amount of hydrocarbons present in the formation where the testing took place. Thus, the gas storage bubble in the aquifer was not compromised. A review of all the field test data collected documents the fact that the application of low-frequency sonication technology definitely removes scale from well pipe. Phase One of this project took sonication technology from the concept stage through a successful ''proof-of-concept'' downhole application in a natural gas storage field

  16. Preliminary Definitions We now review some notions that will be used in this thesis, as well as the main definition of shuffle

    E-Print Network [OSTI]

    Domaratzki, Michael

    , and is denoted |w|. Note that # is the unique word of length 0. A language L is any subset of # # . If w # # # , we will denote the language consisting only of w by w instead of {w}. For a language L # # # , by |L} . If L # # # , alph(L) = # w#L alph(w). For an alphabet # = {a 1 , a 2 , . . . , a n } with a specified

  17. Preliminary Definitions We now review some notions that will be used in this thesis, as well as the main definition of shuffle

    E-Print Network [OSTI]

    Domaratzki, Michael

    of length 0. A language L is any subset of . If w , we will denote the language consisting only of w by w instead of {w}. For a language L , by |L| we denote its cardinality as a set. Let L be a language, if w = abbaa, then |w|a = 3 and |w|b = 2. If w is a word, alph(w) = {a : |w|a > 0} . If L , alph(L

  18. Building America Expert Meeting: Key Innovations for Adding Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Key Innovations for Adding Energy Efficiency to Maintenance Projects Building America Expert Meeting: Key Innovations for Adding Energy Efficiency to Maintenance Projects This...

  19. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  20. analysis material key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Temperature(C) 200 2 Finite key analysis for symmetric attacks in quantum key distribution Quantum Physics (arXiv) Summary: We introduce a constructive method to calculate...

  1. Cooling Towers: Understanding Key Components of Cooling Towers...

    Office of Environmental Management (EM)

    Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve Water Efficiency Cooling Towers: Understanding Key Components of Cooling Towers and How to Improve...

  2. Midstream Infrastructure Improvements Key to Realizing Full Potential...

    Office of Environmental Management (EM)

    Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic Natural Gas Midstream Infrastructure Improvements Key to Realizing Full Potential of Domestic...

  3. JOINT DEGREE PROGRAMS DEFINITION AND POLICY

    E-Print Network [OSTI]

    Omiecinski, Curtis

    1 JOINT DEGREE PROGRAMS DEFINITION AND POLICY: Within the fields of medicine and law, dual training for such complementary training can be demonstrated, the creation of a formal "Joint" degree program in which students or MD) offered at Penn State may be warranted. Such Joint degree programs enhance the educational

  4. Pink Eye Conjunctivitis Definition, Symptoms and Causes

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    Pink Eye ­ Conjunctivitis Definition, Symptoms and Causes Pink eye is the common name given to inflammation of the conjunctiva of the eye. It is otherwise called conjunctivitis. The conjunctiva is the transparent membrane that lines the eyelids and covers the whites of the eyes. Very small, superficial blood

  5. Business Practice Manual for Definitions & Acronyms

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Janaury 21, 2011 #12;CAISO Business Practice Manual BPM for Definitions & Acronyms Version 76 Last Revised: March 31, 2009 BPM Owner: Mike Dozier BPM Owner's Title: Senior Counsel Revision History Version Date Description 2 2009-12-18 Incorporating payment acceleration language submitted in BPM PRR 122

  6. Evolutionary Algorithms for Definition Extraction Claudia Borg

    E-Print Network [OSTI]

    Pace, Gordon J.

    Evolutionary Algorithms for Definition Extraction Claudia Borg Dept. of I.C.S. University of Malta claudia.borg@um.edu.mt Mike Rosner Dept. of I.C.S. University of Malta mike.rosner@um.edu.mt Gordon Pace Dept. of Computer Science University of Malta gordon.pace@um.edu.mt Abstract Books and other text

  7. INVITATIONAL WELL-TESTING SYMPOSIUM PROCEEDINGS

    E-Print Network [OSTI]

    Authors, Various

    2011-01-01T23:59:59.000Z

    Technology and Needs for Drilling and Well Testing. . . . .AND NEEDS FOR DRILLING AND WELL TESTING INSTRUMENTATIONand Needs for Drilling and Well Testing Instrumentation W.

  8. INVITATIONAL WELL-TESTING SYMPOSIUM PROCEEDINGS

    E-Print Network [OSTI]

    Authors, Various

    2011-01-01T23:59:59.000Z

    Education Course on Well Completion and Stimulation, Feb.to provide a reasonable well completion opportunity. Duringinterpretation and well completion strategy. In addition, a

  9. Min-entropy and quantum key distribution: Nonzero key rates for ''small'' numbers of signals

    SciTech Connect (OSTI)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-02-15T23:59:59.000Z

    We calculate an achievable secret key rate for quantum key distribution with a finite number of signals by evaluating the quantum conditional min-entropy explicitly. The min-entropy for a classical random variable is the negative logarithm of the maximal value in its probability distribution. The quantum conditional min-entropy can be expressed in terms of the guessing probability, which we calculate for d-dimensional systems. We compare these key rates to previous approaches using the von Neumann entropy and find nonzero key rates for a smaller number of signals. Furthermore, we improve the secret key rates by modifying the parameter estimation step. Both improvements taken together lead to nonzero key rates for only 10{sup 4}-10{sup 5} signals. An interesting conclusion can also be drawn from the additivity of the min-entropy and its relation to the guessing probability: for a set of symmetric tensor product states, the optimal minimum-error discrimination (MED) measurement is the optimal MED measurement on each subsystem.

  10. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Xiongfeng Ma; Chi-Hang Fred Fung; Hoi-Kwong Lo

    2007-03-14T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-air PDC experiment, we compare three implementations -- entanglement PDC QKD, triggering PDC QKD and coherent state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent state QKD. The coherent state QKD with decoy states is able to achieve highest key rate in the low and medium-loss regions. By applying Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70dB combined channel losses (35dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53dB channel losses.

  11. The impacts of congestion on time-definitive urban freight distribution networks CO2 emission levels: Results from a case study in Portland,

    E-Print Network [OSTI]

    Bertini, Robert L.

    The impacts of congestion on time-definitive urban freight distribution networks CO2 emission Accepted 29 November 2010 Keywords: Vehicle routing Time-dependent travel time speed GHG or CO2 emissions pressures to limit the impacts associated with CO2 emissions are mounting rapidly. A key challenge

  12. The Impacts of Congestion on Time-definitive Urban Freight Distribution1 Networks CO2 Emission Levels: results from a case study in Portland,2

    E-Print Network [OSTI]

    Bertini, Robert L.

    1 The Impacts of Congestion on Time-definitive Urban Freight Distribution1 Networks CO2 Emission pressures to limit the impacts13 associated with CO2 emissions are mounting rapidly. A key challenge on CO2 emissions are hindered by the complexities of vehicle routing18 problems with time

  13. STGWG Key Outcomes for May 3, 2010

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  14. STGWG Key Outcomes for October 21, 2009

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2,OCTOBER 2-3,|Key

  15. Key Associados Bradesco JV | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou New EnergyKenosistec SrlKenyonKetchikan PublicKey

  16. Bioenergy Key Publications | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department ofTransportation Fuels | DepartmentKey

  17. Key Predistribution Techniques for Grid-Based Wireless Sensor Networks

    E-Print Network [OSTI]

    Key Predistribution Techniques for Grid-Based Wireless Sensor Networks Simon R. Blackburn1 , Tuvi sensor networks. Networks consisting of wireless sensor nodes ar- ranged in a grid pattern have many for the instantiation of these schemes. Key words: Key predistribution, wireless sensor networks; symmetric key

  18. Definitional Reflection and the Completion Peter Schroeder-Heister *

    E-Print Network [OSTI]

    Schroeder-Heister, Peter

    /11-1, and by Esprit Basic Research Working Group 7232 (GENTZEN). #12;334 which is the completed definition

  19. Manufacturing Energy and Carbon Footprint Definitions and Assumptions...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Understanding Manufacturing Energy and Carbon Footprints, October 2012 2010 Manufacturing Energy and Carbon Footprints: Definitions...

  20. Quantum key distribution with entangled photon sources

    E-Print Network [OSTI]

    Ma, X; Lo, H K; Ma, Xiongfeng; Fung, Chi-Hang Fred; Lo, Hoi-Kwong

    2007-01-01T23:59:59.000Z

    A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis independent source, we apply Koashi-Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144km open-a...

  1. Michael Rupen EVLA Phase II Definition Aug 23 25, 2001.

    E-Print Network [OSTI]

    Groppi, Christopher

    Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 1 EVLA Phase II Scientific Overview Michael P. Rupen #12;Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 2 New the resolution · Always available! #12;Michael Rupen EVLA Phase II Definition Meeting Aug 23 ­ 25, 2001. 3 NMA

  2. Formal definition of POTENTIAL ENERGY (valid for conservative forces only)

    E-Print Network [OSTI]

    page - 16 Formal definition of POTENTIAL ENERGY (valid for conservative forces only) Given one type of conservative force F UB - UA= - = - Definition of 'Potential energy difference" conserv #12;page - 17 the definition of the "potential energy difference UB - UA " as equal to negative value of the work W done

  3. Language Definitions as Rewrite Theories Andrei Arusoaie1

    E-Print Network [OSTI]

    Boyer, Edmond

    Language Definitions as Rewrite Theories Andrei Arusoaie1 , Dorel Lucanu1 , Vlad Rusu2 , Traian languages. It includes software tools for compiling K language definitions to Maude rewrite theories transformation of language definitions that enables the symbolic execution of programs, i.e., the exe- cution

  4. Definite Descriptions, Focus Shift, and a Theory of Discourse Interpretation

    E-Print Network [OSTI]

    Poesio, Massimo

    Definite Descriptions, Focus Shift, and a Theory of Discourse Interpretation Massimo Poesio Centre of situations and their hierarchical organization. 1 Ingredients of a Theory of Definite Description Inter­ pretation A theory of definite description (DD) interpretation must build on a general theory of discourse

  5. Project definition study for research facility access and science education

    SciTech Connect (OSTI)

    Rosen, S.P. [Univ. of Texas, Arlington, TX (United States). Coll. of Science; Teplitz, V.L. [Southern Methodist Univ., Dallas, TX (United States). Physics Dept.

    1994-10-01T23:59:59.000Z

    This UTA/SMU project definition study describes critical customer services and research programs which draw upon SSC assets to meet regional needs in two major components: Science Education; Academic/Small Business R and D Facility Access. The location of the SSC in Texas constituted a significant stimulus to R and D activities in Texas, encouraging new initiatives in high energy physics, as well as stimulating other areas of physics and related sciences. An important aspect of maximizing the utility of the investment in the SSC should be to re-allocate SSC assets in ways that maintain that momentum. This study addresses several ways to achieve that end, extending benefits to all of physics, the sciences in general and particularly, to science education.

  6. The Definition and Classification of Universes

    SciTech Connect (OSTI)

    Bjorken, J.

    2004-10-12T23:59:59.000Z

    We assume that the concept of a multiverse makes sense, and suggest a specific, standardized definition for member universes which are similar to our own. Central to this description is the definition of size, which is taken to be the asymptotic value, at large times, of the inverse Hubble constant. Thus the cosmological constant plays a central role in defining the properties of the subset of universes similar to our own. We then assume that vacuum parameters and coupling constants of the standard model are dependent upon the size of a universe, and propose a specific form for the dependence. Anthropic considerations then limit the size of habitable universes (as we understand that concept) to be within a factor two of our own. Implications of this picture for understanding the standard-model ''hierarchy problem'' are discussed, as are general issues of falsifiability and/or verifiability of these ideas.

  7. Adjuvant and Definitive Radiotherapy for Adrenocortical Carcinoma

    SciTech Connect (OSTI)

    Sabolch, Aaron [University of Michigan Medical School, Ann Arbor, MI (United States); Feng, Mary [Department of Radiation Oncology, University of Michigan, Ann Arbor, MI (United States); Griffith, Kent [Department of Biostatistics Unit, University of Michigan Comprehensive Cancer Center, Ann Arbor, MI (United States); Hammer, Gary [Department of Internal Medicine, University of Michigan, Ann Arbor, MI (United States); Doherty, Gerard [Department of Surgery, University of Michigan, Ann Arbor, MI (United States); Ben-Josef, Edgar, E-mail: edgarb@med.umich.edu [Department of Radiation Oncology, University of Michigan, Ann Arbor, MI (United States)

    2011-08-01T23:59:59.000Z

    Purpose: To evaluate the impact of both adjuvant and definitive radiotherapy on local control of adrenocortical carcinoma. Methods and Materials: Outcomes were analyzed from 58 patients with 64 instances of treatment for adrenocortical carcinoma at the University of Michigan's Multidisciplinary Adrenal Cancer Clinic. Thirty-seven of these instances were for primary disease, whereas the remaining 27 were for recurrent disease. Thirty-eight of the treatment regimens involved surgery alone, 10 surgery plus adjuvant radiotherapy, and 16 definitive radiotherapy for unresectable disease. The effects of patient, tumor, and treatment factors were modeled simultaneously using multiple variable Cox proportional hazards regression for associations with local recurrence, distant recurrence, and overall survival. Results: Local failure occurred in 16 of the 38 instances that involved surgery alone, in 2 of the 10 that consisted of surgery plus adjuvant radiotherapy, and in 1 instance of definitive radiotherapy. Lack of radiotherapy use was associated with 4.7 times the risk of local failure compared with treatment regimens that involved radiotherapy (95% confidence interval, 1.2-19.0; p = 0.030). Conclusions: Radiotherapy seems to significantly lower the risk of local recurrence/progression in patients with adrenocortical carcinoma. Adjuvant radiotherapy should be strongly considered after surgical resection.

  8. Health and Wellness Guide for Students Introduction

    E-Print Network [OSTI]

    dimensions of health and wellness. The 7 dimensions are: Physical Wellness ­ Taking care of your body Wellness ­ Taking care of what's around you 2Health andWellness Guide for Students #12;Physical Wellness · Communicate with your partner if you have questions or concerns · Meet with a Health Care Provider on campus

  9. UNICEF Canada UNICEF Report Card 11: Child Well-Being in Rich Countries

    E-Print Network [OSTI]

    Sokolowski, Marla

    UNICEF Canada UNICEF Report Card 11: Child Well-Being in Rich Countries KEY POINTS Canadian children are not doing as well as they could be. When factoring in the size of Canada's economy UNICEF ten years ago. Particularly concerning is that Canada's ranking drops 7 places when children's views

  10. Oil and Gas Wells: Regulatory Provisions (Kansas)

    Broader source: Energy.gov [DOE]

    It shall be unlawful for any person, firm or corporation having possession or control of any natural gas well, oil well or coalbed natural gas well, whether as a contractor, owner, lessee, agent or...

  11. Industry survey for horizontal wells. Final report

    SciTech Connect (OSTI)

    Wilson, D.D.; Kaback, D.S. [CDM Federal Programs Corp., Denver, CO (United States); Denhan, M.E. [Westinghouse Savannah River Co., Aiken, SC (United States); Watkins, D. [CDM Federal Programs Corp., Aiken, SC (United States)

    1993-07-01T23:59:59.000Z

    An international survey of horizontal environmental wells was performed during May and June of 1993. The purpose of the survey was to provide the environmental industry with an inventory of horizontal environmental wells and information pertaining to the extent of the use of horizontal environmental wells, the variety of horizontal environmental well applications, the types of geologic and hydrogeologic conditions within which horizontal environmental wells have been installed, and the companies that perform horizontal environmental well installations. Other information, such as the cost of horizontal environmental well installations and the results of tests performed on the wells, is not complete but is provided as general information with the caveat that the information should not be used to compare drilling companies. The result of the survey is a catalogue of horizontal environmental wells that are categorized by the objective or use of the wells, the vertical depth of the wells, and the drilling company contracted to install the wells.

  12. New multilateral well architecture in heterogeneous reservoirs

    E-Print Network [OSTI]

    Jia, Hongqiao

    2004-09-30T23:59:59.000Z

    . The performance of new multilateral well in heterogeneous reservoirs is studied, and that is compared with vertical well architecture also. In order to study the productivity of new multilateral wells, we use a numerical simulation method to set up heterogeneous...

  13. Functionalized Graphene Nanoroads for Quantum Well Device. |...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nanoroads for Quantum Well Device. Functionalized Graphene Nanoroads for Quantum Well Device. Abstract: Using density functional theory, a series of calculations of structural and...

  14. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding

    E-Print Network [OSTI]

    Li, Baochun

    Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding Elias Kehdi}@eecg.toronto.edu Abstract--The performance of randomized network coding can suffer significantly when malicious nodes by generalizing some well known bounds in cod- ing theory. Such codes are based on introducing redundancy in space

  15. Helicopter magnetic survey conducted to locate wells

    SciTech Connect (OSTI)

    Veloski, G.A.; Hammack, R.W.; Stamp, V. (Rocky Mountain Oilfield Testing Center); Hall, R. (Rocky Mountain Oilfield Testing Center); Colina, K. (Rocky Mountain Oilfield Testing Center)

    2008-07-01T23:59:59.000Z

    A helicopter magnetic survey was conducted in August 2007 over 15.6 sq mi at the Naval Petroleum Reserve No. 3’s (NPR-3) Teapot Dome Field near Casper, Wyoming. The survey’s purpose was to accurately locate wells drilled there during more than 90 years of continuous oilfield operation. The survey was conducted at low altitude and with closely spaced flight lines to improve the detection of wells with weak magnetic response and to increase the resolution of closely spaced wells. The survey was in preparation for a planned CO2 flood for EOR, which requires a complete well inventory with accurate locations for all existing wells. The magnetic survey was intended to locate wells missing from the well database and to provide accurate locations for all wells. The ability of the helicopter magnetic survey to accurately locate wells was accomplished by comparing airborne well picks with well locations from an intense ground search of a small test area.

  16. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  17. "Turn-Key" Open Source Software Solutions for Energy Management...

    Energy Savers [EERE]

    "Turn-Key" Open Source Software Solutions for Energy Management of Small to Medium Sized Buildings (DE-FOA-0000822) "Turn-Key" Open Source Software Solutions for Energy Management...

  18. Quantum Key Distribution by Utilizing Four-Level Particles

    E-Print Network [OSTI]

    Tao Yan; Fengli Yan

    2010-02-09T23:59:59.000Z

    We present a quantum key distribution protocol based on four-level particles entanglement. Furthermore, a controlled quantum key distribution protocol is proposed by utilizing three four-level particles. We show that the two protocols are secure.

  19. The impacts of urbanization on endangered florida key deer

    E-Print Network [OSTI]

    Harveson, Patricia Moody

    2006-04-12T23:59:59.000Z

    for resources between man and wildlife continues, it is important to understand the effects of urbanization on species. Endangered Key deer (Odocoileus virginianus clavium) are endemic to the Florida Keys archipelago stretching southwest off the southern tip...

  20. Exploring the context : a small hotel in Key West

    E-Print Network [OSTI]

    VanBeuzekom, Edrick

    1984-01-01T23:59:59.000Z

    This thesis develops a personal method and approach for designing in a delicate context such as the Key West Historic District. This thesis is composed of two parts. The first part presents observations of Key West, focusing ...

  1. actual key success: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  2. access technologies key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    key exchange over an insecure channel. The security of the proposed algorithm grows as NPm, where M, P are the size of the key and the computational commplexity fo the linear...

  3. Turn Your Key, Be Idle Free | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Turn Your Key, Be Idle Free Turn Your Key, Be Idle Free April 13, 2010 - 7:30am Addthis Shannon Brescher Shea Communications Manager, Clean Cities Program What activity wastes...

  4. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  5. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  6. Compression station key to Texas pipeline project

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This was probably the largest pipeline project in the US last year, and the largest in Texas in the last decade. The new compressor station is a key element in this project. TECO, its servicing dealer, and compression packager worked closely throughout the planning and installation stages of the project. To handle the amount of gas required, TECO selected the GEMINI F604-1 compressor, a four-throw, single-stage unit with a six-inch stroke manufactured by Weatherford Enterra Compression Co. (WECC) in Corpus Christi, TX. TECO also chose WECC to package the compressors. Responsibility for ongoing support of the units will be shared among TECO, the service dealer and the packager. TECO is sending people to be trained by WECC, and because the G3600 family of engines is still relatively new, both the Caterpillar dealer and WECC sent people for advanced training at Caterpillar facilities in Peoria, IL. As part of its service commitment to TECO, the servicing dealer drew up a detailed product support plan, encompassing these five concerns: Training, tooling; parts support; service support; and commissioning.

  7. Relationship between key events in Earth history

    E-Print Network [OSTI]

    Gillman, Michael

    2015-01-01T23:59:59.000Z

    A model of cyclical (sinusoidal) motion of the solar system, intercepting event lines distributed at fixed intervals, explains the pattern of timings of mass extinctions, earlier glaciations, largest impact craters and the largest known extrusions of magma in the history of the Earth. The model reveals links between several sets of key events, including the end-Cretaceous and end-Ordovician extinctions with the Marinoan glaciation, and the end-Permian with the end-Serpukhovian extinctions. The model is supported by significant clusters of events and a significant reduction of impact crater size with position (sine value). The pattern of event lines is sustained to the earliest-dated impact craters (2023 and 1849 Ma) and to the origin of the solar system, close to 4567.4 Ma. The implication is that, for the entirety of its existence, the solar system has passed in a consistent manner through a predictably structured galaxy. Dark matter is a possible contender for the structure determining the event lines.

  8. Track 4: Employee Health and Wellness

    Broader source: Energy.gov [DOE]

    ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 4: Employee Health and Wellness

  9. Residential Energy Efficiency Financing: Key Elements of Program Design

    Broader source: Energy.gov [DOE]

    Presents key programmatic elements and context of financing initiatives, including contractor support, rebates, quality assurance, and more.

  10. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea Definitions

  11. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRail between PAD

  12. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRail between

  13. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRail

  14. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRailTanker and

  15. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRailTanker

  16. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksArea DefinitionsRailTankerImports

  17. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInput Definitions

  18. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. Coal StocksAreaChargeInputYield Definitions

  19. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputs & Utilization Definitions

  20. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks Definitions

  1. Table Definitions, Sources, and Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Energy I I' a(STEO)U.S. CoalInputsTotal Stocks DefinitionsWeekly

  2. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  3. Why Hierarchical Key Distribution is Appropriate for Multicast Networks

    E-Print Network [OSTI]

    Zheng, Yuliang

    Why Hierarchical Key Distribution is Appropriate for Multicast Networks Chandana Gamage, Jussipekka rationale for many key distribution schemes for multicast networks are based on heuristic arguments on e of multicast group formation and network growth to look at the selection of a key distribution scheme from

  4. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  5. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  6. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  7. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  8. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  9. Security proof for quantum key distribution using qudit systems

    SciTech Connect (OSTI)

    Sheridan, Lana [Centre for Quantum Technologies, National University of Singapore (Singapore); Scarani, Valerio [Centre for Quantum Technologies, National University of Singapore (Singapore); Department of Physics, National University of Singapore (Singapore)

    2010-09-15T23:59:59.000Z

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d. The finite key corrections are found to be almost insensitive to d < or approx. 20.

  10. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  11. Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    @sabanciuniv.edu Abstract--Key distribution is an important issue to provide security in Wireless Sensor Networks (WSNs. For the performance evaluation basis, we used our mechanism together with a location based key pre-distribution scheme Terms--mobile wireless sensor networks, key ring update, security, resiliency, connectivity I

  12. Advanced Gasifier Pilot Plant Concept Definition

    SciTech Connect (OSTI)

    Steve Fusselman; Alan Darby; Fred Widman

    2005-08-31T23:59:59.000Z

    This report presents results from definition of a preferred commercial-scale advanced gasifier configuration and concept definition for a gasification pilot plant incorporating those preferred technologies. The preferred commercial gasifier configuration was established based on Cost Of Electricity estimates for an IGCC. Based on the gasifier configuration trade study results, a compact plug flow gasifier, with a dry solids pump, rapid-mix injector, CMC liner insert and partial quench system was selected as the preferred configuration. Preliminary systems analysis results indicate that this configuration could provide cost of product savings for electricity and hydrogen ranging from 15%-20% relative to existing gasifier technologies. This cost of product improvement draws upon the efficiency of the dry feed, rapid mix injector technology, low capital cost compact gasifier, and >99% gasifier availability due to long life injector and gasifier liner, with short replacement time. A pilot plant concept incorporating the technologies associated with the preferred configuration was defined, along with cost and schedule estimates for design, installation, and test operations. It was estimated that a 16,300 kg/day (18 TPD) pilot plant gasifier incorporating the advanced gasification technology and demonstrating 1,000 hours of hot-fire operation could be accomplished over a period of 33 months with a budget of $25.6 M.

  13. Definition of heavy oil and natural bitumen

    SciTech Connect (OSTI)

    Meyer, R.F.

    1988-08-01T23:59:59.000Z

    Definition and categorization of heavy oils and natural bitumens are generally based on physical or chemical attributes or on methods of extraction. Ultimately, the hydrocarbon's chemical composition will govern both its physical state and the extraction technique applicable. These oils and bitumens closely resemble the residuum from wholecrude distillation to about 1,000/degree/F; if the residuum constitutes at least 15% of the crude, it is considered to be heavy. In this material is concentrated most of the trace elements, such as sulfur, oxygen, and nitrogen, and metals, such as nickel and vanadium. A widely used definition separates heavy oil from natural bitumen by viscosity, crude oil being less, and bitumen more viscous than 10,000 cp. Heavy crude then falls in the range 10/degree/-20/degree/ API inclusive and extra-heavy oil less than 10/degree/ API. Most natural bitumen is natural asphalt (tar sands, oil sands) and has been defined as rock containing hydrocarbons more viscous than 10,000 cp or else hydrocarbons that may be extracted from mined or quarried rock. Other natural bitumens are solids, such as gilsonite, grahamite, and ozokerite, which are distinguished by streak, fusibility, and solubility. The upper limit for heavy oil may also be set at 18/degree/ API, the approximate limit for recovery by waterflood.

  14. Directional drilling equipment and techniques for deep hot granite wells

    SciTech Connect (OSTI)

    Brittenham, T.L.; Sursen, G.; Neudecker, J.W.; Rowley, J.C.; Williams, R.E.

    1980-01-01T23:59:59.000Z

    Conventional directional drilling technology has been extended and modified to drill the first well of a subsurface geothermal energy extraction system at the Fenton Hill, New Mexico, Hot dry Rock (HDR) experimental site. Completing the first of a two-wellbore HDR system has resulted in the definition of operational limitations of many conventional directional drilling tools, instrumentation and techniques. The successful completion of the first wellbore, Energy Extraction Well No. 2 (EE-2), to a measured depth of 15,300 ft (4.7 km) in granite reservoir rock with a bottomhole temperature of 530/sup 0/F (275/sup 0/C) required the development of a new high temperature downhole motor and modification of existing wireline-conveyed steering tool systems. Conventional rotary-driven directional assemblies were successfully modified to accommodate the very hard and abrasive rock encountered while drilling nearly 8500 ft (2.6 km) of directional hole to a final inclination of 35/sup 0/ from the vertical at a controlled azimuthal orientation.

  15. Vapor port and groundwater sampling well

    DOE Patents [OSTI]

    Hubbell, J.M.; Wylie, A.H.

    1996-01-09T23:59:59.000Z

    A method and apparatus have been developed for combining groundwater monitoring wells with unsaturated-zone vapor sampling ports. The apparatus allows concurrent monitoring of both the unsaturated and the saturated zone from the same well at contaminated areas. The innovative well design allows for concurrent sampling of groundwater and volatile organic compounds (VOCs) in the vadose (unsaturated) zone from a single well, saving considerable time and money. The sample tubes are banded to the outer well casing during installation of the well casing. 10 figs.

  16. Vapor port and groundwater sampling well

    DOE Patents [OSTI]

    Hubbell, Joel M. (Idaho Falls, ID); Wylie, Allan H. (Idaho Falls, ID)

    1996-01-01T23:59:59.000Z

    A method and apparatus has been developed for combining groundwater monitoring wells with unsaturated-zone vapor sampling ports. The apparatus allows concurrent monitoring of both the unsaturated and the saturated zone from the same well at contaminated areas. The innovative well design allows for concurrent sampling of groundwater and volatile organic compounds (VOCs) in the vadose (unsaturated) zone from a single well, saving considerable time and money. The sample tubes are banded to the outer well casing during installation of the well casing.

  17. Definition et unites Sources d'energie primaire

    E-Print Network [OSTI]

    Ravelet, Florent

    D´efinition et unit´es Sources d'´energie primaire L'´energie dans une perspective historique Etat Laboratoire DynFluid, Arts et M´etiers-ParisTech 19 f´evrier 2014 F. Ravelet Energies #12;D´efinition et unit Energies #12;D´efinition et unit´es Sources d'´energie primaire L'´energie dans une perspective historique

  18. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  19. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  20. Optimization Online - Semi-definite relaxations for optimal control ...

    E-Print Network [OSTI]

    Mathieu Claeys

    2014-10-28T23:59:59.000Z

    Oct 28, 2014 ... Abstract: Converging hierarchies of finite-dimensional semi-definite relaxations have been proposed for state-constrained optimal control ...

  1. Modified definition of group velocity and electromagnetic energy conservation equation

    E-Print Network [OSTI]

    Changbiao Wang

    2015-01-19T23:59:59.000Z

    The classical definition of group velocity has two flaws: (a) the group velocity can be greater than the phase velocity in a non-dispersive, lossless, non-conducting, anisotropic uniform medium; (b) the definition is not consistent with the principle of relativity for a plane wave in a moving isotropic uniform medium. To remove the flaws, a modified definition is proposed. A criterion is set up to identify the justification of group velocity definition. A "superluminal power flow" is constructed to show that the electromagnetic energy conservation equation cannot uniquely define the power flow if the principle of Fermat is not taken into account.

  2. BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS

    E-Print Network [OSTI]

    BLOCK DIAGONALLY DOMINANT POSITIVE DEFINITE APPROXIMATE FILTERS AND SMOOTHERS Running title: BLOCKÆciently small as to preclude the loss of positive de#12;niteness in the approximate equations. Therefore

  3. On the definition of velocity in doubly special relativity theories

    E-Print Network [OSTI]

    Piotr Kosinski; Pawel Maslanka

    2002-11-13T23:59:59.000Z

    We discuss the definition of particle velocity in doubly relativity theories. The general formula relating velocity and four-momentum of particle is given.

  4. Redundant axioms in the definition of Bregman functions

    E-Print Network [OSTI]

    Jan 22, 2002 ... REDUNDANT AXIOMS IN THE DEFINITION OF BREGMAN ...... some new results on the theory of Bregman functions, Mathematics of ...

  5. RFI Well Integrity 06 JUL 1400

    Broader source: Energy.gov [DOE]

    This PowerPoint report entitled "Well Integrity During Shut - In Operations: DOE/DOI Analyses" describes risks and suggests risk management recommendations associated with shutting in the well.

  6. INVITATIONAL WELL-TESTING SYMPOSIUM PROCEEDINGS

    E-Print Network [OSTI]

    Authors, Various

    2011-01-01T23:59:59.000Z

    Discharge Using Ground- Water Storage," Trans. , AGU (1935),of a well using ground-water storage: ~n. Geophys. Unionof a Well Using Ground-Water Storage," Trans. , AGU (1935),

  7. Production Trends of Shale Gas Wells

    E-Print Network [OSTI]

    Khan, Waqar A.

    2010-01-14T23:59:59.000Z

    To obtain better well performance and improved production from shale gas reservoirs, it is important to understand the behavior of shale gas wells and to identify different flow regions in them over a period of time. It is also important...

  8. Horizontal well applications in complex carbonate reservoirs

    SciTech Connect (OSTI)

    Rahman, M.; Al-Awami, H.

    1995-10-01T23:59:59.000Z

    Over the past four years, Saudi Aramco has drilled over eighty horizontal wells, onshore and offshore. It has successfully applied this technology to develop new reservoirs as well as enhance recovery from its mature fields. This paper presents the reservoir engineering aspects of `horizontal` and `high angle` wells drilled in a major offshore field in Saudi Arabia. It shows how horizontal wells have (a) increased the recovery of bypassed oil, (b) improved well productivity in tight reservoirs, (c) increased production from thin oil zones underlain by water, and (d) improved peripheral injection. The paper discusses the actual performance of the horizontal wells and compares them with offset conventional wells. It presents the results of logging and testing of these wells, and highlights actual field data on (a) relationship between productivity gain and horizontal length, (b) pressure loss along the horizontal wellbore, and (c) effect of heterogeneity on coning an inflow performance.

  9. Disinfecting Water Wells by Shock Chlorination

    E-Print Network [OSTI]

    Dozier, Monty; McFarland, Mark L.

    2005-09-30T23:59:59.000Z

    If your well has been flooded, it must be shock chlorinated before it can be used as a source of drinking water. This publication explains how to disinfect a well using either dry chlorine or liquid household bleach....

  10. Well performance graph simplifies field calculations

    SciTech Connect (OSTI)

    De Ghetto, G.

    1987-05-01T23:59:59.000Z

    Graphic Methods are widely employed in order to understand overall well behavior using only surface parameters. The authors propose a new graphic method, used successfully by Agip for oil and gas wells in Italy, Libya, Nigeria and Tunisia. The well performance graph helps solve many production problems, including estimation of: inflow performance relationship; causes of rate decline throughout well life; and production rate and bottomhole flowing pressure for various pressures upstream of the surface choke, and vice-versa. This method differs from others by using flow behavior through the choke for both critical and subcritical conditions. Equations describing flow through the formation, string and surface choke are also used. Results are quite reliable when these theoretical equations are calibrated with field data, either from the well concerned or from nearby wells producing the same fluid. This article describes the technique as it applies to oil wells. The methodology for gas wells is similar.

  11. Economic evaluation of smart well technology

    E-Print Network [OSTI]

    Al Omair, Abdullatif A.

    2007-09-17T23:59:59.000Z

    comprehensive review of this technology has been discussed. The possible reservoir environments in which smart well technology could be used and also, the possible benefits that could be realized by utilizing smart well technology has been discussed...

  12. Capping of Water Wells for Future Use 

    E-Print Network [OSTI]

    Lesikar, Bruce J.; Mechell, Justin

    2007-09-04T23:59:59.000Z

    Water wells that are not being used, but that might be needed in the future, can be sealed with a cap that covers the top of the well casing pipe to prevent unauthorized access and contamination of the well. This publication explains how to cap a...

  13. Genomic definition of species. Revision 2

    SciTech Connect (OSTI)

    Crkvenjakov, R.; Drmanac, R.

    1993-03-01T23:59:59.000Z

    A genome is the sum total of the DNA sequences in the cells of an individual organism. The common usage that species possess genomes comes naturally to biochemists, who have shown that all protein and nucleic acid molecules are at the same time species- and individual-specific, with minor individual variations being superimposed on a consensus sequence that is constant for a species. By extension, this property is attributed to the common features of DNA in the chromosomes of members of a given species and is called species genome. Our proposal for the definition of a biological species is as follows: A species comprises a group of actual and potential biological organisms built according to a unique genome program that is recorded, and at least in part expressed, in the structures of their genomic nucleic acid molecule(s), having intragroup sequence differences which can be fully interconverted in the process of organismal reproduction.

  14. ADVANCED TECHNIQUES FOR RESERVOIR SIMULATION AND MODELING OF NONCONVENTIONAL WELLS

    SciTech Connect (OSTI)

    Louis J. Durlofsky; Khalid Aziz

    2004-08-20T23:59:59.000Z

    Nonconventional wells, which include horizontal, deviated, multilateral and ''smart'' wells, offer great potential for the efficient management of oil and gas reservoirs. These wells are able to contact larger regions of the reservoir than conventional wells and can also be used to target isolated hydrocarbon accumulations. The use of nonconventional wells instrumented with downhole inflow control devices allows for even greater flexibility in production. Because nonconventional wells can be very expensive to drill, complete and instrument, it is important to be able to optimize their deployment, which requires the accurate prediction of their performance. However, predictions of nonconventional well performance are often inaccurate. This is likely due to inadequacies in some of the reservoir engineering and reservoir simulation tools used to model and optimize nonconventional well performance. A number of new issues arise in the modeling and optimization of nonconventional wells. For example, the optimal use of downhole inflow control devices has not been addressed for practical problems. In addition, the impact of geological and engineering uncertainty (e.g., valve reliability) has not been previously considered. In order to model and optimize nonconventional wells in different settings, it is essential that the tools be implemented into a general reservoir simulator. This simulator must be sufficiently general and robust and must in addition be linked to a sophisticated well model. Our research under this five year project addressed all of the key areas indicated above. The overall project was divided into three main categories: (1) advanced reservoir simulation techniques for modeling nonconventional wells; (2) improved techniques for computing well productivity (for use in reservoir engineering calculations) and for coupling the well to the simulator (which includes the accurate calculation of well index and the modeling of multiphase flow in the wellbore); and (3) accurate approaches to account for the effects of reservoir heterogeneity and for the optimization of nonconventional well deployment. An overview of our progress in each of these main areas is as follows. A general purpose object-oriented research simulator (GPRS) was developed under this project. The GPRS code is managed using modern software management techniques and has been deployed to many companies and research institutions. The simulator includes general black-oil and compositional modeling modules. The formulation is general in that it allows for the selection of a wide variety of primary and secondary variables and accommodates varying degrees of solution implicitness. Specifically, we developed and implemented an IMPSAT procedure (implicit in pressure and saturation, explicit in all other variables) for compositional modeling as well as an adaptive implicit procedure. Both of these capabilities allow for efficiency gains through selective implicitness. The code treats cell connections through a general connection list, which allows it to accommodate both structured and unstructured grids. The GPRS code was written to be easily extendable so new modeling techniques can be readily incorporated. Along these lines, we developed a new dual porosity module compatible with the GPRS framework, as well as a new discrete fracture model applicable for fractured or faulted reservoirs. Both of these methods display substantial advantages over previous implementations. Further, we assessed the performance of different preconditioners in an attempt to improve the efficiency of the linear solver. As a result of this investigation, substantial improvements in solver performance were achieved.

  15. Potential hydrologic characterization wells in Amargosa Valley

    SciTech Connect (OSTI)

    Lyles, B.; Mihevc, T.

    1994-09-01T23:59:59.000Z

    More than 500 domestic, agricultural, and monitoring wells were identified in the Amargosa Valley. From this list, 80 wells were identified as potential hydrologic characterization wells, in support of the US Department of Energy (DOE) Underground Test Area/Remedial Investigation and Feasibility Study (UGTA/RIFS). Previous hydrogeologic studies have shown that groundwater flow in the basin is complex and that aquifers may have little lateral continuity. Wells located more than 10 km or so from the Nevada Test Site (NTS) boundary may yield data that are difficult to correlate to sources from the NTS. Also, monitoring well locations should be chosen within the guidelines of a hydrologic conceptual model and monitoring plan. Since these do not exist at this time, recompletion recommendations will be restricted to wells relatively close (approximately 20 km) to the NTS boundary. Recompletion recommendations were made for two abandoned agricultural irrigation wells near the town of Amargosa Valley (previously Lathrop Wells), for two abandoned wildcat oil wells about 10 km southwest of Amargosa Valley, and for Test Well 5 (TW-5), about 10 km east of Amargosa Valley.

  16. QKD with finite resources: secret key rates via Rényi entropies

    E-Print Network [OSTI]

    Silvestre Abruzzo; Hermann Kampermann; Markus Mertz; Dagmar Bruß

    2011-05-27T23:59:59.000Z

    A realistic Quantum Key Distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over R\\'enyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  17. Security proof of practical quantum key distribution schemes

    E-Print Network [OSTI]

    Yodai Watanabe

    2005-06-29T23:59:59.000Z

    This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

  18. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  19. Equivalence Relations Definition of a relation on a set

    E-Print Network [OSTI]

    Singman, David

    Equivalence Relations Definition of a relation on a set Let A be any set. Any subset have 1R1, 2R3, 3R1, 2 R2, 3 R2, etc. #12;A special kind of relation- an Equivalence relation There is a type of relation, it's known as an equivalence relation, which is particularly useful. Definition

  20. EXTENDING THE DEFINITION OF ENTROPY TO NONEQUILIBRIUM STEADY STATES.

    E-Print Network [OSTI]

    ## of #. Our definition is based on energy exchanged, uses the microscopic dynamics of the system, and agreesEXTENDING THE DEFINITION OF ENTROPY TO NONEQUILIBRIUM STEADY STATES. by David Ruelle* Abstract. We forces # and maintained at fixed kinetic energy (Hoover­Evans isokinetic thermostat). We assume

  1. Research Product 0-4186-P1 Definition of the

    E-Print Network [OSTI]

    Texas at Austin, University of

    Research Product 0-4186-P1 Definition of the "Cradle-to-Grave" Pavement Management Process Zhanmin in the definition given earlier, pavement management is in fact a process that starts from the conception-effective manner; it combines solid engi- neering principles with sound business practices and economic theory

  2. 1.0 Introduction 1.1 Definition of Nanotechnology

    E-Print Network [OSTI]

    1 1.0 Introduction 1.1 Definition of Nanotechnology Nanotechnology is the art and science improvements in technologies for protecting the environment. While many definitions for nanotechnology exist Nanotechnology Initiative (NNI), a U.S. Government research and development (R&D) program established

  3. Well purge and sample apparatus and method

    DOE Patents [OSTI]

    Schalla, R.; Smith, R.M.; Hall, S.H.; Smart, J.E.; Gustafson, G.S.

    1995-10-24T23:59:59.000Z

    The present invention specifically permits purging and/or sampling of a well but only removing, at most, about 25% of the fluid volume compared to conventional methods and, at a minimum, removing none of the fluid volume from the well. The invention is an isolation assembly with a packer, pump and exhaust, that is inserted into the well. The isolation assembly is designed so that only a volume of fluid between the outside diameter of the isolation assembly and the inside diameter of the well over a fluid column height from the bottom of the well to the top of the active portion (lower annulus) is removed. The packer is positioned above the active portion thereby sealing the well and preventing any mixing or contamination of inlet fluid with fluid above the packer. Ports in the wall of the isolation assembly permit purging and sampling of the lower annulus along the height of the active portion. 8 figs.

  4. Well purge and sample apparatus and method

    DOE Patents [OSTI]

    Schalla, Ronald (Kennewick, WA); Smith, Ronald M. (Richland, WA); Hall, Stephen H. (Kennewick, WA); Smart, John E. (Richland, WA); Gustafson, Gregg S. (Redmond, WA)

    1995-01-01T23:59:59.000Z

    The present invention specifically permits purging and/or sampling of a well but only removing, at most, about 25% of the fluid volume compared to conventional methods and, at a minimum, removing none of the fluid volume from the well. The invention is an isolation assembly with a packer, pump and exhaust, that is inserted into the well. The isolation assembly is designed so that only a volume of fluid between the outside diameter of the isolation assembly and the inside diameter of the well over a fluid column height from the bottom of the well to the top of the active portion (lower annulus) is removed. The packer is positioned above the active portion thereby sealing the well and preventing any mixing or contamination of inlet fluid with fluid above the packer. Ports in the wall of the isolation assembly permit purging and sampling of the lower annulus along the height of the active portion.

  5. ADVANCED TECHNOLOGIES FOR STRIPPER GAS WELL ENHANCEMENT

    SciTech Connect (OSTI)

    Charles M. Boyer II; Ronald J. MacDonald P.G.

    2002-04-01T23:59:59.000Z

    As part of Task 1 in Advanced Technologies for Stripper Gas Well Enhancement, Schlumberger--Holditch Reservoir Technologies (H-RT) joined with two Appalachian Basin producers, Great Lakes Energy Partners, LLC, and Belden and Blake Corporation to develop methodologies for identification and enhancement of stripper wells with economic upside potential. These industry partners previously provided us with data for more than 700 wells in northwestern Pennsylvania. Phase 1 goals of this project are to develop and validate methodologies that can quickly and cost-effectively identify wells with enhancement potential. We have enhanced and streamlined our software, and we are beta-testing the final stages of our new Microsoft{trademark} Access/Excel based software. We have processed all well information and identified potential candidate wells that can be used in Phase 2 to validate the new methodologies. In addition, the final technical report is almost finished and a draft version is being reviewed by Gary Covatch.

  6. Sandia Energy - Direct Measurement of Key Molecule Will Increase...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Direct Measurement of Key Molecule Will Increase Accuracy of Combustion Models Home Energy Transportation Energy CRF Facilities News News & Events Computational Modeling &...

  7. Key Practical Issues in Strengthening Safety Culture, INSAG-15

    Broader source: Energy.gov [DOE]

    Key Pratical Issues in Strengthening Safety Culture, INSAG-15. A report by the International Nuclear Safety Advisory Gorup, International Atomic Energy Agency, Vienna, 2002.

  8. MasterKey Cryptosystems AT&T Bell Labs

    E-Print Network [OSTI]

    Blaze, Matthew

    then be converted to a stream­ cipher via one of the usual block­chaining methods). We use the public­key encryption

  9. Pantex Plant Achieves Key Safety Milestone Ahead of Schedule...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Achieves Key Safety Milestone Ahead of Schedule | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  10. Key Parameters Affecting DPF Performance Degradation and Impact...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy Key Parameters Affecting DPF Performance Degradation and Impact on Lifetime Fuel Economy...

  11. Sierra Geothermal's Key Find in Southern Nevada | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Geothermal's Key Find in Southern Nevada July 13, 2010 - 5:17pm Addthis Sierra Geothermal discovered temperatures hot enough for large-scale geothermal energy production at...

  12. Climate Action Planning: A Review of Best Practices, Key Elements...

    Open Energy Info (EERE)

    Planning: A Review of Best Practices, Key Elements, and Common Climate Strategies for Signatories to the American College & University Presidents' Climate Commitment Jump to:...

  13. Key Facts about the Biosciences Division | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to understand biological mechanisms relevant to bioremediation, climate change, energy production, and the protection of human health. BiosciencesDivisionKeyFactsOct20...

  14. Water dynamics clue to key residues in protein folding

    SciTech Connect (OSTI)

    Gao, Meng [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Zhu, Huaiqiu, E-mail: hqzhu@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Yao, Xin-Qiu [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China) [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China); Department of Biophysics, Kyoto University, Sakyo Kyoto 606-8502 (Japan); She, Zhen-Su, E-mail: she@pku.edu.cn [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)] [State Key Laboratory for Turbulence and Complex Systems, and Department of Biomedical Engineering, and Center for Theoretical Biology, and Center for Protein Science, Peking University, Beijing 100871 (China)

    2010-01-29T23:59:59.000Z

    A computational method independent of experimental protein structure information is proposed to recognize key residues in protein folding, from the study of hydration water dynamics. Based on all-atom molecular dynamics simulation, two key residues are recognized with distinct water dynamical behavior in a folding process of the Trp-cage protein. The identified key residues are shown to play an essential role in both 3D structure and hydrophobic-induced collapse. With observations on hydration water dynamics around key residues, a dynamical pathway of folding can be interpreted.

  15. Worldwide Trends in Energy Use and Efficiency: Key Insights from...

    Open Energy Info (EERE)

    Efficiency: Key Insights from International Energy Agency (IEA) Indicator Analysis in Support of the Group of Eight (G8) Plan of Action Jump to: navigation, search Tool Summary...

  16. PPPL physicists win supercomputing time to simulate key energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PPPL physicists win supercomputing time to simulate key energy and astrophysical phenomena By John Greenwald January 8, 2013 Tweet Widget Google Plus One Share on Facebook A...

  17. Characterization Well R-22 Geochemistry Report

    SciTech Connect (OSTI)

    Patrick Longmire

    2002-09-01T23:59:59.000Z

    This report provides analytical results for groundwater collected during four characterization-sampling rounds conducted at well R-22 from March 2001 through March 2002. Characterization well R-22 was sampled from March 6 through 13, 2001; June 19 through 26, 2001; November 30 through December 10, 2001; and February 27 through March 7, 2002. The goal of the characterization efforts was to assess the hydrochemistry and to determine whether or not contaminants are present in the regional aquifer in the vicinity of the well. A geochemical evaluation of the analytical results for the well is also presented in this report.

  18. Geothermal wells: a forecast of drilling activity

    SciTech Connect (OSTI)

    Brown, G.L.; Mansure, A.J.; Miewald, J.N.

    1981-07-01T23:59:59.000Z

    Numbers and problems for geothermal wells expected to be drilled in the United States between 1981 and 2000 AD are forecasted. The 3800 wells forecasted for major electric power projects (totaling 6 GWe of capacity) are categorized by type (production, etc.), and by location (The Geysers, etc.). 6000 wells are forecasted for direct heat projects (totaling 0.02 Quads per year). Equations are developed for forecasting the number of wells, and data is presented. Drilling and completion problems in The Geysers, The Imperial Valley, Roosevelt Hot Springs, the Valles Caldera, northern Nevada, Klamath Falls, Reno, Alaska, and Pagosa Springs are discussed. Likely areas for near term direct heat projects are identified.

  19. Wells, Borings, and Underground Uses (Minnesota)

    Broader source: Energy.gov [DOE]

    This section regulates wells, borings, and underground storage with regards to protecting groundwater resources. The Commissioner of the Department of Health has jurisdiction, and can grant permits...

  20. Formulas & definitions to know Formulas & definitions that will be provided if Distance formula in 3 dimensions compab = ab

    E-Print Network [OSTI]

    Lozano-Robledo, Alvaro

    Formulas & definitions to know Formulas & definitions that will be provided if needed Distance formula in 3 dimensions compab = a·b |a| Equation of a sphere W = F · D (work, force, distance) Vector of differentiability for a function of two variables arc length formula, arc length function the graph of a function

  1. April 27, 2010 Well Logging I

    E-Print Network [OSTI]

    Ito, Garrett

    wells and may be drilled to tap into water or oil/natural gas. Core samples are usually not taken4/26/2010 1 GG450 April 27, 2010 Well Logging I Today's material comes from p. 501-541 in the text book. Please read and understand all of this material! Drilling ­ Exploration and Scientific Holes

  2. Geothermal Reservoir Well Stimulation Program: technology transfer

    SciTech Connect (OSTI)

    Not Available

    1980-05-01T23:59:59.000Z

    Each of the following types of well stimulation techniques are summarized and explained: hydraulic fracturing; thermal; mechanical, jetting, and drainhole drilling; explosive and implosive; and injection methods. Current stimulation techniques, stimulation techniques for geothermal wells, areas of needed investigation, and engineering calculations for various techniques. (MHR)

  3. Optimization of well length in waterflooding a five-spot pattern of horizontal wells

    E-Print Network [OSTI]

    Jimenez, Zulay J.

    1992-01-01T23:59:59.000Z

    for the horizontal wells and provide a good return on investment. Horizontal Wells in Waterflood Pr t A worldwide interest exists today in drilling horizontal wells to increase productivity, Horizontal wells can be used in any phase of reservoir recovery... efficiency7. Several investigatorss-ic have studied waterflooding using horizontal wells. droman et al, s reported a field application using horizontal wells in the Prudhoe Bay Unit where the main reservoir drive mechanism is gas cap expansion...

  4. Well being, forestry and ecosystem services Wellbeing, forestry and ecosystem services: A

    E-Print Network [OSTI]

    Well being, forestry and ecosystem services Wellbeing, forestry and ecosystem services increasingly important in government policy in the last decade. Ecosystem services have also become a significant focus for government following the Millennium Ecosystem Assessment (MEA). Human wellbeing is a key

  5. The Well-Group Distribution of Groundwater Source Heat Pump System Optimized Research

    E-Print Network [OSTI]

    Liu, Z.; Lu, L.; Yoshida, H.

    2006-01-01T23:59:59.000Z

    It is the key question that how does the well group arrange for application of GWSHP system. Based on the fact that the water movement is the important factor of heat transfer on aquifer, this paper presents two steps analysis method and analyze...

  6. The Well-Group Distribution of Groundwater Source Heat Pump System Optimized Research 

    E-Print Network [OSTI]

    Liu, Z.; Lu, L.; Yoshida, H.

    2006-01-01T23:59:59.000Z

    It is the key question that how does the well group arrange for application of GWSHP system. Based on the fact that the water movement is the important factor of heat transfer on aquifer, this paper presents two steps analysis method and analyze...

  7. Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups

    E-Print Network [OSTI]

    Xu, Wenyuan

    group key establish- ment. We identify seven social and situational factors which impact group formationMind Your Manners: Socially Appropriate Wireless Key Establishment for Groups Cynthia Kuo Ahren Studer Adrian Perrig Carnegie Mellon University {cykuo, astuder, perrig}@cmu.edu ABSTRACT Group

  8. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E to create a public- key encryption scheme for Alice that allows PIR searching over encrypted documents. Our allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  9. Public Key Encryption that Allows PIR Queries Eyal Kushilevitz

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Public Key Encryption that Allows PIR Queries Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. In this paper, we show how to create a public-key encryption scheme for Alice that allows PIR searching over allows for Single-Database PIR writing with sublinear communication complexity, which we consider

  10. Key ornamental innovations facilitate diversification in an avian radiation

    E-Print Network [OSTI]

    Rubenstein, Dustin R.

    Key ornamental innovations facilitate diversification in an avian radiation Rafael Maiaa,1 , Dustin novel ways of interacting with the en- vironment (key innovations) play a fundamental role in promoting evolution of orna- mental traits. Because selection can operate only on existing vari- ation, the tendency

  11. Energy Security: A Key Requirement forSustainable Development

    E-Print Network [OSTI]

    1 Energy Security: A Key Requirement forSustainable Development Perspective and Action Plan Robert Card Under Secretary US Department of Energy August 30, 2002 Session One: Maintaining Energy Security WSSD Side Event Energy for Sustainable Development IEA/UNEP/Eskom #12;2 Energy Security is a Key

  12. Reflective cracking of shear keys in multi-beam bridges

    E-Print Network [OSTI]

    Sharpe, Graeme Peter

    2009-06-02T23:59:59.000Z

    ..............................................2 Figure 2: PCI 33? Box Girder with Shear Keys................................................................5 Figure 3: TxDOT 34? Box Girder with Shear Keys .........................................................5 Figure 4: Test Specimen... Under Tension.........................................................................12 Figure 5: Test Specimen in Bending ...............................................................................12 Figure 6: Test Specimen in Shear...

  13. USB KEY PROFILE MANAGER FOR MOZILLA A Project Report

    E-Print Network [OSTI]

    Pollett, Chris

    USB KEY PROFILE MANAGER FOR MOZILLA A Project Report Presented to The Faculty of the Department FOR THE UNIVERSITY _____________________________________________________ 3 #12;ABSTRACT USB KEY PROFILE MANAGER FOR MOZILLA By Yun Zhou Mozilla's profile manager allows users to save their private information

  14. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  15. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  16. accident conditions key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident conditions key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Range Condition: Key to...

  17. Enhanced Geothermal Systems (EGS) well construction technology evaluation report.

    SciTech Connect (OSTI)

    Capuano, Louis, Jr. (Thermasource Inc.); Huh, Michael; Swanson, Robert (Thermasource Inc.); Raymond, David Wayne; Finger, John Travis; Mansure, Arthur James; Polsky, Yarom; Knudsen, Steven Dell

    2008-12-01T23:59:59.000Z

    Electricity production from geothermal resources is currently based on the exploitation of hydrothermal reservoirs. Hydrothermal reservoirs possess three ingredients critical to present day commercial extraction of subsurface heat: high temperature, in-situ fluid and high permeability. Relative to the total subsurface heat resource available, hydrothermal resources are geographically and quantitatively limited. A 2006 DOE sponsored study led by MIT entitled 'The Future of Geothermal Energy' estimates the thermal resource underlying the United States at depths between 3 km and 10 km to be on the order of 14 million EJ. For comparison purposes, total U.S. energy consumption in 2005 was 100 EJ. The overwhelming majority of this resource is present in geological formations which lack either in-situ fluid, permeability or both. Economical extraction of the heat in non-hydrothermal situations is termed Enhanced or Engineered Geothermal Systems (EGS). The technologies and processes required for EGS are currently in a developmental stage. Accessing the vast thermal resource between 3 km and 10 km in particular requires a significant extension of current hydrothermal practice, where wells rarely reach 3 km in depth. This report provides an assessment of well construction technology for EGS with two primary objectives: (1) Determining the ability of existing technologies to develop EGS wells. (2) Identifying critical well construction research lines and development technologies that are likely to enhance prospects for EGS viability and improve overall economics. Towards these ends, a methodology is followed in which a case study is developed to systematically and quantitatively evaluate EGS well construction technology needs. A baseline EGS well specification is first formulated. The steps, tasks and tools involved in the construction of this prospective baseline EGS well are then explicitly defined by a geothermal drilling contractor in terms of sequence, time and cost. A task and cost based analysis of the exercise is subsequently conducted to develop a deeper understanding of the key technical and economic drivers of the well construction process. Finally, future research & development recommendations are provided and ranked based on their economic and technical significance.

  18. First order theories for nonmonotone inductive definitions: recursively inaccessible and Mahlo

    E-Print Network [OSTI]

    Jäger, Gerhard

    First order theories for nonmonotone inductive definitions: recursively inaccessible and Mahlo Gerhard J¨ager Abstract In this paper first order theories for nonmonotone inductive definitions theories of) several specific nonmonotone inductive definitions which are interesting in the context

  19. National Biomedical Tracer Facility: Project definition study

    SciTech Connect (OSTI)

    Heaton, R.; Peterson, E. [Los Alamos National Lab., NM (United States); Smith, P. [Smith (P.A.) Concepts and Designs (United States)

    1995-05-31T23:59:59.000Z

    The Los Alamos National Laboratory is an ideal institution and New Mexico is an ideal location for siting the National Biomedical Tracer Facility (NBTF). The essence of the Los Alamos proposal is the development of two complementary irradiation facilities that combined with our existing radiochemical processing hot cell facilities and waste handling and disposal facilities provide a low cost alternative to other proposals that seek to satisfy the objectives of the NBTF. We propose the construction of a 30 MeV cyclotron facility at the site of the radiochemical facilities, and the construction of a 100 MeV target station at LAMPF to satisfy the requirements and objectives of the NBTF. We do not require any modifications to our existing radiochemical processing hot cell facilities or our waste treatment and disposal facilities to accomplish the objectives of the NBTF. The total capital cost for the facility defined by the project definition study is $15.2 M. This cost estimate includes $9.9 M for the cyclotron and associated facility, $2.0 M for the 100 MeV target station at LAMPF, and $3.3 M for design.

  20. Boundary definition of a multiverse measure

    E-Print Network [OSTI]

    Raphael Bousso; Ben Freivogel; Stefan Leichenauer; Vladimir Rosenhaus

    2010-09-18T23:59:59.000Z

    We propose to regulate the infinities of eternal inflation by relating a late time cut-off in the bulk to a short distance cut-off on the future boundary. The light-cone time of an event is defined in terms of the volume of its future light-cone on the boundary. We seek an intrinsic definition of boundary volumes that makes no reference to bulk structures. This requires taming the fractal geometry of the future boundary, and lifting the ambiguity of the conformal factor. We propose to work in the conformal frame in which the boundary Ricci scalar is constant. We explore this proposal in the FRW approximation for bubble universes. Remarkably, we find that the future boundary becomes a round three-sphere, with smooth metric on all scales. Our cut-off yields the same relative probabilities as a previous proposal that defined boundary volumes by projection into the bulk along timelike geodesics. Moreover, it is equivalent to an ensemble of causal patches defined without reference to bulk geodesics. It thus yields a holographically motivated and phenomenologically successful measure for eternal inflation.

  1. Phase Space and Jet Definitions in SCET

    E-Print Network [OSTI]

    William Man-Yin Cheung; Michael Luke; Saba Zuberi

    2009-10-13T23:59:59.000Z

    We discuss consistent power counting for integrating soft and collinear degrees of freedom over arbitrary regions of phase space in the soft-collinear effective theory (SCET), and illustrate our results at one loop with several jet algorithms: JADE, Sterman-Weinberg and k_T. Consistently applying SCET power-counting in phase space, along with non-trivial zero-bin subtractions, prevents double-counting of final states. The resulting phase-space integrals over soft and collinear regions are individually ultraviolet divergent, but the phase-space ultraviolet divergences cancel in the sum. Whether the soft and collinear contributions are individually infrared safe depends on the jet definition. We show that while this is true at one loop for JADE and Sterman-Weinberg, the k_T algorithm does not factorize into individually infrared safe soft and collinear pieces in dimensional regularization. We point out that this statement depends on the ultraviolet regulator, and that in a cutoff scheme the soft functions are infrared safe.

  2. Apparatus, system, and method for synchronizing a timer key

    DOE Patents [OSTI]

    Condit, Reston A; Daniels, Michael A; Clemens, Gregory P; Tomberlin, Eric S; Johnson, Joel A

    2014-04-22T23:59:59.000Z

    A timer key relating to monitoring a countdown time of a countdown routine of an electronic device is disclosed. The timer key comprises a processor configured to respond to a countdown time associated with operation of the electronic device, a display operably coupled with the processor, and a housing configured to house at least the processor. The housing has an associated structure configured to engage with the electronic device to share the countdown time between the electronic device and the timer key. The processor is configured to begin a countdown routine based at least in part on the countdown time, wherein the countdown routine is at least substantially synchronized with a countdown routine of the electronic device when the timer key is removed from the electronic device. A system and method for synchronizing countdown routines of a timer key and an electronic device are also disclosed.

  3. Practical issues in quantum-key-distribution postprocessing

    SciTech Connect (OSTI)

    Fung, C.-H. Fred; Chau, H. F. [Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road (Hong Kong); Ma Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, 200 University Ave W., Waterloo, Ontario, Canada N2L 3G1 (Canada)

    2010-01-15T23:59:59.000Z

    Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.

  4. Directional Drilling and Equipment for Hot Granite Wells

    SciTech Connect (OSTI)

    Williams, R. E.; Neudecker, J. W.; Rowley, J.C.; Brittenham, T. L.

    1981-01-01T23:59:59.000Z

    Directional drilling technology was extended and modified to drill the first well of a subsurface geothermal energy extraction system at the Fenton Hill, New Mexico, hot dry rock (HDR) experimental site. Borehole geometries, extremely hard and abrasive granite rock, and high formation temperatures combined to provide a challenging environment for directional drilling tools and instrumentation. Completing the first of the two-wellbore HDR system resulted in the definition of operation limitations of -many conventional directional drilling tools, instrumentation, and techniques. The successful completion of the first wellbore, Energy Extraction Well No. 2 (EE-21), to a measured depth of 4.7 km (15,300 ft) in granite reservoir rock with a bottomhole temperature of 320 C (610 F) required the development of a new high-temperature downhole motor and modification of existing wireline-conveyed steering tool systems. Conventional rotary-driven directional assemblies were successfully modified to accommodate the very hard and abrasive rock encountered while drilling nearly 2.6 km (8,500 ft) of directional hole to a final inclination of 35{sup o} from the vertical at the controlled azimuthal orientation. Data were collected to optimize the drilling procedures far the programmed directional drilling of well EE-3 parallel to, and 370 metres (1,200 ft) above, Drilling equipment and techniques used in drilling wellbores for extraction of geothermal energy from hot granite were generally similar to those that are standard and common to hydrocarbon drilling practices. However, it was necessary to design some new equipment for this program: some equipment was modified especially for this program and some was operated beyond normal ratings. These tools and procedures met with various degrees of success. Two types of shock subs were developed and tested during this project. However, downhole time was limited, and formations were so varied that analysis of the capabilities of these items is not conclusive. Temperature limits of the tools were exceeded. EE-2. Commercial drilling and fishing jars were improved during the drilling program. Three-cone, tungsten-carbide insert bit performance with downhole motors was limited by rapid gauge wear. Rotary drilling was optimized for wells EE-2 and EE-3 using softer (IADS 635 code) bits and provided a balance between gauge,. cutting structure, and bearing life. Problems of extreme drill string drag, drill string twist-off, and corrosion control are discussed.

  5. Gas condensate damage in hydraulically fractured wells

    E-Print Network [OSTI]

    Adeyeye, Adedeji Ayoola

    2004-09-30T23:59:59.000Z

    Company. The well was producing a gas condensate reservoir and questions were raised about how much drop in flowing bottomhole pressure below dewpoint would be appropriate. Condensate damage in the hydraulic fracture was expected to be of significant...

  6. Groundwater well with reactive filter pack

    DOE Patents [OSTI]

    Gilmore, Tyler J. (Pasco, WA); Holdren, Jr., George R. (Kennewick, WA); Kaplan, Daniel I. (Richland, WA)

    1998-01-01T23:59:59.000Z

    A method and apparatus for the remediation of contaminated soil and ground water wherein a reactive pack material is added to the annular fill material utilized in standard well construction techniques.

  7. RMOTC - Field Information - Wells and Production

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sale of RMOTC equipment and materials click here. Partners may test in RMOTC's large inventory of cased, uncased, vertical, high-angle, and horizontal wells. Cased and open-hole...

  8. MARGINAL EXPENSE OIL WELL WIRELESS SURVEILLANCE MEOWS

    SciTech Connect (OSTI)

    Mason M. Medizade; John R. Ridgely; Donald G. Nelson

    2004-11-01T23:59:59.000Z

    A marginal expense oil well wireless surveillance system to monitor system performance and production from rod-pumped wells in real time from wells operated by Vaquero Energy in the Edison Field, Main Area of Kern County in California has been successfully designed and field tested. The surveillance system includes a proprietary flow sensor, a programmable transmitting unit, a base receiver and receiving antenna, and a base station computer equipped with software to interpret the data. First, the system design is presented. Second, field data obtained from three wells is shown. Results of the study show that an effective, cost competitive, real-time wireless surveillance system can be introduced to oil fields across the United States and the world.

  9. Reservoir studies of new multilateral well architecture

    E-Print Network [OSTI]

    Sarfare, Manoj Dnyandeo

    2004-09-30T23:59:59.000Z

    to optimize slot usage, commercially develop lower-quality reserves in the Brent sequence and when applied with complementary technologies of underbalanced drilling and intelligent well completions help optimize field development The economic benefits...

  10. INVITATIONAL WELL-TESTING SYMPOSIUM PROCEEDINGS

    E-Print Network [OSTI]

    Authors, Various

    2011-01-01T23:59:59.000Z

    wei I is being dri lied underbalanced, whether H2S is to beis occurring, the well is underbalanced and the threat of ain, the wei I may become underbalanced and the threat of a

  11. Geological well log analysis. Third ed

    SciTech Connect (OSTI)

    Pirson, S.J.

    1983-01-01T23:59:59.000Z

    Until recently, well logs have mainly been used for correlation, structural mapping, and quantitive evaluation of hydrocarbon bearing formations. This third edition of Geologic Well Log Analysis, however, describes how well logs can be used for geological studies and mineral exploration. This is done by analyzing well logs for numerous parameters and indices of significant mineral accumulation, primarily in sediments. Contents are: SP and Eh curves as redoxomorphic logs; sedimentalogical studies by log curve shapes; exploration for stratigraphic traps; continuous dipmeter as a structural tool; continuous dipmeter as a sedimentation tool; Paleo-facies logging and mapping; hydrogeology 1--hydrodynamics of compaction; hydrogeology 2--geostatic equilibrium; and hydrogeology 3--hydrodynamics of infiltration. Appendixes cover: Computer program for calculating the dip magnitude, azimuth, and the degree and orientation of the resistivity anisotrophy; a lithology computer program for calculating the curvature of a structure; and basic log analysis package for HP-41CV programmable calculator.

  12. Modeling well performance in compartmentalized gas reservoirs

    E-Print Network [OSTI]

    Yusuf, Nurudeen

    2008-10-10T23:59:59.000Z

    Predicting the performance of wells in compartmentalized reservoirs can be quite challenging to most conventional reservoir engineering tools. The purpose of this research is to develop a Compartmentalized Gas Depletion Model that applies not only...

  13. Modeling techniques for simulating well behavior

    E-Print Network [OSTI]

    Rattu, Bungen Christina

    2002-01-01T23:59:59.000Z

    This thesis is a catalog of modeling techniques useful in simulating well behavior in certain types of reservoirs that are often encountered in petroleum reservoirs. Emphasis has been placed on techniques that can be used with any conventional...

  14. Modeling well performance in compartmentalized gas reservoirs

    E-Print Network [OSTI]

    Yusuf, Nurudeen

    2009-05-15T23:59:59.000Z

    Predicting the performance of wells in compartmentalized reservoirs can be quite challenging to most conventional reservoir engineering tools. The purpose of this research is to develop a Compartmentalized Gas Depletion Model that applies not only...

  15. Completion of Oil Wells May 4, 2003

    E-Print Network [OSTI]

    Rudge, John

    Completion of Oil Wells John Rudge May 4, 2003 1 Introduction After the initial drilling of an oil for given , z; i.e. ignore radial variation. Under this assumption these equations can be easily integrated

  16. Groundwater well with reactive filter pack

    DOE Patents [OSTI]

    Gilmore, T.J.; Holdren, G.R. Jr.; Kaplan, D.I.

    1998-09-08T23:59:59.000Z

    A method and apparatus are disclosed for the remediation of contaminated soil and ground water wherein a reactive pack material is added to the annular fill material utilized in standard well construction techniques. 3 figs.

  17. Design and life-cycle considerations for unconventional-reservoir wells

    SciTech Connect (OSTI)

    Miskimins, J.L. [Colorado School of Mines, Golden, CO (United States)

    2009-05-15T23:59:59.000Z

    This paper provides an overview of design and life-cycle considerations for certain unconventional-reservoir wells. An overview of unconventional-reservoir definitions is provided. Well design and life-cycle considerations are addressed from three aspects: upfront reservoir development, initial well completion, and well-life and long-term considerations. Upfront-reservoir-development issues discussed include well spacing, well orientation, reservoir stress orientations, and tubular metallurgy. Initial-well-completion issues include maximum treatment pressures and rates, treatment diversion, treatment staging, flowback and cleanup, and dewatering needs. Well-life and long-term discussions include liquid loading, corrosion, refracturing and associated fracture reorientation, and the cost of abandonment. These design considerations are evaluated with case studies for five unconventional-reservoir types: shale gas (Barnett shale), tight gas (Jonah feld), tight oil (Bakken play), coalbed methane (CBM) (San Juan basin), and tight heavy oil (Lost Hills field). In evaluating the life cycle and design of unconventional-reservoir wells, 'one size' does not fit all and valuable knowledge and a shortening of the learning curve can be achieved for new developments by studying similar, more-mature fields.

  18. Automatic well log correlation using neural networks

    E-Print Network [OSTI]

    Habiballah, Walid Abdulrahim

    1991-01-01T23:59:59.000Z

    AUTOMATIC WELL LOG CORRELATION USING NEURAL NETWORKS A Thesis by WALID ABDULHAHIM HABIBALLAH Submitted to the Office of Graduate Studies of Texas AaM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE... August 1991 Major Subject; Petroleum Engineering AUTOMATIC WELL LOG CORRELATION USING NEURAL NETWORKS A Thesis by WALID ABDULRAHIM HABIBALLAH Approved as to style and content by: R. A. St tzman (Chair of Committee) S. W. Poston (Member) R. R...

  19. PrimeEnergy/DOE/GRI slant well

    SciTech Connect (OSTI)

    Drimal, C.E.; Muncey, G.; Carden, R.

    1991-12-01T23:59:59.000Z

    This report presents final results of the Sterling Boggs 1240 slant well. Objectives of the project were (1) to test the potential for improved recovery efficiency in a fractured Devonian Shale reservoir from a directionally drilled well, (2) to perform detailed tests of reservoir properties and completion methods, and (3) to provide technology to industry which may ultimately improve the economics of drilling in the Devonian Shale and thereby stimulate development of its resources.

  20. Software solutions manage the definition, operation, maintenance and configuration control of the National Ignition Facility

    SciTech Connect (OSTI)

    Dobson, D; Churby, A; Krieger, E; Maloy, D; White, K

    2011-07-25T23:59:59.000Z

    The National Ignition Facility (NIF) is the world's largest laser composed of millions of individual parts brought together to form one massive assembly. Maintaining control of the physical definition, status and configuration of this structure is a monumental undertaking yet critical to the validity of the shot experiment data and the safe operation of the facility. The NIF business application suite of software provides the means to effectively manage the definition, build, operation, maintenance and configuration control of all components of the National Ignition Facility. State of the art Computer Aided Design software applications are used to generate a virtual model and assemblies. Engineering bills of material are controlled through the Enterprise Configuration Management System. This data structure is passed to the Enterprise Resource Planning system to create a manufacturing bill of material. Specific parts are serialized then tracked along their entire lifecycle providing visibility to the location and status of optical, target and diagnostic components that are key to assessing pre-shot machine readiness. Nearly forty thousand items requiring preventive, reactive and calibration maintenance are tracked through the System Maintenance & Reliability Tracking application to ensure proper operation. Radiological tracking applications ensure proper stewardship of radiological and hazardous materials and help provide a safe working environment for NIF personnel.

  1. Characterization Well R-7 Geochemistry Report

    SciTech Connect (OSTI)

    P.Longmire; F.Goff

    2002-12-01T23:59:59.000Z

    This report provides analytical results for four groundwater-sampling rounds conducted at characterization well R-7. The goal of the characterization efforts was to assess the hydrochemistry and to determine if contaminants from Technical Area (TA)-2 and TA-21 of the Los Alamos National Laboratory (LANL or the Laboratory) are present in the regional aquifer in the vicinity of the well. Figure 1.0-1 shows the well's location in the narrow upper part of Los Alamos Canyon, between the inactive Omega West reactor and the mouth of DP Canyon. Well R-7 is in an excellent location to characterize the hydrology and groundwater chemistry in both perched groundwater and the regional aquifer near sites of known Laboratory effluent release, including radionuclides and inorganic chemicals (Stone et al. 2002, 72717). The Risk Reduction and Environmental Stewardship-Remediation (RRES-R) Program (formerly the Environmental Restoration [ER] Project) installed well R-7 as part of groundwater investigations to satisfy requirements of the ''Hydrogeologic Workplan'' (LANL 1998, 59599) and to support the Laboratory's ''Groundwater Protection Management Program Plan'' (LANL 1996, 70215). Well R-7 was designed primarily to provide geochemical or water quality and hydrogeologic data for the regional aquifer within the Puye Formation. This report also presents a geochemical evaluation of the analytical results for well R-7 and provides hydrogeochemical interpretations using analytical results for groundwater samples collected at the well. Discussion of other hydrogeochemical data collected within the east-central portion of the Laboratory, however, is deferred until they can be evaluated in the context of sitewide information collected from other RRES and Hydrogeologic Workplan characterization wells (R-8A, R-9, and R-9i). Once all deep groundwater investigations in the east-central portion of the Laboratory are completed, geochemical and hydrogeologic conceptual models for the Los Alamos Canyon watershed may be included in a groundwater risk analysis. These models will include an evaluation of potential contaminant transport pathways. Well R-7 was completed on March 9, 2001, with three screens (363.2 to 379.2 ft, 730.4 to 746.4 ft, and 895.5 to 937.4 ft). Screen No.2 was dry during characterization sampling. Four rounds of groundwater characterization samples, collected from a perched zone and the regional aquifer from depths of 378.0 ft (screen No.1) and 915.0 ft (screen No.3), were chemically characterized for radionuclides, metals and trace elements, major ions, high-explosive (HE) compounds, total organic carbon, dissolved organic carbon, organic compounds, and stable isotopes (H, N, and O). Although well R-7 is primarily a characterization well, its design and construction also meet the requirements of a Resource Conservation and Recovery Act (RCRA)-compliant monitoring well as described in the US Environmental Protection Agency (EPA) document ''RCRA Groundwater Monitoring: Draft Technical Guidance,'' November 1992, EPA 530-R-93- 001. Incorporation of this well into a Laboratory-wide groundwater-monitoring program will be considered, and more specifically evaluated (e.g., sampling frequency, analytes, etc.), when the results of the well R-7 characterization activities are comprehensively evaluated in conjunction with other groundwater investigations in the ''Hydrogeologic Workplan'' (LANL 1998, 59599).

  2. ADVANCED TECHNOLOGIES FOR STRIPPER GAS WELL ENHANCEMENT

    SciTech Connect (OSTI)

    Charles M. Boyer II; Ronald J. MacDonald P.G.

    2002-01-01T23:59:59.000Z

    As part of Task 1 in Advanced Technologies for Stripper Gas Well Enhancement, Schlumberger-Holditch Reservoir Technologies (H-RT) has joined with two Appalachian Basin producers, Great Lakes Energy Partners, LLC, and Belden & Blake Corporation to develop methodologies for identification and enhancement of stripper wells with economic upside potential. These industry partners have provided us with data for more than 700 wells in northwestern Pennsylvania. Phase 1 goals of this project are to develop and validate methodologies that can quickly and cost-effectively identify wells with enhancement potential. We have continued to enhance and streamline our software, and we are testing the final stages of our new Microsoft{trademark} Access/Excel based software. We are continuing to process the information and are identifying potential candidate wells that can be used in Phase 2 to validate the new methodologies. In addition, preparation of the final technical report is underway. During this quarter, we have presented our project and discussed the software to numerous Petroleum Technology Transfer Council (PTTC) workshops located in various regions of the United States.

  3. Investigating the maintenance of the mouse definitive adrenal cortex 

    E-Print Network [OSTI]

    Zhao, Xin

    2013-11-29T23:59:59.000Z

    and Cyp11b1 that encode the enzymes aldosterone synthase and 11?-hydroxylase, which catalyze the terminal reactions in the production of aldosterone and corticosterone, respectively. This thesis aims to investigate the maintenance of the definitive mouse...

  4. ‘Model’ or ‘tool’? New definitions for translational research

    E-Print Network [OSTI]

    Sive, Hazel

    The term ‘model’ often describes non-human biological systems that are used to obtain a better understanding of human disorders. According to the most stringent definition, an animal ‘model’ would display exactly the same ...

  5. California PRC Section 21065.5, Definitions for Geothermal Exploratory...

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: California PRC Section 21065.5, Definitions for Geothermal Exploratory ProjectLegal Abstract...

  6. Towards Automatic Extraction of Definitions Claudia Borg1

    E-Print Network [OSTI]

    Pace, Gordon J.

    Department of Artificial Intelligence, University of Malta 2 Department of Computer Science, University of Malta {claudia.borg|mike.rosner|gordon.pace}@um.edu.mt Abstract. Definition extraction can be useful

  7. The fundamental theorem of Galois theory Definition 1. A polynomial ...

    E-Print Network [OSTI]

    2011-11-14T23:59:59.000Z

    The fundamental theorem of Galois theory. Definition 1. A polynomial in K[X] (K a field) is separable if it has no multiple roots in any field containing K. An ...

  8. Fluid-Rock Characterization and Interactions in NMR Well Logging

    SciTech Connect (OSTI)

    Hirasaki, George J.; Mohanty, Kishore, K.

    2001-07-13T23:59:59.000Z

    The objective of this project is to characterize the fluid properties and fluid-rock interactions that are needed for formation evaluation by NMR well logging. This is the first annual progress report submitted to the DOE. It reports on the work completed during the reporting period even if it may have started before this period. This project is a partnership between Professor George J. Hirasaki at Rice University and Professor Kishore Mohanty at University of Houston. In addition to the DOE, this project is supported by a consortium of oil companies and service companies. The fluid properties characterization has emphasized the departure of live oils from correlations based on dead oils. Also, asphaltic components can result in a difference between the T1 and T2 relaxation time distributions as well as reduce the hydrogen index. The fluid rock characterizations that are reported here are the effects of wettability and internal magnetic field gradients. A pore reconstruction method ha s been developed to recreate three-dimensional porous media from two-dimensional images that reproduce some of their key statistical properties. A Monte Carlo simulation technique has been developed to calculate the magnetization decay in fluid saturated porous media given their pore structure.

  9. Double Shell Tank (DST) Process Waste Sampling Subsystem Definition Report

    SciTech Connect (OSTI)

    RASMUSSEN, J.H.

    2000-04-25T23:59:59.000Z

    This report defines the Double-Shell Tank (DST) Process Waste Sampling Subsystem (PWSS). This subsystem definition report fully describes and identifies the system boundaries of the PWSS. This definition provides a basis for developing functional, performance, and test requirements (i.e., subsystem specification), as necessary, for the PWSS. The resultant PWSS specification will include the sampling requirements to support the transfer of waste from the DSTs to the Privatization Contractor during Phase 1 of Waste Feed Delivery.

  10. Pressure buildup characteristics in Austin Chalk wells

    E-Print Network [OSTI]

    Claycomb, Eddy

    1982-01-01T23:59:59.000Z

    20 40 60 60 Mr lee IOOKrlemelere EEKAR 6 UA SALMI' WILSON LAVACA hrAVERICK ZAVA' A FRIG ATAECOSA KARNES DE WITT 0 0 IMMIT LA SALLE ~CO o& @g'v Figure I ? Austin Chalk Trend in Texas Early in the development of Clayton W, Williams, Jr..., Henry J. , Jr. : "Well- Test Analysis for Vertically Fractured Wells, " J. Pet. Tech. (Aug. 1972) 1014-1020; Trans. , AINE, 253. VITA Name: Eddy Claycomb Birth Date: March 18, 1956 Birthplace: Tyler, Texas Parents: Mr. and Mrs. Tom Claycomb, Jr...

  11. Key Factors in Displacement Ventilation Systems for Better IAQ

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  12. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    Buttler, W T; Lamoreaux, S K; Morgan, G L; Nordholt, J E; Peterson, C G

    2000-01-01T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  13. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  14. Detailed Description of Key NIF Milestones for NNSA Description

    E-Print Network [OSTI]

    1 Detailed Description of Key NIF Milestones for NNSA Short Description NIC EP Rev 4.0 Approved = Milestone Reporting Tool, which NNSA uses to support quarterly status reporting of NIC Level 1-2 milestones

  15. Intelligence perfecting the mute keys: Edgar Bowers and Music

    E-Print Network [OSTI]

    Smith, Kevin

    2003-01-01T23:59:59.000Z

    a Generation Know Its Story: The Edgar Bowers Conference andperfecting the mute keys: Edgar Bowers and Music” by C.and model for the poetry of Edgar Bowers. From his earliest

  16. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  17. Efficiency in Quantum Key Distribution Protocols using entangled Gaussian states

    E-Print Network [OSTI]

    Carles Rodó

    2010-05-14T23:59:59.000Z

    Efficiency is a key issue in any real implementation of a cryptographic protocol since the physical resources are not unlimited. We will first show that Quantum Key Distribution is possible with an "Entanglement based" scheme with NPPT symmetric Gaussian states in spite of the fact that these systems cannot be distilled with Gaussian operations (they are all bound entangled). In this work we analyze the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill efficiently a secret key secure against finite coherent attacks from sufficiently entangled Gaussian states with non-positive partial transposition. Moreover, all such states allow for efficient key distillation, when the eavesdropper is assumed to perform individual attacks before in an efficient way.

  18. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  19. A Key Target for Diabetes Drugs | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed A Key Target for Diabetes Drugs JULY 26, 2013 Bookmark and Share The structure of the human glucagon receptor,...

  20. Self-referenced continuous-variable quantum key distribution

    E-Print Network [OSTI]

    Soh, Daniel B S; Coles, Patrick J; Lütkenhaus, Norbert; Camacho, Ryan M; Urayama, Junji; Sarovar, Mohan

    2015-01-01T23:59:59.000Z

    We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-referenced CV-QKD, that eliminates the need for transmission of a high-power local oscillator between the communicating parties. In this protocol, each signal pulse is accompanied by a reference pulse (or a pair of twin reference pulses), used to align Alice's and Bob's measurement bases. We present a proof-of-principle, fiber-based experimental demonstration of the protocol and quantify the expected secret key rates by expressing them in terms of experimental parameters. Our analysis of the secret key rate fully takes into account the inherent uncertainty associated with the quantum nature of the reference pulse(s) and quantifies the limit at which the theoretical key rate approaches that of the respective conventional protocol that requires local oscillator transmission. The self-referenced protocol greatly simplifies the hardware required for CV-QKD, especially for potential integrated photonics implementations of trans...

  1. Key Factors in Displacement Ventilation Systems for Better IAQ 

    E-Print Network [OSTI]

    Wang, X.; Chen, J.; Li, Y.; Wang, Z.

    2006-01-01T23:59:59.000Z

    This paper sets up a mathematical model of three-dimensional steady turbulence heat transfer in an air-conditioned room of multi-polluting heat sources. Numerical simulation helps identify key factors in displacement ventilation systems that affect...

  2. Platforms and Methods for Acoustic Detection and Monitoring of Key

    E-Print Network [OSTI]

    Hawai'i at Manoa, University of

    #12;Platforms and Methods for Acoustic Detection and Monitoring of Key Ecosystem Properties Nils Olav Handegard #12;· Introduction · Platforms carrying acoustics · Methods · Applications ­ What we have done · Applications ­ What we would like to do #12;· Introduction · Platforms carrying acoustics

  3. W-like bound entangled states and secure key distillation

    E-Print Network [OSTI]

    Remigiusz Augusiak; Pawel Horodecki

    2009-09-09T23:59:59.000Z

    We construct multipartite entangled states with underlying W-type structure satisfying positive partial transpose (PPT) condition under any (N-1)|1 partition. Then we show how to distill N-partite secure key form the states using two different methods: direct application of local filtering and novel random key distillation scheme in which we adopt the idea form recent results on entanglement distillation. Open problems and possible implications are also discussed.

  4. Security of quantum key distribution with arbitrary individual imperfections

    E-Print Network [OSTI]

    Øystein Marøy; Lars Lydersen; Johannes Skaar

    2010-06-01T23:59:59.000Z

    We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate, and show that only two parameters must be bounded to ensure security; the basis dependence of the source and a detector blinding parameter. The system may otherwise be completely uncharacterized and contain large losses.

  5. Securing a Quantum Key Distribution Network Using Secret Sharing

    E-Print Network [OSTI]

    Barnett, Stephen M

    2012-01-01T23:59:59.000Z

    We present a simple new technique to secure quantum key distribution relay networks using secret sharing. Previous techniques have relied on creating distinct physical paths in order to create the shares. We show, however, how this can be achieved on a single physical path by creating distinct logical channels. The technique utilizes a random 'drop-out' scheme to ensure that an attacker must compromise all of the relays on the channel in order to access the key.

  6. Development of a Humid Climate Definition

    E-Print Network [OSTI]

    Hedrick, R. L.; Shirey, D. B.

    1998-01-01T23:59:59.000Z

    The role of humidity in indoor air quality has become of increasing concern in recent years. High indoor humidities can result in microbial growth on building surfaces, resulting in poor indoor air quality, as well as damage to the building and its...

  7. Foolproof completions for high rate production wells

    E-Print Network [OSTI]

    Tosic, Slavko

    2008-10-10T23:59:59.000Z

    wells, particularly those with subsea wellheads, and the alternative has been to subject the completion to increasingly high drawdown, accepting a high skin effect. A far better solution is to use a HPF completion. Of course the execution of a successful...

  8. Foolproof completions for high rate production wells

    E-Print Network [OSTI]

    Tosic, Slavko

    2009-05-15T23:59:59.000Z

    wells, particularly those with subsea wellheads, and the alternative has been to subject the completion to increasingly high drawdown, accepting a high skin effect. A far better solution is to use a HPF completion. Of course the execution of a successful...

  9. FOR THE ACTIVE Health and Wellness

    E-Print Network [OSTI]

    deYoung, Brad

    FOR THE ACTIVE Health and Wellness n EARLY BIRD SWIM Monday, Wednesday & Friday Sept. 16-Dec. 6, 7, Seniors: $58 n SWIMMER'S SPECIAL (Participate in 36 swims of your choice of Early Bird or Evening Swim Education fasttrac for 55+ ASTRONOMY ­ OUR SOLAR SYSTEM AND BEYOND This basic introductory course

  10. FOR THE ACTIVE Health and Wellness

    E-Print Network [OSTI]

    deYoung, Brad

    FOR THE ACTIVE Health and Wellness n EARLY BIRD SWIM Monday, Wednesday & Friday Sept. 16-Dec. 6, 7, Seniors: $58 n SWIMMER'S SPECIAL (Participate in 36 swims of your choice of Early Bird or Evening Swim Education fasttrac for 55+ ASTRONOMY ­ Our Solar System and Beyond This basic introductory course

  11. Visualizing Motion in Potential Wells* Pratibha Jolly

    E-Print Network [OSTI]

    Zollman, Dean

    , directly and plot the potential energy diagrams using a magnetic field sensor. The ease of measurement of potential #12;2 barriers and wells. The previous developers used a photo-interrupt and timing device for the sake of economy a single sensor was employed. Then, the experiment had to be repeated a large number

  12. Promoting Balance, Wellness & Fitness Creating healthier lives.

    E-Print Network [OSTI]

    Washington at Seattle, University of

    in student recruitment and retention. Engagement ­ We provide opportunities for students and members of their leisure time. Participation in such activities also assists students in performing well in a demanding interpersonal conflicts, learn healthy life-style habits, provide first aid and emergency response services

  13. T2WELL/ECO2N

    Energy Science and Technology Software Center (OSTI)

    002966IBMPC00 T2Well/ECO2N Version 1.0: Multiphase and Non-Isothermal Model for Coupled Wellbore-Reservoir Flow of Carbon Dioxide and Variable Salinity Water  http:..esd.lbl.gov/tough/licensing.html 

  14. Marginal Expense Oil Well Wireless Surveillance (MEOWWS)

    SciTech Connect (OSTI)

    Nelson, Donald G.

    2002-03-11T23:59:59.000Z

    The objective of this study was to identify and field test a new, low cost, wireless oil well surveillance system. A variety of suppliers and technologies were considered. One supplier and system was chosen that was low cost, new to the oil field, and successfully field tested.

  15. C-26A well sets new standard for ER horizontal wells

    SciTech Connect (OSTI)

    Andresen, S.; Hovda, S. [Norsk Hydro Production a.s, Bergen (Norway); Olsen, T.L. [Baker Hughes INTEQ, Bergen (Norway)

    1995-11-01T23:59:59.000Z

    Well 30/6-C-26A in the Norwegian North Sea has a horizontal reach of 25,758 ft, which was briefly a new world record in extended reach drilling. The last 6,888 ft was drilled horizontally in the reservoir 20--26 ft vertically above the oil-water contact. The Oseberg field was discovered in 1979. To develop this giant (16.8 x 3.1 mile, 27 x 5 km) field, two platforms were placed 9.3 miles apart. To drain the oil between the platforms, two subsea wells were drilled and completed. The first horizontal well in the Oseberg field was drilled in 1992. Since then 17 horizontal wells have been successfully drilled and completed. The general trend during this period is that both the length of the horizontal reservoir section and the total depth for the wells have increased. New equipment and technology, as well as general field experience, played an important role when deciding to drill well C-26A. The paper describes well C-26A objectives, well bore stability, well path considerations, the casing program, hydraulics and hole cleaning and well completion.

  16. Well constructions with inhibited microbial growth and methods of antimicrobial treatment in wells

    DOE Patents [OSTI]

    Lee, Brady D.; Dooley, Kirk J.

    2004-11-02T23:59:59.000Z

    The invention includes methods of inhibiting microbial growth in a well. A packing material containing a mixture of a first material and an antimicrobial agent is provided to at least partially fill a well bore. One or more access tubes are provided in an annular space around a casing within the well bore. The access tubes have a first terminal opening located at or above a ground surface and have a length that extends from the first terminal opening at least part of the depth of the well bore. The access tubes have a second terminal opening located within the well bore. An antimicrobial material is supplied into the well bore through the first terminal opening of the access tubes. The invention also includes well constructs.

  17. Security bound of two-basis quantum-key-distribution protocols using qudits

    SciTech Connect (OSTI)

    Nikolopoulos, Georgios M.; Alber, Gernot [Institut fuer Angewandte Physik, Technische Universitaet Darmstadt, 64289 Darmstadt (Germany)

    2005-09-15T23:59:59.000Z

    We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum-cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  18. The ISO/NASA Key Project on AGN Spectral Energy Distributions (Characteristics of the ISO Data)

    E-Print Network [OSTI]

    Eric J. Hooper; Belinda J. Wilkes; Kim K. McLeod; Martin S. Elvis; Chris D. Impey; Carol J. Lonsdale; Matt A. Malkan; Jonathan C. McDowell

    1999-02-05T23:59:59.000Z

    The U.S. ISO Key Project on quasar spectral energy distributions seeks to better understand the very broad-band emission features of quasars from radio to X-rays. A key element of this project is observations of 72 quasars with the ISOPHOT instrument at 8 bands, from 5 to 200 microns. The sample was chosen to span a wide range of redshifts and quasar types. This paper presents an overview of the analysis and reduction techniques, as well as general trends within the data set (comparisons with IRAS fluxes, uncertainties as a function of background sky brightness, and an analysis of vignetting corrections in chopped observing mode). A more detailed look at a few objects in the sample is presented in Wilkes et al. 1999, astro-ph/9902084.

  19. 0.0.1 Saturated models What follows is the main definition of model theory.

    E-Print Network [OSTI]

    0.0.1 Saturated models What follows is the main definition of model theory. Definition: Let x's an algebraically closed field. It's also 1-saturated. Understanding a theory is understanding its types. Definition there is only 1 variable.) However, there is clearly no element satisfying these statements in N. Definition

  20. GAS INJECTION/WELL STIMULATION PROJECT

    SciTech Connect (OSTI)

    John K. Godwin

    2005-12-01T23:59:59.000Z

    Driver Production proposes to conduct a gas repressurization/well stimulation project on a six well, 80-acre portion of the Dutcher Sand of the East Edna Field, Okmulgee County, Oklahoma. The site has been location of previous successful flue gas injection demonstration but due to changing economic and sales conditions, finds new opportunities to use associated natural gas that is currently being vented to the atmosphere to repressurize the reservoir to produce additional oil. The established infrastructure and known geological conditions should allow quick startup and much lower operating costs than flue gas. Lessons learned from the previous project, the lessons learned form cyclical oil prices and from other operators in the area will be applied. Technology transfer of the lessons learned from both projects could be applied by other small independent operators.

  1. Pumpernickel Valley Geothermal Project Thermal Gradient Wells

    SciTech Connect (OSTI)

    Z. Adam Szybinski

    2006-01-01T23:59:59.000Z

    The Pumpernickel Valley geothermal project area is located near the eastern edge of the Sonoma Range and is positioned within the structurally complex Winnemucca fold and thrust belt of north-central Nevada. A series of approximately north-northeast-striking faults related to the Basin and Range tectonics are superimposed on the earlier structures within the project area, and are responsible for the final overall geometry and distribution of the pre-existing structural features on the property. Two of these faults, the Pumpernickel Valley fault and Edna Mountain fault, are range-bounding and display numerous characteristics typical of strike-slip fault systems. These characteristics, when combined with geophysical data from Shore (2005), indicate the presence of a pull-apart basin, formed within the releasing bend of the Pumpernickel Valley – Edna Mountain fault system. A substantial body of evidence exists, in the form of available geothermal, geological and geophysical information, to suggest that the property and the pull-apart basin host a structurally controlled, extensive geothermal field. The most evident manifestations of the geothermal activity in the valley are two areas with hot springs, seepages, and wet ground/vegetation anomalies near the Pumpernickel Valley fault, which indicate that the fault focuses the fluid up-flow. There has not been any geothermal production from the Pumpernickel Valley area, but it was the focus of a limited exploration effort by Magma Power Company. In 1974, the company drilled one exploration/temperature gradient borehole east of the Pumpernickel Valley fault and recorded a thermal gradient of 160oC/km. The 1982 temperature data from five unrelated mineral exploration holes to the north of the Magma well indicated geothermal gradients in a range from 66 to 249oC/km for wells west of the fault, and ~283oC/km in a well next to the fault. In 2005, Nevada Geothermal Power Company drilled four geothermal gradient wells, PVTG-1, -2, -3, and -4, and all four encountered geothermal fluids. The holes provided valuable water geochemistry, supporting the geothermometry results obtained from the hot springs and Magma well. The temperature data gathered from all the wells clearly indicates the presence of a major plume of thermal water centered on the Pumpernickel Valley fault, and suggests that the main plume is controlled, at least in part, by flow from this fault system. The temperature data also defines the geothermal resource with gradients >100oC/km, which covers an area a minimum of 8 km2. Structural blocks, down dropped with respect to the Pumpernickel Valley fault, may define an immediate reservoir. The geothermal system almost certainly continues beyond the recently drilled holes and might be open to the east and south, whereas the heat source responsible for the temperatures associated with this plume has not been intersected and must be at a depth greater than 920 meters (depth of the deepest well – Magma well). The geological and structural setting and other characteristics of the Pumpernickel Valley geothermal project area are markedly similar to the portions of the nearby Dixie Valley geothermal field. These similarities include, among others, the numerous, unexposed en echelon faults and large-scale pull-apart structure, which in Dixie Valley may host part of the geothermal field. The Pumpernickel Valley project area, for the majority of which Nevada Geothermal Power Company has geothermal rights, represents a geothermal site with a potential for the discovery of a relatively high temperature reservoir suitable for electric power production. Among locations not previously identified as having high geothermal potential, Pumpernickel Valley has been ranked as one of four sites with the highest potential for electrical power production in Nevada (Shevenell and Garside, 2003). Richards and Blackwell (2002) estimated the total heat loss and the preliminary production capacity for the entire Pumpernickel Valley geothermal system to be at 35MW. A more conservative estimate, for

  2. Efficiency limits of quantum well solar cells

    E-Print Network [OSTI]

    Connolly, J P; Barnham, K W J; Bushnell, D B; Tibbits, T N D; Roberts, J S

    2010-01-01T23:59:59.000Z

    The quantum well solar cell (QWSC) has been proposed as a flexible means to ensuring current matching for tandem cells. This paper explores the further advantage afforded by the indication that QWSCs operate in the radiative limit because radiative contribution to the dark current is seen to dominate in experimental data at biases corresponding to operation under concentration. The dark currents of QWSCs are analysed in terms of a light and dark current model. The model calculates the spectral response (QE) from field bearing regions and charge neutral layers and from the quantum wells by calculating the confined densities of states and absorption coefficient, and solving transport equations analytically. The total dark current is expressed as the sum of depletion layer and charge neutral radiative and non radiative currents consistent with parameter values extracted from QE fits to data. The depletion layer dark current is a sum of Shockley-Read-Hall non radiative, and radiative contributions. The charge neu...

  3. Pressure buildup characteristics in Austin Chalk wells 

    E-Print Network [OSTI]

    Claycomb, Eddy

    1982-01-01T23:59:59.000Z

    Bottom Hole Pressure Data; Case IV: Most Prevalent Case . 30 VIII Data Used for Analysis of Buildup Test; Case IV 32 LIST OF FIGURES Fi gure Page I Austin Chalk Trend in Texas Horner Plot; Case I: Radial Flow, i. e. , No Hydraulic Fracture 12 III... Pressure 8uildup Test in Vertically Fractured Wells. . . . . . . . . . . . 37 INTRODUCTION The Austin Chalk is a limestone that was deposited during the Gulfian Series of the Cretaceous System. The Austin Chalk overlies the Eagle Ford Group...

  4. Oscillation dynamics of multi-well condensates

    E-Print Network [OSTI]

    S. Mossmann; C. Jung

    2006-12-05T23:59:59.000Z

    We propose a new approach to the macroscopic dynamics of three-well Bose-Einstein condensates, giving particular emphasis to self-trapping and Josephson oscillations. Although these effects have been studied quite thoroughly in the mean-field approximation, a full quantum description is desirable, since it avoids pathologies due to the nonlinear character of the mean-field equations. Using superpositions of quantum eigenstates, we construct various oscillation and trapping scenarios.

  5. Recompletion Report for Well UE-10j

    SciTech Connect (OSTI)

    M. J. Townsend

    2000-05-01T23:59:59.000Z

    Existing Well UE-10j was deepened and recompleted for the U.S. Department of Energy, Nevada Operations Office in support of the Nevada Environmental Restoration Project at the Nevada Test Site, Nye County, Nevada. The well was originally drilled to a total depth of 725.4 meters in 1965 for use as a hydrologic test hole in the northern portion of Yucca Flat in Area 8 of the Nevada Test Site. The well is located up-gradient of the Yucca Flat underground test area and penetrates deep into the Paleozoic rocks that form the lower carbonate aquifer of the NTS and surrounding areas. The original 24.4-centimeter-diameter borehole was drilled to a depth of 725.4 meters and left uncompleted. Water-level measurements were made periodically by the U.S. Geological Survey, but access to the water table was lost between 1979 and 1981 due to hole sloughing. In 1993, the hole was opened to 44.5 centimeters and cased off to a depth of 670.0 meters. The hole diameter was then decreased to 31.1 centimeters for drilling to a total depth of 796.4 meters. The depth to water in the open borehole was measured at 658.7 meters on March 18, 1993.

  6. Remote down-hole well telemetry

    DOE Patents [OSTI]

    Briles, Scott D. (Los Alamos, NM); Neagley, Daniel L. (Albuquerque, NM); Coates, Don M. (Santa Fe, NM); Freund, Samuel M. (Los Alamos, NM)

    2004-07-20T23:59:59.000Z

    The present invention includes an apparatus and method for telemetry communication with oil-well monitoring and recording instruments located in the vicinity of the bottom of gas or oil recovery pipes. Such instruments are currently monitored using electrical cabling that is inserted into the pipes; cabling has a short life in this environment, and requires periodic replacement with the concomitant, costly shutdown of the well. Modulated reflectance, a wireless communication method that does not require signal transmission power from the telemetry package will provide a long-lived and reliable way to monitor down-hole conditions. Normal wireless technology is not practical since batteries and capacitors have to frequently be replaced or recharged, again with the well being removed from service. RF energy generated above ground can also be received, converted and stored down-hole without the use of wires, for actuating down-hole valves, as one example. Although modulated reflectance reduces or eliminates the loss of energy at the sensor package because energy is not consumed, during the transmission process, additional stored extra energy down-hole is needed.

  7. Bitumen production through a horizontal well

    SciTech Connect (OSTI)

    Livesey, D.B.; Toma, P.

    1987-02-03T23:59:59.000Z

    This patent describes a method for thermal stimulation and production of a viscous hydrocarbon from a reservoir having a productive layer which retains the hydrocarbon until the latter is made flowable by contact with a hot stimulating medium. The method includes the steps of: forming a borehole having a substantially horizontal segment which transverses the productive layer, registering a well completion in the borehole which includes; an elongated perforate well liner, a fluid conduit extending through the liner and having a discharge end, and a well head at the liner upper end communicated with the fluid conduit, positioning a variable length flow diverter in the liner adjacent to the fluid conduit discharge end, whereby to define a quasi-barrier in the liner which is pervious to passage of the hot stimulating medium, and which divides the liner into injection and production segments respectively, heating the productive layer about the substantially horizontal segment of the elongated liner, introducing a pressurized stream of the hot stimulant through the fluid conduit and into the liner injection segment, and producing hydrocarbon emulsion which flows into the liner production segment.

  8. Level-1 Milestone 350 Definitions v1

    SciTech Connect (OSTI)

    Quinn, T

    2006-11-17T23:59:59.000Z

    This milestone is the direct result of work that started seven years ago with the planning for a 100-teraFLOP platform and will be satisfied when 100 teraFLOPS is placed in operation and readied for Stockpile Stewardship Program simulations. The end product of this milestone will be a production-level, high-performance computing system, code named Purple, designed to be used to solve the most demanding stockpile stewardship problems, that is, the large-scale application problems at the edge of our understanding of weapon physics. This fully functional 100 teraFLOPS system must be able to serve a diverse scientific and engineering workload. It must also have a robust code development and production environment, both of which facilitate the workload requirements. This multi-year effort includes major activities in contract management, facilities, infrastructure, system software, and user environment and support. Led by LLNL, the trilabs defined the statement of work for a 100-teraFLOP system that resulted in a contract with IBM known as the Purple contract. LLNL worked with IBM throughout the contract period to resolve issues and collaborated with the Program to resolve contractual issues to ensure delivery of a platform that best serves the Program for a reasonable cost. The Purple system represents a substantial increase in the classified compute resources at LLNL for NNSA. The center computer environment must be designed to accept the Purple system and to scale with the increase of compute resources to achieve required end-to-end services. Networking, archival storage, visualization servers, global file systems, and system software will all be enhanced to support Purple's size and architecture. IBM and LLNL are sharing responsibility for Purple's system software. LLNL is responsible for the scheduler, resource manager, and some code development tools. Through the Purple contract, IBM is responsible for the remainder of the system software including the operating system, parallel file system, and runtime environment. LLNL, LANL, and SNL share responsibility for the Purple user environment. Since LLNL is the host for Purple, LLNL has the greatest responsibility. LLNL will provide customer support for Purple to the tri-labs and as such has the lead for user documentation, negotiating the Purple usage model, mapping of the ASC computational environment requirements to the Purple environment, and demonstrating those requirements have been met. In addition, LLNL will demonstrate important capabilities of the computing environment including full functionality of visualization tools, file transport between Purple and remote site file systems, and the build environment for principle ASC codes. LANL and SNL are responsible for delivering unique capabilities in support of their users, porting important applications and libraries, and demonstrating remote capabilities. The key capabilities that LANL and SNL will test are user authorization and authentication, data transfer, file system, data management, and visualization. SNL and LANL should port and run in production mode a few key applications on a substantial number of Purple nodes.

  9. abandoned wells: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Do Well, Be Well with Diabetes Do Well, Be Well with Diabetes Lesson Topics WhatisDiabetes? Nutrition-FirstSteptoDiabetesManagement...

  10. abandoned wells metodologia: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Do Well, Be Well with Diabetes Do Well, Be Well with Diabetes Lesson Topics WhatisDiabetes? Nutrition-FirstSteptoDiabetesManagement...

  11. abandoning wells working: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Do Well, Be Well with Diabetes Do Well, Be Well with Diabetes Lesson Topics WhatisDiabetes? Nutrition-FirstSteptoDiabetesManagement...

  12. Decline curve analysis for horizontal wells

    E-Print Network [OSTI]

    Shih, Min-Yu

    1994-01-01T23:59:59.000Z

    support kept me from losing sight of my goals. Thanks to Sam Hou, Joseph Wang, Robert Liau, James Wang, and Shou for their company and in particular to Li Fan and Mrs. Shou-Lee Chang for their caring and delicious meals when I forgot my dinner. Thanks... Pressure (L/2xe= 0. 2) Composite Dimensionless Flow Rate Integral and Flow Rate Integral Derivative Functions Type Curve for an Infinite-Conductivity Horizontal Well Located in the Center of a Square Drainage Area, Producing at Constant Bottomhole...

  13. Negative decline curves of coalbed degasification wells

    SciTech Connect (OSTI)

    Harrison, G.C.; Gordon, R.B.

    1984-05-01T23:59:59.000Z

    Production data from coalbed degasification wells characteristically exhibit a negative decline curve. The dynamics of this methane production are complex and interrelated. As production begins, water and free gas are often first recovered. Continued production lowers pressure and increases permeability to gas, allowing adsorbed gas to flow. This pressure drop within the formation causes sublimation whereby gas, which is absorbed within the coal, forms on the walls of the micropores. Finally, the desorption through production disturbs the chemical and physical equilibrium of the coal, thus enabling the coal to resume generation of methane.

  14. In situ bioremediation using horizontal wells

    SciTech Connect (OSTI)

    NONE

    1995-04-01T23:59:59.000Z

    In Situ Bioremediation (ISB), which is the term used in this report for Gaseous Nutrient Injection for In Situ Bioremediation, remediates soils and ground water contaminated with volatile organic compounds (VOCs) both above and below the water table. ISB involves injection of air and nutrients (sparging and biostimulation) into the ground water and vacuum extraction to remove .VOCs from the vadose zone concomitant with biodegradation of VOCs. The innovation is in the combination of 3 emerging technologies, air stripping, horizontal wells, and bioremediation via gaseous nutrient injection with a baseline technology, soil vapor extraction, to produce a more efficient in situ remediation system.

  15. Production Well Performance Enhancement using Sonication Technology

    SciTech Connect (OSTI)

    Adewumi, Michael A; Ityokumbul, M Thaddeus; Watson, Robert W; Eltohami, Eltohami; Farias, Mario; Heckman, Glenn; Houlihan, Brendan; Karoor, Samata Prakash; Miller, Bruce G; Mohammed, Nazia; Olanrewaju, Johnson; Ozdemir, Mine; Rejepov, Dautmamed; Sadegh, Abdallah A; Quammie, Kevin E; Zaghloul, Jose; Hughes, W Jack; Montgomery, Thomas C

    2005-12-31T23:59:59.000Z

    The objective of this project was to develop a sonic well performance enhancement technology that focused on near wellbore formation damage. In order to successfully achieve this objective, a three-year project was defined. The entire project was broken into four tasks. The overall objective of all this was to foster a better understanding of the mechanisms involved in sonic energy interactions with fluid flow in porous media and adapt such knowledge for field applications. The fours tasks are: • Laboratory studies • Mathematical modeling • Sonic tool design and development • Field demonstration The project was designed to be completed in three years; however, due to budget cuts, support was only provided for the first year, and hence the full objective of the project could not be accomplished. This report summarizes what was accomplished with the support provided by the US Department of Energy. Experiments performed focused on determining the inception of cavitation, studying thermal dissipation under cavitation conditions, investigating sonic energy interactions with glass beads and oil, and studying the effects of sonication on crude oil properties. Our findings show that the voltage threshold for onset of cavitation is independent of transducer-hydrophone separation distance. In addition, thermal dissipation under cavitation conditions contributed to the mobilization of deposited paraffins and waxes. Our preliminary laboratory experiments suggest that waxes are mobilized when the fluid temperature approaches 40°C. Experiments were conducted that provided insights into the interactions between sonic wave and the fluid contained in the porous media. Most of these studies were carried out in a slim-tube apparatus. A numerical model was developed for simulating the effect of sonication in the nearwellbore region. The numerical model developed was validated using a number of standard testbed problems. However, actual application of the model for scale-up purposes was limited due to funding constraints. The overall plan for this task was to perlorm field trials with the sonication tooL These trials were to be performed in production and/or injection wells located in Pennsylvania, New York, and West Virginia. Four new wells were drilled in preparation for the field demonstration. Baseline production data were collected and reservoir simulator tuned to simulate these oil reservoirs. The sonication tools were designed for these wells. However, actual field testing could not be carried out because of premature termination of the project.

  16. Maazama Well Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to:LandownersLuther, Oklahoma:EnergyECO AugerMaan Development CompanyMaazama Well

  17. Geothermal/Well Field | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEI Reference LibraryAdd toWell TestingGeothermal/Power PlantUse)

  18. California Water Well Standards | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas Recovery Biomass16Association JumpCaliforniaWater Well

  19. Wells, Minnesota: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown ofNationwideWTED Jump to:Ohio: EnergyWebGenWelcomeMaine:Wells, Minnesota:

  20. Wells, Vermont: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown ofNationwideWTED Jump to:Ohio: EnergyWebGenWelcomeMaine:Wells,

  1. Category:Well Deepening | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, click here.Telluric Survey as explorationpage? For detailed information on Well

  2. Willow Well Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Wind Project Jump to: navigation,Williamsport,Willow Well

  3. Salt Wells Geothermal Area | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ |Rippey Jump to:WY) JumpLandSRTHelena:Sakti3RiverSalt Wells

  4. Spontaneous Potential Well Log | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries Pvt LtdShawangunk,Southeast ColoradoOhio: Energy ResourcesSpire(book section)Well

  5. Step-out Well | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎SolarCityInformation Glass ButtesStep-out Well Jump to:

  6. Wells Rural Electric Co | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin BaxinUmweltVillageGraph HomeWaranaWaterEnergyWeeklyWelivitWells Rural

  7. Geothermal/Well Field | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating AGeothermal/Exploration < Geothermal Jump to: navigation,Geothermal/Well

  8. Field Test of Measurement-Device-Independent Quantum Key Distribution

    E-Print Network [OSTI]

    Yan-Lin Tang; Hua-Lei Yin; Si-Jing Chen; Yang Liu; Wei-Jun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Li-Xing You; Jian-Yu Guan; Dong-Xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

    2014-08-11T23:59:59.000Z

    A main type of obstacles of practical applications of quantum key distribution (QKD) network is various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks and thus a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 bps. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length, achieving a 16.9 bps secure key rate. The result lays the foundation for a global quantum network which can shield from all the detection-side attacks.

  9. Well injection valve with retractable choke

    SciTech Connect (OSTI)

    Pringle, R.E.

    1986-07-22T23:59:59.000Z

    An injection valve is described for use in a well conduit consisting of: a housing having a bore, a valve closure member in the bore moving between open and closed positions, a flow tube telescopically movable in the housing for controlling the movement of the valve closure member, means for biasing the flow tube in a direction for allowing the valve closure member to move to the closed position, an expandable and contractible fluid restriction connected to the flow tube and extending into the bore for moving the flow tube to the open position in response to injection fluid, but allowing the passage of well tools through the valve, the restriction contractible in response to fluid flow, the restriction includes, segments movable into and out of the bore, and biasing means yieldably urging the segments into the bore, a no-go shoulder on the flow tube, and releasable lockout means between the flow tube and the housing for locking the flow tube and valve in the open position.

  10. Productivity and Injectivity of Horizontal Wells

    SciTech Connect (OSTI)

    Khalid Aziz; Sepehr Arababi; Thomas A. Hewett

    1997-04-29T23:59:59.000Z

    A general wellbore flow model is presented to incorporate not only frictional, accelerational and gravitational pressure drops, but also the pressure drop caused by inflow. Influence of inflow or outflow on the wellbore pressure drop is analyzed. New friction factor correlations accounting for both inflow and outflow are also developed. The greatest source of uncertainty is reservoir description and how it is used in simulators. Integration of data through geostatistical techniques leads to multiple descriptions that all honor available data. The reality is never known. The only way to reduce this uncertainty is to use more data from geological studies, formation evaluation, high resolution seismic, well tests and production history to constrain stochastic images. Even with a perfect knowledge about reservoir geology, current models cannot do routine simulations at a fine enough scale. Furthermore, we normally don't know what scale is fine enough. Upscaling introduces errors and masks some of the physical phenomenon that we are trying to model. The scale at which upscaling is robust is not known and it is probably smaller in most cases than the scale actually used for predicting performance. Uncertainties in the well index can cause errors in predictions that are of the same magnitude as those caused by reservoir heterogeneities. Simplified semi-analytical models for cresting behavior and productivity predictions can be very misleading.

  11. A Key to Common Caterpillar Pests of Vegetables 

    E-Print Network [OSTI]

    Sparks Jr., Alton N.; Liu, Tong-Xian

    2001-08-10T23:59:59.000Z

    of the head capsule. The proximity of the juncture of the adfrontal and epicranial sutures to the vertical triangle is used in separating armyworms and cutworms. Using the key The key will help you identify the most destructive and most com- mon caterpillar...; sp=spiracle Figure 3. Common arrangement of crochets on prolegs. A?complete circle B?semicircle C?two rows D?single row Figure 4. Head capsule of a caterpillar. vt=vertical triangle; epi=epicranial suture; adf=adfrontal suture 3 1 Body has numerous...

  12. BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You will be required to present photo

    E-Print Network [OSTI]

    BUSCH CAMPUS KEY PICK UP INSTRUCTIONS: ALL STUDENTS: ONLY YOU CAN PICK UP YOUR KEY. You at the Housing and Residence Life Office, 581 Taylor Road, Busch Campus. If you are unable to pick up your key. _____________________________________________________________________________________ FIRST-YEAR STUDENTS MOVE-IN DAY KEY PICK UP BUSCH CAMPUS SATURDAY, AUGUST 28th 8:00 a.m. ­ 2:00 p

  13. Bayesian Learning via Stochastic Gradient Langevin Dynamics Max Welling welling@ics.uci.edu

    E-Print Network [OSTI]

    Kaski, Samuel

    Bayesian Learning via Stochastic Gradient Langevin Dynamics Max Welling welling@ics.uci.edu D. Bren on iterative learning from small mini-batches. By adding the right amount of noise to a standard stochastic" and collects sam- ples after it has been surpassed. We apply the method to three models: a mixture of Gaussians

  14. Crown Zellerbach Well No. 2, Livingston Parish, Louisiana. Volume II. Well test data. Final report

    SciTech Connect (OSTI)

    Not Available

    1981-01-01T23:59:59.000Z

    The following well test data are included: final report of field test data, IGT compiled data, ERMI raw data, Gas Producer's Associated tentative method of testing for hydrogen sulfide in natural gas using length of stain tubes, IGT combined sample log, report on reservoir fluids, well test analysis, sampling and chemical analysis procedures, and scale and corrosion evaluation. (MHR)

  15. Spatially indirect excitons in coupled quantum wells

    SciTech Connect (OSTI)

    Lai, Chih-Wei Eddy

    2004-03-01T23:59:59.000Z

    Microscopic quantum phenomena such as interference or phase coherence between different quantum states are rarely manifest in macroscopic systems due to a lack of significant correlation between different states. An exciton system is one candidate for observation of possible quantum collective effects. In the dilute limit, excitons in semiconductors behave as bosons and are expected to undergo Bose-Einstein condensation (BEC) at a temperature several orders of magnitude higher than for atomic BEC because of their light mass. Furthermore, well-developed modern semiconductor technologies offer flexible manipulations of an exciton system. Realization of BEC in solid-state systems can thus provide new opportunities for macroscopic quantum coherence research. In semiconductor coupled quantum wells (CQW) under across-well static electric field, excitons exist as separately confined electron-hole pairs. These spatially indirect excitons exhibit a radiative recombination time much longer than their thermal relaxation time a unique feature in direct band gap semiconductor based structures. Their mutual repulsive dipole interaction further stabilizes the exciton system at low temperature and screens in-plane disorder more effectively. All these features make indirect excitons in CQW a promising system to search for quantum collective effects. Properties of indirect excitons in CQW have been analyzed and investigated extensively. The experimental results based on time-integrated or time-resolved spatially-resolved photoluminescence (PL) spectroscopy and imaging are reported in two categories. (i) Generic indirect exciton systems: general properties of indirect excitons such as the dependence of exciton energy and lifetime on electric fields and densities were examined. (ii) Quasi-two-dimensional confined exciton systems: highly statistically degenerate exciton systems containing more than tens of thousands of excitons within areas as small as (10 micrometer){sup 2} were observed. The spatial and energy distributions of optically active excitons were used as thermodynamic quantities to construct a phase diagram of the exciton system, demonstrating the existence of distinct phases. Optical and electrical properties of the CQW sample were examined thoroughly to provide deeper understanding of the formation mechanisms of these cold exciton systems. These insights offer new strategies for producing cold exciton systems, which may lead to opportunities for the realization of BEC in solid-state systems.

  16. Well funneled nuclear structure landscape: renormalization

    E-Print Network [OSTI]

    Idini, A; Barranco, F; Vigezzi, E; Broglia, R A

    2015-01-01T23:59:59.000Z

    A complete characterization of the structure of nuclei can be obtained by combining information arising from inelastic scattering, Coulomb excitation and $\\gamma-$decay, together with one- and two-particle transfer reactions. In this way it is possible to probe the single-particle and collective components of the nuclear many-body wavefunction resulting from their mutual coupling and diagonalising the low-energy Hamiltonian. We address the question of how accurately such a description can account for experimental observations. It is concluded that renormalizing empirically and on equal footing bare single-particle and collective motion in terms of self-energy (mass) and vertex corrections (screening), as well as particle-hole and pairing interactions through particle-vibration coupling allows theory to provide an overall, quantitative account of the data.

  17. Well funneled nuclear structure landscape: renormalization

    E-Print Network [OSTI]

    A. Idini; G. Potel; F. Barranco; E. Vigezzi; R. A. Broglia

    2015-04-29T23:59:59.000Z

    A complete characterization of the structure of nuclei can be obtained by combining information arising from inelastic scattering, Coulomb excitation and $\\gamma-$decay, together with one- and two-particle transfer reactions. In this way it is possible to probe the single-particle and collective components of the nuclear many-body wavefunction resulting from their mutual coupling and diagonalising the low-energy Hamiltonian. We address the question of how accurately such a description can account for experimental observations. It is concluded that renormalizing empirically and on equal footing bare single-particle and collective motion in terms of self-energy (mass) and vertex corrections (screening), as well as particle-hole and pairing interactions through particle-vibration coupling allows theory to provide an overall, quantitative account of the data.

  18. Zero Energy Buildings: A Critical Look at the Definition; Preprint

    SciTech Connect (OSTI)

    Torcellini, P.; Pless, S.; Deru, M.; Crawley, D.

    2006-06-01T23:59:59.000Z

    A net zero-energy building (ZEB) is a residential or commercial building with greatly reduced energy needs through efficiency gains such that the balance of energy needs can be supplied with renewable technologies. Despite the excitement over the phrase ''zero energy'', we lack a common definition, or even a common understanding, of what it means. In this paper, we use a sample of current generation low-energy buildings to explore the concept of zero energy: what it means, why a clear and measurable definition is needed, and how we have progressed toward the ZEB goal.

  19. Passive decoy-state quantum key distribution with practical light sources

    SciTech Connect (OSTI)

    Curty, Marcos [ETSI Telecomunicacion, Department of Signal Theory and Communications, University of Vigo, Campus Universitario, E-36310 Vigo (Pontevedra) (Spain); Ma, Xiongfeng [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Qi, Bing [Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical and Computer Engineering, University of Toronto, M5S 3G4 Toronto, Ontario (Canada); Moroder, Tobias [Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, N2L 3G1 Waterloo, Ontario (Canada); Quantum Information Theory Group, Institute of Theoretical Physics I, University of Erlangen-Nuernberg, D-91058 Erlangen (Germany); Max Planck Institute for the Science of Light, D-91058 Erlangen (Germany)

    2010-02-15T23:59:59.000Z

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.

  20. In 2010 a group of key forestry players

    E-Print Network [OSTI]

    Forestry Skills Action Plan #12;Summary #12;In 2010 a group of key forestry players came together to start a movement across the sector to upskill the current, and train the future, forestry workforce. #12;In May 2010 Forestry Commission England convened a small cross- sector task and finish group

  1. Key issues of FED/INTOR impurity control system

    SciTech Connect (OSTI)

    Abdou, M.A.

    1982-10-01T23:59:59.000Z

    A key part of the FED/INTOR activity over the past year has focused on examining the critical issues and developing credible physics and engineering solutions for the impurity control system. The primary emphasis of the work was on the edge-region physics, plasma-wall interaction, materials, engineering and magnetic considerations of the poloidal divertor and pump limiter.

  2. Public-Key Locally-Decodable Codes Brett Hemenway

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Semantically-Secure Public Key En- cryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we

  3. The Key Coal Producers ONLINE SUPPORTING MATERIALS to

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    The Key Coal Producers ONLINE SUPPORTING MATERIALS to A Global Coal Production Forecast with Multi's most important coal-producing area is North-Central China. The provinces of Inner Mongolia, Ningxia, Shaanxi and Shanxi together accounted for 83 percent of China's proven coal reserves in 2000, and Shanxi

  4. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  5. Dictionaries Using Variable-Length Keys and Data, with Applications *

    E-Print Network [OSTI]

    Blelloch, Guy E.

    (Isil- logn, 1) + Itil) and Isil is the length of bit string si. We assume a word length w > log m. We present string Isil > 1, Itil > 1 for all bit-strings si and ti. Fox' fixed-length keys the dictionary problem

  6. The Seven Keys to Success in Energy Management and Conservation

    E-Print Network [OSTI]

    Darby, D. F.

    1984-01-01T23:59:59.000Z

    This paper is a summary of the seven key elements of the Deere & Company Energy Management and Conservation Program. These elements have been found to be essential for the ultimate success of any company-wide energy management program. The process...

  7. Efficient Algorithms for Implementing Elliptic Curve PublicKey Schemes

    E-Print Network [OSTI]

    Efficient Algorithms for Implementing Elliptic Curve Public­Key Schemes by Dan Beauregard A Thesis Cyganski Thesis Advisor Thesis Committee Dr. Stanley Selkow Dr. John Orr Thesis Committee Department Head #12; Preface This thesis describes the research which I conducted while completing my graduate work

  8. Termites, elephants and fire are key drivers of tree mortality

    E-Print Network [OSTI]

    mortality: 2 dominated by elephant damage, 2 by termite attack and 1 by fire. Wind and human activity wereTermites, elephants and fire are key drivers of tree mortality 5 plots suffered substantial tree not major causes of tree mortality. Sample sizes are too small to reasonably determine the most significant

  9. Daylight quantum key distribution over 1.6 km

    E-Print Network [OSTI]

    W. T. Buttler; R. J. Hughes; S. K. Lamoreaux; G. L. Morgan; J. E. Nordholt; C. G. Peterson

    2000-01-25T23:59:59.000Z

    Quantum key distribution (QKD) has been demonstrated over a point-to-point $\\sim1.6$-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.

  10. Keys for growth in Japan's mature mobile market

    E-Print Network [OSTI]

    Oto, Hiroyuki

    2005-01-01T23:59:59.000Z

    The objective of this thesis is to identify key factors that will produce further growth for NTT DoCoMo in Japan's mature mobile market. Since the early 1990s, the mobile phone market in Japan has grown rapidly, and ...

  11. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  12. Offshore Wind Power Experiences, Potential and Key Issues for

    E-Print Network [OSTI]

    offshore wind farms are installed in British, Swedish and Danish waters, and present-day costs in 2015, 2030 and 2050 14 3.1 Offshore wind farms under construction and in planning stage 14 3Offshore Wind Power Experiences, Potential and Key Issues for Deployment Jørgen Lemming, Poul Erik

  13. Putting cancer in focusPathologists key to picking the

    E-Print Network [OSTI]

    Eichman, Brandt F.

    Putting cancer in focusPathologists key to picking the right path to a cure momentum IN THIS ISSUE without cancer. #12;EDITOR Heather Newman DESIGN Diana Duren DIRECTOR OF PUBLICATIONS Wayne Wood ASSOCIATE / Photo Researchers, Inc. EDITORIAL OFFICE Vanderbilt-Ingram Cancer Center 691 Preston Building Nashville

  14. Key Factors for Digital Collections August 7, 2007

    E-Print Network [OSTI]

    by Fondren's Digital Library Initiative We evaluate digital projects on a case by case basis. There is no oneKey Factors for Digital Collections August 7, 2007 Rice University Digital Repository Supported formula for this process and in fact welcome open discussion on potential digital projects

  15. Page 1 of 4 Creating and Submitting a Key Request

    E-Print Network [OSTI]

    Howitt, Ivan

    of employees. Enter search criteria in the search fields available and select the down red arrow to filter the terms. #12;Page 3 of 4 13. On the Key Request Form - Room List windowpane, select Add New. 14 use the Select Drawing button after entering the building and floor to display the floor plan

  16. Using Key Performance Indicators to Manage Energy Costs

    E-Print Network [OSTI]

    Van Gorp, J. C.

    2005-01-01T23:59:59.000Z

    -effective to collect much more data than ever before, many energy managers find themselves drowning in the volume of data generated. Business information systems faced a similar challenge a decade ago, and it is now common practice to use Key Performance Indicators...

  17. Architecture of the Secoqc Quantum Key Distribution network

    E-Print Network [OSTI]

    Mehrdad Dianati; Romain Alleaume

    2006-10-25T23:59:59.000Z

    The European projet Secoqc (Secure Communication based on Quantum Cryptography) aims at developing a global network for unconditionally secure key distribution. This paper specifies the requirements and presents the principles guiding the design of this network, and relevant to its architecture and protocols.

  18. Families First: Keys to Successful Family Functioning An Introduction

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . publication 350-090 #12;KEY CHARACTERISTICS OF HEALTHY FAMILIES Research has identified several; and the aging family. Crisis tasks are family hardship events such as ill- ness, job loss, accidents, relocation Virginia Cooperative Extension programs and employment are open to all, regardless of race, color, national

  19. USB Key Profile Manager for Advisor: Dr. Chris Pollett

    E-Print Network [OSTI]

    Pollett, Chris

    . · Search for profiles. · Load the profile to Mozilla's registry. · Clean up at shutdown. #12;Feature 2USB Key Profile Manager for Mozilla by Yun Zhou Advisor: Dr. Chris Pollett Committee Members: Dr. Design and Implementation · Event-driven structure · USB profile loader · User authentication · Bulk

  20. The Design of a Group Key Agreement API Giuseppe Ateniese

    E-Print Network [OSTI]

    Kim, Dae-Shik

    and communication-independent API. The rest of this paper is organized as follows. We be- gin with the notationThe Design of a Group Key Agreement API Giuseppe Ateniese Computer Science Department Johns Hopkins describes a protocol suite and an API geared for securing collab- orative applications. The API is based

  1. Cryptanalysis of two knapsack public-key cryptosystems

    E-Print Network [OSTI]

    Han1 {jguobi,hanlidong}@sdu.edu.cn mengxm@sdfi.edu.cn 1 Key Laboratory of Cryptologic Technology is useless to the security of the cryptosystem. Because of the special super increasing structure, we can. We show that the permutation algorithm is useless to avoid the low-density attack and the density

  2. PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches

    E-Print Network [OSTI]

    Developer University #12;8 FUEL CELL RESEARCH NEEDS MEA optimization should focus on new materials Pt (full1 PEM FUEL CELL TECHNOLOGY Key Research Needs and Approaches Tom Jarvi UTC Power South Windsor, CT 06074 23 January 2008 #12;2 UTC POWER MARKET FOCUS Transportation Fuel Cells On-Site Power Solutions #12

  3. The U.S. ISO Key Project on Quasars

    E-Print Network [OSTI]

    Eric Hooper; Belinda Wilkes; Kim McLeod; Jonathan McDowell; Martin Elvis; Matthew Malkan; Carol Lonsdale; Chris Impey

    1998-09-22T23:59:59.000Z

    Observations for the U.S. key project on quasars using ISO were completed in April when the satellite's cryogen supply expired. This proceeding presents an update of the project, including information on the final sample, a discussion of some of the data reduction challenges and current efforts to meet them, plus a comparison of preliminary results with IRAS fluxes.

  4. absorption line key: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption line key First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 The Hubble Space Telescope Quasar...

  5. On the Performance of Group Key Management Protocols in MANETs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . In this paper, we present an evaluation method for group key management protocols within ad hoc networks based the NS2 network simulator. To present our contribution, we structure this paper as follows. Section 22010 Author manuscript, published in "Joint Conference on Security in Network Architectures

  6. 7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/

    E-Print Network [OSTI]

    Latchman, Haniph A.

    7/6/12 Florida Blue Key Homecoming 1/8fbk.org/homecoming/ Since 1923, Florida Blue Key has served in the fall, Homecoming and Gator Growl are produced by a team of over 500 students working in Florida Blue Blue Key on Facebo 430 people like Florida Blue Key Like Florida Blue Key via Growl & UF Homecoming

  7. Key-Insulated Signcryption (Science and Technology on Communication Security Laboratory,

    E-Print Network [OSTI]

    Zheng, Yuliang

    Key-Insulated Signcryption Jia Fan 1 (Science and Technology on Communication Security Laboratory addresses the issue of key exposure by proposing a key-insulated signcryption technique. We define a security model for key-insulated signcryption and prove that the key- insulated signcryption technique

  8. A precise definition of the Standard Model

    E-Print Network [OSTI]

    W-Y. Pauchy Hwang

    2014-09-22T23:59:59.000Z

    To write the $SU_c(3) \\times SU_L(2) \\times U(1) \\times SU_f(3)$ Standard Model in Minkowski space-time in a precise way, we assume that a special space-time such as the $SU_c(3) \\times SU_L(2) \\times U(1) \\times SU_f(3)$ Minkowski space-time exists to begin with. Thus, the scalar fields $\\Phi(1,2)$ (the Standard-Model Higgs), $\\Phi(3,1)$ (the purely family Higgs), and $\\Phi(3,2)$ (the mixed family Higgs), with the first family label and the second $SU_L(2)$ label, all pre-exist with all gauge bosons, each with well-defined group assignment and the "purpose" (of making a certain gauge boson massive). Moreover, this space-time turns out to support the lepton world, and it also supports the quark world. In this language, all the various gauge bosons are born with the special gauge-group Minkowski space-time. (Or, the Minkowski space-time is further characterized by the force fields, or the gauge group.) This may be the most efficient and clearest way to spell out the Standard Model.

  9. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    SciTech Connect (OSTI)

    Li, Hong-Wei [Key Laboratory of Quantum Information,University of Science and Technology of China, Hefei, 230026 (China); Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 (China); Wang, Shuang; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Han, Zheng-Fu [Key Laboratory of Quantum Information,University of Science and Technology of China, Hefei, 230026 (China); Bao, Wan-Su [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 (China)

    2011-12-15T23:59:59.000Z

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost of only increasing the quantum bit error rate from 1.3 to 1.4%.

  10. Virtual Chassis for Snake Robots: Definition and Applications

    E-Print Network [OSTI]

    Choset, Howie

    Full paper Virtual Chassis for Snake Robots: Definition and Applications David Rollinson*, Austin Buchan and Howie Choset The Robotics Institute, Carnegie Mellon University, 5000 Forbes Avenue the motion of a snake robot is difficult. This is in part because the internal shape changes that the robot

  11. The development of high definition television : an ecology of games

    E-Print Network [OSTI]

    Neil, Suzanne Chambliss

    2010-01-01T23:59:59.000Z

    This study is an analysis of the forces that shaped the overall character of a new US television system, high definition or HDTV, between the early 1980s and 2010, with a primary focus on the period leading up the Federal ...

  12. Patent License for OpenSSL 1. Definitions

    E-Print Network [OSTI]

    Rogaway, Phillip

    Patent License for OpenSSL 1. Definitions 1.1 "Licensor" means Phillip Rogaway. orOne Shields Avenue, Davis, CA 95616-8562. 1.2 "Licensed Patents" means any patent that claims priority to United States Patent Application No. 09/918,615 entitled "Method and Apparatus for Facilitating Efficient

  13. Seismic Tomography: Definitions Lapo Boschi (lapo@erdw.ethz.ch)

    E-Print Network [OSTI]

    Boschi, Lapo

    Tomography Seismic tomography is the science of interpreting seismic measurements (seismograms) to derive; that is to say, solve the seismological inverse problem. Seismic data and their interpretation Seismic stationsSeismic Tomography: Definitions Lapo Boschi (lapo@erdw.ethz.ch) September 14, 2009 Seismic

  14. WICT PROCEEDINGS, DECEMBER 2008 1 Definition Characterisation through Genetic Algorithms

    E-Print Network [OSTI]

    Pace, Gordon J.

    Borg Dept. of Artificial Intelligence University of Malta claudia.borg@um.edu.mt Mike Rosner Dept. of Artificial Intelligence University of Malta mike.rosner@um.edu.mt Gordon J. Pace Dept. of Computer Science University of Malta gordon.pace@um.edu.mt Abstract The identification of definitions from natural lan- guage

  15. A possible definition of a {\\it Realistic} Physics Theory

    E-Print Network [OSTI]

    Nicolas Gisin

    2014-01-02T23:59:59.000Z

    A definition of a {\\it Realistic} Physics Theory is proposed based on the idea that, at all time, the set of physical properties possessed (at that time) by a system should unequivocally determine the probabilities of outcomes of all possible measurements.

  16. Energetic Materials for EGS Well Stimulation (solids, liquids...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energetic Materials for EGS Well Stimulation (solids, liquids, gases) Energetic Materials for EGS Well Stimulation (solids, liquids, gases) Energetic Materials for EGS Well...

  17. Multifunctional Corrosion-resistant Foamed Well Cement Composites...

    Broader source: Energy.gov (indexed) [DOE]

    Multifunctional Corrosion-resistant Foamed Well Cement Composites Multifunctional Corrosion-resistant Foamed Well Cement Composites Multifunctional Corrosion-resistant Foamed Well...

  18. ARSENIC IN PRIVATE WELLS IN NH YEAR 1 FINAL REPORT

    E-Print Network [OSTI]

    Bucci, David J.

    performed geospatial analysis of the well water arsenic estimates and survey results and produced the maps............................................................................................... 8 Well water treatment .................................................................................................. 7 Well water quality

  19. A WELL-POSED SHOOTING ALGORITHM FOR OPTIMAL ...

    E-Print Network [OSTI]

    2011-10-17T23:59:59.000Z

    bations and the well-posedness of the shooting algorithm for the perturbed problem. .... tion under small perturbation of the data, as well as the well-

  20. Well test imaging - a new method for determination of boundaries from well test data

    SciTech Connect (OSTI)

    Slevinsky, B.A.

    1997-08-01T23:59:59.000Z

    A new method has been developed for analysis of well test data, which allows the direct calculation of the location of arbitrary reservoir boundaries which are detected during a well test. The method is based on elements of ray tracing and information theory, and is centered on the calculation of an instantaneous {open_quote}angle of view{close_quote} of the reservoir boundaries. In the absence of other information, the relative reservoir shape and boundary distances are retrievable in the form of a Diagnostic Image. If other reservoir information, such as 3-D seismic, is available; the full shape and orientation of arbitrary (non-straight line or circular arc) boundaries can be determined in the form of a Reservoir Image. The well test imaging method can be used to greatly enhance the information available from well tests and other geological data, and provides a method to integrate data from multiple disciplines to improve reservoir characterization. This paper covers the derivation of the analytical technique of well test imaging and shows examples of application of the technique to a number of reservoirs.

  1. Well completion report on installation of horizontal wells for in-situ remediation tests

    SciTech Connect (OSTI)

    Kaback, D.S.; Looney, B.B.; Corey, J.C.; Wright, L.M.

    1989-08-01T23:59:59.000Z

    A project to drill and install two horizontal vapor extraction/air-injection wells at the Savannah River Site (SRS), Aiken, South Carolina, was performed in September and October of 1988. This study was performed to test the feasibility of horizontal drilling technologies in unconsolidated sediments and to evaluate the effectiveness of in-situ air stripping of volatile organics from the ground water and unsaturated soils. A tremendous amount of knowledge was obtained during the drilling and installation of the two test wells. Factors of importance to be considered during design of another horizontal well drilling program follow. (1) Trips in and out of the borehole should be minimized to maintain hole stability. No reaming to enlarge the hole should be attempted. (2) Drilling fluid performance should be maximized by utilizing a low solids, low weight, moderate viscosity, high lubricity fluid. Interruption of drilling fluid circulation should be minimized. (3) Well materials should possess adequate flexibility to negotiate the curve. A flexible guide should be attached to the front of the well screen to guide the screen downhole. (4) Sands containing a minor amount of clay are recommended for completion targets, as better drilling control in the laterals was obtained in these sections.

  2. Public key Steganography Using Discrete Cross-Coupled Chaotic Maps

    E-Print Network [OSTI]

    Sodeif Ahadpour; Mahdiyeh Majidpour; Yaser Sadra

    2012-11-01T23:59:59.000Z

    By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross- coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  3. $\\beta$-decay of key titanium isotopes in stellar environment

    E-Print Network [OSTI]

    Nabi, Jameel-Un; 10.1142/S0218301311018174

    2011-01-01T23:59:59.000Z

    Amongst iron regime nuclei, $\\beta$-decay rates on titanium isotopes are considered to be important during the late phases of evolution of massive stars. The key $\\beta$-decay isotopes during presupernova evolution were searched from available literature and a microscopic calculation of the decay rates were performed using the proton-neutron quasiparticle random phase approximation (pn-QRPA) theory. As per earlier simulation results electron capture and $\\beta$-decay on certain isotopes of titanium are considered to be important for the presupernova evolution of massive stars. Earlier the stellar electron capture rates and neutrino energy loss rates due to relevant titanium isotopes were presented. In this paper we finally present the $\\beta$-decay rates of key titanium isotopes in stellar environment. The results are also compared against previous calculations. The pn-QRPA $\\beta$-decay rates are bigger at high stellar temperatures and smaller at high stellar densities compared to the large scale shell model...

  4. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  5. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  6. 1. Aim of the Code of Practice 2. Key points

    E-Print Network [OSTI]

    Roelleke, Thomas

    family leave provisions 1August 2011 #12;1 Aim of the Code of Practice The aim is to: 1 promote good1. Aim of the Code of Practice 2. Key points 3. Maternity leave and pay 4. Ante-natal leave 5. Compassionate leave for family and other reasons 1 1 3 4 5 7 8 9 10 HR Code of Practice 14. Maternity and other

  7. Low Timing Jitter Detector for Gigahertz Quantum Key Distribution

    E-Print Network [OSTI]

    R. J. Collins; R. H. Hadfield; V. Fernandez; S. W. Nam; G. S. Buller

    2007-02-23T23:59:59.000Z

    A superconducting single-photon detector based on a niobium nitride nanowire is demonstrated in an optical-fibre-based quantum key distribution test bed operating at a clock rate of 3.3 GHz and a transmission wavelength of 850 nm. The low jitter of the detector leads to significant reduction in the estimated quantum bit error rate and a resultant improvement in the secrecy efficiency compared to previous estimates made by use of silicon single-photon avalanche detectors.

  8. A correct security evaluation of quantum key distribution

    E-Print Network [OSTI]

    Osamu Hirota

    2014-09-21T23:59:59.000Z

    There is no doubt that quantum key distribution is an excellent result as a science. However, this paper presents a view on quantum key distribution (QKD) wherein QKD may have a difficulty to provide a sufficient security and good communication performance in real world networks. In fact, a one-time pad forwarded by QKD model with $\\bar{\\epsilon}=10^{-6}$ may be easily decrypted by key estimation. Despite that researchers know several criticisms on the theoretical incompleteness on the security evaluation, Portmann and Rennner, and others still avert from the discussion on criticism, and experimental groups tend to make exaggerated claims about their own work by making it seems that QKD is applicable to commercial communication systems. All such claims are based on a misunderstanding of the meaning of criteria of information theoretic security in cryptography. A severe situation has arisen as a result, one that will impair a healthy development of quantum information science (QIS). Thus, the author hopes that this paper will help to stimulate discussions on developing a more detailed theory.

  9. Semiquantum-key distribution using less than four quantum states

    SciTech Connect (OSTI)

    Zou Xiangfu [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); Department of Mathematics and Physics, Wuyi University, Jiangmen 529020 (China); Qiu Daowen [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China); SQIG-Instituto de Telecomunicacoes, IST, TULisbon, Av. Rovisco Pais 1049-001, Lisbon (Portugal); Li Lvzhou; Wu Lihua; Li Lvjun [Department of Computer Science, Zhongshan University, Guangzhou 510275 (China)

    2009-05-15T23:59:59.000Z

    Recently Boyer et al. [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key distribution protocol (BKM2007). To discuss the security of the BKM2007 protocol, they proved that their protocol is completely robust. This means that nonzero information acquired by Eve on the information string implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. The BKM2007 protocol uses four quantum states to distribute a secret key. In this paper, we simplify their protocol by using less than four quantum states. In detail, we present five different SQKD protocols in which Alice sends three quantum states, two quantum states, and one quantum state, respectively. Also, we prove that all the five protocols are completely robust. In particular, we invent two completely robust SQKD protocols in which Alice sends only one quantum state. Alice uses a register in one SQKD protocol, but she does not use any register in the other. The information bit proportion of the SQKD protocol in which Alice sends only one quantum state but uses a register is the double as that in the BKM2007 protocol. Furthermore, the information bit rate of the SQKD protocol in which Alice sends only one quantum state and does not use any register is not lower than that of the BKM2007 protocol.

  10. U.S. Average Depth of Natural Gas Exploratory Wells Drilled (Feet per Well)

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40CoalLease Separation,ProductionMarketed18,736RevisionExploratory WellsWells

  11. Eruptive and Geomorphic Processes at the Lathrop Wells Scoria Cone

    SciTech Connect (OSTI)

    G. Valentine; D.J. Krier; F.V. Perry; G. Heiken

    2006-08-03T23:59:59.000Z

    The {approx}80 ka Lathrop Wells volcano (southern Nevada, U.S.A.) preserves evidence for a range of explosive processes and emplacement mechanisms of pyroclastic deposits and lava fields in a small-volume basaltic center. Early cone building by Strombolian bursts was accompanied by development of a fan-like lava field reaching {approx}800 m distance from the cone, built upon a gently sloping surface. Lava flows carried rafts of cone deposits, which provide indirect evidence for cone facies in lieu of direct exposures in the active quarry. Subsequent activity was of a violent Strombolian nature, with many episodes of sustained eruption columns up to a few km in height. These deposited layers of scoria lapilli and ash in different directions depending upon wind direction at the time of a given episode, reaching up to {approx}20 km from the vent, and also produced the bulk of the scoria cone. Lava effusion migrated from south to north around the eastern base of the cone as accumulation of lavas successively reversed the topography at the base of the cone. Late lavas were emplaced during violent Strombolian activity and continued for some time after explosive eruptions had waned. Volumes of the eruptive products are: fallout--0.07 km{sup 3}, scoria cone--0.02 km{sup 3}, and lavas--0.03 km{sup 3}. Shallow-derived xenolith concentrations suggest an upper bound on average conduit diameter of {approx}21 m in the uppermost 335 m beneath the volcano. The volcano was constructed over a period of at least seven months with cone building occurring only during part of that time, based upon analogy with historical eruptions. Post-eruptive geomorphic evolution varied for the three main surface types that were produced by volcanic activity: (1) scoria cone, (2) low relief surfaces (including lavas) with abundant pyroclastic material, and (3) lavas with little pyroclastic material. The role of these different initial textures must be accounted for in estimating relative ages of volcanic surfaces, and failure to account for this resulted in previous erroneous interpretation that the volcano is polycyclic (eruptions separated by 1,000s-10,000s of years). Lathrop Wells volcano provides an example of the wide range of eruptive processes that can occur with little change in major element composition; the variation in explosive and effusive processes, including their simultaneous occurrence, must result entirely from fluid dynamic, crystallization, and degassing processes in the ascending multiphase magma. The volcano also provides key analog information regarding processes that are important for volcanic risk assessment at the proposed Yucca Mountain radioactive waste repository, {approx}18 km north of the volcano.

  12. Similarities and Differences between Coronal Holes and the Quiet Sun: Are Loop Statistics the Key?

    E-Print Network [OSTI]

    T. Wiegelmann; S. K. Solanki

    2008-02-01T23:59:59.000Z

    Coronal holes (CH) emit significantly less at coronal temperatures than quiet-Sun regions (QS), but can hardly be distinguished in most chromospheric and lower transition region lines. A key quantity for the understanding of this phenomenon is the magnetic field. We use data from SOHO/MDI to reconstruct the magnetic field in coronal holes and the quiet Sun with the help of a potential magnetic model. Starting from a regular grid on the solar surface we then trace field lines, which provide the overall geometry of the 3D magnetic field structure. We distinguish between open and closed field lines, with the closed field lines being assumed to represent magnetic loops. We then try to compute some properties of coronal loops. The loops in the coronal holes (CH) are found to be on average flatter than in the QS. High and long closed loops are extremely rare, whereas short and low-lying loops are almost as abundant in coronal holes as in the quiet Sun. When interpreted in the light of loop scaling laws this result suggests an explanation for the relatively strong chromospheric and transition region emission (many low-lying, short loops), but the weak coronal emission (few high and long loops) in coronal holes. In spite of this contrast our calculations also suggest that a significant fraction of the cool emission in CHs comes from the open flux regions. Despite these insights provided by the magnetic field line statistics further work is needed to obtain a definite answer to the question if loop statistics explain the differences between coronal holes and the quiet Sun.

  13. Encrusting growth and retreat of Montastrea annularis (Anthozoa; Scleractinia) following the grounding of a freighter on Molasses Reef, Key Largo, Florida

    E-Print Network [OSTI]

    Choi, Kwang-Sik

    1987-01-01T23:59:59.000Z

    ). Because of its accessibility, it is one of the most visited reefs in the upper Florida Keys (Voss, 1984). Voss (1984) characterized the usage of Molasses Reef by divers as "heavya and use for fishing as "moderate". Structurally, ix, has s, well-developed... management, quantitative evaluation on destructive processes of coral is very necessary as well as that of constructive processes. It is suggested that the influence of previously discussed environmental factors on coral tissue retreat as well as growth...

  14. Segmentation of complex geophysical structures with well Running title: Image segmentation with well data.

    E-Print Network [OSTI]

    Boyer, Edmond

    with well data. Authors: Christian Gout§, and Carole Le Guyader. Complete affiliation: § Universit´e de 96822-2273 , USA. chris gout@cal.berkeley.edu : INSA de Rennes 20 Avenue des Buttes de Co¨esmes CS 14315 35043 Rennes, France. carole.le-guyader@insa-rennes.fr Corresponding author : Christian Gout

  15. The Effect of Well Trajectory on Production Performance of Tight Gas Wells

    E-Print Network [OSTI]

    Aldousari, Mohammad

    2012-02-14T23:59:59.000Z

    been studied. The aim of this research is to investigate the effect of the trajectory angle on pressure drop in horizontal wells. In addition, the contribution of water flow to pressure drop is a part of this research. Generally, water comes from...

  16. New wells architectures to access deep geothermal reservoirsand increase well productivity

    E-Print Network [OSTI]

    Boyer, Edmond

    with the higher costs of well drilling and completion. Our first step in tackling theproblem,was to consider with the wellbore flow which is modelled by a 1D momentum equation describing the conservation of the fluid in the wellbore fluid coupled to the heat transfer in the reservoir.We apply this coupled wellbore and reservoir

  17. Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry Engineering Group s.r.o. has developed a biotechnology for the production of an animal

    E-Print Network [OSTI]

    Practical Training in Microalgae Utilization with Key Industry Engineering Group Key Industry on a suspension of Planktochlorella microalgae. The product consists of a suspension of algae in the growing

  18. On the definition of velocity in theories with two observer-independent scales

    E-Print Network [OSTI]

    S. Mignemi

    2003-02-10T23:59:59.000Z

    We argue that a consistent definition of the velocity of a particle in generalizations of special relativity with two observer-independent scales should be independent from the mass of the particle. This request rules out the definition $v_i=\\partial p_0/\\partial p_i$, but allows for other definitions proposed in the literature.

  19. A DEFINITION OF "DEGREE OF CONFIRMATION" CARL G. HEMPEL AND PAUL OPPENHEIM

    E-Print Network [OSTI]

    Fitelson, Branden

    -method of settling the issue seems to consist in actually constructing an explicit and general definition and theory, and ,vith emphasis on the general methodological issues, a theory of 98 #12;DEFINITION OF "DEGREEA DEFINITION OF "DEGREE OF CONFIRMATION" CARL G. HEMPEL AND PAUL OPPENHEIM 1. The problem

  20. arXiv:1110.0908v1 Employing the perturbative definition of the Higgs

    E-Print Network [OSTI]

    Maas, Axel

    mass in and beyond perturbation theory The precise definition of the mass of a particle is a highly non) gauge theories. The most direct definition of the mass of a particle is just given by the (timearXiv:1110.0908v1 [hep­lat] 5 Oct 2011 Employing the perturbative definition of the Higgs mass