Powered by Deep Web Technologies
Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-207: Wireshark Multiple Denial of Service Vulnerabilities ...  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

2

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple...

3

V-019: Google Chrome Multiple Vulnerabilities | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Google Chrome Multiple Vulnerabilities V-019: Google Chrome Multiple Vulnerabilities November 8, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

4

A multiple secretary problem with switch costs  

E-Print Network (OSTI)

In this thesis, we utilize probabilistic reasoning and simulation methods to determine the optimal selection rule for the secretary problem with switch costs, in which a known number of applicants appear sequentially in a ...

Ding, Jiachuan

2007-01-01T23:59:59.000Z

5

A new grouping genetic algorithm for the quadratic multiple knapsack problem  

Science Conference Proceedings (OSTI)

The quadratic multiple knapsack problem is an extension of the well known 0/1 multiple knapsack problem. In the quadratic multiple knapsack problem, profit values are associated not only with individual objects but also with pairs of objects. Profit ... Keywords: combinatorial optimization, grouping genetic algorithm, knapsack problem, quadratic multiple knapsack problem

Alok Singh; Anurag Singh Baghel

2007-04-01T23:59:59.000Z

6

Solving $k$-Nearest Vector Problem on Multiple Graphics Processors  

E-Print Network (OSTI)

In a recommendation system, customers' preferences are encoded into vectors, and finding the nearest vectors to each vector is an essential part. We define this part of problem as a $k$-nearest vector problem and give an effective algorithm to solve it on multiple graphics processor units (GPUs). By an experiment, we show that when the size of the problem is large, an implementation of the algorithm on two GPUs runs more than 260 times faster than a single core implementation on a latest CPU. We also show that our algorithm scales well with respect to the number of GPUs.

Kato, Kimikazu

2009-01-01T23:59:59.000Z

7

A multiprocessor based heuristic for multi-dimensional multiple-choice knapsack problem  

Science Conference Proceedings (OSTI)

This paper presents a multiprocessor based heuristic algorithm for the Multi-dimensional Multiple Choice Knapsack Problem (MMKP). MMKP is a variant of the classical 0---1 knapsack problem, where items having a value and a number of resource requirements ... Keywords: Heuristic algorithms, Inter process communication, Knapsack problem, Multiprocessor systems, Process synchronization

Abu Zafar Shahriar; M. Mostofa Akbar; M. Sohel Rahman; Muhammad Abdul Newton

2008-03-01T23:59:59.000Z

8

Multiple attribute decision-making methods for the dynamic operator allocation problem  

Science Conference Proceedings (OSTI)

This study explores two multiple attribute decision-making (MADM) methods to solve a dynamic operator allocation problem. Both methods use an analytic hierarchy process (AHP) to determine attribute weights a priori. The first method uses a technique ... Keywords: AHP, Fuzzy set theory, Integrated circuit packaging, Multiple attribute decision making, TOPSIS

Taho Yang; Mu-Chen Chen; Chih-Ching Hung

2007-01-01T23:59:59.000Z

9

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

10

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

11

The Multiple-Sets Split Feasibility Problem and Its Applications for ...  

E-Print Network (OSTI)

Oct 6, 2005 ... the inverse problem of intensity-modulated radiation therapy (IMRT) treatment ..... and test experimentally in [14] a unified theory that enables treatment of .... for the linear split feasibility problems, Technical Report, September.

12

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

13

Models for the two-dimensional two-stage cutting stock problem with multiple stock size  

Science Conference Proceedings (OSTI)

We consider a Two-Dimensional Cutting Stock Problem (2DCSP) where stock of different sizes is available, and a set of rectangular items has to be obtained through two-stage guillotine cuts. We propose and computationally compare three Mixed-Integer Programming ... Keywords: Computational experiments, Cutting stock problem, Mixed-integer programming models

Fabio Furini, Enrico Malaguti

2013-08-01T23:59:59.000Z

14

Multiple Phase Neighborhood Search-GRASP for the Capacitated Vehicle Routing Problem  

Science Conference Proceedings (OSTI)

Greedy Randomized Adaptive Search Procedure (GRASP) has been proved to be a very efficient algorithm for the solution of the Traveling Salesman Problem. Also, it has been proved that expanding the local search with the use of two or more different local ... Keywords: Expanding Neighborhood Search, Greedy Randomized Adaptive Search Procedure, Langrangean Relaxation, Vehicle Routing Problem

Yannis Marinakis

2012-06-01T23:59:59.000Z

15

Constrained multiple deployment problem in wireless sensor networks with guaranteed lifetimes  

Science Conference Proceedings (OSTI)

We aimed to deploy wireless sensor networks with guaranteed lifetimes for outdoor monitoring projects. The provision of a guaranteed lifetime has rarely been studied in previous deployment problems. The use of battery packs as the power source for sensors ... Keywords: Deployment problem, Guaranteed lifetime, Sensor network

Chun-Han Lin; Chung-Ta King; Ting-Yi Chen

2011-02-01T23:59:59.000Z

16

Solving nuclear safeguards evaluation problem with fuzzy multiple attribute decision making methods  

Science Conference Proceedings (OSTI)

International Atomic Energy Agency (IAEA) conducts nuclear safeguards evaluation (NSE) to verify that a State is living up to its international undertakings not to use nuclear programs for nuclear weapons purposes. In NSE, IAEA experts linguistically ... Keywords: fuzzy multiple attribute decision making, linguistic evaluation, nuclear safeguards

Özgür Kabak; Da Ruan

2009-12-01T23:59:59.000Z

17

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

18

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

19

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

20

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

22

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

23

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

24

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

25

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

26

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

27

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

28

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

29

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

30

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

31

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

32

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

33

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

34

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

35

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

36

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

37

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

38

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

39

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

40

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

42

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

43

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

44

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

45

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

46

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

47

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

48

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

49

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

50

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

51

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

52

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

53

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

54

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

55

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

56

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

57

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

58

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

59

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

60

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

62

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

63

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

64

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

65

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

66

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

67

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

68

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

69

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

70

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

71

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

72

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

73

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML 8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities January 5, 2011 - 2:28pm Addthis PROBLEM: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities PLATFORM: Mozilla Firefox 3.5.11 - 3.6.10, Mozilla SeaMonkey 2.0 - 2.0.9 Vulnerable Platforms Details ABSTRACT: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the

74

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

75

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

76

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

77

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

78

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

79

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

80

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

82

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

83

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

84

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

85

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

86

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

87

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

88

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

89

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: OpenSC Smart Card Serial Number Multiple Buffer Overflow 7: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities January 4, 2011 - 5:52pm Addthis PROBLEM: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities PLATFORM: Vulnerable Platform: OpenSC 0.11.13 ABSTRACT: OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. reference LINKS: SecurityFocus - OpenSC Smart Card Serial CVE-2010-4523 OpenSC: Three stack-based buffer overflows CVE-2010-4523 - Three stack-based buffer overflows

90

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

91

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

92

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

93

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

94

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

95

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

96

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

97

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

98

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

99

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

100

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM TRIRIGA Application Platform Multiple Cross-Site 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are reported in versions 2.1, 2.5, 2.6, and 2.7. REFERENCE LINKS: Secunia Advisory SA54641 CVE-2013-4003 IBM Security Bulletin IMPACT ASSESSMENT: Low DISCUSSION: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks.

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

102

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

103

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

104

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

105

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

106

Verification test problems for the calculation of probability of loss of assured safety in temperature-dependent systems with multiple weak and strong links.  

SciTech Connect

Four verification test problems are presented for checking the conceptual development and computational implementation of calculations to determine the probability of loss of assured safety (PLOAS) in temperature-dependent systems with multiple weak links (WLs) and strong links (SLs). The problems are designed to test results obtained with the following definitions of loss of assured safety: (1) Failure of all SLs before failure of any WL, (2) Failure of any SL before failure of any WL, (3) Failure of all SLs before failure of all WLs, and (4) Failure of any SL before failure of all WLs. The test problems are based on assuming the same failure properties for all links, which results in problems that have the desirable properties of fully exercising the numerical integration procedures required in the evaluation of PLOAS and also possessing simple algebraic representations for PLOAS that can be used for verification of the analysis.

Johnson, Jay Dean (ProStat, Mesa, AZ); Oberkampf, William Louis; Helton, Jon Craig (Arizona State University, Tempe, AZ)

2006-06-01T23:59:59.000Z

107

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

108

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

109

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

110

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

111

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

112

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

113

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

114

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

115

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

116

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

117

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

118

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

119

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

120

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

122

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

123

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

124

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

125

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

126

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

127

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

128

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

129

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

211: IBM iNotes Multiple Vulnerabilities 211: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related to MIME mail is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An integer overflow error within the DWA9W ActiveX control can be exploited to execute arbitrary code.

130

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

131

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

132

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

133

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

134

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

135

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

136

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

137

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

138

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

139

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

140

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

142

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

143

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

144

U-171: DeltaV Products Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71: DeltaV Products Multiple Vulnerabilities 71: DeltaV Products Multiple Vulnerabilities U-171: DeltaV Products Multiple Vulnerabilities May 17, 2012 - 7:00am Addthis PROBLEM: DeltaV Products Multiple Vulnerabilities PLATFORM: DeltaV and DeltaV Workstations versions 9.3.1, 10.3.1, 11.3, and 11.3.1 DeltaV ProEssentials Scientific Graph version 5.0.0.6 ABSTRACT: Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference LINKS: Secunia Advisory SA49210 CVE-2012-1814 CVE-2012-1815 CVE-2012-1816 CVE-2012-1817 CVE-2012-1818 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and

145

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

146

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

147

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities May 17, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in BlackBerry Tablet OS PLATFORM: BlackBerry Tablet OS 2.x ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53453 Blackberry Security Advisory KB34161 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265

148

The existence of multiple positive solutions to boundary value problems of nonlinear delay differential equations with countably many singularities on infinite interval  

Science Conference Proceedings (OSTI)

In this paper, we consider the existence of countably many positive solutions to a boundary value problem of a nonlinear delay differential equation with countably many singularities on infinite interval (@f(x^'(t)))^'+a(t)f(t,x(t),x"t)=0,0~x^'(t)=0, ... Keywords: 34B18, 34B40, Boundary value problems, Delay differential equations, Infinite interval, Positive solutions

Yuming Wei; Patricia J. Y. Wong; Weigao Ge

2010-03-01T23:59:59.000Z

149

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

150

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

151

Common Air Conditioner Problems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Air Conditioner Problems Common Air Conditioner Problems Common Air Conditioner Problems May 30, 2012 - 6:41pm Addthis A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. What does this mean for me? You can eliminate the most common air conditioner problems before hiring an air conditioning technician. You can do some air conditioner maintenance and repair tasks yourself. One of the most common air conditioning problems is improper operation. If your air conditioner is on, be sure to close your home's windows and outside doors. For room air conditioners, isolate the room or a group of connected rooms as much as possible from the rest of your home.

152

Common Air Conditioner Problems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Air Conditioner Problems Common Air Conditioner Problems Common Air Conditioner Problems May 30, 2012 - 6:41pm Addthis A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. What does this mean for me? You can eliminate the most common air conditioner problems before hiring an air conditioning technician. You can do some air conditioner maintenance and repair tasks yourself. One of the most common air conditioning problems is improper operation. If your air conditioner is on, be sure to close your home's windows and outside doors. For room air conditioners, isolate the room or a group of connected rooms as much as possible from the rest of your home.

153

Hedging Problems with Stochastic Parameters  

NLE Websites -- All DOE Office Websites (Extended Search)

the problems of quadratic hedging and mean-variance portfolio selection in an incomplete market with continuous trading, multiple assets, and Brownian information. In particular,...

154

Parallel progressive multiple sequence alignment  

Science Conference Proceedings (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

155

A Heuristic Approach for Big Bucket Production Planning Problems  

E-Print Network (OSTI)

Oct 4, 2006 ... Multi-level production planning problems in which multiple items ... setup costs, lot-sizing problems seek a minimum-cost production plan that ...

156

The recoverable robust tail assignment problem  

E-Print Network (OSTI)

using column generation in the master and subproblems of the Benders ...... described by (36)-(41) is a network flow problem with one source and multiple sink.

157

Management of multiple-use commons.  

E-Print Network (OSTI)

??This thesis addresses an example of multiple-use commons problems: the case of land use for forestry and reindeer husbandry. Forestry use land for industrial purposes… (more)

Widmark, Camilla

2009-01-01T23:59:59.000Z

158

Multigrid Methods for Elliptic Problems: A Review  

Science Conference Proceedings (OSTI)

Multigrid methods solve a large class of problems very efficiently. They work by approximating a problem on multiple overlapping grids with widely varying mesh sizes and cycling between thew approximations, using relaxation to reduce the error on ...

Scott R. Fulton; Paul E. Ciesielski; Wayne H. Schubert

1986-05-01T23:59:59.000Z

159

Multiple Motivations Institutional Change Principle | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

160

Tackling Energy Problems For America's Tribal Nations | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tackling Energy Problems For America's Tribal Nations Tackling Energy Problems For America's Tribal Nations Tackling Energy Problems For America's Tribal Nations June 20, 2012 - 6:07pm Addthis Julia Bovey, First Wind; Tracey LeBeau; Neil Kiely, First Wind; and Bob Springer (NREL) at First Wind's new Rollins project near Lincoln, Maine. Julia Bovey, First Wind; Tracey LeBeau; Neil Kiely, First Wind; and Bob Springer (NREL) at First Wind's new Rollins project near Lincoln, Maine. Tracey A. LeBeau Director, Office of Indian Energy Policy & Programs What Is START? It provides tribal communities with technical assistance to accelerate clean energy project development. Helps to advance energy self-sufficiency. And creates jobs across the country. At the Tribal Nations Conference last December, President Obama noted that

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

MULTIPLE TORNADO  

E-Print Network (OSTI)

The purpose of this note is to call attention to a preferred 1,000-500-mb. thickness line that in the mean accompanies multiple tornado outbreaks in the United States. Studies by Sutcliffe [I] and others have suggested that thickness patterns are a suitable synoptic tool for obtaining a picture of the three-dimensional structure of the atmosphere. SutclifFe and Forsdyke [2] have placed particular emphasis on charts showing the pattern of thickness of the 1,000-500-mb. layer. The contribution of the thickness pattern and the synoptic pressure patterns to the vorticity of the tornado is outside the scope of the present study. However, though much has been written concerning the value of such patterns in the evaluation of vertical motion and synoptic development, there has

Conrad P. Mook

1954-01-01T23:59:59.000Z

162

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

163

A MULTIPLE-ITEM MULTIPLE-CONSTRAINT INVENTORY OPTIMIZATION AND SUPPLIER SELECTION MODEL UNDER LEAD TIME DEMAND UNCERTAINTY.  

E-Print Network (OSTI)

??The objective of this thesis is to solve a multiple-item, one-retailer inventory control and supplier selection problem with multiple constraints and uncertainties. For each item,… (more)

Zhu, Rongjia

2009-01-01T23:59:59.000Z

164

A Stochastic Vendor Managed Inventory Problem and Its Variations .  

E-Print Network (OSTI)

??We analyze the problem of distributing units of a product, by a capacitated vehicle, from one storage location (depot) to multiple retailers. The demand processes… (more)

Balun, Pairote

2004-01-01T23:59:59.000Z

165

Multiple attributes analysis of vegetable production  

Science Conference Proceedings (OSTI)

This paper shows the possibility of some multiple criteria decision-making methods in agricultural enterprise decisions. In practice humans often meet multi-criteria decision problems. The success of every organization depends, among other things, on ... Keywords: AHP, ORESTE, TOPSIS, WSM, agricultural decision, multiple attribute decision methods

Martin Mat?j?ek; Helena Brožová

2011-04-01T23:59:59.000Z

166

DOE Selects Two Contractors for Multiple-Award Waste Disposal Contract |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Two Contractors for Multiple-Award Waste Disposal Two Contractors for Multiple-Award Waste Disposal Contract DOE Selects Two Contractors for Multiple-Award Waste Disposal Contract April 12, 2013 - 12:00pm Addthis Media Contact Bill Taylor, 803-952-8564 Bill.Taylor@srs.gov Cincinnati - The U.S. Department of Energy (DOE) awarded two fixed price unit rate Indefinite Delivery/Indefinite Quantity (ID/IQ) multiple-award contracts for the permanent disposal of Low-Level Waste (LLW) and Mixed-Low Level Waste (MLLW) today to EnergySolutions, LLC and Waste Control Specialists, LLC. The goal of these contracts is to establish a vehicle that allows DOE sites to place timely, competitive and cost-effective task orders for the permanent disposal of: Class A, B, and C LLW and MLLW 11e(2) byproduct material Technology Enhanced Naturally Occurring Radioactive Material

167

Capacity-constrained multiple-market price discrimination  

Science Conference Proceedings (OSTI)

This paper studies a multiple-market price discrimination problem with different markets' demand elasticity and supply constraints, whereas the markets share a common capacity. We model the problem as a continuous nonlinear knapsack problem, and propose ... Keywords: Knapsack problem, Nonlinear programming, Price discrimination

Bin Zhang

2012-01-01T23:59:59.000Z

168

Plan-based policies for efficient multiple battery load management  

Science Conference Proceedings (OSTI)

Efficient use of multiple batteries is a practical problem with wide and growing application. The problem can be cast as a planning problem under uncertainty. We describe the approach we have adopted to modelling and solving this problem, seen as a Markov ...

Maria Fox; Derek Long; Daniele Magazzeni

2012-05-01T23:59:59.000Z

169

Constraining multiple systems with GAIA  

E-Print Network (OSTI)

GAIA will provide observations of some multiple asteroid and dwarf systems. These observations are a way to determine and improve the quantification of dynamical parameters, such as the masses and the gravity fields, in these multiple systems. Here we investigate this problem in the cases of Pluto's and Eugenia's system. We simulate observations reproducing an approximate planning of the GAIA observations for both systems, as well as the New Horizons observations of Pluto. We have developed a numerical model reproducing the specific behavior of multiple asteroid system around the Sun and fit it to the simulated observations using least-square method, giving the uncertainties on the fitted parameters. We found that GAIA will improve significantly the precision of Pluto's and Charon's mass, as well as Petit Prince's orbital elements and Eugenia's polar oblateness.

Beauvalet, L; Arlot, J -E; Bancelin, D; Binzel, R P; Marchis, F

2012-01-01T23:59:59.000Z

170

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodologies  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scientific Team Draws on New Data, Multiple Scientific Scientific Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well June 15, 2010 - 12:00am Addthis Washington - Based on updated information and scientific assessments, Secretary of Energy Steven Chu, Secretary of the Interior Ken Salazar, and Chair of the National Incident Command's Flow Rate Technical Group (FRTG) Dr. Marcia McNutt (Director of the U.S. Geological Survey) today announced an improved estimate of how much oil is flowing from the leaking BP well. Secretary Chu, Secretary Salazar, and Dr. McNutt convened a group of federal and independent scientists on Monday to discuss new analyses and

171

cutting stock problem  

Science Conference Proceedings (OSTI)

NIST. cutting stock problem. (classic problem). Definition: Find the best arrangement of shapes on rectangles to minimize ...

2013-08-23T23:59:59.000Z

172

Solving large stochastic planning problems using multiple dynamic abstractions  

E-Print Network (OSTI)

One of the goals of AI is to produce a computer system that can plan and act intelligently in the real world. It is difficult to do so, in part because real-world domains are very large. Existing research generally deals ...

Steinkraus, Kurt Alan, 1978-

2005-01-01T23:59:59.000Z

173

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

174

Learning from multiple heuristics  

Science Conference Proceedings (OSTI)

Heuristic functions for single-agent search applications estimate the cost of the optimal solution. When multiple heuristics exist, taking their maximum is an effective way to combine them. A new technique is introduced for combining multiple heuristic ...

Mehdi Samadi; Ariel Felner; Jonathan Schaeffer

2008-07-01T23:59:59.000Z

175

Plastics' Color Problem: How a New Device Will Prevent Waste | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Plastics' Color Problem: How a New Device Will Prevent Waste Plastics' Color Problem: How a New Device Will Prevent Waste Plastics' Color Problem: How a New Device Will Prevent Waste July 22, 2010 - 3:20pm Addthis This is a probe for use in an extruder, similar to the one being developed by Guided Wave of Rancho Cordova, Calif. | Photo courtesy of Guided Wave. This is a probe for use in an extruder, similar to the one being developed by Guided Wave of Rancho Cordova, Calif. | Photo courtesy of Guided Wave. What are the key facts? Commercial plastics made at 752 degrees Fahrenheit and 2,000 psi Conventional plastic color detectors break at high temps and pressures Plastics with incorrect colors, require rerunning production - wasting energy $250,000 DOE grant to support development of improved probe Color can make or break commercial plastics. And commercial or extruded

176

Feasible distributed CSP models for scheduling problems  

Science Conference Proceedings (OSTI)

A distributed constraint satisfaction problem (DisCSP) is a CSP in which variables and constraints are distributed among multiple automated agents. Many researchers have developed techniques for solving DisCSPs. They assume for simplicity that each agent ... Keywords: Constraint satisfaction, Distributed CSP, Holonic system, Multi-agent system, Scheduling

Miguel A. Salido; Adriana Giret

2008-08-01T23:59:59.000Z

177

Ensemble smoother with multiple data assimilation  

Science Conference Proceedings (OSTI)

In the last decade, ensemble-based methods have been widely investigated and applied for data assimilation of flow problems associated with atmospheric physics and petroleum reservoir history matching. This paper focuses entirely on the reservoir history-matching ... Keywords: Ensemble Kalman filter, Ensemble smoother, History matching, Multiple data assimilation

Alexandre A. Emerick, Albert C. Reynolds

2013-06-01T23:59:59.000Z

178

An Object Oriented Framework for Parallel Multiple Optimizations  

Science Conference Proceedings (OSTI)

This report presents a general Objected-Oriented Framework for Parallel and Multiple Optimizations. We designed a general Objected-Oriented Class Library for Parallel Numerical Optimization. All optimization problems are considered: Unconstrained, Constrained, ...

Beidi Hamma

2000-06-01T23:59:59.000Z

179

Symmetry in Scheduling Problems  

E-Print Network (OSTI)

Nov 16, 2010 ... 2 Problem Symmetry and Fundamental Domains ...... Handbook of Computational Group Theory (Discrete Mathematics and Its Applica- tions).

180

PREFAIL: a programmable tool for multiple-failure injection  

Science Conference Proceedings (OSTI)

As hardware failures are no longer rare in the era of cloud computing, cloud software systems must "prevail" against multiple, diverse failures that are likely to occur. Testing software against multiple failures poses the problem of combinatorial explosion ... Keywords: distributed systems, fault injection, testing

Pallavi Joshi; Haryadi S. Gunawi; Koushik Sen

2011-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Energy Consumption in Downlink MIMO Relay Systems with Multiple Users  

Science Conference Proceedings (OSTI)

This paper focuses on the energy consumption problem in the downlink MIMO relay systems with multiple users. Power consumption under the target sum capacity is used as the energy efficient performance metric. Three transmission schemes, i.e. regenerate ... Keywords: Energy Consumption, MIMO, Relay, Multiple Users

Jie Xu; Ling Qiu

2010-12-01T23:59:59.000Z

182

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

Alger, T.W.

1994-09-06T23:59:59.000Z

183

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

184

Synchronization in Vehicle Routing---A Survey of VRPs with Multiple Synchronization Constraints  

Science Conference Proceedings (OSTI)

This paper presents a survey of vehicle routing problems with multiple synchronization constraints. These problems exhibit, in addition to the usual task covering constraints, further synchronization requirements between the vehicles, concerning spatial, ... Keywords: coordination, survey, synchronization, trailer, transshipment, vehicle routing

Michael Drexl

2012-08-01T23:59:59.000Z

185

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

186

Troubleshoot HRSG corrosion problems  

SciTech Connect

Heat-recovery steam generators (HRSGs) have come of age. At the same time, these boilers are more complex as designs are refined to maximize heat recovery. Hundreds of units are installed and now have years of operating experience providing valuable information that can benefit all HRSG owners. Experienced troubleshooters can anticipate potential problem areas and recommend cost-effective solutions. The HRSG corrosion problems summarized here--and the means by which they were identified and solved--are useful examples to alert other HRSG owners and operators to potential problem areas. Steps involved include thorough inspection and documentation, problem and cost/benefit analyses, and planning around outages.

Stanley, L.

1996-07-01T23:59:59.000Z

187

Drinking Water Problems: Copper  

E-Print Network (OSTI)

High levels of copper in drinking water can cause health problems. This publication explains the effects of copper in water and methods of removing it. 4 pp.

Dozier, Monty; McFarland, Mark L.; Lesikar, Bruce J.

2006-01-25T23:59:59.000Z

188

Multiple shell fusion targets  

DOE Patents (OSTI)

Multiple shell fusion targets for use with electron beam and ion beam implosion systems are described. The multiple shell targets are of the low-power type and use a separate relatively low Z, low density ablator at large radius for the outer shell, which reduces the focusing and power requirements of the implosion system while maintaining reasonable aspect ratios. The targets use a high Z, high density pusher shell placed at a much smaller radius in order to obtain an aspect ratio small enough to protect against fluid instability. Velocity multiplication between these shells further lowers the power requirements. Careful tuning of the power profile and intershell density results in a low entropy implosion which allows breakeven at low powers. For example, with ion beams as a power source, breakeven at 10-20 Terrawatts with 10 MeV alpha particles for imploding a multiple shell target can be accomplished.

Lindl, J.D.; Bangerter, R.O.

1975-10-31T23:59:59.000Z

189

Photovoltaics: Separating Multiple Excitons  

Science Conference Proceedings (OSTI)

Scientists have demonstrated an efficient process for generating multiple excitons in adjacent silicon nanocrystals from a single high-energy photon. Their findings could prove useful for a wide range of photovoltaic applications.

Nozik, A. J.

2012-05-01T23:59:59.000Z

190

Learning from Multiple Outlooks  

E-Print Network (OSTI)

We consider semi-supervised learning from multiple outlooks of the same learning task, that is, learning from different representations of the same type of data. As opposed to learning from multiple views where it is assumed that the exact same instances have multiple representations, we only assume the availability of samples of the same learning task in different domains. We develop an algorithmic framework that is based on mapping the (unlabeled) data followed by adjusting the mapping using the scarcer labeled data. The mapped data from all the outlooks can then be used for a generic classification algorithm. We further provide sample complexity results under the assumption that the different outlooks are inherently low dimension Gaussian mixtures. Experiments with real-world data indicate the performance boost from using multiple outlooks.

Gal-on, Maayan

2010-01-01T23:59:59.000Z

191

ITOUGH2 sample problems  

DOE Green Energy (OSTI)

This report contains a collection of ITOUGH2 sample problems. It complements the ITOUGH2 User`s Guide [Finsterle, 1997a], and the ITOUGH2 Command Reference [Finsterle, 1997b]. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media [Preuss, 1987, 1991a]. The report ITOUGH2 User`s Guide [Finsterle, 1997a] describes the inverse modeling framework and provides the theoretical background. The report ITOUGH2 Command Reference [Finsterle, 1997b] contains the syntax of all ITOUGH2 commands. This report describes a variety of sample problems solved by ITOUGH2. Table 1.1 contains a short description of the seven sample problems discussed in this report. The TOUGH2 equation-of-state (EOS) module that needs to be linked to ITOUGH2 is also indicated. Each sample problem focuses on a few selected issues shown in Table 1.2. ITOUGH2 input features and the usage of program options are described. Furthermore, interpretations of selected inverse modeling results are given. Problem 1 is a multipart tutorial, describing basic ITOUGH2 input files for the main ITOUGH2 application modes; no interpretation of results is given. Problem 2 focuses on non-uniqueness, residual analysis, and correlation structure. Problem 3 illustrates a variety of parameter and observation types, and describes parameter selection strategies. Problem 4 compares the performance of minimization algorithms and discusses model identification. Problem 5 explains how to set up a combined inversion of steady-state and transient data. Problem 6 provides a detailed residual and error analysis. Finally, Problem 7 illustrates how the estimation of model-related parameters may help compensate for errors in that model.

Finsterle, S.

1997-11-01T23:59:59.000Z

192

Pyrochemical multiplicity counter development  

Science Conference Proceedings (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

193

Multiple stage multiple filter hydrate store  

DOE Patents (OSTI)

An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

Bjorkman, H.K. Jr.

1983-05-31T23:59:59.000Z

194

Stereo matching via selective multiple windows  

E-Print Network (OSTI)

Window-based correlation algorithms are widely used for stereo matching due to their computational efficiency as compared to global algorithms. In this paper, a multiple window correlation algorithm for stereo matching is presented which addresses the problems associated with a fixed window size. The developed algorithm differs from the previous multiple window algorithms by introducing a reliability test to select the most reliable window among multiple windows of increasing sizes. This ensures that at least one window is large enough to cover a region of adequate intensity variations while at the same time small enough to cover a constant depth region. A recursive computation procedure is also used to allow a computationally efficient implementation of the algorithm. The outcome obtained from a standard set of images with known disparity maps shows that the generated disparity maps are more accurate as compared to two popular stereo matching local algorithms.

Satyajit Anil Adhyapak; Nasser Kehtarnavaz; Mihai Nadin

2007-01-01T23:59:59.000Z

195

Rollout strategy-based probabilistic causal model approach for the multiple fault diagnosis  

Science Conference Proceedings (OSTI)

Multiple fault diagnosis (MFD) is used as an effective measure to tackle the problems of real-shop floor environment for reducing the total lifetime maintenance cost of the system. It is a well-known computationally complex problem, where computational ... Keywords: Multiple fault diagnosis, Probabilistic causal model, Rollout strategy

Nishikant Mishra; Alok Kumar Choudhary; M. K. Tiwari; Ravi Shankar

2010-08-01T23:59:59.000Z

196

FOURIER TRANSFORM MULTIPLE QUANTUM NMR  

E-Print Network (OSTI)

TRANSFORM MULTIPLE QUANTUM NMR G. Drobny, A. Pines, S.TRANSFO~~ MULTIPLE QUANTUM NMR G. Drobny, A. Pines, S.

Drobny, G.

2011-01-01T23:59:59.000Z

197

Energy Minimization Using Multiple Supply Voltages Jui-Ming Chang and Massoud Pedram  

E-Print Network (OSTI)

Energy Minimization Using Multiple Supply Voltages Jui-Ming Chang and Massoud Pedram Department and energy costs of these level shifters must be taken into account when comparing a multiple-supply voltage a dynamic programming technique for solv- ing the multiple supply voltage scheduling problem in both non

Pedram, Massoud

198

MUSE CSP: An Extension to the Constraint Satisfaction Problem  

E-Print Network (OSTI)

This paper describes an extension to the constraint satisfaction problem (CSP) called MUSE CSP (MUltiply SEgmented Constraint Satisfaction Problem). This extension is especially useful for those problems which segment into multiple sets of partially shared variables. Such problems arise naturally in signal processing applications including computer vision, speech processing, and handwriting recognition. For these applications, it is often difficult to segment the data in only one way given the low-level information utilized by the segmentation algorithms. MUSE CSP can be used to compactly represent several similar instances of the constraint satisfaction problem. If multiple instances of a CSP have some common variables which have the same domains and constraints, then they can be combined into a single instance of a MUSE CSP, reducing the work required to apply the constraints. We introduce the concepts of MUSE node consistency, MUSE arc consistency, and MUSE path consistency. We th...

Randall A. Helzerman; Mary P. Harpe

1996-01-01T23:59:59.000Z

199

Corrosion Problems and Solutions  

Science Conference Proceedings (OSTI)

Table 5   Typical deaerator corrosion problems...General corrosion of vessels and piping GC Layup, CH V, high iron in feedwater None N/A (a) CF, corrosion fatigue;

200

Swaging Problems and Solutions  

Science Conference Proceedings (OSTI)

Table 5   Some swaging problems, potential causes, and possible solutions...causes Solutions Difficult feeding Work material too hard Anneal or stress relieve to remove effects of cold

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

The Magnetotelluric Inverse Problem  

E-Print Network (OSTI)

1572–1592. Banks, R. , 1969: Geomagnetic variations and theThe inverse problem in geomagnetic induction. Z. Geophys. ,sound inferences from geomagnetic sounding, doi:10.1016/j.

Medin, Ashley E

2008-01-01T23:59:59.000Z

202

The magnetotelluric inverse problem  

E-Print Network (OSTI)

1572–1592. Banks, R. , 1969: Geomagnetic variations and theThe inverse problem in geomagnetic induction. Z. Geophys. ,sound inferences from geomagnetic sounding, doi:10.1016/j.

Medin, Ashley E.

2008-01-01T23:59:59.000Z

203

Hydrostatic Adjustment: Lamb's Problem  

Science Conference Proceedings (OSTI)

The prototype problem of hydrostatic adjustment for large-scale atmospheric motions is Presented. When a horizontally infinite layer of compressible fluid, initially at rest, is instantaneously heated, the fluid is no longer in hydrostatic ...

Peter R. Bannon

1995-05-01T23:59:59.000Z

204

Multiple sort flow cytometer  

DOE Patents (OSTI)

A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane.

Van den Engh, Ger (Seattle, WA); Esposito, Richard J. (Seattle, WA)

1996-01-01T23:59:59.000Z

205

Multiple gap photovoltaic device  

DOE Patents (OSTI)

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

206

The Sedov Test Problem  

SciTech Connect

The Sedov test is classically defined as a point blast problem. The Sedov problem has led us to advances in algorithms and in their understanding. Vorticity generation can be physical or numerical. Both play a role in Sedov calculations. The RAGE code (Eulerian) resolves the shock well, but produces vorticity. The source definition matters. For the FLAG code (Lagrange), CCH is superior to SGH by avoiding spurious vorticity generation. FLAG SGH currently has a number of options that improve results over traditional settings. Vorticity production, not shock capture, has driven the Sedov work. We are pursuing treatments with respect to the hydro discretization as well as to artificial viscosity.

Fung, Jimmy [Los Alamos National Laboratory; Masser, Thomas [Los Alamos National Laboratory; Morgan, Nathaniel R. [Los Alamos National Laboratory

2012-06-25T23:59:59.000Z

207

Multiple System Rate Process  

NLE Websites -- All DOE Office Websites (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

208

Portable multiplicity counter  

DOE Patents (OSTI)

A portable multiplicity counter has signal input circuitry, processing circuitry and a user/computer interface disposed in a housing. The processing circuitry, which can comprise a microcontroller integrated circuit operably coupled to shift register circuitry implemented in a field programmable gate array, is configured to be operable via the user/computer interface to count input signal pluses receivable at said signal input circuitry and record time correlations thereof in a total counting mode, coincidence counting mode and/or a multiplicity counting mode. The user/computer interface can be for example an LCD display/keypad and/or a USB interface. The counter can include a battery pack for powering the counter and low/high voltage power supplies for biasing external detectors so that the counter can be configured as a hand-held device for counting neutron events.

Newell, Matthew R. (Los Alamos, NM); Jones, David Carl (Los Alamos, NM)

2009-09-01T23:59:59.000Z

209

Solving quantified constraint satisfaction problems  

Science Conference Proceedings (OSTI)

We make a number of contributions to the study of the Quantified Constraint Satisfaction Problem (QCSP). The QCSP is an extension of the constraint satisfaction problem that can be used to model combinatorial problems containing contingency or uncertainty. ... Keywords: Arc consistency, Quantified Boolean formulas, Quantified constraint satisfaction problems, Random problems, Search algorithms

Ian P. Gent; Peter Nightingale; Andrew Rowley; Kostas Stergiou

2008-04-01T23:59:59.000Z

210

Multiple sclerosis and interferon  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

211

Drinking Water Problems: Radionuclides  

E-Print Network (OSTI)

Radionuclides in drinking water can cause serious health problems for people. This publication explains what the sources of radionuclides in water are, where high levels have been found in Texas, how they affect health and how to treat water to remove them.

Lesikar, Bruce J.; Melton, Rebecca; Hare, Michael; Hopkins, Janie; Dozier, Monty

2006-08-04T23:59:59.000Z

212

A fuzzy goal programming approach with priority for channel allocation problem in steel industry  

Science Conference Proceedings (OSTI)

A model is presented to address a steel supplier's channel allocation problem that includes decisions of channel mix and capacity allocation for each distribution channel. The problem has been formulated as a fuzzy mixed integer multiple goal programming ... Keywords: Channel allocation problem, Fuzzy goal programming, Fuzzy sets, Preemptive priority

Kune-Muh Tsai; Shiau-Yuan You; Yu-Hsin Lin; Chih-Hung Tsai

2008-04-01T23:59:59.000Z

213

A rock-paper-scissors evolutionary algorithm for the TDMA broadcast scheduling problem  

Science Conference Proceedings (OSTI)

In wireless ad-hoc networks, the broadcast scheduling problem (BSP) is commonly viewed as a well-known NP-complete combinatorial optimization problem. The purpose of the BSP is to achieve a transmission schedule with collision-free time slots in a time ... Keywords: Broadcast scheduling problem, Evolutionary algorithm, Optimum transmission schedule, Rock-paper-scissors, Time division multiple access

Chih-Chiang Lin, Pi-Chung Wang

2013-08-01T23:59:59.000Z

214

Phase-multiplication holography  

DOE Patents (OSTI)

This disclosure relates generally to nondestructive testing for identifying structural characteristics of an object by scanned holographic techniques using a known source of radiation, such as electromagnetic or acoustical radiation. It is an object of this invention to provide an apparatus and method for synthetic aperture expansion in holographic imaging applications to construct fringe patterns capable of holographic reproduction where aperture restrictions in nondestructive testing applications would conventionally make such imaging techniques impossible. The apparatus and method result in the production of a sharply defined frontal image of structural characteristics which could not otherwise be imaged because they occur either near the surface of the object or are confined by geometry restricting aperture dimensions available for scanning purposes. The depth of the structural characteristic below the surface of the object can also be determined by the reconstruction parameters which produce the sharpest focus. Lateral resolution is established by simulated reduction in the radiation wavelength and may easily be an order of magnitude less than the electromagnetic wavelength in the material or 2 times the standard depth of penetration. Since the phase multiplication technique is performed on the detected data, the penetration depth available due to the longer wavelength signals applied to the test object remains unchanged. The phase multiplication technique can also be applied to low frequency acoustic holography, resulting in a test which combines excellent penetration of difficult materials with high resolution images.

Collins, H.D.; Prince, J.M.; Davis, T.J.

1982-01-25T23:59:59.000Z

215

Multiple capillary biochemical analyzer  

DOE Patents (OSTI)

A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

Dovichi, N.J.; Zhang, J.Z.

1995-08-08T23:59:59.000Z

216

Pemex: Problems and Policy Options  

E-Print Network (OSTI)

American Studies University of California, Berkeley Pemex: Problems and Policy Options David Shields Independent Energy

Shields, David

2006-01-01T23:59:59.000Z

217

Solving the Fast Clock Problem  

Science Conference Proceedings (OSTI)

This power quality (PQ) case study troubleshoots then solves the problem of digital clocks running fast.

2003-12-31T23:59:59.000Z

218

The interior transmission problem and bounds on transmission eigenvalues  

E-Print Network (OSTI)

We study the interior transmission eigenvalue problem for sign-definite multiplicative perturbations of the Laplacian in a bounded domain. We show that all but finitely many complex transmission eigenvalues are confined to a parabolic neighborhood of the positive real axis.

Michael Hitrik; Katsiaryna Krupchyk; Petri Ola; Lassi Päivärinta

2010-09-28T23:59:59.000Z

219

The interior transmission problem and bounds on transmission eigenvalues  

E-Print Network (OSTI)

We study the interior transmission eigenvalue problem for sign-definite multiplicative perturbations of the Laplacian in a bounded domain. We show that all but finitely many complex transmission eigenvalues are confined to a parabolic neighborhood of the positive real axis.

Hitrik, Michael; Ola, Petri; Päivärinta, Lassi

2010-01-01T23:59:59.000Z

220

Bayesian nonlinear regression for large p small n problems  

Science Conference Proceedings (OSTI)

Statistical modeling and inference problems with sample sizes substantially smaller than the number of available covariates are challenging. This is known as large p small n problem. Furthermore, the problem is more complicated when we have multiple ... Keywords: 62F15, 62G08, 62H99, 62J02, 62M20, Bayesian hierarchical model, Empirical Bayes, Gibbs sampling, Markov chain Monte Carlo, Metropolis-Hastings algorithm, Near infrared spectroscopy, Relevance vector machine, Reproducing kernel Hilbert space, Support vector machine, Vapnik's ?-insensitive loss

Sounak Chakraborty; Malay Ghosh; Bani K. Mallick

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

On the design of high-performance algorithms for aligning multiple protein sequences on mesh-based multiprocessor architectures  

Science Conference Proceedings (OSTI)

In this paper, we address the problem of multiple sequence alignment (MSA) for handling very large number of proteins sequences on mesh-based multiprocessor architectures. As the problem has been conclusively shown to be computationally complex, we employ ... Keywords: Divisible loads, Mesh topology, Multiple sequence alignment, Protein sequences, Smith--Waterman algorithm

Diana H. P. Low; Bharadwaj Veeravalli; David A. Bader

2007-09-01T23:59:59.000Z

222

Asynchronous Communication Schemes for Finite Difference Methods on Multiple GPUs  

Science Conference Proceedings (OSTI)

Finite difference methods continue to provide an important and parallelisable approach to many numerical simulations problems. Iterative multigrid and multilevel algorithms can converge faster than ordinary finite difference methods but can be more difficult ... Keywords: finite-difference, GPU, multiple device, CUDA

Daniel Peter Playne; Kenneth Arthur Hawick

2010-05-01T23:59:59.000Z

223

Predicting Gene Structures from Multiple RT-PCR Tests  

E-Print Network (OSTI)

Predicting Gene Structures from Multiple RT-PCR Tests (Extended Abstract) Jakub Kov´ac1 , Tom RT-PCR experiments in gene finding. We present hardness results and practical algorithms for several variants of the problem. We also apply our methods to a real RT-PCR data set in the Drosophila genome. We

Vinar, Tomas

224

Multiple layer insulation cover  

DOE Patents (OSTI)

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

225

Traits and Multiple Genes  

NLE Websites -- All DOE Office Websites (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

226

Problem 2-Lexicographic Order  

E-Print Network (OSTI)

Problem: For complex numbers z = a + bi ? C and w = c + di ? C define ”z ? w ” if either a ordering of C”. (Question I) Prove that this turns C into and ordered set. (Question II) Is this an ordered field? (no) (Question III) Does it have the least-upper-bound property? (no) We will first review the definitions of order and ordered set from Rudin [R]. We will then show that under the lexicographic ordering C is an ordered set. Definition 1. Let S be a set. An order on S is a relation, denoted by ?, with the following two properties: (i) If x ? S and y ? S then one and only one of the statements is true. x ? y, x = y, y ? x (ii) If x, y, z ? S, if x ? y and y ? z, then x ? z.

Jacob Bower

2008-01-01T23:59:59.000Z

227

Instability of Non-Zonal Baroclinic Flows: Multiple-Scale Analysis  

Science Conference Proceedings (OSTI)

The linear instability of a non-zonal flow can be reduced to an eigenvalue-eigenfunction problem, governed by a nonseparable partial differential equation (Niehaus, 1980). Approximate solutions, found by the method of multiple scales, are derived ...

Margaret C. W. Niehaus

1981-05-01T23:59:59.000Z

228

On Resource Allocation in Fading Multiple-Access Channels–An Efficient Approximate Projection Approach  

E-Print Network (OSTI)

In this paper, we consider the problem of rate and power allocation in a multiple-access channel (MAC). Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of ...

Parandehgheibi, Ali

229

On Resource Allocation in Fading Multiple Access Channels -- An Efficient Approximate Projection Approach  

E-Print Network (OSTI)

In this paper, we consider the problem of rate and power allocation in a multiple-access channel (MAC). Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of ...

Parandehgheibi, Ali

230

Many heads are better than one: jointly removing bias from multiple MRIs using nonparametric maximum likelihood  

Science Conference Proceedings (OSTI)

The correction of multiplicative bias in magnetic resonance images is an important problem in medical image processing, especially as a preprocessing step for quantitative measurements and other numerical procedures. Most previous approaches have used ...

Erik G. Learned-Miller; Vidit Jain

2005-07-01T23:59:59.000Z

231

A D-S theory based AHP decision making approach with ambiguous evaluations of multiple criteria  

Science Conference Proceedings (OSTI)

This paper proposes an ambiguity aversion principle of minimax regret to extend DS/AHP approach of multi-criteria decision making (MCDM). This extension can analyze the MCDM problems with ambiguous evaluations of multiple criteria. Such evaluations cannot ...

Wenjun Ma; Wei Xiong; Xudong Luo

2012-09-01T23:59:59.000Z

232

Kolkata Restaurant Problem as a generalised El Farol Bar Problem  

E-Print Network (OSTI)

Generalisation of the El Farol bar problem to that of many bars here leads to the Kolkata restaurant problem, where the decision to go to any restaurant or not is much simpler (depending on the previous experience of course, as in the El Farol bar problem). This generalised problem can be exactly analysed in some limiting cases discussed here. The fluctuation in the restaurant service can be shown to have precisely an inverse cubic behavior, as widely seen in the stock market fluctuations.

Chakrabarti, Bikas K

2007-01-01T23:59:59.000Z

233

Applying problem-structuring methods to problems in computer security  

Science Conference Proceedings (OSTI)

Solutions to security problems, particularly ones involving cryptography, have typically been approached through the Inside-Out Threat Model, "this is our solution and whatever it addresses is the threat". Email encryption/signing and SSL/TLS are two ... Keywords: problem-structuring methods, soft operations research, soft systems methodology, wicked problems

Peter Gutmann

2011-09-01T23:59:59.000Z

234

TA Orientation 2005 Activity 6 Problem Solving: Cowboy Bob Problem  

E-Print Network (OSTI)

TA Orientation 2005 Activity 6 Problem Solving: Cowboy Bob Problem Page 61 Below is a problem from the outlaws. #12;TA Orientation 2005 Activity 6 (continued) Page 62 Notes: #12;TA Orientation 2005 Activity 7. #12;TA Orientation 2005 Activity 7 (continued) Page 64 Answer Sheet for Activity 7 1. Examine your

Minnesota, University of

235

Multiple stage railgun  

DOE Patents (OSTI)

A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

Hawke, Ronald S. (Livermore, CA); Scudder, Jonathan K. (Pleasanton, CA); Aaland, Kristian (Livermore, CA)

1982-01-01T23:59:59.000Z

236

Optimal control problems, curves of pursuit.  

E-Print Network (OSTI)

??We study a class of problems known as pursuit-evasion problems (PE). These problems can be understood as special cases of optimal control problems. After describing… (more)

Moiseeva, Svetlana

2011-01-01T23:59:59.000Z

237

Two problems in Classical Mechanics  

E-Print Network (OSTI)

A problem about the present structure of dimensional analysis, and another one about the differences between solids and fluids are suggested. Both problems appear to have certain foundational aspects.

E. E. Rosinger

2004-07-09T23:59:59.000Z

238

Hospitals - Medical - Backup Generator Problems  

Science Conference Proceedings (OSTI)

This power quality (PQ) case study presents the investigation of problems while testing a backup generator at a hospital.

2003-12-31T23:59:59.000Z

239

Problem frames and software engineering  

Science Conference Proceedings (OSTI)

A general account is given of the problem frames approach to the development of software-intensive systems, assuming that the reader is already familiar with its basic ideas. The approach is considered in the light of the long-standing aspiration of ... Keywords: Problem frame, Problems, Software

Michael Jackson

2005-11-01T23:59:59.000Z

240

Anglers' fishing problem  

E-Print Network (OSTI)

The considered model will be formulated as related to "the fishing problem" even if the other applications of it are much more obvious. The angler goes fishing. He uses various techniques and he has at most two fishing rods. He buys a fishing ticket for a fixed time. The fishes are caught with the use of different methods according to the renewal processes. The fishes' value and the inter arrival times are given by the sequences of independent, identically distributed (i.i.d.) random variables with the known distribution functions. It forms the marked renewal--reward process. The angler's measure of satisfaction is given by the difference between the utility function, depending on the value of the fishes caught, and the cost function connected with the time of fishing. In this way, the angler's relative opinion about the methods of fishing is modelled. The angler's aim is to have as much satisfaction as possible and additionally he has to leave the lake before a fixed moment. Therefore his goal is to find two...

Karpowicz, Anna

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Usability in multiple monitor displays  

Science Conference Proceedings (OSTI)

An experimental study was conducted to examine the impact of multiple monitors on user performance and multitasking. Forty-three participants were assigned to two groups - a multi-monitor group and a singlemonitor group - to carry out a series of tasks. ... Keywords: large display monitor, multiple monitors, multitasking, usability, user performance

Jacob M. Truemper; Hong Sheng; Michael G. Hilgers; Richard H. Hall; Morris Kalliny; Basanta Tandon

2008-10-01T23:59:59.000Z

242

The Consent Problem in International Law  

E-Print Network (OSTI)

nuclear   weapons.     More   problems   implicating   more   people   make   the   consent   problem   more   complex  

Guzman, Andrew

2011-01-01T23:59:59.000Z

243

Analysis of oil-pipeline distribution of multiple products subject to delivery time-windows  

E-Print Network (OSTI)

This dissertation defines the operational problems of, and develops solution methodologies for, a distribution of multiple products into oil pipeline subject to delivery time-windows constraints. A multiple-product oil pipeline is a pipeline system composing of pipes, pumps, valves and storage facilities used to transport different types of liquids. Typically, products delivered by pipelines are petroleum of different grades moving either from production facilities to refineries or from refineries to distributors. Time-windows, which are generally used in logistics and scheduling areas, are incorporated in this study. The distribution of multiple products into oil pipeline subject to delivery time-windows is modeled as multicommodity network flow structure and mathematically formulated. The main focus of this dissertation is the investigation of operating issues and problem complexity of single-source pipeline problems and also providing solution methodology to compute input schedule that yields minimum total time violation from due delivery time-windows. The problem is proved to be NP-complete. The heuristic approach, a reversed-flow algorithm, is developed based on pipeline flow reversibility to compute input schedule for the pipeline problem. This algorithm is implemented in no longer than O(T*E) time. This dissertation also extends the study to examine some operating attributes and problem complexity of multiple-source pipelines. The multiple-source pipeline problem is also NP-complete. A heuristic algorithm modified from the one used in single-source pipeline problems is introduced. This algorithm can also be implemented in no longer than O(T*E) time. Computational results are presented for both methodologies on randomly generated problem sets. The computational experience indicates that reversed-flow algorithms provide good solutions in comparison with the optimal solutions. Only 25% of the problems tested were more than 30% greater than optimal values and approximately 40% of the tested problems were solved optimally by the algorithms.

Jittamai, Phongchai

2004-12-01T23:59:59.000Z

244

Feasible Distributed CSP Models for Scheduling Problems Miguel A. Salido, Adriana Giret  

E-Print Network (OSTI)

Feasible Distributed CSP Models for Scheduling Problems Miguel A. Salido, Adriana Giret Universidad satisfaction problem (DisCSP) is a CSP in which variables and constraints are distributed among multiple are distributed by using our model. Key words: distributed CSP, constraint satisfaction, holonic system, multi

Salido, Miguel Angel

245

A construction and improvement heuristic for a liquefied natural gas inventory routing problem  

Science Conference Proceedings (OSTI)

We present a large scale ship routing and inventory management problem for a producer and distributor of liquefied natural gas (LNG). The problem contains multiple products, inventory and berth capacity at the loading port and a heterogeneous fleet of ... Keywords: Heuristics, Inventory routing, Maritime transportation

Magnus Stålhane; Jørgen Glomvik Rakke; Christian Rørholt Moe; Henrik Andersson; Marielle Christiansen; Kjetil Fagerholt

2012-02-01T23:59:59.000Z

246

Scheduling trains as a blocking parallel-machine job shop scheduling problem  

Science Conference Proceedings (OSTI)

In this paper, the train scheduling problem is modelled as a blocking parallel-machine job shop scheduling (BPMJSS) problem. In the model, trains, single-track sections and multiple-track sections, respectively, are synonymous with jobs, single machines ... Keywords: Blocking, Job shop scheduling, Parallel machine, Train scheduling

Shi Qiang Liu; Erhan Kozan

2009-10-01T23:59:59.000Z

247

Positive solutions for a class of boundary-value problems with integral boundary conditions  

Science Conference Proceedings (OSTI)

This paper investigates the existence and multiplicity of positive solutions for a class of nonlinear boundary-value problems of fourth-order differential equations with integral boundary conditions. The arguments are based upon a specially constructed ... Keywords: Boundary-value problem, Existence, Fixed-point theorem, Integral boundary conditions, Positive solution

Xuemei Zhang; Weigao Ge

2009-07-01T23:59:59.000Z

248

An incremental deployment algorithm for wireless sensor networks using one or multiple autonomous agents  

Science Conference Proceedings (OSTI)

The paper studies the deployment problem of wireless sensor networks using one or multiple autonomous agents. An online incremental algorithm based on Voronoi partition is proposed to solve the problem, for which each agent deploys sensors one-at-a-time ... Keywords: Autonomous agent, Incremental deployment, Sensor network

Zhiyun Lin; Sijian Zhang; Gangfeng Yan

2013-01-01T23:59:59.000Z

249

Strategies in Symmetric Kolkata Restaurant Problem  

E-Print Network (OSTI)

The Quantum Kolkata restaurant problem is a multiple-choice version of the quantum minority game, where a set of n non-communicating players have to chose between one of m choices. A payoff is granted to the players that make a unique choice. It has previously been shown that shared entanglement and quantum operations can aid the players to coordinate their actions and acquire higher payoffs than is possible with classical randomization. In this paper the initial quantum state is expanded to a family of GHZ-type states and strategies are discussed in terms of possible final outcomes. It is shown that the players individually seek outcomes that maximize the collective good.

Puya Sharif; Hoshang Heydari

2012-12-30T23:59:59.000Z

250

Algae control problems and practices workshop  

SciTech Connect

Western water resources are continuously facing increased demand from industry and the public. Consequently, many of these resources are required to perform multiple tasks as they cycle through the ecosystem. Many plants and animals depend upon these resources for growth. Algae are one group of plants associated with nutrient and energy cycles in many aquatic ecosystems. Although most freshwater algae are microscopic in size, they are capable of dominating and proliferating to the extent that the value of the water resource for both industrial and domestic needs is compromised. There is a great diversity of aquatic environments and systems in which algae may be found, and there are many varieties of treatment and control techniques available to reduce the impacts of excessive growth. This workshop was organized to exchange information about these control problems and practices.

Pryfogle, P.A. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Ghio, G. [Pacific Gas and Electric Co., San Francisco, CA (United States)

1996-09-01T23:59:59.000Z

251

Liquid hydrogen flow problems in Kiwi reactors  

DOE Green Energy (OSTI)

The Kiwi series of reactors were the first ones tested in the US Rover Program in the development of nuclear rocket engines for space propulsion. The early experiments with liquid hydrogen showed that parallel flow systems were prone to uneven flow distributions and violent fluctuations in pressure and flow that were capable of destroying a reactor core. Kiwi flow distribution problems were solved by using multiple feed lines into the nozzle cooling system and carefully balancing impedance among them. The violent pressure and flow fluctuations were eliminated after their cause was identified as resonance phenomena driven by the response to flow disturbances of heat transfer through a superheated hydrogen layer. Smooth flow operations were assured by rapidly bringing operating pressures beyond several times the critical pressure of hydrogen. After this initial rough start, solid core nuclear rocket engines successfully passed milestones of achievements during the remainder of the Rover program.

Thurston, R.S.

1992-09-01T23:59:59.000Z

252

Multiple predictor smoothing methods for sensitivity analysis.  

Science Conference Proceedings (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

253

Pooling problems: relaxations and discretizations  

E-Print Network (OSTI)

The classical minimum cost network flow problem seeks to find the optimal way of sending ... The front-end scheduling, also referred to as the crude oil operation.

254

Moods, wicked problems, and learning  

Science Conference Proceedings (OSTI)

Wicked problems and learning environments present tough mood challenges for leaders and teachers. Telepresence and sensory gadgets are unlikely to replace physical presence in these areas.

Peter J. Denning

2013-03-01T23:59:59.000Z

255

Problems in High Energy Astrophysics  

E-Print Network (OSTI)

This contribution discusses some of the main problems in high energy astrophysics, and the perspectives to solve them using different types of "messengers": cosmic rays, photons and neutrinos

Lipari, Paolo

2008-01-01T23:59:59.000Z

256

Problems in High Energy Astrophysics  

E-Print Network (OSTI)

This contribution discusses some of the main problems in high energy astrophysics, and the perspectives to solve them using different types of "messengers": cosmic rays, photons and neutrinos

Paolo Lipari

2008-08-04T23:59:59.000Z

257

The Split Variational Inequality Problem  

E-Print Network (OSTI)

Sep 20, 2010 ... lines of research related to our notion of the CVIP. ...... Imaging, Therapy Planning and Inverse Problems, Medical Physics Pub# lishing ...

258

The underwater radiance distribution problem  

E-Print Network (OSTI)

THE UNDERWATER RADIANCE DISTRIBUTION PROBLEM S. Q. DuntleyFunction of Depth in an Underwater Environment," which firsta Function of Depth in an Underwater Environment," which has

Duntley, Seibert Q

1959-01-01T23:59:59.000Z

259

Anomaly Detection at Multiple Scales  

Science Conference Proceedings (OSTI)

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Anomaly Detection at Multiple Scales, or ADAMS, is a $35 million DARPA project designed to identify patterns and anomalies ...

Alain Sren Mikhayhu

2012-06-01T23:59:59.000Z

260

Multiple Specialization of WAM Code  

Science Conference Proceedings (OSTI)

Program specialization is normally supported by global analysis of the program. Compilers use the information deduced to generate more efficient, specialized implementations of the program. This specialization can be single or multiple, depending if ...

Michel Ferreira; Luís Damas

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Boundary stabilization of transmission problems  

E-Print Network (OSTI)

We study the transmission problem in bounded domains with dissipative boundary conditions. Under some natural assumptions, we prove uniform bounds of the corresponding resolvents on the real axis at high frequency, and as a consequence, we obtain free of eigenvalues regions. As an application, we get exponential decay of the energy of the solutions of the correpsonding mixed boundary value problems.

Fernando Cardoso; Georgi Vodev

2009-10-20T23:59:59.000Z

262

STOMP, Subsurface Transport Over Multiple Phases, theory guide  

Science Conference Proceedings (OSTI)

This guide describes the simulator`s governing equations, constitutive functions and numerical solution algorithms of the STOMP (Subsurface Transport Over Multiple Phases) simulator, a scientific tool for analyzing multiple phase subsurface flow and transport. The STOMP simulator`s fundamental purpose is to produce numerical predictions of thermal and hydrologic flow and transport phenomena in variably saturated subsurface environments, which are contaminated with volatile or nonvolatile organic compounds. Auxiliary applications include numerical predictions of solute transport processes including radioactive chain decay processes. In writing these guides for the STOMP simulator, the authors have assumed that the reader comprehends concepts and theories associated with multiple-phase hydrology, heat transfer, thermodynamics, radioactive chain decay, and nonhysteretic relative permeability, saturation-capillary pressure constitutive functions. The authors further assume that the reader is familiar with the computing environment on which they plan to compile and execute the STOMP simulator. The STOMP simulator requires an ANSI FORTRAN 77 compiler to generate an executable code. The memory requirements for executing the simulator are dependent on the complexity of physical system to be modeled and the size and dimensionality of the computational domain. Likewise execution speed depends on the problem complexity, size and dimensionality of the computational domain, and computer performance. One-dimensional problems of moderate complexity can be solved on conventional desktop computers, but multidimensional problems involving complex flow and transport phenomena typically require the power and memory capabilities of workstation or mainframe type computer systems.

White, M.D.; Oostrom, M.

1996-10-01T23:59:59.000Z

263

Studies in nonlinear problems of energy  

Science Conference Proceedings (OSTI)

Emphasis has been on combustion and flame propagation. The research program was on modeling, analysis and computation of combustion phenomena, with emphasis on transition from laminar to turbulent combustion. Nonlinear dynamics and pattern formation were investigated in the transition. Stability of combustion waves, and transitions to complex waves are described. Combustion waves possess large activation energies, so that chemical reactions are significant only in thin layers, or reaction zones. In limit of infinite activation energy, the zones shrink to moving surfaces, (fronts) which must be found during the analysis, so that (moving free boundary problems). The studies are carried out for limiting case with fronts, while the numerical studies are carried out for finite, though large, activation energy. Accurate resolution of the solution in the reaction zones is essential, otherwise false predictions of dynamics are possible. Since the the reaction zones move, adaptive pseudo-spectral methods were developed. The approach is based on a synergism of analytical and computational methods. The numerical computations build on and extend the analytical information. Furthermore, analytical solutions serve as benchmarks for testing the accuracy of the computation. Finally, ideas from analysis (singular perturbation theory) have induced new approaches to computations. The computational results suggest new analysis to be considered. Among the recent interesting results, was spatio-temporal chaos in combustion. One goal is extension of the adaptive pseudo-spectral methods to adaptive domain decomposition methods. Efforts have begun to develop such methods for problems with multiple reaction zones, corresponding to problems with more complex, and more realistic chemistry. Other topics included stochastics, oscillators, Rysteretic Josephson junctions, DC SQUID, Markov jumps, laser with saturable absorber, chemical physics, Brownian movement, combustion synthesis, etc.

Matkowsky, B.J.

1992-07-01T23:59:59.000Z

264

Spreadsheet modelling for solving combinatorial problems: The vendor selection problem  

E-Print Network (OSTI)

Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers, planners and schedulers can work with them in developing solid and practical Do-It-Yourself Decision Support Systems. Small and Medium size organizations, can apply OR methodologies without the presence of specialized software and trained personnel, which in many cases cannot afford anyway. This paper examines an efficient approach in solving combinatorial programming problems with the use of spreadsheets. A practical application, which demonstrates the approach, concerns the development of a spreadsheet-based DSS for the Multi Item Procurement Problem with Fixed Vendor Cost. The DSS has been build using exclusively standard spreadsheet feature and can solve real problems of substantial size. The benefits and limitations of the approach are also discussed.

Ipsilandis, Pandelis G

2008-01-01T23:59:59.000Z

265

Inverse Problems in Heat Transfer  

E-Print Network (OSTI)

This chapter presents a stochastic modeling and statistical inference approach to the solution of inverse problems in thermal transport systems. Of particular interest is the inverse heat conduction problem (IHCP) of estimating an unknown boundary heat flux in a conducting solid given temperature data within the domain. Even though deterministic sequential and whole time domain estimation methods have been applied with success over the years for the solution of such problems, we herein introduce stochastic approaches to representing and solving the IHCP. As most engineering systems and processes operate in an uncertain environment, it becomes increasingly important to address their analysis and inverse design in a stochastic manner using statistical data-driven prior and concurrent information on the system response. Recent advances in spectral stochastic modeling, computational Bayesian and spatial statistics enable complete and e#cient solution procedures to such problems. Two distinct approaches to the IHCP are presented in this chapter one based on spectral stochastic modeling and the other on Bayesian inference. Although these techniques are discussed in the context of the IHCP, the methodologies presented are general and applicable to design and estimation problems in other more complex problems in thermal transport systems including problems in the presence of convection, radiation and conduction. 1

Nicholas Zabaras

2004-01-01T23:59:59.000Z

266

Federal Energy Management Program: Multiple Motivations Institutional  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

267

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

268

Robust Multiple Car Tracking With Occlusion Reasoning  

E-Print Network (OSTI)

BERKELEY Robust Multiple Car Tracking with OcclusionAND HIGHWAYS Robust Multiple Car Tracking with Occlusiondraws decisions like "stalled car in lane 2 detected", "high

Koler, Dieter; Weber, Joseph; Malik, Jitendra

1994-01-01T23:59:59.000Z

269

Normalized Compression Distance of Multiples  

E-Print Network (OSTI)

Normalized compression distance (NCD) is a parameter-free similarity measure based on compression. The NCD between pairs of objects is not sufficient for all applications. We propose an NCD of finite multisets (multiples) of objacts that is metric and is better for many applications. Previously, attempts to obtain such an NCD failed. We use the theoretical notion of Kolmogorov complexity that for practical purposes is approximated from above by the length of the compressed version of the file involved, using a real-world compression program. We applied the new NCD for multiples to retinal progenitor cell questions that were earlier treated with the pairwise NCD. Here we get significantly better results. We also applied the NCD for multiples to synthetic time sequence data. The preliminary results are as good as nearest neighbor Euclidean classifier.

Cohen, Andrew R

2012-01-01T23:59:59.000Z

270

Parallel solution of recurrence problems  

Science Conference Proceedings (OSTI)

An mth-order recurrence problem is defined as the computation of the sequence x1,..., xN, where x1 = f(ai, xi-1,...,xi-m), ...

P. M. Kogge

1974-03-01T23:59:59.000Z

271

Connectivity problem in wireless networks  

Science Conference Proceedings (OSTI)

We study the complexity of the following connectivity problem in wireless networks: for a given placement of n nodes in the plane, the goal is to compute a channel and power assignment that forms strongly connected communication structure spanning ...

Dariusz R. Kowalski; Mariusz A. Rokicki

2010-09-01T23:59:59.000Z

272

Surrogate Guderley Test Problem Definition  

SciTech Connect

The surrogate Guderley problem (SGP) is a 'spherical shock tube' (or 'spherical driven implosion') designed to ease the notoriously subtle initialization of the true Guderley problem, while still maintaining a high degree of fidelity. In this problem (similar to the Guderley problem), an infinitely strong shock wave forms and converges in one-dimensional (1D) cylindrical or spherical symmetry through a polytropic gas with arbitrary adiabatic index {gamma}, uniform density {rho}{sub 0}, zero velocity, and negligible pre-shock pressure and specific internal energy (SIE). This shock proceeds to focus on the point or axis of symmetry at r = 0 (resulting in ostensibly infinite pressure, velocity, etc.) and reflect back out into the incoming perturbed gas.

Ramsey, Scott D. [Los Alamos National Laboratory; Shashkov, Mikhail J. [Los Alamos National Laboratory

2012-07-06T23:59:59.000Z

273

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, Emanuel M. (Los Alamos, NM); Nunnally, William C. (Los Alamos, NM)

1988-01-01T23:59:59.000Z

274

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

275

Statistical inference problems for (nonlinear) Stochastic PDEs | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Statistical inference problems for (nonlinear) Stochastic PDEs Statistical inference problems for (nonlinear) Stochastic PDEs Event Sponsor: Mathematics and Computing Science - LANS Seminar Start Date: Dec 11 2013 - 3:00pm Building/Room: Building 240/Room 1406-1407 Location: Argonne National Laboratory Speaker(s): Igor Cialenco Speaker(s) Title: Illinois Institute of Technology Host: Jie Chen Event Website: http://www.mcs.anl.gov/research/LANS/events/listn/detail.php?id=2241 We consider a parameter estimation problem to determine the drift coefficient for a large class of parabolic Stochastic PDEs driven by additive or multiplicative noise. In the first part of the talk, we derive several different classes of estimators based on the first N Fourier modes of a sample path observed continuously on a finite time interval. Second

276

A solution of LIDAR problem in double scattering approximation  

E-Print Network (OSTI)

A problem of monoenergetic particles pulse reflection from half-infinite stratified medium is considered in conditions of elastic scattering with absorbtion account. The theory is based on multiple scattering series solution of Kolmogorov equation for one-particle distribution function. The analytical representation for first two terms are given in compact form for a point impulse source and cylindric symmetrical detector. Reading recent articles on the LIDAR sounding of environment (e.g. Atmospheric and Oceanic Optics (2010) 23: 389-395, Kaul, B. V.; Samokhvalov, I. V. http://www.springerlink.com/content/k3p2p3582674xt21/) one recovers standing interest to the related direct and inverse problems. A development of the result fo the case of n-fold scattering and polarization account as well as correspondent convergence series problem solution of the Kolmogorov equation will be published in nearest future.

Sergey Leble; Alexei Buzdin

2011-12-14T23:59:59.000Z

277

1140 IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 6, JUNE 2013 Jamming Energy Allocation in Training-Based Multiple Access Systems  

E-Print Network (OSTI)

Maham, Member, IEEE Abstract--We consider the problem of jamming attack in a multiple access channel). H. Pezeshki and B. Maham are with the School of Electrical and Com- puter Engineering, University

Zhou, Xiangyun "Sean"

278

Mathematical Problems of Thermoacoustic Tomography  

E-Print Network (OSTI)

Thermoacoustic tomography (TAT) is a newly emerging modality in biomedical imaging. It combines the good contrast of electromagnetic and good resolution of ultrasound imaging. The mathematical model of TAT is the observability problem for the wave equation: one observes the data on a hyper-surface and reconstructs the initial perturbation. In this dissertation, we consider several mathematical problems of TAT. The first problem is the inversion formulas. We provide a family of closed form inversion formulas to reconstruct the initial perturbation from the observed data. The second problem is the range description. We present the range description of the spherical mean Radon transform, which is an important transform in TAT. The next problem is the stability analysis for TAT. We prove that the reconstruction of the initial perturbation from observed data is not H¨older stable if some observability condition is violated. The last problem is the speed determination. The question is whether the observed data uniquely determines the ultrasound speed and initial perturbation. We provide some initial results on this issue. They include the unique determination of the unknown constant speed, a weak local uniqueness, a characterization of the non-uniqueness, and a characterization of the kernel of the linearized operator.

Nguyen, Linh V.

2010-08-01T23:59:59.000Z

279

The Consistent Vehicle Routing Problem  

SciTech Connect

In the small package shipping industry (as in other industries), companies try to differentiate themselves by providing high levels of customer service. This can be accomplished in several ways, including online tracking of packages, ensuring on-time delivery, and offering residential pickups. Some companies want their drivers to develop relationships with customers on a route and have the same drivers visit the same customers at roughly the same time on each day that the customers need service. These service requirements, together with traditional constraints on vehicle capacity and route length, define a variant of the classical capacitated vehicle routing problem, which we call the consistent VRP (ConVRP). In this paper, we formulate the problem as a mixed-integer program and develop an algorithm to solve the ConVRP that is based on the record-to-record travel algorithm. We compare the performance of our algorithm to the optimal mixed-integer program solutions for a set of small problems and then apply our algorithm to five simulated data sets with 1,000 customers and a real-world data set with more than 3,700 customers. We provide a technique for generating ConVRP benchmark problems from vehicle routing problem instances given in the literature and provide our solutions to these instances. The solutions produced by our algorithm on all problems do a very good job of meeting customer service objectives with routes that have a low total travel time.

Groer, Christopher S [ORNL; Golden, Bruce [University of Maryland; Edward, Wasil [American University

2009-01-01T23:59:59.000Z

280

Solving Consistency Problems in Multiple Hypotheses Testing with Consonant Likelihood Ratio Test  

E-Print Network (OSTI)

38 3.3 Consonant closed F test against two-sided1.2 Closed Test . . . . . . . . . . . . . . . . . .1.2.1 Holm’s step-down test . . . . . . . . 1.2.2 Hochberg’s

Wang, Bushi

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Multiple Partonic Interactions in Herwig++  

E-Print Network (OSTI)

We review the implementation of a model for multiple partonic interactions in Herwig++. Moreover, we show how recent studies on the colour structure of events in Herwig++ led to a significant improvement in the description of soft inclusive observables in pp interactions at the LHC.

Stefan Gieseke; Christian Rohr; Andrzej Siodmok

2013-02-20T23:59:59.000Z

282

Key-Based Problem Decomposition for Relational Constraint Satisfaction Problems  

Science Conference Proceedings (OSTI)

Constraint satisfaction problems (CSP) are often posed over data residing in relational database systems, which serve as passive data-storage back ends. Several studies have demonstrated a number of important advantages to having database systems capable ... Keywords: constraint processing, databases, decomposition

James J. Lu; Sebastien Siva

2011-11-01T23:59:59.000Z

283

Steam Boiler Control Specification Problem:  

E-Print Network (OSTI)

Our solution to the specification problem in the specification language TLA+ is based on a model of operation where several components proceed synchronously. Our first specification concerns a simplified controller and abstracts from many details given in the informal problem description. We successively add modules to build a model of the state of the steam boiler, detect failures, and model message transmission. We give a more detailed controller specification and prove that it refines the abstract controller. We also address the relationship between the physical state of the steam boiler and the model maintained by the controller and discuss the reliability of failure detection. Finally, we discuss the implementability of our specification.

Tla Solution Frank; Frank Le Ke; Stephan Merz

1996-01-01T23:59:59.000Z

284

Multiple target laser ablation system  

DOE Patents (OSTI)

A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film.

Mashburn, Douglas N. (Knoxville, TN)

1996-01-01T23:59:59.000Z

285

Multiple Uses of Substation Data  

Science Conference Proceedings (OSTI)

This report describes a suite of modules developed under the Multiple Uses of Substation Data project. The modules are aimed at the integration and automated analysis of data coming from several Intelligent Electronic Devices (IEDs) such as Digital Protective Relays, Digital Fault Recorders and Circuit Breaker Monitors. Once data are collected, automated analysis processes the files to extract relevant information. The modules convert non-operational data to information that may be used by variety of app...

2008-06-30T23:59:59.000Z

286

Exotic Species What's the Problem?  

E-Print Network (OSTI)

are estimated to cost about $138 billion in environmental damage and losses each year. Non-native plants $100 million annually in damage to water pipes and filtration systems, and in control costs. · Brown-300 power outages/yr, numerous bites of children, etc. #12;What's the Problem? · Melaleuca tree --destroyed

Callender, Craig

287

Inverse scattering problem with isobars  

SciTech Connect

The inverse scattering problem is solved for a covariant, isobar-dominated scattering amplitude (including inelasticity). Application is made to the ..pi..N P/sub 33/ channel, with the ..pi..N ..delta.. vertex function and isobar bare mass as results.

Londergan, J.T.; Moniz, E.J.

1977-08-01T23:59:59.000Z

288

Substation automation problems and possibilities  

SciTech Connect

The evolutionary growth in the use and application of microprocessors in substations has brought the industry to the point of considering integrated substation protection, control, and monitoring systems. An integrated system holds the promise of greatly reducing the design, documentation, and implementation cost for the substation control, protection, and monitoring systems. This article examines the technical development path and the present implementation problems.

Smith, H.L.

1996-10-01T23:59:59.000Z

289

Open Problems in $?$ Particle Condensation  

E-Print Network (OSTI)

$\\alpha$ particle condensation is a novel state in nuclear systems. We briefly review the present status on the study of $\\alpha$ particle condensation and address the open problems in this research field: $\\alpha$ particle condensation in heavier systems other than the Hoyle state, linear chain and $\\alpha$ particle rings, Hoyle-analogue states with extra neutrons, $\\alpha$ particle condensation related to astrophysics, etc.

Y. Funaki; M. Girod; H. Horiuchi; G. Roepke; P. Schuck; A. Tohsaki; T. Yamada

2010-03-05T23:59:59.000Z

290

The metro map layout problem  

Science Conference Proceedings (OSTI)

We initiate a new problem of automatic metro map layout. In general, a metro map consists of a set of lines which have intersections or overlaps. We define a set of aesthetic criteria for good metro map layouts and present a method to produce ...

Seok-Hee Hong; Damian Merrick; Hugo A. D. do Nascimento

2004-09-01T23:59:59.000Z

291

Drinking Water Problems: Radionuclides (Spanish)  

E-Print Network (OSTI)

Radionuclides in drinking water can cause serious health problems for people. This publication explains what the sources of radionuclides in water are, where high levels have been found in Texas, how they affect health and how to treat water to remove them.

Lesikar, Bruce J.; Melton, Rebecca; Hare, Michael; Hopkins, Janie; Dozier, Monty

2006-12-21T23:59:59.000Z

292

A nonlinear programming test problem  

Science Conference Proceedings (OSTI)

Figure 1 is a flow diagram of the chemical process. The test problem was a hydrocarbon refrigeration process in which the feed stream (stream number 1 of Figure 1) is a vapor mixture of ethane, propane, and n-butane (subscripts e, p and b, respectively) ...

D. M. Himmelblau

1979-07-01T23:59:59.000Z

293

Semidefinite Relaxations of Ordering Problems  

E-Print Network (OSTI)

Jan 19, 2011 ... The quadratic ordering problem does not seem to have attracted ... 2 Linear Ordering as a Linear Program in 0-1 variables .... Instead of the Lovász-Schrijver lifting procedure, ...... Review of Economics and Statistics, 18, 1936. ... IEEE Transactions on Systems, Man, and Cybernetics, 11(2):109–125, 1981.

294

Statistical Inference in Inverse Problems  

E-Print Network (OSTI)

Inverse problems have gained popularity in statistical research recently. This dissertation consists of two statistical inverse problems: a Bayesian approach to detection of small low emission sources on a large random background, and parameter estimation methods for partial differential equation (PDE) models. Source detection problem arises, for instance, in some homeland security applications. We address the problem of detecting presence and location of a small low emission source inside an object, when the background noise dominates. The goal is to reach the signal-to-noise ratio levels on the order of 10^-3. We develop a Bayesian approach to this problem in two-dimension. The method allows inference not only about the existence of the source, but also about its location. We derive Bayes factors for model selection and estimation of location based on Markov chain Monte Carlo simulation. A simulation study shows that with sufficiently high total emission level, our method can effectively locate the source. Differential equation (DE) models are widely used to model dynamic processes in many fields. The forward problem of solving equations for given parameters that define the DEs has been extensively studied in the past. However, the inverse problem of estimating parameters based on observed state variables is relatively sparse in the statistical literature, and this is especially the case for PDE models. We propose two joint modeling schemes to solve for constant parameters in PDEs: a parameter cascading method and a Bayesian treatment. In both methods, the unknown functions are expressed via basis function expansion. For the parameter cascading method, we develop the algorithm to estimate the parameters and derive a sandwich estimator of the covariance matrix. For the Bayesian method, we develop the joint model for data and the PDE, and describe how the Markov chain Monte Carlo technique is employed to make posterior inference. A straightforward two-stage method is to first fit the data and then to estimate parameters by the least square principle. The three approaches are illustrated using simulated examples and compared via simulation studies. Simulation results show that the proposed methods outperform the two-stage method.

Xun, Xiaolei

2012-05-01T23:59:59.000Z

295

Quantum mechanics problems in observer's mathematics  

Science Conference Proceedings (OSTI)

This work considers the ontology, guiding equation, Schrodinger's equation, relation to the Born Rule, the conditional wave function of a subsystem in a setting of arithmetic, algebra and topology provided by Observer's Mathematics (see www.mathrelativity.com). Observer's Mathematics creates new arithmetic, algebra, geometry, topology, analysis and logic which do not contain the concept of continuum, but locally coincide with the standard fields. Certain results and communications pertaining to solutions of these problems are provided. In particular, we prove the following theorems: Theorem I (Two-slit interference). Let {Psi}{sub 1} be a wave from slit 1, {Psi}{sub 2} - from slit 2, and {Psi} = {Psi}{sub 1}+{Psi}{sub 2}. Then the probability of {Psi} being a wave equals to 0.5. Theorem II (k-bodies solution). For W{sub n} from m-observer point of view with m>log{sub 10}((2 Multiplication-Sign 10{sup 2n}-1){sup 2k}+1), the probability of standard expression of Hamiltonian variation is less than 1 and depends on n,m,k.

Khots, Boris; Khots, Dmitriy [Compressor Controls Corp, Des Moines, Iowa (United States); iMath Consulting LLC, Omaha, Nebraska (United States)

2012-11-06T23:59:59.000Z

296

Inelastic shadowing effects in multiple scattering  

SciTech Connect

The projectile--nucleon scattering amplitudes used as input into multiple scattering theories of projectile--nucleus scattering naturally include the effects of coupling to inelastic (i.e., production) channels. We employ a multichannel separable potential to describe the projectile--nucleon interaction and show that within the fixed nucleon framework we can obtain the nuclear elastic scattering amplitude. This includes terms outside the conventional formalisms, corresponding to intermediate propagation in the inelastic channels both above and below inelastic threshold. We refer to this as inelastic shadowing. In a two-channel approximation, we show that knowledge of the projectile--nucleon elastic scattering phase shifts plus specification of the inelastic threshold energy are sufficient to determine the off-shell coupled- channel transition matrix, implying that the nuclear amplitude can be calculated within this model without any detailed information about the inelastic channels. We study this solution quantitatively for some model problems and for pion scattering, with the general result that inelastic shadowing can be significant whenever the elementary interaction has important channel coupling. For pion scattering in the energy regime characterized by strongly absorptive resonance, we find, for example, that the effect of inelastic shadowing is much more important than that due to two-nucleon correlations. (AIP)

Londergan, J.T.; Moniz, E.J.

1975-09-19T23:59:59.000Z

297

On Multiple Decoding Attempts for Reed-Solomon Codes  

E-Print Network (OSTI)

One popular approach to soft-decision decoding of Reed-Solomon (RS) codes is based on the idea of using multiple trials of a simple RS decoding algorithm in combination with successively erasing or flipping a set of symbols or bits in each trial. In this paper, we present an framework based on rate-distortion (RD) theory to analyze such multiple-decoding algorithms for RS codes. By defining an appropriate distortion measure between an error pattern and an erasure pattern, it is shown that, for a single errors-and-erasures decoding trial, the condition for successful decoding is equivalent to the condition that the distortion is smaller than a fixed threshold. Finding the best set of erasure patterns for multiple decoding trials then turns out to be a covering problem which can be solved asymptotically by rate-distortion theory. Thus, the proposed approach can be used to understand the asymptotic performance-versus-complexity trade-off of multiple errors-and-erasures decoding of RS codes. We also consider an a...

Nguyen, Phong S; Narayanan, Krishna R

2010-01-01T23:59:59.000Z

298

Matroids, secretary problems, and online mechanisms  

Science Conference Proceedings (OSTI)

We study a generalization of the classical secretary problem which we call the "matroid secretary problem". In this problem, the elements of a matroid are presented to an online algorithm in random order. When an element arrives, the algorithm observes ...

Moshe Babaioff; Nicole Immorlica; Robert Kleinberg

2007-01-01T23:59:59.000Z

299

Self-organizing traffic lights at multiple-street intersections  

E-Print Network (OSTI)

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

300

Annual Inventory Troubleshooting Checklist Problem Solutions  

E-Print Network (OSTI)

Annual Inventory Troubleshooting Checklist Problem Solutions Duplicate tag number Send email to am;Annual Inventory Troubleshooting Checklist Problem Solutions Personal property Send email to am

Li, Mo

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Test instances for the traffic assignment problem  

E-Print Network (OSTI)

Test instances for the traffic assignment problem. F. Babonneau. ?. J.-P. Vial. ?. January 8, 2008. Abstract. This short note on the Traffic Assignment Problem ...

302

Improving feedback from multiple choice tests  

Science Conference Proceedings (OSTI)

Providing individual feedback to large groups of students can be difficult. By asking students to record their confidence in multiple choice test answers the quality of feedback can be improved. In a "multiple choice question" (MCQ) test the student ...

William Fone

2002-06-01T23:59:59.000Z

303

An Oil Pipeline Design Problem  

Science Conference Proceedings (OSTI)

We consider a given set of offshore platforms and onshore wells producing known (or estimated) amounts of oil to be connected to a port. Connections may take place directly between platforms, well sites, and the port, or may go through connection points ... Keywords: Algorithms: interactive branch-and-bound with valid inequalities. industries, Applications: design problem-formulation and analysis. programming, Integer, Networks/graphs, Petroleum/natural gas: oil pipeline network design

Jack Brimberg; Pierre Hansen; Keh-Wei Lin; Nenad Mladenovic; Michèle Breton

2003-03-01T23:59:59.000Z

304

Multiple piece turbine rotor blade  

DOE Patents (OSTI)

A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

Jones, Russell B; Fedock, John A

2013-05-21T23:59:59.000Z

305

Multiple channel programmable coincidence counter  

DOE Patents (OSTI)

A programmable digital coincidence counter having multiple channels and featuring minimal dead time. Neutron detectors supply electrical pulses to a synchronizing circuit which in turn inputs derandomized pulses to an adding circuit. A random access memory circuit connected as a programmable length shift register receives and shifts the sum of the pulses, and outputs to a serializer. A counter is input by the adding circuit and downcounted by the serializer, one pulse at a time. The decoded contents of the counter after each decrement is output to scalers.

Arnone, G.J.

1989-02-27T23:59:59.000Z

306

Multiple Access Channels with Generalized Feedback and Confidential Messages  

E-Print Network (OSTI)

This paper considers the problem of secret communication over a multiple access channel with generalized feedback. Two trusted users send independent confidential messages to an intended receiver, in the presence of a passive eavesdropper. In this setting, an active cooperation between two trusted users is enabled through using channel feedback in order to improve the communication efficiency. Based on rate-splitting and decode-and-forward strategies, achievable secrecy rate regions are derived for both discrete memoryless and Gaussian channels. Results show that channel feedback improves the achievable secrecy rates.

Tang, Xiaojun; Spasojevic, Predrag; Poor, H Vincent

2007-01-01T23:59:59.000Z

307

Visual secret sharing for multiple secrets  

Science Conference Proceedings (OSTI)

Conventional visual secret sharing schemes are designed for a single secret image so it is inefficient to generate numerous share images for multiple secret images simultaneously. Therefore, a novel visual secret sharing scheme for multiple secret images ... Keywords: Multiple secret sharing, Visual cryptography, Visual pattern, Visual secret sharing

Jen-Bang Feng; Hsien-Chu Wu; Chwei-Shyong Tsai; Ya-Fen Chang; Yen-Ping Chu

2008-12-01T23:59:59.000Z

308

Multiple channel data acquisition system  

DOE Patents (OSTI)

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler.

Crawley, H. Bert (Ames, IA); Rosenberg, Eli I. (Ames, IA); Meyer, W. Thomas (Ames, IA); Gorbics, Mark S. (Ames, IA); Thomas, William D. (Boone, IA); McKay, Roy L. (Ames, IA); Homer, Jr., John F. (Ames, IA)

1990-05-22T23:59:59.000Z

309

Multiple channel data acquisition system  

DOE Patents (OSTI)

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

1990-05-22T23:59:59.000Z

310

On the equivalence of linear complementarity problems  

Science Conference Proceedings (OSTI)

We show that the Extended Linear Complementarity Problem (ELCP) can be recast as a standard Linear Complementarity Problem (LCP) provided that the surplus variables or the feasible set of the ELCP are bounded. Since many extensions of the LCP are special ... Keywords: Complementarity problems, Integer programming, Linear complementarity problem, Nonlinear algorithms, Optimization

B. De Schutter; W. P. M. H. Heemels; A. Bemporad

2002-08-01T23:59:59.000Z

311

A real-time warehouse operations planning system for small batch replenishment problems in production environment  

Science Conference Proceedings (OSTI)

A factory consists of numerous production workstations, multiple production lines and many production floors. Due to the characteristics of just-in-time and make-to-order mode manufacturing, small batches of production materials are required for production ... Keywords: Genetic algorithm (GA), Radio frequency identification (RFID) technology, Small batch replenishment problem

T. C. Poon; K. L. Choy; F. T. S. Chan; G. T. S. Ho; A. Gunasekaran; H. C. W. Lau; H. K. H. Chow

2011-07-01T23:59:59.000Z

312

Integrating plan-view tracking and color-based person models for multiple people tracking  

E-Print Network (OSTI)

Tracking multiple people in a dynamic environment is important in many applications. Recent research in this area has focused either on geometric analysis or appearance models. In this paper we distinguish four types of tracking problems, and then describe an approach for combining geometric analysis and appearance-based tracking to “hold on to ” people in three of these situations. 1.

Luca Iocchi; Robert C. Bolles

2005-01-01T23:59:59.000Z

313

Energy-efficient scheduling for multiple access in wireless sensor networks: A job scheduling method  

Science Conference Proceedings (OSTI)

With the objective to minimize the transmission energy cost, we consider the energy-efficient scheduling problem in a single hop multi-access data gathering network. We first prove by theoretical induction that transmitting with reduced powers decreases ... Keywords: Job scheduling, Multiple access channel, Polymatroid analysis, Wireless sensor networks

Xiaomao Mao; Huifang Chen; Peiliang Qiu; Zhaoyang Zhang

2010-09-01T23:59:59.000Z

314

A subspace method for projective reconstruction from multiple images with missing data  

Science Conference Proceedings (OSTI)

In this paper, we consider the problem of projective reconstruction based on the subspace method. Unlike existing subspace methods which require that all the points are visible in all views, we propose an algorithm to estimate projective shape, projective ... Keywords: Factorization method, Multiple views, Structure from motion, Subspace method

W. K. Tang; Y. S. Hung

2006-05-01T23:59:59.000Z

315

Hereditary Multiple Exostoses with Pseudoaneurysm  

Science Conference Proceedings (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

316

Physics problems of thermonuclear reactors  

SciTech Connect

From topical conference on energy; Philadelphia, Pennsylvania, USA (Nov 1973). A problem common to all controlled fusion reactors is that of the burning deuterium --tritium fuel under conditions of plasma confinement which approach the ideal limit as nearly as possible. After ignitlon, the balance between alpha- particle energy deposition and plasma losses (radiation plus thermal and particle diffusion) determines the stability or instability of the burn in toroidal systems. Tokamak systems are described both with unstable, injection-regulated burn cycles and stabilized steady-state burn conditions. In the theta-pinch reactor an unstable burn occurs, some, what regulated by high-beta plasma expansion, which is quenched by a programmed plasma decompression. The plasma expansion during the constant-pressure burn provides direct'' conversion of plasma thermonuclear heat to electrical output, in addition to the electrical power derived from the neutron energy through conventional thermal conversion equipment. The open-ended mirror reactor is characterized by a direct conversion system for recovering end-loss plasma energy and converting it to electrical energy for reinjection into the plasma. This allows a favorable reactor energy balance and an amplification factor Q (= thermonuclear energy output/injected plasma energy) which is compatible with classical collisional losses. For the three reactor types considered the ramifications of burn and confinement conditions for reactor configuration, energy balance, economy, fuel handling, materials problems, and environmentalradiological factors are considered. (auth)

Ribe, F.L.

1974-01-01T23:59:59.000Z

317

The ANgel Problem, Positional Games, . . .  

E-Print Network (OSTI)

This thesis is about combinatorial games—mostly. It is also about graphs, directed graphs and hypergraphs, to a large extent; and it deals with the complexity of certain computational problems from these two areas. We study three different problems that share several of the above aspects, yet, they form three individual subjects and so we treat them independently in three self-contained chapters: The angel-devil game. In the first chapter, we present improved strategies for an infinite game played on an infinite chess board, which has been introduced by Berlekamp, Conway, and Guy [8]. The angel, a chess person who jumps from square to square, tries to escape his opponent, the devil, who intends to strand the angel by placing obstacles on the board. The open question about this game is, whether some angel who is allowed to make sufficiently large but bounded steps in each move, will be able to escape forever. Conway [11] has shown that certain quite natural escape attempts are bound to fail.

Martin Kutz

2004-01-01T23:59:59.000Z

318

Virtual Human Problem Solving Environments  

SciTech Connect

Abstract. Interest in complex integrated digital or virtual human modeling has seen a significant increase over the last decade. Coincident with that increased interest, Oak Ridge National Laboratory (ORNL) initiated the development of a human simulation tool, the Virtual Human. The Virtual Human includes a problem-solving environment (PSE) for implementing the integration of physiological models in different programming languages and connecting physiological function to anatomy. The Virtual Human PSE (VHPSE) provides the computational framework with which to develop the concept of a "Virtual Human." Supporting the framework is a data definition for modeling parameters, PhysioML, a Virtual Human Database (VHDB), and a Web-based graphical user interface (GUI) developed using Java. Following description of the VHPSE, we discuss four example implementations of models within the framework. Further expansion of a human modeling environment was carried out in the Defense Advanced Research Projects Agency Virtual Soldier Project. SCIRun served as the Virtual Soldier problem solving environment (VSPSE). We review and compare specific developments in these projects that have significant potential for the future of Virtual Human modeling and simulation. We conclude with an evaluation of areas of future work that will provide important extensions to the VHPSE and VSPSE and make possible a fully-integrated environment for human anatomical and physiological modeling: the Virtual Human.

Ward, Richard C [ORNL; Pouchard, Line Catherine [ORNL; Munro, Nancy B [ORNL; Fischer, Sarah Kathleen [ORNL

2008-01-01T23:59:59.000Z

319

Supercomputers Tackle Biofuel Production Problems  

NLE Websites -- All DOE Office Websites (Extended Search)

V V E R C O M I N G P L A N T R E C A L C I T R A N C E Supercomputers Tackle BIOFUEL Production Problems If you have ever dealt with an uncooperative, fractious kid or a combative employee, you understand the meaning of "recalcitrance" - over-the-top stubbornness, disobedience, and noncompliance. But recalcitrance is not just a human trait - plants can be recalcitrant, too, and for them it is a matter of survival. Over millions of years, plants have evolved complex structural and chemical mechanisms to ward off assaults on their structural sugars by microbial and animal marauders. So it should be no surprise that when humans attempt to turn plant biomass into biofuels to meet our energy needs, we discover how stubborn and noncompliant our vegetative friends can be. Plant recalcitrance is one of

320

Studies of Nonlinear Problems, I  

NLE Websites -- All DOE Office Websites (Extended Search)

. . . ~0s ALAMOS SCIENTIFIC LABORATORY of the UNIVERSITY OF CALIFORNIA ' . c' . .: . Report written: May 1955 Report distributed: LA-1940 h .1 STUDIES OF NONLINEAR PROBLEMS. I . - 4 . . . ._~ Work done by: E. Fermi J. Pasta S. Ulam M. Tsingou PHYSICS Report written by: E. Fermi J. Pasta S. Ulam DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available document. original . - . * * , . ' ABSTRACT " .*. . A one-dimensional dynamical system of 64 particles with forces be- . . . tween neighbors containing nonlinear terms has been studied on the Los Alamos computer MANIAC I. The nonlinear terms considered are quadratic, cubic, and broken linear types. The results are analyzed into Fourier

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

The 3He Supply Problem  

Science Conference Proceedings (OSTI)

One of the main uses for 3He is in gas proportional counters for neutron detection. Radiation portal monitors deployed for homeland security and non-proliferation use such detectors. Other uses of 3He are for research detectors, commercial instruments, well logging detectors, dilution refrigerators, for targets or cooling in nuclear research, and for basic research in condensed matter physics. The US supply of 3He comes almost entirely from the decay of tritium used in nuclear weapons by the US and Russia. A few other countries contribute a small amount to the world’s 3He supply. Due to the large increase in use of 3He for homeland security, the supply has dwindled, and can no longer meet the demand. This white paper reviews the problems of supply, utilization, and alternatives.

Kouzes, Richard T.

2009-05-01T23:59:59.000Z

322

Integrated Inverter Control for Multiple Electric Machines ...  

Wind Energy; Partners (27 ... control for directing multiple inverters with a single ... 57, 62), which may include a three-phase main ...

323

Implementation of multiple specialization in logic programs  

Science Conference Proceedings (OSTI)

Keywords: abstract interpretation, compile-time analysis, direct manipulation, distributed computing, graphical user interfaces, logic programming, multimedia, multiple program specialization, optimization, reconfiguration, user interface management system

Germán Puebla; Manuel Hermenegildo

1995-06-01T23:59:59.000Z

324

MULTIPLE OXIDANT CHROMIUM LEACHING FROM HANFORD WASTE  

MULTIPLE OXIDANT CHROMIUM LEACHING FROM HANFORD WASTE USDOE Aluminum Chromium Leaching Workshop January 24th, 2007 Jennifer E. Holland, Ph.D. Chairman, President, CEO

325

Competitive solutions for online financial problems  

Science Conference Proceedings (OSTI)

This article surveys results concerning online algorihtms for solving problems related to the management of money and other assets. In particular, the survey focucus us search, replacement, and portfolio selection problems

Ran El-Yaniv

1998-03-01T23:59:59.000Z

326

Approximation algorithms for stochastic scheduling problems  

E-Print Network (OSTI)

In this dissertation we study a broad class of stochastic scheduling problems characterized by the presence of hard deadline constraints. The input to such a problem is a set of jobs, each with an associated value, processing ...

Dean, Brian C. (Brian Christopher), 1975-

2005-01-01T23:59:59.000Z

327

Fermi and the ergodic problem Giovanni Gallavotti  

E-Print Network (OSTI)

the esoteric (quasi) ergodic problem. Consider- ing a `{degrees of freedom system, ` > 2, with Hamilto- nian H

Roma "La Sapienza", Università di

328

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments (OSTI)

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

329

Multiple-energy techniques in industrial computerized tomography  

SciTech Connect

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

330

Holographic superconductor with multiple competing condensates  

E-Print Network (OSTI)

Holography is a novel approach to modeling strongly interacting many-body systems. By reorganizing the quantum many-body problem into an equivalent problem in classical gravity, holography makes it relatively easy, for ...

Grabowska, Dorota M

2010-01-01T23:59:59.000Z

331

Quantum Algorithm to Solve Satisfiability Problems  

E-Print Network (OSTI)

A new quantum algorithm is proposed to solve Satisfiability(SAT) problems by taking advantage of non-unitary transformation in ground state quantum computer. The energy gap scale of the ground state quantum computer is analyzed for 3-bit Exact Cover problems. The time cost of this algorithm on general SAT problems is discussed.

Wenjin Mao

2004-11-29T23:59:59.000Z

332

Approximation of Bayesian Inverse Problems for PDEs  

Science Conference Proceedings (OSTI)

Inverse problems are often ill posed, with solutions that depend sensitively on data. In any numerical approach to the solution of such problems, regularization of some form is needed to counteract the resulting instability. This paper is based on an ... Keywords: Bayesian, Markov chain-Monte Carlo, Stokes flow, data assimilation, inverse problem

S. L. Cotter; M. Dashti; A. M. Stuart

2010-04-01T23:59:59.000Z

333

1 July 1996 `The Hard Problem'  

E-Print Network (OSTI)

1 July 1996 Turning `The Hard Problem' Upside Down & Sideways Piet Hut Roger N. Shepard School. As a first option, we reconsider the `hard problem' of the relation between conscious experience and the physical world by thus turning that problem upside down. We also consider a second option: turning the hard

Hut, Piet

334

PROBLEMS OF FORECAST1 Dmitry KUCHARAVY  

E-Print Network (OSTI)

1 PROBLEMS OF FORECAST1 Dmitry KUCHARAVY dmitry.kucharavy@insa-strasbourg.fr Roland DE GUIO roland for the purpose of Innovative Design. First, a brief analysis of problems for existing forecasting methods of the forecast errors. Second, using a contradiction analysis, a set of problems related to technology forecast

Paris-Sud XI, Université de

335

Hybrid optimization schemes for simulation-based problems.  

Science Conference Proceedings (OSTI)

The inclusion of computer simulations in the study and design of complex engineering systems has created a need for efficient approaches to simulation-based optimization. For example, in water resources management problems, optimization problems regularly consist of objective functions and constraints that rely on output from a PDE-based simulator. Various assumptions can be made to simplify either the objective function or the physical system so that gradient-based methods apply, however the incorporation of realistic objection functions can be accomplished given the availability of derivative-free optimization methods. A wide variety of derivative-free methods exist and each method has both advantages and disadvantages. Therefore, to address such problems, we propose a hybrid approach, which allows the combining of beneficial elements of multiple methods in order to more efficiently search the design space. Specifically, in this paper, we illustrate the capabilities of two novel algorithms; one which hybridizes pattern search optimization with Gaussian Process emulation and the other which hybridizes pattern search and a genetic algorithm. We describe the hybrid methods and give some numerical results for a hydrological application which illustrate that the hybrids find an optimal solution under conditions for which traditional optimal search methods fail.

Fowler, Katie (Clarkson University, NY); Gray, Genetha Anne; Griffin, Joshua D. (SAS Institute, NC)

2010-05-01T23:59:59.000Z

336

Design and Analysis of Flexible Biodiesel Processes with Multiple Feedstocks  

E-Print Network (OSTI)

With the growing interest in converting a wide variety of biomass-based feedstocks to biofuels, there is a need to develop effective procedures for the design and optimization of multi-feedstock biorefineries. The unifying goal of this work is the development of systematic methodologies and procedures for designing flexible multifeedstock biorefineries. This work addresses four problems that constitute building blocks towards achieving the unifying goal of the dissertation. The first problem addresses the design and techno-economic analysis of an integrated system for the production of biodiesel from algal oil. With the sequestration of carbon dioxide from power plant flue gases, algae growth and processing has the potential to reduce greenhouse gas emissions. Algae are a non-food oil feedstock source and various pathways and technologies for obtaining algal oil were investigated. Detailed economic and sensitivity analysis reveal specific scenarios that lead to profitability of algal oil as an alternative feedstock. In the second problem, a new safety metric is introduced and utilized in process design and selection. A case study was solved to assess the potential of producing biodiesel from sewage sludge. The entire process was evaluated based on multiple criteria including cost, technology and safety. The third problem is concerned with incorporating flexibility in the design phase of the development of multi-feedstock biofuel production processes. A mathematical formulation is developed for determining the optimal flexible design for a biorefinery that is to accommodate the use of multiple feedstocks. Various objective functions may be utilized for the flexible plant depending on the purpose of the flexibility analysis and a case study is presented to demonstrate one such objective function. Finally, the development of a systematic procedure for incorporating flexibility and heat integration in the design phase of a flexible feedstock production process is introduced for the fourth problem. A mathematical formulation is developed for use in determining the heat exchange network design. By incorporating the feedstock scenarios under investigation, a mixed integer linear program is generated and a flexible heat exchange network scheme can be developed. The solution provides for a network that can accommodate the heating and cooling demands of the various scenarios while meeting minimum utility targets.

Pokoo-Aikins, Grace Amarachukwu

2010-08-01T23:59:59.000Z

337

Development of multiple robotic fish cooperation platform  

Science Conference Proceedings (OSTI)

This article presents the development of a multiple robotic fish cooperation platform, which is established by employing a group of radio-controlled, multi-link fish-like robots. This work is inspired by the observation from nature that the capability ... Keywords: Multi-agent system, Multiple robot cooperation, Platform, Robotic fish

Jinyan Shao; Long Wang; Junzhi Yu

2007-03-01T23:59:59.000Z

338

External and mental referencing of multiple representations  

Science Conference Proceedings (OSTI)

This article reports on two experimental studies that investigate the impact of integration and external activity on an instructional support method that encourages learners to systematically and interactively integrate multiple representations in the ... Keywords: Cognitive load, Coherence formation, Multimedia, Multiple representations, Structure mapping, Visualizations

Daniel Bodemer; Uwe Faust

2006-01-01T23:59:59.000Z

339

One-dimensional Gromov minimal filling problem  

Science Conference Proceedings (OSTI)

The paper is devoted to a new branch in the theory of one-dimensional variational problems with branching extremals, the investigation of one-dimensional minimal fillings introduced by the authors. On the one hand, this problem is a one-dimensional version of a generalization of Gromov's minimal fillings problem to the case of stratified manifolds. On the other hand, this problem is interesting in itself and also can be considered as a generalization of another classical problem, the Steiner problem on the construction of a shortest network connecting a given set of terminals. Besides the statement of the problem, we discuss several properties of the minimal fillings and state several conjectures. Bibliography: 38 titles.

Ivanov, Alexandr O; Tuzhilin, Alexey A

2012-05-31T23:59:59.000Z

340

A PC-based telemetry system for acquiring and reducing data from multiple PCM streams  

DOE Green Energy (OSTI)

The Solar Energy Research Institute's (SERI) Wind Research Program is using Pulse Code Modulation (PCM) telemetry data-acquisition systems to study horizontal-axis wind turbines. Many PCM systems are combined for use in test installations that require accurate measurements from a variety of different locations. SERI has found them ideal for data-acquisition from multiple wind turbines and meteorological towers in wind parks. A major problem has been in providing the capability to quickly combine and examine incoming data from multiple PCM sources in the field. To solve this problem, SERI has developed a low-cost PC-based PCM telemetry data-reduction system to facilitate quick, in-the-field multiple-channel data analysis. Called the PC-PCM System,'' it consists of two basic components. First, PC-compatible hardware boards are used to decode and combine multiple PCM data streams. Up to four hardware boards can be installed in a single PC, which provides the capability to combine data from four PCM streams directly to PC disk or memory. Each stream can have up to 62 data channels. Second, a software package written for use under DOS was developed to simplify data-acquisition control and management. The software provides a quick, easy-to-use interface between the PC and multiple PCM data streams. Called the Quick-Look Data Management Program,'' it is a comprehensive menu-driven package used to organize, acquire, process, and display information from incoming PCM data streams. The paper describes both hardware and software aspects of the SERI PC-PCM system, concentrating on features that make it useful in an experiment test environment to quickly examine and verify incoming data from multiple PCM streams. Also discussed are problems and techniques associated with PC-based telemetry data-acquisition, processing, and real-time display. 11 refs., 2 figs., 3 tabs.

Simms, D A; Butterfield, C P

1991-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A Modeling and Optimization Approach for Multiple Energy Carrier Power Flow  

E-Print Network (OSTI)

Abstract — This paper presents a general power flow and optimization approach for power systems including multiple energy carriers, such as electricity, natural gas, and district heat. The model is based on a conceptual approach for the inclusion of distributed resources. Couplings between the different energy carriers are regarded explicitly, enabling investigations in power flow and marginal price interactions. Optimal demand, conversion, and transmission of multiple energy carriers within a system is formulated as a combined optimal power flow problem. A numerical example demonstrates how the method can be used for different system studies. I.

Martin Geidl; Göran Andersson

2005-01-01T23:59:59.000Z

342

Identifying potential repositories for radioactive waste: multiple criteria decision analysis and critical infrastructure systems  

E-Print Network (OSTI)

An approach for the analysis and management of multiple criteria critical infrastructure problems is put forth. Nuclear waste management involves complex tradeoffs under uncertainty. Among all waste either generated by nature or human activities, radioactive nuclear waste is the most toxic to human health and difficult to manage: it is known that some nuclear waste material will be radioactive and potentially dangerous for hundreds of thousands of years. This paper discusses the use of multiple criteria decision analysis techniques such as the analytic hierarchy process for recommending sites to be considered as potential repositories for nuclear waste.

Kouichi Taji; Jason K. Levy; Jens Hartmann; Michelle L. Bell; Richard M. Anderson; Benjamin F. Hobbs; Tom Feglar

2005-01-01T23:59:59.000Z

343

Constrained Graph Optimization: Interdiction and Preservation Problems  

SciTech Connect

The maximum flow, shortest path, and maximum matching problems are a set of basic graph problems that are critical in theoretical computer science and applications. Constrained graph optimization, a variation of these basic graph problems involving modification of the underlying graph, is equally important but sometimes significantly harder. In particular, one can explore these optimization problems with additional cost constraints. In the preservation case, the optimizer has a budget to preserve vertices or edges of a graph, preventing them from being deleted. The optimizer wants to find the best set of preserved edges/vertices in which the cost constraints are satisfied and the basic graph problems are optimized. For example, in shortest path preservation, the optimizer wants to find a set of edges/vertices within which the shortest path between two predetermined points is smallest. In interdiction problems, one deletes vertices or edges from the graph with a particular cost in order to impede the basic graph problems as much as possible (for example, delete edges/vertices to maximize the shortest path between two predetermined vertices). Applications of preservation problems include optimal road maintenance, power grid maintenance, and job scheduling, while interdiction problems are related to drug trafficking prevention, network stability assessment, and counterterrorism. Computational hardness results are presented, along with heuristic methods for approximating solutions to the matching interdiction problem. Also, efficient algorithms are presented for special cases of graphs, including on planar graphs. The graphs in many of the listed applications are planar, so these algorithms have important practical implications.

Schild, Aaron V [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

344

Consciousness in Robots: The Hard Problem and Some Less Hard Problems  

E-Print Network (OSTI)

Consciousness in Robots: The Hard Problem and Some Less Hard Problems B. J. MacLennan Department it is also important. Finally we explore the Hard Problem for robots (i.e., whether they can experience sub, intentional- ity, evolutionary psychology, artificial life, autonomous robots, the hard problem I

Tennessee, University of

345

Consciousness in Robots: The Hard Problem and Some Less Hard Problems  

E-Print Network (OSTI)

1 Consciousness in Robots: The Hard Problem and Some Less Hard Problems (Extended Version intrinsic intentionality from consciousness, but argue it is also important. Fi- nally we explore the Hard using "the Hard Problem" to refer to the principal scientific problem of consciousness, which

Tennessee, University of

346

Implementation of exterior complex scaling in B-splines to solve atomic and molecular collision problems  

SciTech Connect

B-spline methods are now well established as widely applicable tools for the evaluation of atomic and molecular continuum states. The mathematical technique of exterior complex scaling has been shown, in a variety of other implementations, to be a powerful method with which to solve atomic and molecular scattering problems, because it allows the correct imposition of continuum boundary conditions without their explicit analytic application. In this paper, an implementation of exterior complex scaling in B-splines is described that can bring the well-developed technology of B-splines to bear on new problems, including multiple ionization and breakup problems, in a straightforward way. The approach is demonstrated for examples involving the continuum motion of nuclei in diatomic molecules as well as electronic continua. For problems involving electrons, a method based on Poisson's equation is presented for computing two-electron integrals over B-splines under exterior complex scaling.

McCurdy, C. William; Martin, Fernando

2003-11-18T23:59:59.000Z

347

From optimal measurement to efficient quantum algorithms for the hidden subgroup problem over semidirect product groups  

E-Print Network (OSTI)

We approach the hidden subgroup problem by performing the so-called pretty good measurement on hidden subgroup states. For various groups that can be expressed as the semidirect product of an abelian group and a cyclic group, we show that the pretty good measurement is optimal and that its probability of success and unitary implementation are closely related to an average-case algebraic problem. By solving this problem, we find efficient quantum algorithms for a number of nonabelian hidden subgroup problems, including some for which no efficient algorithm was previously known: certain metacyclic groups as well as all groups of the form (Z_p)^r X| Z_p for fixed r (including the Heisenberg group, r=2). In particular, our results show that entangled measurements across multiple copies of hidden subgroup states can be useful for efficiently solving the nonabelian HSP.

Dave Bacon; Andrew M. Childs; Wim van Dam

2005-04-11T23:59:59.000Z

348

Implementation of exterior complex scaling in B-splines to solve atomic and molecular collision problems  

SciTech Connect

B-spline methods are now well established as widely applicable tools for the evaluation of atomic and molecular continuum states. The mathematical technique of exterior complex scaling has been shown, in a variety of other implementations, to be a powerful method with which to solve atomic and molecular scattering problems, because it allows the correct imposition of continuum boundary conditions without their explicit analytic application. In this paper, an implementation of exterior complex scaling in B-splines is described that can bring the well-developed technology of B-splines to bear on new problems, including multiple ionization and breakup problems, in a straightforward way. The approach is demonstrated for examples involving the continuum motion of nuclei in diatomic molecules as well as electronic continua. For problems involving electrons, a method based on Poisson's equation is presented for computing two-electron integrals over B-splines under exterior complex scaling.

McCurdy, C. William; Martin, Fernando

2003-11-18T23:59:59.000Z

349

PJM Interconnection (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

350

Computational evaluation of two reactor benchmark problems  

E-Print Network (OSTI)

A neutronic evaluation of two reactor benchmark problems was performed. The benchmark problems describe typical PWR uranium and plutonium (mixed oxide) fueled lattices. WIMSd4m, a neutron transport lattice code, was used to evaluate multigroup macroscopic cross sections for various pincell models in each benchmark problem. DEF3D, a multigroup multidimensional diffusion code, was used to evaluate the uranium-fueled lattice benchmark problem of the American Nuclear Society. TWODANT, a multigroup, two-dimensional transport code, was used to evaluate the mixed oxide lattice benchmark problem from the Nuclear Energy Agency. Both benchmark problems yielded results consistent with preliminary results submitted by other participants in the benchmarking exercises. Some suggestions are made to improve future benchmark evaluations.

Cowan, James Anthony

1998-01-01T23:59:59.000Z

351

Complexity analysis of pipeline mapping problems in distributed heterogeneous networks  

Science Conference Proceedings (OSTI)

Largescale scientific applications require using various system resources to execute complex computing pipelines in distributed networks to support collaborative research. System resources are typically shared in the Internet or over dedicated connections based on their location, availability, capability, and capacity. Optimizing the network performance of computing pipelines in such distributed environments is critical to the success of these applications. We consider two types of largescale distributed applications: (1) interactive applications where a single dataset is sequentially processed along a pipeline; and (2) streaming applications where a series of datasets continuously flow through a pipeline. The computing pipelines of these applications consist of a number of modules executed in a linear order in network environments with heterogeneous resources under different constraints. Our goal is to find an efficient mapping scheme that allocates the modules of a pipeline to network nodes for minimum endtoend delay or maximum frame rate. We formulate the pipeline mappings in distributed environments as optimization problems and categorize them into six classes with different optimization goals and mapping constraints: (1) Minimum Endtoend Delay with No Node Reuse (MEDNNR), (2) Minimum Endtoend Delay with Contiguous Node Reuse (MEDCNR), (3) Minimum Endtoend Delay with Arbitrary Node Reuse (MEDANR), (4) Maximum Frame Rate with No Node Reuse or Share (MFRNNRS), (5) Maximum Frame Rate with Contiguous Node Reuse and Share (MFRCNRS), and (6) Maximum Frame Rate with Arbitrary Node Reuse and Share (MFRANRS). Here, 'contiguous node reuse' means that multiple contiguous modules along the pipeline may run on the same node and 'arbitrary node reuse' imposes no restriction on node reuse. Note that in interactive applications, a node can be reused but its resource is not shared. We prove that MEDANR is polynomially solvable and the rest are NP-complete. MEDANR, where either contiguous or noncontiguous modules in the pipeline can be mapped onto the same node, is essentially the Maximum n-hop Shortest Path problem, and can be solved using a dynamic programming method. In MEDNNR and MFRNNRS, any network node can be used only once, which requires selecting the same number of nodes for onetoone onto mapping. We show its NP-completeness by reducing from the Hamiltonian Path problem. Node reuse is allowed in MEDCNR, MFRCNRS and MFRANRS, which are similar to the Maximum n-hop Shortest Path problem that considers resource sharing. We prove their NP-completeness by reducing from the Disjoint-Connecting-Path Problem and Widest path with the Linear Capacity Constraints problem, respectively.

Lin, Ying [University of Tennessee, Knoxville (UTK); Wu, Qishi [ORNL; Zhu, Mengxia [ORNL; Rao, Nageswara S [ORNL

2009-04-01T23:59:59.000Z

352

Integrating multiple internet directories by instance-based learning  

E-Print Network (OSTI)

Finding desired information on the Internet is becoming increasingly difficult. Internet directories such as Yahoo!, which organize web pages into hierarchical categories, provide one solution to this problem; however, such directories are of limited use because some bias is applied both in the collection and categorization of pages. We propose a method for integrating multiple Internet directories by instance-based learning. Our method provides the mapping of categories in order to transfer documents from one directory to another, instead of simply merging two directories into one. We present herein an effective algorithm for determining similar categories between two directories via a statistical method called the k-statistic. In order to evaluate the proposed method, we conducted experiments using two actual Internet directories, Yahoo! and Google. The results show that the proposed method achieves extensive improvements relative to both the Naive Bayes and Enhanced Naive Bayes approaches, without any text analysis on documents. 1

Ryutaro Ichise; Hiedeaki Takeda; Shinichi Honiden

2003-01-01T23:59:59.000Z

353

Lower bounds for dynamic algebraic problems  

Science Conference Proceedings (OSTI)

We consider dynamic evaluation of algebraic functions (matrix multiplication, determinant, convolution, Fourier transform, etc.) in the model of Reif and Tate; i.e., if f (x1,..., xn)= (y1, ..., ym) ...

Gudmund Skovbjerg Frandsen; Johan P. Hansen; Peter Bro Miltersen

2002-01-01T23:59:59.000Z

354

Hans Bethe and the Global Energy Problems  

E-Print Network (OSTI)

Bethe's view-point on the global energy problems is presented. Bethe claimed that the nuclear power is a necessity in future. Nuclear energetic must be based on breeder reactors. Bethe considered the non-proliferation of nuclear weapons as the main problem of long-range future of nuclear energetics. The solution of this problem he saw in heavy water moderated thermal breeders, using uranium-233, uranium-238 and thorium as a fuel.

Ioffe, B L

2005-01-01T23:59:59.000Z

355

Minimal Achievable Error in the LED problem  

E-Print Network (OSTI)

This paper presents a theoretical model to predict the minimal achievable error, given a noise ratio #, in the LED data set problem. The motivation for developing this theoretical model is to understand and explain some of the results that di#erent systems achieve when they solve the LED problem. Moreover, given a new learning algorithm that solves the LED problem, we can now bound its optimal generalization accuracy.

Xavier Llora; Xavier Llora; David E. Goldberg; David E. Goldberg

2002-01-01T23:59:59.000Z

356

Hans Bethe and the Global Energy Problems  

E-Print Network (OSTI)

Bethe's view-point on the global energy problems is presented. Bethe claimed that the nuclear power is a necessity in future. Nuclear energetic must be based on breeder reactors. Bethe considered the non-proliferation of nuclear weapons as the main problem of long-range future of nuclear energetics. The solution of this problem he saw in heavy water moderated thermal breeders, using uranium-233, uranium-238 and thorium as a fuel.

B. L. Ioffe

2005-07-06T23:59:59.000Z

357

Approche Multicrit\\`ere pour le Probl\\`eme de Ramassage et de Livraison avec Fen\\^etres de Temps \\`a Plusieurs V\\'ehicules  

E-Print Network (OSTI)

Nowadays, the transport goods problem occupies an important place in the economic life of modern societies. The pickup and delivery problem with time windows (PDPTW) is one of the problems which a large part of the research was interested. In this paper, we present a a brief literature review of the VRP and the PDPTW, propose our multicriteria approach based on genetic algorithms which allows minimize the compromise between the vehicles number, the total tardiness time and the total travel cost. And this, by treating the case where a customer can have multiple suppliers and one supplier can have multiple customers

Dridi, Imen Harbaoui; Ksouri, Mekki; Borne, Pierre

2010-01-01T23:59:59.000Z

358

CA Problem is Price - Energy Information Administration  

U.S. Energy Information Administration (EIA)

The basic California problem concerning heavy crude oil is price. With the reported cost of the natural-gas-fueled steam for extracting the crude sometimes being as ...

359

Multi-Standard Quadratic Optimization Problems  

E-Print Network (OSTI)

Abstract. A Standard Quadratic Optimization Problem (StQP) consists ... A multi- standard quadratic optimiza- ..... the two sums in the last row above are identical.

360

The Facility Location Problem with Bernoulli Demands  

E-Print Network (OSTI)

Abstract. In this paper we address a discrete capacitated facility location problem in which ...... The type of instance for FLPBD (1, 2, 3, or 4) as described above.

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Student's algorithm solves real-world problem  

NLE Websites -- All DOE Office Websites (Extended Search)

how to use powerful computers to analyze, model, and solve real-world problems," Jordan Medlock wins supercomputer challenge with his algorithm that automates counting and...

362

On the Transportation Problem with Market Choice  

E-Print Network (OSTI)

Apr 3, 2013 ... Abstract: We study a variant of the classical transportation problem in which suppliers with limited capacities have a choice of which demands ...

363

Optimization Online - The Freight Train Routing Problem  

E-Print Network (OSTI)

Jul 21, 2013 ... Abstract: We consider the following freight train routing problem (FTRP). Given is a transportation network with fixed routes for passenger trains ...

364

Quantum Condensates in Nuclear Matter: Problems  

E-Print Network (OSTI)

In connection with the contribution "Quantum Condensates in Nuclear Matter" some problems are given to become more familiar with the techniques of many-particle physics.

G. Ropke; D. Zablocki

2010-01-11T23:59:59.000Z

365

MIRPLib: A Maritime Inventory Routing Problem Library  

E-Print Network (OSTI)

Aug 28, 2013 ... Abstract: This paper presents a detailed description of a particular class of deterministic single product maritime inventory routing problems ...

366

Brief announcement: Exploring the Consistency Problem Space  

E-Print Network (OSTI)

We study formally the consistency problem, for replicated shared data, in the Action-Constraint framework (ACF). ACF can describe a large range of application semantics and replication protocols, including optimistic and/or partial replication. ACF is used to decompose the consistency problem into simpler sub-problems. Each is easily understood. Existing algorithms from the literature can be explained as combinations of concrete sub-problem implementations. Using ACF, we design a new serialisation algorithm that does not cause aborts and only needs pairwise agreement (not global consensus).

Nishith Krishna; Marc Shapiro; Karthikeyan Bhargavan

2005-01-01T23:59:59.000Z

367

Optimization Online - Stochastic Nash Equilibrium Problems ...  

E-Print Network (OSTI)

May 22, 2009 ... Finally, the model is applied to a stochastic Nash equilibrium problem in the electricity market. Keywords: Stochastic Nash equilibrium, ...

368

Test problems for quasi-satellite packing????  

E-Print Network (OSTI)

1. Test problems for quasi-satellite packing: Cylinders packing with behavior constraints and all the optimal solutions known. Chao Che. School of Mechanical  ...

369

Optimization Online - Minimax Robust Unit Commitment Problem ...  

E-Print Network (OSTI)

Oct 19, 2012... Commitment Problem with Demand and Market Price uncertainty ... to energy providers --- consists of finding an energy production plan in ...

370

Integer Solutions to Cutting Stock Problems  

E-Print Network (OSTI)

ting Stock Problem (CSP) that can be described as follows: find the most ... two integer linear programming models for the one-dimensional CSP differing in.

371

Exact Solution of Emerging Quadratic Assignment Problems  

E-Print Network (OSTI)

National Science Foundation under grant No. DMI-. 0400155. .... Process Allocation Problem of Sofianopoulous ([63] and. [64]), the ...... lower bound is tight

372

Multiple predictor smoothing methods for sensitivity analysis  

Science Conference Proceedings (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric ...

Curtis B. Storlie; Jon C. Helton

2005-12-01T23:59:59.000Z

373

A Bistatic Multiple-Doppler Radar Network  

Science Conference Proceedings (OSTI)

A multiple-Doppler radar network can be constructed using only one, traditional, transmitting pencil-beam radar and one or more passive, low-gain, nontransmitting receivers at remote sites. Radiation scattered from the pencil beam of the ...

Joshua Wurman; Stanley Heckman; Dennis Boccippio

1993-12-01T23:59:59.000Z

374

Multiple signal fault detection using fuzzy logic  

Science Conference Proceedings (OSTI)

In this paper, we describe a multiple Signal Fault Detection system that employs fuzzy logic at two levels of detection: signal segment fault and signal fault. The system involves signal segmentation, feature extraction and fuzzy logic based segment ...

Yi Lu Murphey; Jacob Crossman; ZhiHang Chen

2003-06-01T23:59:59.000Z

375

Engine control system for multiple combustion modes  

Science Conference Proceedings (OSTI)

To reduce the emission by Diesel-engine in railway traction, continuous development and innovation in combustion, sensing net, control method and strategies are required to met the legal requirements. Multiple combustion modes by Diesel engines can reduce ...

D. Bonta; V. Tulbure; Cl. Festila

2008-05-01T23:59:59.000Z

376

Minimizing Errors Associated with Multiplate Radiation Shields  

Science Conference Proceedings (OSTI)

Multiplate radiation shield errors are examined using the following techniques: 1) ray tracing analysis, 2) wind tunnel experiments, 3) numerical flow simulations, and 4) field testing. The authors’ objectives are to develop guidelines for ...

Scott J. Richardson; Fred V. Brock; Steven R. Semmer; Cathy Jirak

1999-11-01T23:59:59.000Z

377

Persistent Multiple Jets and PV Staircase  

Science Conference Proceedings (OSTI)

The persistence of multiple jets is investigated with a quasigeostrophic, two-layer, ?-plane channel model. Linearly unstable normal modes are found to be capable of qualitatively describing the eddy fluxes of the nonlinear model. For a ...

Changhyun Yoo; Sukyoung Lee

2010-07-01T23:59:59.000Z

378

Visualizing Multiple Measures of Forecast Quality  

Science Conference Proceedings (OSTI)

A method for visually representing multiple measures of dichotomous (yes–no) forecast quality (probability of detection, false alarm ratio, bias, and critical success index) in a single diagram is presented. Illustration of the method is provided ...

Paul J. Roebber

2009-04-01T23:59:59.000Z

379

Satellite Remote Sensing of Multiple Cloud Layers  

Science Conference Proceedings (OSTI)

The goals of the current study are threefold: 1) to present a multispectral, multiresolution (MSMR) methodology for analysis of scenes containing multiple cloud layers; 2) to apply the MSMR method to two multilevel cloud scenes recorded by the ...

B.A. Baum; T. Uttal; M. Poellot; T.P. Ackerman; J.M. Alvarez; J. Intrieri; D.O'C. Starr; J. Titlow; V. Tovinkere; E. Clothiaux

1995-12-01T23:59:59.000Z

380

Multiple-description multistage vector quantization  

Science Conference Proceedings (OSTI)

Multistage vector quantization (MSVQ) is a technique for low complexity implementation of high-dimensional quantizers, which has found applications within speech, audio, and image coding. In this paper, a multiple-description MSVQ (MD-MSVQ) targeted ...

Pradeepa Yahampath

2007-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

382

Designing Optimal Spectral Filters for Inverse Problems  

Science Conference Proceedings (OSTI)

Spectral filtering suppresses the amplification of errors when computing solutions to ill-posed inverse problems; however, selecting good regularization parameters is often expensive. In many applications, data are available from calibration experiments. ... Keywords: Bayes risk, Bayesian risk, Tikhonov, Wiener filter, empirical risk, filtering, ill-posed problem, image deblurring, machine learning, optimal design, optimal filtering, regularization, singular value decomposition, stochastic programming

Julianne Chung; Matthias Chung; Dianne P. O'Leary

2011-11-01T23:59:59.000Z

383

A Remark on the Kramers Problem  

E-Print Network (OSTI)

We present new point of view on the old problem, the Kramers problem. The passage from the Fokker-Planck equation to the Smoluchowski equation, including corrections to the Smoluchowski current, is treated through an asymptotic expansion of the solution of the stochastic dynamical equations. The case of an extremely weak force of friction is also discussed

A. Samoletov

2003-11-10T23:59:59.000Z

384

A Remark on the Kramers Problem  

E-Print Network (OSTI)

We present new point of view on the old problem, the Kramers problem. The passage from the Fokker-Planck equation to the Smoluchowski equation, including corrections to the Smoluchowski current, is treated through an asymptotic expansion of the solution of the stochastic dynamical equations. The case of an extremely weak force of friction is also discussed

Samoletov, A

1999-01-01T23:59:59.000Z

385

Iterative Methods for Neutron Transport Eigenvalue Problems  

Science Conference Proceedings (OSTI)

We discuss iterative methods for computing criticality in nuclear reactors. In general this requires the solution of a generalized eigenvalue problem for an unsymmetric integro-differential operator in six independent variables, modeling transport, scattering, ... Keywords: criticality, generalized eigenvalue problem, inexact inverse iteration, neutron transport, symmetry

Fynn Scheben; Ivan G. Graham

2011-09-01T23:59:59.000Z

386

CALIFORNIA ENERGY Small HVAC Problems and Potential  

E-Print Network (OSTI)

CALIFORNIA ENERGY COMMISSION Small HVAC Problems and Potential Savings Reports Summary of Problems of the Integrated Design of Small Commercial HVAC Systems research project. The reports are a result of funding: Productivity and Interior Environments Integrated Design of Large Commercial HVAC Systems Integrated Design

387

Dual extragradient algorithms extended to equilibrium problems  

Science Conference Proceedings (OSTI)

In this paper we propose two iterative schemes for solving equilibrium problems which are called dual extragradient algorithms. In contrast with the primal extragradient methods in Quoc et al. (Optimization 57(6):749---776, 2008) which require ... Keywords: Complexity, Dual extragradient algorithm, Equilibrium problem, Gap function, Nash-Cournot equilibria

Tran D. Quoc; Pham N. Anh; Le D. Muu

2012-01-01T23:59:59.000Z

388

Steiner Forest Orientation Problems Marek Cygan1  

E-Print Network (OSTI)

Steiner Forest Orientation Problems Marek Cygan1 , Guy Kortsarz2 , and Zeev Nutov3 1 Institute with orientation constra- ints. Given a directed graph D and a collection of ordered node pairs P let P[D] = {(u, v) P : D contains an uv-path}. In the Steiner Forest Orientation problem we are given an undirected

Kortsarz, Guy

389

Steiner Forest Orientation Problems Marek Cygan1  

E-Print Network (OSTI)

Steiner Forest Orientation Problems Marek Cygan1 , Guy Kortsarz2 , and Zeev Nutov3 1 IDSIA with orientation constra- ints. Given a directed graph D and a collection of ordered node pairs P let P[D] = {(u, v) P : D contains a uv-path}. In the Steiner Forest Orientation problem we are given an undirected

Kortsarz, Guy

390

The real problem with Merchant transmission  

SciTech Connect

Current regulatory policy distinguishes transmission investments that have primarily economic benefits from those that primarily enhance reliability. But no such dichotomy exists; congestion and reliability are inter-related in complex ways. Thus, solving the transmission investment problem is more complex than ''fixing'' merchant transmission; investment in the grid must be treated as a systems problem. (author)

Blumsack, Seth; Lave, Lester B.; Ilic, Marija

2008-03-15T23:59:59.000Z

391

Iterated local search in nurse rostering problem  

Science Conference Proceedings (OSTI)

This paper presents how to solve a nurse rostering problem over the real datasets of Centre hospitalier régional de Trois-Rivières hospital in Canada. Due to the complexity of this problem with plenty of hard constraints, we propose an ... Keywords: greedy, iterated local search, nurse rostering, tabu search

Sen Ngoc Vu, Minh H. Nhat Nguyen, Le Minh Duc, Chantal Baril, Viviane Gascon, Tien Ba Dinh

2013-12-01T23:59:59.000Z

392

Quantum Algorithms for Graph Problems -- A Survey  

E-Print Network (OSTI)

In this survey we give an overview about important methods to construct quantum algorithms and quantum lower bounds for graph problems. We show how to use these methods, and we give a summary about the quantum complexity of the most important graph problems. At the end of our paper, we give some interesting questions in this research area.

Sebastian Dörn

2006-01-01T23:59:59.000Z

393

The 2-hop spanning tree problem  

Science Conference Proceedings (OSTI)

A spanning tree in a graph G where each node has distance at most 2 from a root node r is called a 2-hop spanning tree. For given edge weights the 2-hop spanning tree problem is to find a minimum weight 2-hop spanning tree. The problem is NP-hard. We ... Keywords: Hop-constrained spanning tree, Integer programming, Polyhedra

Geir Dahl

1998-08-01T23:59:59.000Z

394

Fuel cycle problems in fusion reactors  

SciTech Connect

Fuel cycle problems of fusion reactors evolve around the breeding, recovery, containment, and recycling of tritium. These processes are described, and their implications and alternatives are discussed. Technically, fuel cycle problems are solvable; economically, their feasibility is not yet known. (auth)

Hickman, R.G.

1976-01-13T23:59:59.000Z

395

Joint Source-Channel Coding over a Fading Multiple Access Channel with Partial Channel State Information  

E-Print Network (OSTI)

In this paper we address the problem of transmission of correlated sources over a fast fading multiple access channel (MAC) with partial channel state information available at both the encoders and the decoder. We provide sufficient conditions for transmission with given distortions. Next these conditions are specialized to a Gaussian MAC (GMAC). We provide the optimal power allocation strategy and compare the strategy with various levels of channel state information. Keywords: Fading MAC, Power allocation, Partial channel state information, Correlated sources.

Rajesh, R

2009-01-01T23:59:59.000Z

396

Student's algorithm solves real-world problem  

NLE Websites -- All DOE Office Websites (Extended Search)

Student's algorithm solves real-world problem Student's algorithm solves real-world problem Supercomputing Challenge: student's algorithm solves real-world problem Students learn how to use powerful computers to analyze, model, and solve real-world problems. April 3, 2012 Jordon Medlock of Albuquerque's Manzano High School won the 2012 Lab-sponsored Supercomputing Challenge Jordon Medlock of Albuquerque's Manzano High School won the 2012 Lab-sponsored Supercomputing Challenge by creating a computer algorithm that automates the process of counting and analyzing plaques, substances in the blood such as fat and cholesterol found in persons diagnosed with Alzheimer's disease. Contact Kurt Steinhaus (505) 665-7370 Email "The mission of the Supercomputing Challenge is to teach students how to use powerful computers to analyze, model, and solve real-world problems,"

397

Exactly solvable quantum Sturm-Liouville problems  

Science Conference Proceedings (OSTI)

The harmonic oscillator with time-dependent parameters covers a broad spectrum of physical problems from quantum transport, quantum optics, and quantum information to cosmology. Several methods have been developed to quantize this fundamental system, such as the path integral method, the Lewis-Riesenfeld time invariant method, the evolution operator or dynamical symmetry method, etc. In all these methods, solution of the quantum problem is given in terms of the classical one. However, only few exactly solvable problems of the last one, such as the damped oscillator or the Caldirola-Kanai model, have been treated. The goal of the present paper is to introduce a wide class of exactly solvable quantum models in terms of the Sturm-Liouville problem for classical orthogonal polynomials. This allows us to solve exactly the corresponding quantum parametric oscillators with specific damping and frequency dependence, which can be considered as quantum Sturm-Liouville problems.

Bueyuekasik, Sirin A.; Pashaev, Oktay K. [Department of Mathematics, Izmir Institute of Technology, Urla, Izmir 35430 (Turkey); Tigrak-Ulas, Esra [Astronomy, Kapteyn Institute, University of Groningen, Zernike Gebouw, Landleven, 12 9747 AD Groningen (Netherlands)

2009-07-15T23:59:59.000Z

398

Review: Independent component analysis for multiple-input multiple-output wireless communication systems  

Science Conference Proceedings (OSTI)

Independent component analysis (ICA), an efficient higher order statistics (HOS) based blind source separation technique, has been successfully applied in various fields. In this paper, we provide an overview of the applications of ICA in multiple-input ... Keywords: Frequency-domain equalization (FDE), I/Q imbalance, Independent component analysis (ICA), Multiple-input multiple-output (MIMO), Orthogonal frequency-division multiplexing (OFDM), Peak-to-average power ratio (PAPR)

J. Gao; X. Zhu; A. K. Nandi

2011-04-01T23:59:59.000Z

399

Mapping multiple gas/odor sources in an uncontrolled indoor environment using a Bayesian occupancy grid mapping based method  

Science Conference Proceedings (OSTI)

In this paper we address the problem of autonomously localizing multiple gas/odor sources in an indoor environment without a strong airflow. To do this, a robot iteratively creates an occupancy grid map. The produced map shows the probability each discrete ... Keywords: Gas source localization, Gas source mapping, Indoor monitoring, Occupancy grid mapping

Gabriele Ferri; Michael V. Jakuba; Alessio Mondini; Virgilio Mattoli; Barbara Mazzolai; Dana R. Yoerger; Paolo Dario

2011-11-01T23:59:59.000Z

400

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Experiment on a Modeling of Positive Electrodes with Multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

Experiment on a Modeling of Positive Electrodes with Multiple Active Materials for Lithium-Ion Batteries Title Experiment on a Modeling of Positive Electrodes with Multiple Active...

402

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

403

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

404

New directions in enumerative chess problems  

E-Print Network (OSTI)

Normally a chess problem must have a unique solution, and is deemed unsound even if there are alternatives that differ only in the order in which the same moves are played. In an enumerative chess problem, the set of moves in the solution is (usually) unique but the order is not, and the task is to count the feasible permutations via an isomorphic problem in enumerative combinatorics. Almost all enumerative chess problems have been ``series-movers'', in which one side plays an uninterrupted series of moves, unanswered except possibly for one move by the opponent at the end. This can be convenient for setting up enumeration problems, but we show that other problem genres also lend themselves to composing enumerative problems. Some of the resulting enumerations cannot be shown (or have not yet been shown) in series-movers. This article is based on a presentation given at the banquet in honor of Richard Stanley's 60th birthday, and is dedicated to Stanley on this occasion.

Noam D. Elkies

2005-08-31T23:59:59.000Z

405

Houston, we have a problem...: a survey of actual problems in computer games development  

Science Conference Proceedings (OSTI)

This paper presents a survey of problems found in the development process of electronic games. These problems were collected mainly from game postmortems and specialized litterature on game development, allowing a comparison with respect to well-known ... Keywords: electronic games, game development, postmortems, problems in game development, survey

Fábio Petrillo; Marcelo Pimenta; Francisco Trindade; Carlos Dietrich

2008-03-01T23:59:59.000Z

406

SIENA Customer Problem Statement and Requirements  

Science Conference Proceedings (OSTI)

This document describes the problem domain and functional requirements of the SIENA framework. The software requirements and system architecture of SIENA are specified in separate documents (called SIENA Software Requirement Specification and SIENA Software Architecture, respectively). While currently this version of the document describes the problems and captures the requirements within the Analysis domain (concentrating on finite element models), it is our intention to subsequent y expand this document to describe problems and capture requirements from the Design and Manufacturing domains. In addition, SIENA is designed to be extendible to support and integrate elements from the other domains (see SIENA Software Architecture document).

L. Sauer; R. Clay; C. Adams; H. Walther; B. Allan; R. Mariano; C. Poore; B. Whiteside; B. Boughton; J. Dike; E. Hoffman; R. Hogan; C. LeGall

2000-08-01T23:59:59.000Z

407

Inverse hyperbolic problems and optical black holes  

E-Print Network (OSTI)

In this paper we give a more geometrical formulation of the main theorem in [E1] on the inverse problem for the second order hyperbolic equation of general form with coefficients independent of the time variable. We apply this theorem to the inverse problem for the equation of the propagation of light in a moving medium (the Gordon equation). Then we study the existence of black and white holes for the general hyperbolic and for the Gordon equation and we discuss the impact of this phenomenon on the inverse problems.

Gregory Eskin

2008-09-23T23:59:59.000Z

408

Mitigating PQ Problems in Legacy Data Centers  

Science Conference Proceedings (OSTI)

The conclusions of this presentation are: (1) Problems with PQ in legacy data centers still exist and need to be mitigated; (2) Harmonics generated by non-linear IT load can be lowered by passive, active and hybrid cancellation methods; (3) Harmonic study is necessary to find the best way to treat PQ problems; (4) AHF's and harmonic cancellation transformers proved to be very efficient in mitigating PQ problems; and (5) It is important that IT leaders partner with electrical engineering to appropriate ROI statements, justifying many of these expenditures.

Ilinets, Boris; /SLAC

2011-06-01T23:59:59.000Z

409

Beam profiles from multiple aperture sources  

SciTech Connect

Using a rapidly convergent approximation scheme, formulas are given for beam intensity profiles everywhere. In the first approximation, formulas are found for multiple aperture sources, such as a TFTR design, and integrated power for rectangular plates downstream for Gaussian beamlets. This analysis is duplicated for Lorentzian beamlets which should provide a probable upper bound for off-axis loading as Gaussian beamlets provide a probable lower bound. Formulas for beam intensity profiles are found everywhere. In first approximation, formulas are found for downstream intensity of multiple sources and integrated power for rectangular plates.

Whealton, J.H.

1979-02-01T23:59:59.000Z

410

Laser isotope separation by multiple photon absorption  

DOE Patents (OSTI)

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, in the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1977-01-01T23:59:59.000Z

411

Laser isotope separation by multiple photon absorption  

DOE Patents (OSTI)

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1987-01-01T23:59:59.000Z

412

Modeling the Black Hole Excision Problem  

E-Print Network (OSTI)

We analyze the excision strategy for simulating black holes. The problem is modeled by the propagation of quasi-linear waves in a 1-dimensional spatial region with timelike outer boundary, spacelike inner boundary and a horizon in between. Proofs of well-posed evolution and boundary algorithms for a second differential order treatment of the system are given for the separate pieces underlying the finite difference problem. These are implemented in a numerical code which gives accurate long term simulations of the quasi-linear excision problem. Excitation of long wavelength exponential modes, which are latent in the problem, are suppressed using conservation laws for the discretized system. The techniques are designed to apply directly to recent codes for the Einstein equations based upon the harmonic formulation.

B. Szilagyi; H-O. Kreiss; J. Winicour

2004-12-21T23:59:59.000Z

413

Parallel Displacement Decomposition Solvers for Elasticity Problems  

Science Conference Proceedings (OSTI)

This article describes the displacement decomposition and its benefits for the parallelization of the preconditioned conjugate gradient method for finite element elasticity problems. It deals with both the fixed and variable preconditioning based on ...

Radim Blaheta; Ondrej Jakl; Jiri Stary

2001-09-01T23:59:59.000Z

414

An effective algorithm of motif finding problem  

Science Conference Proceedings (OSTI)

Identification of the short DNA sequence motif, which serves as binding targets for transcription factors, is a fundamental problem in both computer science and molecular biology. Especially, finding the subtle motifs with variable gaps is more challenging. ...

Yong Chen; Guojun Li

2008-05-01T23:59:59.000Z

415

ADAM: a problem-oriented symbol processor  

Science Conference Proceedings (OSTI)

Digital computers have evolved in their own technical environment, and to a large degree independently of the problem environment. Thus it was necessary to have computing centers with staffs of programmers as intermediaries between machines and users. ...

A. P. Mullery; R. F. Schauer; R. Rice

1963-05-01T23:59:59.000Z

416

The Logical Problem of Language Change  

E-Print Network (OSTI)

This paper considers the problem of language change. Linguists must explain not only how languages are learned but also how and why they have evolved along certain trajectories and not others. While the language ...

Niyogi, Partha

1995-12-01T23:59:59.000Z

417

Maximum Empirical Likelihood: Empty Set Problem  

E-Print Network (OSTI)

resulted in the extension of ESP into aESP A feedback fromand therefore may be subject to the empty set problem (ESP).In other words, ESP introduces the possibility that for the

Grendar, Marian; Judge, George G

2009-01-01T23:59:59.000Z

418

Online decision problems with large strategy sets  

E-Print Network (OSTI)

In an online decision problem, an algorithm performs a sequence of trials, each of which involves selecting one element from a fixed set of alternatives (the "strategy set") whose costs vary over time. After T trials, the ...

Kleinberg, Robert David

2005-01-01T23:59:59.000Z

419

Numerical solution methods for differential game problems  

E-Print Network (OSTI)

Differential game theory provides a potential means for the parametric analysis of combat engagement scenarios. To determine its viability for this type of analysis, three frameworks for solving differential game problems ...

Johnson, Philip A. (Philip Arthur)

2009-01-01T23:59:59.000Z

420

The Group Diffie-Hellman Problems  

Science Conference Proceedings (OSTI)

In this paper we study generalizations of the Diffie-Hellman problems recently used to construct cryptographic schemes for practical purposes. The Group Computational and the Group Decisional Diffie-Hellman assumptions not only enable one to construct ...

Emmanuel Bresson; Olivier Chevassut; David Pointcheval

2002-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Detached shock problem and related topics  

Science Conference Proceedings (OSTI)

A finite difference method for solving the Cauchy or initial value problem for elliptic partial differential equations as introduced in (1) and further developed in (2) will be the principal topic discussed here. Involved in this discussion, also, will ...

H. M. Lieberstein

1959-09-01T23:59:59.000Z

422

Nogood Recording for Valued Constraint Satisfaction Problems  

Science Conference Proceedings (OSTI)

In the frame of classical Constraint Satisfaction Problems (CSPs), the backtrack tree search, combined with learning methods, presents a double advantage: for static solving, it improves the search speed by avoiding redundant explorations; for dynamic ...

P. Dago; G. Verfailllie

1996-11-01T23:59:59.000Z

423

Solution to the Dark Energy Problem  

E-Print Network (OSTI)

I present a simple, and hopefully convincing, discussion of a solution to the dark energy problem, which arises because the visible universe is well approximated by a black hole.

Frampton, Paul Howard

2010-01-01T23:59:59.000Z

424

Essays on the principal-expert problem  

E-Print Network (OSTI)

This dissertation studies the problem of motivating an expert to help a principal take a decision. The first chapter examines a principal-expert model in which the only source of friction is that the expert must be induced ...

Zermeño Vallés, Luis G. (Luis Guillermo)

2012-01-01T23:59:59.000Z

425

test problem for packing_sumit  

E-Print Network (OSTI)

Test problems of circles in circle packing with constraints and known the optimal solutions*. Hong-fei Teng1, 2**, Chao Che 2, Yu Chen 1, Yi-shou Wang 1. 1.

426

Exact Algorithms for Combinatorial Optimization Problems with ...  

E-Print Network (OSTI)

Fuchs [10] showed that the problem of finding a minimum-power connected network with ... receiving node, in the latter all nodes except the source are addressed. ..... As an alternative, one could use an algorithm for general submodular ...

427

Nonlinear boundary value problem of magnetic insulation  

E-Print Network (OSTI)

On the basis of generalization of upper and lower solution method to the singular two point boundary value problems, the existence theorem of solutions for the system, which models a process of magnetic insulation in plasma is proved.

A. V. Sinitsyn

2000-09-09T23:59:59.000Z

428

Universal Forces and the Dark Energy Problem  

E-Print Network (OSTI)

The Dark Energy problem is forcing us to re-examine our models and our understanding of relativity and space-time. Here a novel idea of Fundamental Forces is introduced. This allows us to perceive the General Theory of Relativity and Einstein's Equation from a new pesrpective. In addition to providing us with an improved understanding of space and time, it will be shown how it leads to a resolution of the Dark Energy problem.

Afsar Abbas

2007-04-01T23:59:59.000Z

429

Universal Forces and the Dark Energy Problem  

E-Print Network (OSTI)

The Dark Energy problem is forcing us to re-examine our models and our understanding of relativity and space-time. Here a novel idea of Fundamental Forces is introduced. This allows us to perceive the General Theory of Relativity and Einstein's Equation from a new pesrpective. In addition to providing us with an improved understanding of space and time, it will be shown how it leads to a resolution of the Dark Energy problem.

Abbas, Afsar

2007-01-01T23:59:59.000Z

430

Geological problems in radioactive waste isolation  

SciTech Connect

The problem of isolating radioactive wastes from the biosphere presents specialists in the fields of earth sciences with some of the most complicated problems they have ever encountered. This is especially true for high level waste (HLW) which must be isolated in the underground and away from the biosphere for thousands of years. Essentially every country that is generating electricity in nuclear power plants is faced with the problem of isolating the radioactive wastes that are produced. The general consensus is that this can be accomplished by selecting an appropriate geologic setting and carefully designing the rock repository. Much new technology is being developed to solve the problems that have been raised and there is a continuing need to publish the results of new developments for the benefit of all concerned. The 28th International Geologic Congress that was held July 9--19, 1989 in Washington, DC provided an opportunity for earth scientists to gather for detailed discussions on these problems. Workshop W3B on the subject, Geological Problems in Radioactive Waste Isolation -- A World Wide Review'' was organized by Paul A Witherspoon and Ghislain de Marsily and convened July 15--16, 1989 Reports from 19 countries have been gathered for this publication. Individual papers have been cataloged separately.

Witherspoon, P.A. (ed.)

1991-01-01T23:59:59.000Z

431

Geological problems in radioactive waste isolation  

SciTech Connect

The problem of isolating radioactive wastes from the biosphere presents specialists in the fields of earth sciences with some of the most complicated problems they have ever encountered. This is especially true for high level waste (HLW) which must be isolated in the underground and away from the biosphere for thousands of years. Essentially every country that is generating electricity in nuclear power plants is faced with the problem of isolating the radioactive wastes that are produced. The general consensus is that this can be accomplished by selecting an appropriate geologic setting and carefully designing the rock repository. Much new technology is being developed to solve the problems that have been raised and there is a continuing need to publish the results of new developments for the benefit of all concerned. The 28th International Geologic Congress that was held July 9--19, 1989 in Washington, DC provided an opportunity for earth scientists to gather for detailed discussions on these problems. Workshop W3B on the subject, Geological Problems in Radioactive Waste Isolation -- A World Wide Review'' was organized by Paul A Witherspoon and Ghislain de Marsily and convened July 15--16, 1989 Reports from 19 countries have been gathered for this publication. Individual papers have been cataloged separately.

Witherspoon, P.A. (ed.)

1991-01-01T23:59:59.000Z

432

Multiple-user quantum optical communication  

E-Print Network (OSTI)

A fundamental understanding of the information carrying capacity of optical channels requires the signal and physical channel to be modeled quantum mechanically. This thesis considers the problems of distributing multi-party ...

Yen, Brent J., 1977-

2005-01-01T23:59:59.000Z

433

Splitting Methods for Problems with Different Timescales  

Science Conference Proceedings (OSTI)

The time step for the leapfrog scheme for a symmetric hyperbolic system with multiple timescales is limited by the Courant-Friedlichs-Lewy condition based on the fastest speed present. However, in many physical cases, most of the energy is in the ...

G. L. Browning; H-O. Kreiss

1994-11-01T23:59:59.000Z

434

Volumetric stem biomass modelling using multiple regression  

Science Conference Proceedings (OSTI)

This paper presented the development of a simple model for obtaining the stem volume of a tropical tree species, that is, Cinnamomum iners based on the two volumetric equations, namely, the Huber's and Newton's equations. Variables considered during ... Keywords: best model, correlation tests, interactions, multiple regression, selection criteria, stem volume, volumetric equations

Noraini Abdullah; Zainodin Hj. Jubok; J. B. Nigel Jonney

2007-12-01T23:59:59.000Z

435

Clustering local frequency items in multiple databases  

Science Conference Proceedings (OSTI)

Frequent items could be considered as a basic type of patterns in a database. In the context of multiple data sources, most of the global patterns are based on local frequency items. A multi-branch company transacting from different branches often needs ... Keywords: Association, Clustering, Data mining, Measure of association, Multi-database mining

Animesh Adhikari

2013-07-01T23:59:59.000Z

436

Energy and momentum in multiple metric theories  

E-Print Network (OSTI)

We derive the expressions for canonical energy, momentum, and angular momentum for multiple metric theories. We prove that although the metric fields are generally interacting, the total energy is the sum of conserved energies corresponding to each metric. A positive energy theorem is given as a result.

Talshir, Idan

2013-01-01T23:59:59.000Z

437

Steady water waves with multiple critical layers  

E-Print Network (OSTI)

We construct small-amplitude periodic water waves with multiple critical layers. In addition to waves with arbitrarily many critical layers and a single crest in each period, two-dimensional sets of waves with several crests and troughs in each period are found. The setting is that of steady two-dimensional finite-depth gravity water waves with vorticity.

Mats Ehrnström; Joachim Escher; Erik Wahlén

2010-04-29T23:59:59.000Z

438

Energy and momentum in multiple metric theories  

E-Print Network (OSTI)

We derive the expressions for canonical energy, momentum, and angular momentum for multiple metric theories. We prove that although the metric fields are generally interacting, the total energy is the sum of conserved energies corresponding to each metric. A positive energy theorem is given as a result.

Talshir, Idan

2012-01-01T23:59:59.000Z

439

Multiple kernel learning with gaussianity measures  

Science Conference Proceedings (OSTI)

Kernel methods are known to be effective for nonlinear multivariate analysis. One of the main issues in the practical use of kernel methods is the selection of kernel. There have been a lot of studies on kernel selection and kernel learning. Multiple ...

Hideitsu Hino; Nima Reyhani; Noboru Murata

2012-07-01T23:59:59.000Z

440

Multiple Input Microcantilever Sensor with Capacitive Readout  

DOE Green Energy (OSTI)

A surface-micromachined MEMS process has been used to demonstrate multiple-input chemical sensing using selectively coated cantilever arrays. Combined hydrogen and mercury-vapor detection was achieved with a palm-sized, self-powered module with spread-spectrum telemetry reporting.

Britton, C.L., Jr.; Brown, G.M.; Bryan, W.L.; Clonts, L.G.; DePriest, J.C.; Emergy, M.S.; Ericson, M.N.; Hu, Z.; Jones, R.L.; Moore, M.R.; Oden, P.I.; Rochelle, J.M.; Smith, S.F.; Threatt, T.D.; Thundat, T.; Turner, G.W.; Warmack, R.J.; Wintenberg, A.L.

1999-03-11T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

bu.edu/eng26 Managing Multiple,  

E-Print Network (OSTI)

the workload for human operators of semi-autonomous underwater, ground and aerial vehicles in military's computer code can follow, and thus survey a defined space. ROBOTICS #12;27 A persistent surveillance scenario in which multiple agents coordinate to survey a complex scene with areas weighted by importance

Goldberg, Bennett

442

Route to direct multiphoton multiple ionization  

Science Conference Proceedings (OSTI)

We address the concept of direct multiphoton multiple ionization in atoms exposed to intense, short-wavelength radiation and explore the conditions under which such processes dominate over the sequential. Their contribution is shown to be quite robust, even under intensity fluctuations and interaction volume integration, and reasonable agreement with experimental data is also found.

Lambropoulos, P. [Institute of Electronic Structure and Laser, FORTH, P.O. Box 1527, GR-71110 Heraklion (Greece); Department of Physics, University of Crete, P.O. Box 2208, GR-71003 Heraklion, Crete (Greece); Kavli Institute for Theoretical Physics, Santa Barbara, California 93106 (United States); Nikolopoulos, G. M. [Institute of Electronic Structure and Laser, FORTH, P.O. Box 1527, GR-71110 Heraklion (Greece); Kavli Institute for Theoretical Physics, Santa Barbara, California 93106 (United States); Papamihail, K. G. [Department of Physics, University of Crete, P.O. Box 2208, GR-71003 Heraklion, Crete (Greece)

2011-02-15T23:59:59.000Z

443

Frequency Instability Problems in North American Interconnections  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequency Instability Problems in Frequency Instability Problems in North American Interconnections May 1, 2011 DOE/NETL-2011/1473 Frequency Instability Problems in North American Interconnections Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement,

444

Bayesian Uncertainty Quantification for Large Scale Spatial Inverse Problems  

E-Print Network (OSTI)

We considered a Bayesian approach to nonlinear inverse problems in which the unknown quantity is a high dimension spatial field. The Bayesian approach contains a natural mechanism for regularization in the form of prior information, can incorporate information from heterogeneous sources and provides a quantitative assessment of uncertainty in the inverse solution. The Bayesian setting casts the inverse solution as a posterior probability distribution over the model parameters. Karhunen-Lo'eve expansion and Discrete Cosine transform were used for dimension reduction of the random spatial field. Furthermore, we used a hierarchical Bayes model to inject multiscale data in the modeling framework. In this Bayesian framework, we have shown that this inverse problem is well-posed by proving that the posterior measure is Lipschitz continuous with respect to the data in total variation norm. The need for multiple evaluations of the forward model on a high dimension spatial field (e.g. in the context of MCMC) together with the high dimensionality of the posterior, results in many computation challenges. We developed two-stage reversible jump MCMC method which has the ability to screen the bad proposals in the first inexpensive stage. Channelized spatial fields were represented by facies boundaries and variogram-based spatial fields within each facies. Using level-set based approach, the shape of the channel boundaries was updated with dynamic data using a Bayesian hierarchical model where the number of points representing the channel boundaries is assumed to be unknown. Statistical emulators on a large scale spatial field were introduced to avoid the expensive likelihood calculation, which contains the forward simulator, at each iteration of the MCMC step. To build the emulator, the original spatial field was represented by a low dimensional parameterization using Discrete Cosine Transform (DCT), then the Bayesian approach to multivariate adaptive regression spline (BMARS) was used to emulate the simulator. Various numerical results were presented by analyzing simulated as well as real data.

Mondal, Anirban

2011-08-01T23:59:59.000Z

445

Inverse Problems in Classical and Quantum Physics  

E-Print Network (OSTI)

The subject of this thesis is in the area of Applied Mathematics known as Inverse Problems. Inverse problems are those where a set of measured data is analysed in order to get as much information as possible on a model which is assumed to represent a system in the real world. We study two inverse problems in the fields of classical and quantum physics: QCD condensates from tau-decay data and the inverse conductivity problem. We use a functional method which allows us to extract within rather general assumptions phenomenological parameters of QCD (the condensates) from a comparison of the time-like experimental data with asymptotic space-like results from theory. The price to be paid for the generality of assumptions is relatively large errors in the values of the extracted parameters. Although we do not claim that our method is superior to other approaches, we hope that our results lend additional confidence to the numerical results obtained with the help of methods based on QCD sum rules. In this thesis, also two approaches of EIT image reconstruction are proposed. The first is based on reformulating the inverse problem in terms of integral equations. This method uses only a single set of measurements for the reconstruction. The second approach is an algorithm based on linearisation which uses more then one set of measurements. A promising result is that one can qualitatively reconstruct the conductivity inside the cross-section of a human chest. Even though the human volunteer is neither two-dimensional nor circular, such reconstructions can be useful in medical applications: monitoring for lung problems such as accumulating fluid or a collapsed lung and noninvasive monitoring of heart function and blood flow.

Andrea A. Almasy

2009-12-02T23:59:59.000Z

446

Transport Test Problems for Hybrid Methods Development  

Science Conference Proceedings (OSTI)

This report presents 9 test problems to guide testing and development of hybrid calculations for the ADVANTG code at ORNL. These test cases can be used for comparing different types of radiation transport calculations, as well as for guiding the development of variance reduction methods. Cases are drawn primarily from existing or previous calculations with a preference for cases which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22.

Shaver, Mark W.; Miller, Erin A.; Wittman, Richard S.; McDonald, Benjamin S.

2011-12-28T23:59:59.000Z

447

Planning lessens problems, gets benefits of underbalance  

Science Conference Proceedings (OSTI)

A horizontal well planned to be drilled underbalanced required special procedures and countermeasures to prevent formation damage from the mud and downhole tool failures from high temperature. Drilling the well underbalanced helped reduce problems from lost returns and from solids entering and plugging the natural fractures in the Austin chalk. The high bottom hole temperature in the deep Austin chalk in central Louisiana complicates drilling, the mud program, and well design. The first of this two-part series covers the planning, procedures, and well design to alleviate these problems. The next article, which will appear in a future issue, addresses complications during the operation and the equipment used.

Joseph, R.A. [OXY U.S.A. Inc., Houston, TX (United States)

1995-03-20T23:59:59.000Z

448

NP-complete Problems and Physical Reality  

E-Print Network (OSTI)

Can NP-complete problems be solved efficiently in the physical universe? I survey proposals including soap bubbles, protein folding, quantum computing, quantum advice, quantum adiabatic algorithms, quantum-mechanical nonlinearities, hidden variables, relativistic time dilation, analog computing, Malament-Hogarth spacetimes, quantum gravity, closed timelike curves, and "anthropic computing." The section on soap bubbles even includes some "experimental" results. While I do not believe that any of the proposals will let us solve NP-complete problems efficiently, I argue that by studying them, we can learn something not only about computation but also about physics.

Scott Aaronson

2005-02-12T23:59:59.000Z

449

Problems continue to plague electronic ballast industry  

SciTech Connect

Problems of unreliable components, poor quality due to the lack of performance testing standards, and electromagnetic radiation are preventing the electronic ballast industry from achieving the anticipated 40% electricity savings and have led several manufacturers to drop out of the market. The National Association of Lighting Maintenance Contractors (NALMCO) recognized the problem, and the remaining manufacturers plan to reduce the number of components to improve reliability until standards are developed. Many potential users are waiting for a larger selection and better product before they invest in electronic ballasts. A directory of major lighting equipment manufacturers accompanies the article. (DCK)

Warrock, A.M.

1983-10-17T23:59:59.000Z

450

Approximation Algorithm for Multiple-Tool Milling  

E-Print Network (OSTI)

Milling is the mechanical process of removing material from a piece of stock through the use of a rapidly spinning circular milling tool in order to form some desired geometric shape. An important problem in computer-aided design and manufacturing is the automated generation of efficient milling plans for computerized numerically controlled (CNC) milling machines. Among the most common milling problems is simple 2-dimensional pocket milling: cut a given 2-dimensional region down to some constant depth using a given set of milling tools. Most of the research in this area has focused on generating such milling plans assuming that the machine has a tool of a single size. Since modern CNC milling machines typically have access to a number of milling tools of various sizes and the ability to change tools automatically, this raises the important optimization problem of generating efficient milling plans that take advantage of this capability to reduce the total milling time. We consider the ...

Sunil Arya; Siu-Wing Cheng; David M. Mount

1999-01-01T23:59:59.000Z

451

A material's multiple personalities | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

452

Multiple Scattering Measurements in the MICE Experiment  

Science Conference Proceedings (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

453

Evaluation of multiple emission point facilities  

SciTech Connect

In 1970, the New York State Department of Environmental Conservation (NYSDEC) assumed responsibility for the environmental aspect of the state's regulatory program for by-product, source, and special nuclear material. The major objective of this study was to provide consultation to NYSDEC and the US NRC to assist NYSDEC in determining if broad-based licensed facilities with multiple emission points were in compliance with NYCRR Part 380. Under this contract, BNL would evaluate a multiple emission point facility, identified by NYSDEC, as a case study. The review would be a nonbinding evaluation of the facility to determine likely dispersion characteristics, compliance with specified release limits, and implementation of the ALARA philosophy regarding effluent release practices. From the data collected, guidance as to areas of future investigation and the impact of new federal regulations were to be developed. Reported here is the case study for the University of Rochester, Strong Memorial Medical Center and Riverside Campus.

Miltenberger, R.P.; Hull, A.P.; Strachan, S.; Tichler, J.

1988-01-01T23:59:59.000Z

454

Subcritical Measurments Multiple HEU Metal Castings  

SciTech Connect

Experiments with the standard annular highly enriched uranium (HEU) metal castings at the Y-12 National Security Complex were performed in which up to five castings ({approx}90 kg) were assembled in a tightly packed array with minimal spacing between castings. The fission chain multiplication process was initiated by a time-tagged {sup 252}Cf spontaneously fissioning neutron source or by time and directionally tagged neutrons from a small portable DT neutron generator. The prompt neutron time behavior was measured with plastic scintillation detectors sensitive to the fast neutron (>1 MeV) and gamma ray without distinction. These experiments were performed to provide data to benchmark methods for the calculation of the prompt neutron time behavior. Previous measurements with a single casting have been reported. This paper presents the experimental results for multiple castings.

Mihalczo, John T [ORNL; Archer, Daniel E [ORNL; Wright, Michael C [ORNL; Mullens, James Allen [ORNL

2008-01-01T23:59:59.000Z

455

MCNP6 Fission Multiplicity with FMULT Card  

Science Conference Proceedings (OSTI)

With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

Wilcox, Trevor [Los Alamos National Laboratory; Fensin, Michael Lorne [Los Alamos National Laboratory; Hendricks, John S. [Los Alamos National Laboratory; James, Michael R. [Los Alamos National Laboratory; McKinney, Gregg W. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

456

Multiple Use of Existing Transmission Corridors  

Science Conference Proceedings (OSTI)

Multiple use utility corridors can provide significant benefits for the utilities and the public. However, increasing the power flow in the power system can raise compatibility issues with other utilities or systems that share the corridor. This report provides case studies of three common corridors for which compatibility issues were raised as a result of planned increases in power transmission capacity. The case studies review the criteria used to evaluate compatibility and the need for mitigation meas...

2007-12-18T23:59:59.000Z

457

Hiding the Higgs Boson with Multiple Scalars  

E-Print Network (OSTI)

We consider models with multiple Higgs scalar gauge singlets and the resulting restrictions on the parameters from precision electroweak measurements. In these models, the scalar singlets mix with the SU(2) Higgs doublet, potentially leading to reduced couplings of the scalars to fermions and gauge bosons relative to the Standard Model Higgs boson couplings. Such models can make the Higgs sector difficult to explore at the LHC. We emphasize the new physics resulting from the addition of at least two scalar Higgs singlets.

Sally Dawson; Wenbin Yan

2009-04-13T23:59:59.000Z

458

Lamp method and apparatus using multiple reflections  

DOE Patents (OSTI)

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible is disclosed. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture. 20 figs.

MacLennan, D.A.; Turner, B.; Kipling, K.

1999-05-11T23:59:59.000Z

459

Lamp method and apparatus using multiple reflections  

DOE Patents (OSTI)

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture.

MacLennan, Donald A. (Butler, PA); Turner, Brian (Damascus, MD); Kipling, Kent (Gaithersburg, MD)

1999-01-01T23:59:59.000Z

460

Multiple quantum coherence in HYSCORE spectra  

Science Conference Proceedings (OSTI)

The implementation of matched pulses in two-dimensional electron spin echo envelope modulation experiments results in a drastic increase in intensity of peaks representing nuclear multiple quantum coherence. For a spin system consisting of one electron spin S= 1 2 and two nuclei with spin I= 1 2 the nuclear coherence created by the sequence (?/2)???(?/2) is calculated. The transfer amplitudes between different kinds of nuclear coherences of a microwave ? pulse are given. A new matched HYSCORE pulse sequence

Lorenz Liesum; Arthur Schweiger

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

MPACT Fast Neutron Multiplicity System Prototype Development  

Science Conference Proceedings (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

462

On the geomagnetic directional problem: A uniqueness result  

E-Print Network (OSTI)

On the geomagnetic directional problem: A uniqueness result Ralf Kaiser Fakultat fur Mathematik = f D. This problem is related to the problem of reconstructing the geomagnetic #12;eld outside on S. Key words: Nonlinear boundary value problem, geomagnetism, directional problem 35J65, 86A25 1

Kaiser, Ralf

463

Differential nested lattice encoding for consensus problems  

Science Conference Proceedings (OSTI)

In this paper we consider the problem of transmitting quantized data while performing an average consensus algorithm. Average consensus algorithms are protocols to compute the average value of all sensor measurements via near neighbors communications. ... Keywords: average consensus, coding with side information, consensus, nested lattice coding, predictive coding

Mehmet E. Yildiz; Anna Scaglione

2007-04-01T23:59:59.000Z

464

MIRPLib: A Maritime Inventory Routing Problem Library  

E-Print Network (OSTI)

additional vessels can also be chartered on the spot market. A path-flow ...... On the other hand, if regional information is not specified in the problem, one can create an .... For a more detailed analysis of the tradeoff between speed ...... In Energy, Natural Resources and Environmental Economics, pages 427–439. Springer ...

465

Comonotonic approximations for optimal portfolio selection problems  

E-Print Network (OSTI)

We investigate multiperiod portfolio selection problems in a Black & Scholes type market where a basket of 1 riskfree and m risky securities are traded continuously. We look for the optimal allocation of wealth within the class of ’constant mix ’ portfolios. First, we consider the portfolio selection problem of a decision maker who invests money at predetermined points in time in order to obtain a target capital at the end of the time period under consideration. A second problem concerns a decision maker who invests some amount of money (the initial wealth or provision) in order to be able to fullfil a series of future consumptions or payment obligations. Several optimality criteria and their interpretation within Yaari’s dual theory of choice under risk are presented. For both selection problems, we propose accurate approximations based on the concept of comonotonicity, as studied in Dhaene, Denuit, Goovaerts, Kaas & Vyncke (2002 a,b). Our analytical approach avoids simulation, and hence reduces the computing effort drastically. 1

J. Dhaene; S. Vanduffel; M. J. Goovaerts; R. Kaas; D. Vyncke

2005-01-01T23:59:59.000Z

466

Applying Adaptive Evolutionary Algorithms to Hard Problems  

E-Print Network (OSTI)

Applying Adaptive Evolutionary Algorithms to Hard Problems J.I. van Hemert1 jvhemert into two distinct parts. The main theme is adaptive evolutionary algorithms. The rst part covers. The second part mainly consists of the development of a library. Its use is aimed at evolutionary algorithms

Emmerich, Michael

467

Optimum LDPC decoder: a memory architecture problem  

Science Conference Proceedings (OSTI)

This paper addresses a frequently overlooked problem: designing a memory architecture for an LDPC decoder. We analyze the requirements to support the codes defined in the IEEE 802.11n and 802.16e standards. We show a design methodology for a flexible ... Keywords: LDPC codes, low power architectures, memory optimization

Erick Amador; Renaud Pacalet; Vincent Rezard

2009-07-01T23:59:59.000Z

468

Department of Mathematics Analysis Inverse Problems  

E-Print Network (OSTI)

McLaughlin In this talk we report the application of level-set techniques for reservoir facies for data inversion in reservoir modeling, Inverse Problems, 25 (2009), 035006. [4] M. A. Iglesias and D. McLaughlin.40­14.05 Anastasia Cornelio (Modena, Italy) Regularized Nonlinear Least Squares Methods for Hit Position

Hofmann, Bernd

469

Solving Water Quality Problems in the Home  

E-Print Network (OSTI)

If your drinking water comes from a private water well, there are certain procedures you can follow to make sure the water is safe. This publication explains how to get your water tested and, if treatment is necessary, to select the correct treatment equipment. Tables display common water problems and the equipment used to treat them.

Dozier, Monty; McFarland, Mark L.

2004-02-20T23:59:59.000Z

470

Cyclic coordinate descent in hydrothermal nonsmooth problems  

Science Conference Proceedings (OSTI)

In this paper we present an algorithm, inspired by the cyclic coordinate descent method, which allows the solution of hydrothermal optimization problems involving pumped-storage plants. The proof of the convergence of the succession generated by the ... Keywords: Coordinate descent, Hydrothermal coordination, Optimal control, Zangwill's theorem

Luis Bayón; Jose M. Grau; Maria M. Ruiz; Pedro M. Suárez

2012-02-01T23:59:59.000Z

471

An introduction to the dark energy problem  

E-Print Network (OSTI)

In this work we review briefly the origin and history of the cosmological constant and its recent reincarnation in the form of the dark energy component of the universe. We also comment on the fundamental problems associated to its existence and magnitude which require and urgent solution for the sake of the internal consistency of theoretical physics.

Antonio Dobado; Antonio L. Maroto

2008-02-13T23:59:59.000Z

472

Inverse Problems in Classical and Quantum Physics  

E-Print Network (OSTI)

The subject of this thesis is in the area of Applied Mathematics known as Inverse Problems. Inverse problems are those where a set of measured data is analysed in order to get as much information as possible on a model which is assumed to represent a system in the real world. We study two inverse problems in the fields of classical and quantum physics: QCD condensates from tau-decay data and the inverse conductivity problem. We use a functional method which allows us to extract within rather general assumptions phenomenological parameters of QCD (the condensates) from a comparison of the time-like experimental data with asymptotic space-like results from theory. The price to be paid for the generality of assumptions is relatively large errors in the values of the extracted parameters. Although we do not claim that our method is superior to other approaches, we hope that our results lend additional confidence to the numerical results obtained with the help of methods based on QCD sum rules. In this thesis, als...

Almasy, Andrea A

2009-01-01T23:59:59.000Z

473

Identify the Problem: Reduce Waste By  

E-Print Network (OSTI)

Identify the Problem: Reduce Waste By Banning Plastic Bag Use Define Goal: Is the ban the most The 2008 EPA report asserts that while paper waste has remained relatively constant at approximately 31%, plastic waste has been rising from 0.4% in 1960 to the present value at 12%a. San Francisco sets the goal

Iglesia, Enrique

474

Pathwise Optimization for Optimal Stopping Problems  

Science Conference Proceedings (OSTI)

We introduce the pathwise optimization (PO) method, a new convex optimization procedure to produce upper and lower bounds on the optimal value (the “price”) of a high-dimensional optimal stopping problem. The PO method builds on a dual characterization ... Keywords: American options, Bermudian options, dynamic programming, optimal control, optimal stopping

Vijay V. Desai; Vivek F. Farias; Ciamac C. Moallemi

2012-12-01T23:59:59.000Z

475

The stack loading and unloading problem  

Science Conference Proceedings (OSTI)

When piling a set of items in a single stack, one often does not pay attention to the order. Real-life experience suggests that, whenever a specific item is suddenly requested, we need to dig very deep into the stack to extract it. In this paper we investigate ... Keywords: Computational complexity, Dynamic programming, Stowage problems

Federico Malucelli; Stefano Pallottino; Daniele Pretolani

2008-10-01T23:59:59.000Z

476

Problems of future GMDH algorithms development  

Science Conference Proceedings (OSTI)

Theories and algorithms developed for pattern recognition can be applied to random processes forecasting and for solution of all another interpolation type problems of artificial intelligence. For this purpose input data sample in the form of time series ... Keywords: approximation, computer software, error analysis, filtering, neural network

A. G. Ivakhnenko; E. A. Savchenko; G. A. Ivakhnenko

2003-10-01T23:59:59.000Z

477

On the Input Problem for Massive Modularity  

Science Conference Proceedings (OSTI)

Jerry Fodor argues that the massive modularity thesis -- the claim that (human) cognition is wholly served by domain specific, autonomous computational devices, i.e., modules -- is a priori ... Keywords: Fodor, Sperber, input problem, language faculty, massive modularity, theory of mind

J. Collins

2005-02-01T23:59:59.000Z

478

Relay placement problem in smart grid deployment  

Science Conference Proceedings (OSTI)

In this paper, we give an overview of power grid, smart grid, Advanced Metering Infrastructure (AMI), and the deployment cost analysis step by step. The importance between Relay Placement Problem (RPP) and the deployment cost in an AMI system is highlighted. ...

Wei-Lun Wang; Quincy Wu

2010-10-01T23:59:59.000Z

479

Optimization neural network for solving flow problems  

Science Conference Proceedings (OSTI)

This paper describes a neural network for solving flow problems, which are of interest in many areas of application as in fuel, hydro, and electric power scheduling. The neural network consist of two layers: a hidden layer and an output layer. The hidden ...

R. Perfetti

1995-09-01T23:59:59.000Z

480

Handling class imbalance problem in cultural modeling  

Science Conference Proceedings (OSTI)

Cultural modeling is an emergent and promising research area in social computing. It aims at developing behavioral models of groups and analyzing the impact of culture factors on group behavior using computational methods. Machine learning methods in ... Keywords: ROC analysis, class imbalance problem, classification, cultural modeling, sampling

Peng Su; Wenji Mao; Daniel Zeng; Xiaochen Li; Fei-Yue Wang

2009-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Evolution of isotopic composition of reprocessed uranium during the multiple recycling in light water reactors with natural uranium feed  

Science Conference Proceedings (OSTI)

A complex approach based on the consistent modeling of neutron-physics processes and processes of cascade separation of isotopes is applied for analyzing physical problems of the multiple usage of reprocessed uranium in the fuel cycle of light water reactors. A number of scenarios of multiple recycling of reprocessed uranium in light water reactors are considered. In the process, an excess absorption of neutrons by the {sup 236}U isotope is compensated by re-enrichment in the {sup 235}U isotope. Specific consumptions of natural uranium for re-enrichment of the reprocessed uranium depending on the content of the {sup 232}U isotope are obtained.

Smirnov, A. Yu., E-mail: a.y.smirnoff@rambler.ru; Sulaberidze, G. A. [National Research Nuclear University MEPhI (Russian Federation); Alekseev, P. N.; Dudnikov, A. A.; Nevinitsa, V. A., E-mail: neva@dhtp.kiae.ru; Proselkov, V. N.; Chibinyaev, A. V. [Russian Research Centre Kurchatov Institute (Russian Federation)

2012-12-15T23:59:59.000Z

482

Initialization of the Benders master problem using valid inequalities applied to fixed-charge network problems  

Science Conference Proceedings (OSTI)

Network problems concern the selection of arcs in a graph in order to satisfy, at minimum cost, some flow requirements, usually expressed in the form of node-node pair demands. Benders decomposition methods, based on the idea of partitioning of the initial ... Keywords: Benders decomposition, Fixed-charge network problem, Mixed integer programming, Refinery, Scheduling of crude oil, Valid inequalities

Georgios K. D. Saharidis; Maria Boile; Sotiris Theofanis

2011-06-01T23:59:59.000Z

483

Environmental WindowsEnvironmental Windows Real Problems and PotentialReal Problems and Potential  

E-Print Network (OSTI)

Environmental WindowsEnvironmental Windows Real Problems and PotentialReal Problems and Potential Window - a period during which dredging may occur Seasonal Restriction - a period during which dredging and effective management guidelines such as dredging windows..." #12;Schubel et al. 1979. A conceptual framework

US Army Corps of Engineers

484

Linear PDEs and eigenvalue problems corresponding to ergodic stochastic optimization problems on compact manifolds  

E-Print Network (OSTI)

We consider long term average or `ergodic' optimal control poblems with a special structure: Control is exerted in all directions and the control costs are proportional to the square of the norm of the control field with respect to the metric induced by the noise. The long term stochastic dynamics on the manifold will be completely characterized by the long term density $\\rho$ and the long term current density $J$. As such, control problems may be reformulated as variational problems over $\\rho$ and $J$. We discuss several optimization problems: the problem in which both $\\rho$ and $J$ are varied freely, the problem in which $\\rho$ is fixed and the one in which $J$ is fixed. These problems lead to different kinds of operator problems: linear PDEs in the first two cases and a nonlinear PDE in the latter case. These results are obtained through through variational principle using infinite dimensional Lagrange multipliers. In the case where the initial dynamics are reversible we obtain the result that the optimally controlled diffusion is also symmetrizable. The particular case of constraining the dynamics to be reversible of the optimally controlled process leads to a linear eigenvalue problem for the square root of the density process.

Joris Bierkens; Vladimir Y. Chernyak; Michael Chertkov; Hilbert J. Kappen

2013-03-01T23:59:59.000Z

485

Multiple Risks and Mean-Variance Preferences  

Science Conference Proceedings (OSTI)

We analyze comparative static effects under uncertainty when a decision maker has mean-variance preferences and faces a generic, quasi-linear decision problem with both an endogenous risk and a background risk. In terms of mean-variance preferences, ... Keywords: decision analysis, risk

Thomas Eichner; Andreas Wagener

2009-09-01T23:59:59.000Z

486

MARVEL: multiple antenna based relative vehicle localizer  

Science Conference Proceedings (OSTI)

Access to relative location of nearby vehicles on the local roads or on the freeways is useful for providing critical alerts to the drivers, thereby enhancing their driving experience as well as reducing the chances of accidents. The problem of determining ... Keywords: location classification, smartphone, wireless ranging

Dong Li; Tarun Bansal; Zhixue Lu; Prasun Sinha

2012-08-01T23:59:59.000Z

487

Multiple mass-market applications as components  

Science Conference Proceedings (OSTI)

Truly successful models for component-based software development continue to prove elusive. One of the few is the use of operating system, database and similar programs in many systems. We address three related problems in this paper. First, we lack ... Keywords: component-based software, package-oriented programming

David Coppit; Kevin J. Sullivan

2000-06-01T23:59:59.000Z

488

Multiple scattering of light in superdiffusive media  

E-Print Network (OSTI)

Light transport in superdiffusive media of finite size is studied theoretically. The Green's function of the problem is found by discretizing the fractional diffusion equation and employing the eigenfunction expansion method. Truncated step length distributions and complex boundary conditions are considered. As an example we calculate the weak localization effect in the superdiffusion approximation.

Bertolotti, Jacopo; Wiersma, Diederik S

2010-01-01T23:59:59.000Z

489

A Fuzzy Logic Framework for Integrating Multiple Learned Models  

SciTech Connect

The Artificial Intelligence field of Integrating Multiple Learned Models (IMLM) explores ways to combine results from sets of trained programs. Aroclor Interpretation is an ill-conditioned problem in which trained programs must operate in scenarios outside their training ranges because it is intractable to train them completely. Consequently, they fail in ways related to the scenarios. We developed a general-purpose IMLM solution, the Combiner, and applied it to Aroclor Interpretation. The Combiner's first step, Scenario Identification (M), learns rules from very sparse, synthetic training data consisting of results from a suite of trained programs called Methods. S1 produces fuzzy belief weights for each scenario by approximately matching the rules. The Combiner's second step, Aroclor Presence Detection (AP), classifies each of three Aroclors as present or absent in a sample. The third step, Aroclor Quantification (AQ), produces quantitative values for the concentration of each Aroclor in a sample. AP and AQ use automatically learned empirical biases for each of the Methods in each scenario. Through fuzzy logic, AP and AQ combine scenario weights, automatically learned biases for each of the Methods in each scenario, and Methods' results to determine results for a sample.

Bobi Kai Den Hartog

1999-03-01T23:59:59.000Z

490

Real-time multi-mode neutron multiplicity counter  

DOE Patents (OSTI)

Embodiments are directed to a digital data acquisition method that collects data regarding nuclear fission at high rates and performs real-time preprocessing of large volumes of data into directly useable forms for use in a system that performs non-destructive assaying of nuclear material and assemblies for mass and multiplication of special nuclear material (SNM). Pulses from a multi-detector array are fed in parallel to individual inputs that are tied to individual bits in a digital word. Data is collected by loading a word at the individual bit level in parallel, to reduce the latency associated with current shift-register systems. The word is read at regular intervals, all bits simultaneously, with no manipulation. The word is passed to a number of storage locations for subsequent processing, thereby removing the front-end problem of pulse pileup. The word is used simultaneously in several internal processing schemes that assemble the data in a number of more directly useable forms. The detector includes a multi-mode counter that executes a number of different count algorithms in parallel to determine different attributes of the count data.

Rowland, Mark S; Alvarez, Raymond A

2013-02-26T23:59:59.000Z

491

Detection and track of a stochastic target using multiple measurements  

SciTech Connect

The authors are interested in search and tracking problems. In a search, the target might be located among a number of hiding places. Multiple measurements from various locations might be used to determine the likelihood that a particular hiding place is occupied. An obvious example would be a search for a weak radiation source in a building. Search teams might make many measurements with radiation detectors and analyze this data to determine likely areas for further searching. In this paper the authors present a statistical interpretation of the implications of measurements made on a stochastic system, one which makes random state transitions with known average rates. Knowledge of the system is represented as a statistical ensemble of instances which accord with measurements and prior information. The evolution of ratios of populations in this ensemble due to measurements and stochastic transitions may be calculated efficiently. Applied to target detection and tracking, this approach allows a rigorous definition of probability of detection and probability of false alarm and reveals a computationally useful functional relationship between the two. An example of a linear array of simple counters is considered in detail. For it, accurate analytic approximations are developed for detection and tracking statistics as functions of system parameters. A single measure of effectiveness for individual sensors is found which is a major determinant of system performance and which would be useful for initial sensor design.

Cunningham, C.T.

1995-11-01T23:59:59.000Z

492

Interaction of Multiple Distributed Energy Resources in Voltage Regulation  

Science Conference Proceedings (OSTI)

Distributed energy resources (DE) with power electronics (PE) interfaces with the right control are capable of providing reactive power related ancillary services; voltage regulation in particular has drawn much attention. In this paper the problem of how to coordinate control multiple DEs to regulate the local voltage in the distribution system is addressed. A control method for voltage regulation using the DE PE controller is presented and based on the proposed control scheme; the voltage regulation of a distribution system with one DE and two DEs are tested, respectively. The factors affecting the gain parameters of the PE controller are investigated. The simulation results show that the parameters of the controller determine its dynamic response for voltage regulation and the factors associated with the network characteristics, such as locations of DEs and the amount of load, affect the impact range of the controller. The research work presented in this paper can be potentially used for the control system design of Smart Grid or Utility of the Future.

Li, Huijuan [University of Tennessee, Knoxville (UTK); Li, Fangxing [ORNL; Xu, Yan [ORNL; Rizy, D Tom [ORNL; Kueck, John D [ORNL

2008-01-01T23:59:59.000Z

493

An approximative inference method for solving ??SO satisfiability problems  

Science Conference Proceedings (OSTI)

This paper considers the fragment ??SO of second-order logic. Many interesting problems, such as conformant planning, can be naturally expressed as finite domain satisfiability problems of this logic. Such satisfiability problems are computationally ...

Hanne Vlaeminck; Joost Vennekens; Marc Denecker; Maurice Bruynooghe

2012-09-01T23:59:59.000Z

494

The DynCOAA algorithm for dynamic constraint optimization problems  

Science Conference Proceedings (OSTI)

Numerous problems in software coordination, operations research, manufacturing control and others can be transformed in constraint optimization problems (COPs). Moreover, most practical problems change constantly, requiring algorithms that can handle ... Keywords: ACO, distributed constraint optimization, dynamic

Koenraad Mertens; Tom Holvoet; Yolande Berbers

2006-05-01T23:59:59.000Z

495

Simulation Problem Analysis and Research Kernel | Open Energy...  

Open Energy Info (EERE)

Simulation Problem Analysis and Research Kernel Jump to: navigation, search Tool Summary Name: Simulation Problem Analysis and Research Kernel AgencyCompany Organization:...

496

Many small consumers, one growing problem: Achieving energy savings...  

NLE Websites -- All DOE Office Websites (Extended Search)

Many small consumers, one growing problem: Achieving energy savings for electronic equipment operating in low power modes Title Many small consumers, one growing problem: Achieving...

497

The robust vehicle routing problem with time windows  

E-Print Network (OSTI)

Oct 2, 2012 ... Abstract: This paper addresses the robust vehicle routing problem with time windows. We are motivated by a problem that arises in maritime ...

498

PARS II Process Document - Project Phasing (Multiple CD-2 from...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Phasing (Multiple CD-2 from Single CD-1) PARS II Process Document - Project Phasing (Multiple CD-2 from Single CD-1) This document details the process by which projects...

499

design problem | OpenEI Community  

Open Energy Info (EERE)

27 27 Varnish cache server Home Groups Community Central Green Button Applications Developer Utility Rate FRED: FRee Energy Database More Public Groups Private Groups Features Groups Blog posts Content Stream Documents Discussions Polls Q & A Events Notices My stuff Energy blogs 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142229527 Varnish cache server design problem Home Dc's picture Submitted by Dc(15) Member 15 November, 2013 - 13:26 Living Walls ancient building system architect biomimicry building technology cooling cu daylight design problem energy use engineer fred andreas geothermal green building heat transfer heating living walls metabolic adjustment net zero pre-electricity Renewable Energy Solar university of colorado utility grid

500

Green's function of the cosmological thermalization problem  

E-Print Network (OSTI)

Energy release in the early Universe leads to spectral distortions of the cosmic microwave background (CMB) which in the future might allow probing different physical processes in the pre-recombination (z>~10^3) epoch. Depending on the energy injection history, the associated distortion partially thermalizes due to the combined action of Compton scattering, double Compton scattering and Bremsstrahlung emission, a problem that in general is hard to solve. Various analytic approximations describing the resulting distortion exist, however, for small distortions and fixed background cosmology the Green's function of the problem can be computed numerically. Here we show that this approach gives very accurate results for general thermal histories, allowing fast and quasi-exact computation of the spectral distortion given the energy release rate. Our method can thus be used to forecast possible constraints on early-universe physics obtained from future measurements of the CMB spectrum.

Chluba, Jens

2013-01-01T23:59:59.000Z