Powered by Deep Web Technologies
Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network [OSTI]

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

2

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network [OSTI]

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

3

Diagnostics for multiple regression problems  

SciTech Connect (OSTI)

In the last 10 to 15 years there has been much work done in trying to improve linear regression results. Individuals have analyzed the susceptibility of least-squares results to values far removed from the center of the independent variable observations. They have studied the problem of heavy-tailed residuals, and they have studied the problem of collinearity. From these studies have come ridge regression techniques, robust regression techniques, regression on principal components, etc. However, many practitioners view these methods with suspicion (and ignorance), and prefer to continue using the usual least-squares procedures to fit their models, even though their results might not be answering the question they think. In reaction to this, statisticians are spending more time analyzing how the individual observations affect the least squares results. In the last few years approximately 10 papers and one text have appeared that address the problem of how to study the influence of the individual observations. This report is a study of the recent work done in linear regression diagnostics. It is concerned with analyzing the effect of one case at a time, since the methods to analyze this situation are relatively straight-forward and are not prohibitive computationally.

Daly, J.C.

1982-03-01T23:59:59.000Z

4

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

5

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

6

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Saraç; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

7

Multiple scattering approach to one?dimensional potential problems  

Science Journals Connector (OSTI)

By calculating the reflection and transmission coefficients for a square potential barrier in terms of a series of scatterings at step potential discontinuities a multiple scattering approach to potential problems is presented. This approach is applied to WKB potential problems by interpreting the WKB connection formulas in terms of reflection and transmission coefficients at each turning point. An algorithm for the systematic construction of the energy Green’s function is given. The significance of complex coordinate turning points is demonstrated. The equivalence of this approach and that of the Gaussian approximation of the path integral is mentioned briefly.

Arlen Anderson

1989-01-01T23:59:59.000Z

8

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

9

ON THE SYNTHESIS OF OPTIMAL SCHEDULERS IN DISCRETE EVENT CONTROL PROBLEMS WITH MULTIPLE GOALS  

E-Print Network [OSTI]

ON THE SYNTHESIS OF OPTIMAL SCHEDULERS IN DISCRETE EVENT CONTROL PROBLEMS WITH MULTIPLE GOALS HERV to modify if necessary and piece together, or schedule, all of the controllers built in the first step, optimal control, scheduler, traveling salesman problem AMS subject classifications. 93A99, 49-XX, 90C27

Paris-Sud XI, Université de

10

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

11

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

12

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

13

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

14

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

15

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

16

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

17

A tabu search approach to the truck scheduling problem with multiple docks and time windows  

Science Journals Connector (OSTI)

While organizing the cross-docking operations, cross-dock managers are confronted with many decision problems. One of these problems is the truck scheduling problem. This paper presents a truck scheduling problem that is concerned with both inbound and ... Keywords: Cross-docking, Logistics, Tabu search, Truck scheduling

Jan Van Belle; Paul Valckenaers; Greet Vanden Berghe; Dirk Cattrysse

2013-12-01T23:59:59.000Z

18

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

19

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

20

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

22

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

23

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

24

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

25

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

26

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

27

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

28

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

29

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

30

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

31

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

32

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

33

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

34

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

35

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

36

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

37

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

38

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

39

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

40

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

42

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

43

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

44

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

45

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

46

Application of the residue number system to the matrix multiplication problem  

E-Print Network [OSTI]

Global Considerations 96 97 98 98 100 Design Comparison 6. 4. 1 Comparison Structure 101 102 TABLE OF CONTENTS (Continued) 6. d. 2 Time and Area Comparison VII CONCLUSION Page 103 105 7. 1 Contributions 7. 2 Future Research 106 108... to Residue 2. 4 The Chinese Remainder Theorem 2. 5 Sign Representation of a Residue Number 2. 6 Introduction to Matrix Multiplication 15 16 18 19 21 22 2. 7 The Matrix Multiplication Algorithm 2. 7. 1 The Multiply and Add Cell 2. 7. 2 Formulation...

Chard, Gary Franklin

2012-06-07T23:59:59.000Z

47

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

48

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

49

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

50

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

51

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

52

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

53

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

54

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

55

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

56

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

57

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

58

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

59

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

60

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

62

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

63

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

64

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

65

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

66

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

67

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

68

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

69

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

70

U-224: ISC DHCP Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

4: ISC DHCP Multiple Denial of Service Vulnerabilities 4: ISC DHCP Multiple Denial of Service Vulnerabilities U-224: ISC DHCP Multiple Denial of Service Vulnerabilities July 31, 2012 - 7:00am Addthis PROBLEM: ISC DHCP Multiple Denial of Service Vulnerabilities PLATFORM: ISC DHCP before versions DHCP 4.1-ESV-R6 or DHCP 4.2.4-P1 ABSTRACT: ISC DHCP is prone to multiple denial-of-service vulnerabilities. reference LINKS: BIND and DHCP Security Updates Released Bugtraq ID: 54665 Secunia Advisory SA50018 CVE-2012-3571 CVE-2012-3570 CVE-2012-3954 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in ISC DHCP, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error when handling client identifiers can be exploited to trigger an endless loop and prevent the server from processing further client requests

71

V-028: Splunk Multiple Cross-Site Scripting and Denial of Service  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Multiple Cross-Site Scripting and Denial of Service 8: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 - 2:00am Addthis PROBLEM: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities PLATFORM: Splunk versions 4.3.5 and 5.0 ABSTRACT: Splunk is prone to multiple vulnerabilities REFERENCE LINKS: SecurityTracker Alert ID: 1027785 SecurityTracker Alert ID: 1027784 Bugtraq ID: 56581 Secunia Advisory SA51337 Secunia Advisory SA51351 Splunk Vulnerability Descriptions IMPACT ASSESSMENT: Medium DISCUSSION: Splunk is prone to multiple cross-site scripting vulnerabilities and a denial-of-service vulnerability because it fails to properly handle user-supplied input. An attacker may leverage these issues to cause denial-of-service conditions

72

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

42: Mac RealPlayer Multiple Vulnerabilities 42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

73

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection  

Broader source: Energy.gov (indexed) [DOE]

8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML 8: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities January 5, 2011 - 2:28pm Addthis PROBLEM: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities PLATFORM: Mozilla Firefox 3.5.11 - 3.6.10, Mozilla SeaMonkey 2.0 - 2.0.9 Vulnerable Platforms Details ABSTRACT: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the

74

V-070: Apache CouchDB Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Apache CouchDB Multiple Vulnerabilities 0: Apache CouchDB Multiple Vulnerabilities V-070: Apache CouchDB Multiple Vulnerabilities January 16, 2013 - 1:00am Addthis PROBLEM: Apache CouchDB Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.0.4, 1.1.2, and 1.2.1. ABSTRACT: Multiple vulnerabilities have been reported in Apache CouchDB REFERENCE LINKS: Secunia Advisory SA51765 Seclists.org/fulldisclosure/2013/Jan/80 Seclists.org/fulldisclosure/2013/Jan/81 Seclists.org/fulldisclosure/2013/Jan/82 CVE-2012-5641 CVE-2012-5649 CVE-2012-5650 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Apache CouchDB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information. 1) Input passed via the query parameters to browser-based test suite is not

75

U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Mac RealPlayer Multiple Vulnerabilities 2: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in the versions 14.0.7 and prior.

76

V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple 9: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities January 15, 2013 - 4:00am Addthis PROBLEM: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities PLATFORM: BlackBerry Tablet Software versions 2.1.0.1032 and prior. ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS REFERENCE LINKS: BlackBerry Knowledge Base Article ID: KB32019 BlackBerry Knowledge Base Article ID: KB32189 Secunia Advisory SA51830 CVE-2012-1182 CVE-2012-1535 CVE-2012-2034 CVE-2012-2037 CVE-2012-4163 CVE-2012-4165 CVE-2012-4166 CVE-2012-4167 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

77

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

78

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

79

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

80

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

82

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 9: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

83

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

84

V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: IBM TRIRIGA Application Platform Multiple Cross-Site 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are reported in versions 2.1, 2.5, 2.6, and 2.7. REFERENCE LINKS: Secunia Advisory SA54641 CVE-2013-4003 IBM Security Bulletin IMPACT ASSESSMENT: Low DISCUSSION: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks.

85

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

86

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

87

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

88

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

89

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

90

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

91

T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities 29: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities May 24, 2011 - 3:35pm Addthis PROBLEM: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities. PLATFORM: Avaya versions prior to 3.8.5 (confirmed in 3.8.2) ABSTRACT: Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. refrence LINKS: Avaya Security Advisory: ASA-2011-143 Secunia Advisory: SA44062 Securelist ID: SA44062 Vulnerability Report: Avaya WinPDM 3.x IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities in Avaya WinPDM, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error in the Unite Host Router service (UniteHostRouter.exe)

92

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow  

Broader source: Energy.gov (indexed) [DOE]

7: OpenSC Smart Card Serial Number Multiple Buffer Overflow 7: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities January 4, 2011 - 5:52pm Addthis PROBLEM: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities PLATFORM: Vulnerable Platform: OpenSC 0.11.13 ABSTRACT: OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. reference LINKS: SecurityFocus - OpenSC Smart Card Serial CVE-2010-4523 OpenSC: Three stack-based buffer overflows CVE-2010-4523 - Three stack-based buffer overflows

93

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

94

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

95

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

96

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

97

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

98

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

99

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

100

U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities August 6, 2012 - 7:00am Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions 2.0.1.358 and earlier. ABSTRACT: Vulnerabilities in Adobe Flash Player version included with the BlackBerry PlayBook tablet software reference LINKS: BlackBerry Article ID: KB31675 Secunia Advisory SA50164 CVE-2012-0752 CVE-2012-0753 CVE-2012-0754 CVE-2012-0755 CVE-2012-0756 CVE-2012-0767 CVE-2012-0768 CVE-2012-0769 CVE-2012-0773 CVE-2012-0779 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

102

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

103

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

104

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

105

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

106

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

107

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

108

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

109

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

110

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

111

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

112

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

113

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

114

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

115

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

211: IBM iNotes Multiple Vulnerabilities 211: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related to MIME mail is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) An integer overflow error within the DWA9W ActiveX control can be exploited to execute arbitrary code.

116

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

117

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

118

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

119

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security  

Broader source: Energy.gov (indexed) [DOE]

97: Google Chrome Prior to 13.0.782.107 Multiple Security 97: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities August 19, 2011 - 3:02pm Addthis PROBLEM: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. PLATFORM: Cross Platform: Google Chrome Prior to 13.0.782.107: Versions and Vulnerabilities (Details) ABSTRACT: Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. The Chromium Projects Security Overview. reference LINKS: SecurityFocus: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities

120

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

122

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

123

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

124

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

125

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

126

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Broader source: Energy.gov (indexed) [DOE]

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

127

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Broader source: Energy.gov (indexed) [DOE]

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

128

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

129

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

130

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

131

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

132

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

133

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

134

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

135

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

136

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

137

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

138

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

139

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

140

V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities 8: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities May 17, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in BlackBerry Tablet OS PLATFORM: BlackBerry Tablet OS 2.x ABSTRACT: Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53453 Blackberry Security Advisory KB34161 CVE-2012-5248 CVE-2012-5249 CVE-2012-5250 CVE-2012-5251 CVE-2012-5252 CVE-2012-5253 CVE-2012-5254 CVE-2012-5255 CVE-2012-5256 CVE-2012-5257 CVE-2012-5258 CVE-2012-5259 CVE-2012-5260 CVE-2012-5261 CVE-2012-5262 CVE-2012-5263 CVE-2012-5264 CVE-2012-5265

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

142

U-171: DeltaV Products Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71: DeltaV Products Multiple Vulnerabilities 71: DeltaV Products Multiple Vulnerabilities U-171: DeltaV Products Multiple Vulnerabilities May 17, 2012 - 7:00am Addthis PROBLEM: DeltaV Products Multiple Vulnerabilities PLATFORM: DeltaV and DeltaV Workstations versions 9.3.1, 10.3.1, 11.3, and 11.3.1 DeltaV ProEssentials Scientific Graph version 5.0.0.6 ABSTRACT: Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference LINKS: Secunia Advisory SA49210 CVE-2012-1814 CVE-2012-1815 CVE-2012-1816 CVE-2012-1817 CVE-2012-1818 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and

143

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

144

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

145

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Broader source: Energy.gov (indexed) [DOE]

Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli...

146

Common Air Conditioner Problems | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Common Air Conditioner Problems Common Air Conditioner Problems Common Air Conditioner Problems May 30, 2012 - 6:41pm Addthis A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. What does this mean for me? You can eliminate the most common air conditioner problems before hiring an air conditioning technician. You can do some air conditioner maintenance and repair tasks yourself. One of the most common air conditioning problems is improper operation. If your air conditioner is on, be sure to close your home's windows and outside doors. For room air conditioners, isolate the room or a group of connected rooms as much as possible from the rest of your home.

147

Common Air Conditioner Problems | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Common Air Conditioner Problems Common Air Conditioner Problems Common Air Conditioner Problems May 30, 2012 - 6:41pm Addthis A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. A refrigerant leak is one common air conditioning problem. | Photo courtesy of ©iStockphoto/BanksPhotos. What does this mean for me? You can eliminate the most common air conditioner problems before hiring an air conditioning technician. You can do some air conditioner maintenance and repair tasks yourself. One of the most common air conditioning problems is improper operation. If your air conditioner is on, be sure to close your home's windows and outside doors. For room air conditioners, isolate the room or a group of connected rooms as much as possible from the rest of your home.

148

A Heuristic Approach for Big Bucket Production Planning Problems  

E-Print Network [OSTI]

Oct 4, 2006 ... Multi-level production planning problems in which multiple items ..... To satisfy (8)

2006-10-04T23:59:59.000Z

149

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

150

Multiple Motivations Institutional Change Principle | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

151

Complicated problems not yet soluble  

Science Journals Connector (OSTI)

... of truly complicated systems is another matter, but the past few years have seen their surreptitious accumulation. These are the problems with many degrees of freedom in which the multiplicity ...

John Maddox

1989-04-06T23:59:59.000Z

152

Ondskans Problem.  

E-Print Network [OSTI]

?? Ondskans problem är ett gammalt (religions)filosofiskt problem som, i grova drag, frågar om existensen av en allsmäktig, allvetande och allgod Gud är förenlig med… (more)

Rizk, Charbel

2010-01-01T23:59:59.000Z

153

Design of globally optimal multiple description scalar quantizers  

E-Print Network [OSTI]

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

154

Nonparametric estimation of multiple structures with outliers  

E-Print Network [OSTI]

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

155

DOE Selects Two Contractors for Multiple-Award Waste Disposal Contract |  

Broader source: Energy.gov (indexed) [DOE]

Two Contractors for Multiple-Award Waste Disposal Two Contractors for Multiple-Award Waste Disposal Contract DOE Selects Two Contractors for Multiple-Award Waste Disposal Contract April 12, 2013 - 12:00pm Addthis Media Contact Bill Taylor, 803-952-8564 Bill.Taylor@srs.gov Cincinnati - The U.S. Department of Energy (DOE) awarded two fixed price unit rate Indefinite Delivery/Indefinite Quantity (ID/IQ) multiple-award contracts for the permanent disposal of Low-Level Waste (LLW) and Mixed-Low Level Waste (MLLW) today to EnergySolutions, LLC and Waste Control Specialists, LLC. The goal of these contracts is to establish a vehicle that allows DOE sites to place timely, competitive and cost-effective task orders for the permanent disposal of: Class A, B, and C LLW and MLLW 11e(2) byproduct material Technology Enhanced Naturally Occurring Radioactive Material

156

Problem 5  

E-Print Network [OSTI]

Sep 20, 2011 ... which can be hit. (Neglect air resistance.) A panel in the Mathematics Department publishes a challenging problem once a week and invites ...

2011-09-19T23:59:59.000Z

157

Tackling Energy Problems For America's Tribal Nations | Department of  

Broader source: Energy.gov (indexed) [DOE]

Tackling Energy Problems For America's Tribal Nations Tackling Energy Problems For America's Tribal Nations Tackling Energy Problems For America's Tribal Nations June 20, 2012 - 6:07pm Addthis Julia Bovey, First Wind; Tracey LeBeau; Neil Kiely, First Wind; and Bob Springer (NREL) at First Wind's new Rollins project near Lincoln, Maine. Julia Bovey, First Wind; Tracey LeBeau; Neil Kiely, First Wind; and Bob Springer (NREL) at First Wind's new Rollins project near Lincoln, Maine. Tracey A. LeBeau Director, Office of Indian Energy Policy & Programs What Is START? It provides tribal communities with technical assistance to accelerate clean energy project development. Helps to advance energy self-sufficiency. And creates jobs across the country. At the Tribal Nations Conference last December, President Obama noted that

158

Problem 3  

E-Print Network [OSTI]

Sep 4, 2012 ... NOON 9/17/12. CAN YOU GIVE US A SOLUTION? Problem No. 3 (Fall 2012 Series). There are M gold fish and K silver fish in a lake. They are.

2012-09-04T23:59:59.000Z

159

Generalized quantum state discrimination problems  

E-Print Network [OSTI]

We address a broad class of optimization problems of finding quantum measurements, which includes the problems of finding an optimal measurement in the Bayes criterion and a measurement maximizing the average success probability with a fixed rate of inconclusive results. Our approach can deal with any problem in which each of the objective and constraint functions is formulated by the sum of the traces of the multiplication of a Hermitian operator and a detection operator. We first derive dual problems and necessary and sufficient conditions for an optimal measurement. We also consider the minimax version of these problems and provide necessary and sufficient conditions for a minimax solution. Finally, for optimization problem having a certain symmetry, there exists an optimal solution with the same symmetry. Examples are shown to illustrate how our results can be used.

Kenji Nakahira; Kentaro Kato; Tsuyoshi Sasaki Usuda

2015-01-23T23:59:59.000Z

160

U.S. Scientific Team Draws on New Data, Multiple Scientific Methodologies  

Broader source: Energy.gov (indexed) [DOE]

Scientific Team Draws on New Data, Multiple Scientific Scientific Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well U.S. Scientific Team Draws on New Data, Multiple Scientific Methodologies to Reach Updated Estimate of Oil Flows from BP's Well June 15, 2010 - 12:00am Addthis Washington - Based on updated information and scientific assessments, Secretary of Energy Steven Chu, Secretary of the Interior Ken Salazar, and Chair of the National Incident Command's Flow Rate Technical Group (FRTG) Dr. Marcia McNutt (Director of the U.S. Geological Survey) today announced an improved estimate of how much oil is flowing from the leaking BP well. Secretary Chu, Secretary Salazar, and Dr. McNutt convened a group of federal and independent scientists on Monday to discuss new analyses and

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network [OSTI]

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

162

Multipart Homework Problems Over the Web  

Science Journals Connector (OSTI)

WebHW enables the Web?based presentation of science and engineering homework problems. It allows for numeric input an enforced sequence of multiple subparts with multiple steps and “just?in?time” pedagogy. The software is easy to use and students using it perform better on both homework and tests.

2000-01-01T23:59:59.000Z

163

U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

of sensitive information System access Solution: The vendor has issued a fix. The patch is available at Adobe downloads Addthis Related Articles V-066: Adobe AcrobatReader...

164

Analysis of oil-pipeline distribution of multiple products subject to delivery time-windows  

E-Print Network [OSTI]

This dissertation defines the operational problems of, and develops solution methodologies for, a distribution of multiple products into oil pipeline subject to delivery time-windows constraints. A multiple-product oil pipeline is a pipeline system...

Jittamai, Phongchai

2006-04-12T23:59:59.000Z

165

A probabilistic numerical method for optimal multiple switching problem  

E-Print Network [OSTI]

electricity demand, cointegrated fuel prices, carbon price and random outages of power plants. It computes its demand1 . Before the worldwide liberalization of the electricity sector, electric utilities were

166

Extremal Graph Problems, Degenerate Extremal Problems,  

E-Print Network [OSTI]

Extremal Graph Problems, Degenerate Extremal Problems, and Supersaturated Graphs Mikl´os Simonovits´an-type extremal problem. The graphs attaining the maximum will be called extremal and their family will be denoted and multi- ple edges. In 1940, P. Tur´an posed and solved the extremal problem of Kp+1, the complete graph

Simonovits, Miklós

167

Plastics' Color Problem: How a New Device Will Prevent Waste | Department  

Broader source: Energy.gov (indexed) [DOE]

Plastics' Color Problem: How a New Device Will Prevent Waste Plastics' Color Problem: How a New Device Will Prevent Waste Plastics' Color Problem: How a New Device Will Prevent Waste July 22, 2010 - 3:20pm Addthis This is a probe for use in an extruder, similar to the one being developed by Guided Wave of Rancho Cordova, Calif. | Photo courtesy of Guided Wave. This is a probe for use in an extruder, similar to the one being developed by Guided Wave of Rancho Cordova, Calif. | Photo courtesy of Guided Wave. What are the key facts? Commercial plastics made at 752 degrees Fahrenheit and 2,000 psi Conventional plastic color detectors break at high temps and pressures Plastics with incorrect colors, require rerunning production - wasting energy $250,000 DOE grant to support development of improved probe Color can make or break commercial plastics. And commercial or extruded

168

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

169

Computational evaluation of two reactor benchmark problems  

E-Print Network [OSTI]

benchmark problem . . . Fig. 2. Layouts of assembly types B and C Fig. 3. Core diagram/layout for the NEA WPPR benchmark problem . . . Fig. 4. Layouts of UOz and MOX assemblies Fig. 5. Core A effective multiplication factor. Fig. 6. Core B effective... by rod peaking factors for the MOX assembly. . . . . . . . . . . . . Fig. 12 Rod by rod peaking factors for the middle UO. assembly . . . Fig. 13. Rod by rod peaking factors for the corner UO assembly. . . . . . 30 . . . . . 3 1 . . . . . 32 Fig. 14...

Cowan, James Anthony

2012-06-07T23:59:59.000Z

170

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

171

The k-Canadian Travelers Problem with Communication  

Science Journals Connector (OSTI)

From the online point of view, this paper studies a variation of the k-Canadian Traveler Problem (k-CTP), in which there are multiple travelers who communicate with each other to share real-time information. The ...

Huili Zhang; Yinfeng Xu

2011-01-01T23:59:59.000Z

172

The k-Canadian Travelers Problem with communication  

Science Journals Connector (OSTI)

This paper studies a variation of the online k-Canadian Traveler Problem (k-CTP), in which there are multiple travelers who can communicate with each other, to share real-time blockage information of the edges. W...

Huili Zhang; Yinfeng Xu; Lan Qin

2013-08-01T23:59:59.000Z

173

Online optimization problems  

E-Print Network [OSTI]

In this thesis, we study online optimization problems in routing and allocation applications. Online problems are problems where information is revealed incrementally, and decisions must be made before all information is ...

Lu, Xin, Ph. D. Massachusetts Institute of Technology. Operations Research Center

2013-01-01T23:59:59.000Z

174

The k-canadian travelers problem with communication  

Science Journals Connector (OSTI)

From the online point of view, this paper studies a variation of the k-Canadian Traveler Problem (k-CTP), in which there are multiple travelers who communicate with each other to share real-time information. The objective is to find a route from ... Keywords: communication, competitive analysis, multiple travelers, online k-CTP

Huili Zhang; Yinfeng Xu

2011-05-01T23:59:59.000Z

175

Tackling Wicked Problems.  

E-Print Network [OSTI]

?? Wicked problems are a special subset of particularly complex issues that current problem-solving tools fail tofully address. Because of this deficiency, a new tool… (more)

Spaulding, Jeannette

2014-01-01T23:59:59.000Z

176

Review: Wicked Environmental Problems  

E-Print Network [OSTI]

Bauer, ed. Forging Environmentalism (2006). Regardless ofby reading Wicked Environmental Problems as they participateReview: Wicked Environmental Problems: Managing Uncertainty

Jenkins, David

2012-01-01T23:59:59.000Z

177

Joint Routing, Scheduling And Power Control For Multihop Wireless Networks With Multiple Antennas  

E-Print Network [OSTI]

We consider the problem of Joint Routing, Scheduling and Power-control (JRSP) problem for multihop wireless networks (MHWN) with multiple antennas. We extend the problem and a (sub-optimal) heuristic solution method for JRSP in MHWN with single antennas. We present an iterative scheme to calculate link capacities(achievable rates) in the interference environment of the network using SINR model. We then present the algorithm for solving the JRSP problem. This completes a feasible system model for MHWN when nodes have multiple antennas. We show that the gain we achieve by using multiple antennas in the network is linear both in optimal performance as well as heuristic algorithmic performance.

Vangala, Harish; Sharma, Prof Vinod

2011-01-01T23:59:59.000Z

178

Multiple Rankine topping cycles  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

179

Problem 031: Rack Configuration Problem Matthew Grum  

E-Print Network [OSTI]

Problem 031: Rack Configuration Problem Matthew Grum Dept. Computer Science, The University of York/index.html given n models, n types, n racks: nat letting MODEL be 1..n models, TY PE be 1..n types find PLUG: mset(maxsize n racks) of mset of TY PE, MODEL minimising r PLUG Price(r[2]) such that t TY

St Andrews, University of

180

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Multiple System Rate Process  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

182

Multiple sclerosis and interferon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

183

Problems and Challenges Vibrations  

E-Print Network [OSTI]

, but is not necessary for many standard measurements. Mounting all optical components on vibration insulation posts further reduced vibrations. Concerning the suppression of vibration-induced measurement problems58 Problems and Challenges Vibrations: One of the key problems for the bulge tester is vibration

Huston, Dryver R.

184

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

185

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

186

The Inverse Ising Problem  

Science Journals Connector (OSTI)

Abstract The inverse Ising problem consists of taking a set of Ising configurations generated with unknown interaction parameters, and deter- mining reliable estimates for the values of those interaction parameters. The problem first arose in connection with the Monte Carlo renormalization group, and was solved thirty years ago. Recently, there has been renewed interest in the inverse Ising problem due to biological applications. The original solution seems to have been forgotten, as it was rediscovered in a different representation by Aurell and Ekeberg in 2012. In this paper we modify the earlier equations to solve problems that are not translationally invariant.

Joseph Albert; Robert H. Swendsen

2014-01-01T23:59:59.000Z

187

Problems in squeeze cementing  

SciTech Connect (OSTI)

For the past half century, work has been carried out to improve squeeze cementing. During the course of time, new techniques, equipment, cement and cement additives were introduced. Work is still underway to improve squeeze cementing. Basic concept of squeeze cementing, understanding the problems, planning for a squeeze job and then later testing of the job help in achieving the goal. Solutions were offered to some common problems, whereas many regional problems need time to time study and effort. Squeezing long perforations in highly permeable sand has always been a problem, for which some techniques were presented.

Toor, I.A.

1983-03-01T23:59:59.000Z

188

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

189

Traits and Multiple Genes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

190

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

191

Development of a genetic algorithm for multi-objective assembly line balancing using multiple assignment approach  

Science Journals Connector (OSTI)

In this study, a new genetic algorithm is developed for solving multi-objective single-model assembly line balancing problems. The proposed genetic algorithm is called multiple-assignment genetic algorithm (MA...

Tarek Al-Hawari; Marwan Ali; Omar Al-Araidah…

2014-11-01T23:59:59.000Z

192

Market Power in Emissions Trading Markets Ruled by a Multiple Unit Double Auction: Further Experimental Evidence  

Science Journals Connector (OSTI)

We discuss selected methodological problems of previous Double Auction (DA) experiments and test the hypothesis that a Multiple Unit Double Auction (MUDA) is able to prevent market power in an emissions trading m...

Bodo Sturm

2008-08-01T23:59:59.000Z

193

Hadron multiplicities at the LHC  

E-Print Network [OSTI]

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

194

Multiple cross-docks scheduling using two meta-heuristic algorithms  

Science Journals Connector (OSTI)

This paper considers a truck scheduling problem in a multiple cross docks while there is temporary storage in front of the shipping docks. Receiving and shipping trucks can intermittently move in and out of the docks during the time intervals between ... Keywords: Experimental design, Firefly algorithm, Multiple cross-docks scheduling, Simulated annealing

Mansooreh Madani-Isfahani, Reza Tavakkoli-Moghaddam, Bahman Naderi

2014-08-01T23:59:59.000Z

195

Ethics in science: Recombinant problems  

Science Journals Connector (OSTI)

Ethics in science: Recombinant problems ... Dealing with the pedagogical problems of science in ethics and ethics in science. ... Ethics ...

Robert P. McArthur; Wayne L. Smith

1982-01-01T23:59:59.000Z

196

What is Mathematics Mathematical Problems  

E-Print Network [OSTI]

What is Mathematics Mathematical Problems A Personal Example The 3n+1 Problem Open Problems' Company Mathematics Course 2014 Thomas Prellberg Open Problems in Mathematics #12;What is Mathematics Mathematical Problems A Personal Example The 3n+1 Problem Topic Outline 1 What is Mathematics 2 Mathematical

Wright, Francis

197

The Biodiversity Bargaining Problem  

E-Print Network [OSTI]

This paper describes global biodiversity conservation as a co-operative bargaining problem. We model an interdependent ‘technology rich’ North and a ‘gene rich’ South who must co-operate in the biotechnology sector in order to combine their unique...

Gatti, J Rupert J; Goeschl, Timo; Groom, Ben; Swanson, Timothy

2006-03-14T23:59:59.000Z

198

(ADMM): quadratic problems  

E-Print Network [OSTI]

Below we illustrate the MPC problem for the quadruple-tank process [29]. The state ... process x ? R4 corresponds to the water levels of all tanks, measured in

2014-12-11T23:59:59.000Z

199

Drinking Water Problems: Perchlorate  

E-Print Network [OSTI]

in groundwater (Figure 1). Drinking Water Problems: Perchlorate Monty C. Dozier, Assistant Professor and Extension Specialist, Rebecca H. Melton, Extension Assistant, Texas Cooperative Extension, The Texas A&M University System Michael F. Hare, Senior Natural... in groundwater (Figure 1). Drinking Water Problems: Perchlorate Monty C. Dozier, Assistant Professor and Extension Specialist, Rebecca H. Melton, Extension Assistant, Texas Cooperative Extension, The Texas A&M University System Michael F. Hare, Senior Natural...

Dozier, Monty; Melton, Rebecca; Hare, Michael; Porter, Dana; Lesikar, Bruce J.

2005-11-18T23:59:59.000Z

200

Pauli problem in thermodynamics  

E-Print Network [OSTI]

A thermodynamic analogue of the Pauli problem (reconstruction of a wavefunction from the position and momentum distributions) is formulated. The coordinates of a quantum system are replaced by the inverse absolute temperature and other intensive quantities, and the Planck constant is replaced by the Boltzmann constant multiplied by two. A new natural mathematical generalization of the quasithermodynamic fluctuation theory is suggested and sufficient conditions for the existence of asymptotic solutions of the thermodynamic Pauli problem are obtained.

Artur E. Ruuge

2012-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Optimal investment under multiple defaults risk: a BSDE-decomposition approach  

E-Print Network [OSTI]

Optimal investment under multiple defaults risk: a BSDE-decomposition approach Ying JIAO Idris KHARROUBI Huy^en PHAM February 23, 2011 Abstract We study an optimal investment problem under contagion risk characterizes explicitly the value function and optimal strategies to the optimal investment problem. We

Le Pennec, Erwan

202

The k-Canadian Travelers Problem with communication  

Science Journals Connector (OSTI)

This paper studies a variation of the online k-Canadian Traveler Problem (k-CTP), in which there are multiple travelers who can communicate with each other, to share real-time blockage information of the edges. We study two different ... Keywords: Communication, Competitive analysis, Online k-CTP

Huili Zhang; Yinfeng Xu; Lan Qin

2013-08-01T23:59:59.000Z

203

Solar abundance problem  

E-Print Network [OSTI]

The chemical composition of the Sun is among the most important quantities in astrophysics. Solar abundances are needed for modelling stellar atmospheres, stellar structure and evolution, population synthesis, and galaxies as a whole. The solar abundance problem refers to the conflict of observed data from helioseismology and the predictions made by stellar interior models for the Sun, if these models use the newest solar chemical composition obtained with 3D and NLTE models of radiative transfer. Here we take a close look at the problem from observational and theoretical perspective. We also provide a list of possible solutions, which have yet to be tested.

Bergemann, Maria

2014-01-01T23:59:59.000Z

204

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

205

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

206

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

207

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 71–80] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schäffer

1994-01-01T23:59:59.000Z

208

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

209

Space Contamination and Ecological Problems  

Science Journals Connector (OSTI)

The state-of-the-art theories concerning the problem of pollution by space vehicles are discussed and a variety of mechanical problems’ formulations are considered, as applied to environmental problems in space.

V. M. Fomin; A. M. Kharitonov…

1995-01-01T23:59:59.000Z

210

Drinking Water Problems: Corrosion  

E-Print Network [OSTI]

Drinking Water Problems: Corrosion Mark L. McFarland, Tony L. Provin, and Diane E. Boellstorff and fail. Corrosion can cause three types of damage: · The entire metal surface gradually thins and red (Fig. 1). · Deep pits appear that can penetrate pipe or tank walls. This type of corrosion may not add

211

Drinking Water Problems: MTBE  

E-Print Network [OSTI]

Methyl tertiary-butyl ether, a gasoline additive commonly known as MTBE, can contaminate ground water and cause health problems for those exposed to it for a long time. However, filtering devices can remove this and other additives from well water...

Dozier, Monty; Lesikar, Bruce J.

2008-08-28T23:59:59.000Z

212

Licensing Opportunity The Problem  

E-Print Network [OSTI]

Licensing Opportunity The Problem Small scale wind and water turbines (% and noise levels significantly reduced. All in all, the new generator increases the viability of low wind for small scale wind turbines". The Opportunity A significant body of intellectual property (IP) has been

Wirosoetisno, Djoko

213

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

214

Identification and Active Control of Multiple Sources of Sound Work at the Institute of Sound and Vibration Research (ISVR) has led to a sophisticated  

E-Print Network [OSTI]

in acoustics known as multiple- input multiple-output (MIMO) problems. The research findings have attracted, aviation and defence. Engineers at the University of Southampton began work to tackle problems in acoustics Systems, and Philip Nelson, Professor of Acoustics, were appointed as lecturers in ISVR. Since that time

Sóbester, András

215

Federal Energy Management Program: Multiple Motivations Institutional  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

216

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

217

Examining Earth's Ecological Problems  

Science Journals Connector (OSTI)

Examining Earth's Ecological Problems ... In "Earth in the Balance: Ecology and the Human Spirit," Sen. Al Gore (D.-Tenn.) ... However, nearly all of it is a fluffy recapitulation of the doomsday theories of those members of a modern environmentalist group who see nothing but disaster and catastrophe in store for the human race, and perhaps all other forms of life on Earth, unless people change their wicked ways—at once. ...

PHILLIP J. WINGATE

1992-03-09T23:59:59.000Z

218

Multiple smart weapons employment mechanism  

SciTech Connect (OSTI)

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

219

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the system’s elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

220

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network [OSTI]

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Coordination of multiple mobile robots with limited communication range in pursuit of single mobile target in cluttered environment  

Science Journals Connector (OSTI)

This paper addresses the problem of coordinating multiple mobile robots in searching for and capturing a mobile target, with the aim of reducing the ... that the target can be detected by any robot and captured s...

Jianying Zheng; Haibin Yu; Meng Zheng…

2010-11-01T23:59:59.000Z

222

Multiple resonant railgun power supply  

DOE Patents [OSTI]

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

223

Feasible Distributed CSP Models for Scheduling Problems Miguel A. Salido, Adriana Giret  

E-Print Network [OSTI]

Feasible Distributed CSP Models for Scheduling Problems Miguel A. Salido, Adriana Giret Universidad satisfaction problem (DisCSP) is a CSP in which variables and constraints are distributed among multiple are distributed by using our model. Key words: distributed CSP, constraint satisfaction, holonic system, multi

Salido, Miguel Angel

224

Subcritical perturbations of resonant linear problems with sign-changing potential  

E-Print Network [OSTI]

We establish existence and multiplicity theorems for a Dirichlet boundary value problem at resonance, which is a nonlinear subcritical perturbation of a linear eigenvalue problem studied by Cuesta. Our framework includes a sign-changing potential and we locate the solutions by using the Mountain Pass lemma and the Saddle Point theorem.

Teodora Liliana Dinu

2005-11-07T23:59:59.000Z

225

Positive solutions of periodic boundary value problems for impulsive differential equations  

Science Journals Connector (OSTI)

In this paper, we discuss the existence of positive solutions of periodic boundary value problems for second-order impulsive equations. The existence and multiplicity of positive solutions are established and the proof is based upon fixed point theorems ... Keywords: Fixed point theorem, Impulsive differential equations, Periodic boundary value problems, Positive solution

Weibing Wang; Xiangling Fu; Xuxin Yang

2009-10-01T23:59:59.000Z

226

A Valuation Problem  

E-Print Network [OSTI]

problem in valuation work. The Corporation Commission of the State of Oklahoma promulgated, in the spring of 1914, its now rather famous Order No. 774» outlining a standard system of accounts for Gas and Electric Utilities in Oklahoma and calling for a...* In Accompanying Book of Maps and Drawings Appendix K — Set of Maps Showing Distribution System of the Comanche Light and Power Company, as of June 30 , 1914, but with Additions, Bringing Same up to December 31, 1914 — to Accompany Original Cost Report...

Bozell, Harold V.

1915-01-01T23:59:59.000Z

227

VIDEO STREAMING TO MULTIPLE CLIENTS OVER WIRELESS LOCAL AREA Hulya Seferoglu*, Ozgur Gurbuz*, Ozgur Ercetin*, Yucel Altunbasak  

E-Print Network [OSTI]

VIDEO STREAMING TO MULTIPLE CLIENTS OVER WIRELESS LOCAL AREA NETWORKS Hulya Seferoglu*, Ozgur@ece.gatech.edu ABSTRACT This paper considers the problem of multiple video streaming over wireless local area networks. In particular, we propose video streaming techniques to improve the quality of video streams over the link from

Markopoulou, Athina

228

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schäffer

1996-01-01T23:59:59.000Z

229

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

230

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network [OSTI]

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

231

The proliferation of functions: multiple systems playing multiple roles in multiple super systems  

E-Print Network [OSTI]

 played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

232

The optimization problem Genetic Algorithm  

E-Print Network [OSTI]

The optimization problem Genetic Algorithm Particle Swarm Optimization Experimental results for time-power optimization META, October 27-31, 2014 1 / 25 #12;The optimization problem Genetic Algorithm Particle Swarm Optimization Experimental results Conclusions Time and energy optimization Traditionally

Giménez, Domingo

233

Mathematical Problems of Thermoacoustic Tomography  

E-Print Network [OSTI]

formulas to reconstruct the initial perturbation from the observed data. The second problem is the range description. We present the range description of the spherical mean Radon transform, which is an important transform in TAT. The next problem...

Nguyen, Linh V.

2010-10-12T23:59:59.000Z

234

A scalable framework for the solution of stochastic inverse problems using a sparse grid collocation approach  

SciTech Connect (OSTI)

Experimental evidence suggests that the dynamics of many physical phenomena are significantly affected by the underlying uncertainties associated with variations in properties and fluctuations in operating conditions. Recent developments in stochastic analysis have opened the possibility of realistic modeling of such systems in the presence of multiple sources of uncertainties. These advances raise the possibility of solving the corresponding stochastic inverse problem: the problem of designing/estimating the evolution of a system in the presence of multiple sources of uncertainty given limited information. A scalable, parallel methodology for stochastic inverse/design problems is developed in this article. The representation of the underlying uncertainties and the resultant stochastic dependant variables is performed using a sparse grid collocation methodology. A novel stochastic sensitivity method is introduced based on multiple solutions to deterministic sensitivity problems. The stochastic inverse/design problem is transformed to a deterministic optimization problem in a larger-dimensional space that is subsequently solved using deterministic optimization algorithms. The design framework relies entirely on deterministic direct and sensitivity analysis of the continuum systems, thereby significantly enhancing the range of applicability of the framework for the design in the presence of uncertainty of many other systems usually analyzed with legacy codes. Various illustrative examples with multiple sources of uncertainty including inverse heat conduction problems in random heterogeneous media are provided to showcase the developed framework.

Zabaras, N. [Materials Process Design and Control Laboratory, Sibley School of Mechanical and Aerospace Engineering, 101 Frank H.T. Rhodes Hall, Cornell University, Ithaca, NY 14853-3801 (United States)], E-mail: zabaras@cornell.edu; Ganapathysubramanian, B. [Materials Process Design and Control Laboratory, Sibley School of Mechanical and Aerospace Engineering, 101 Frank H.T. Rhodes Hall, Cornell University, Ithaca, NY 14853-3801 (United States)

2008-04-20T23:59:59.000Z

235

Ordered Vertex Removal Subgraph Problems  

E-Print Network [OSTI]

of the vertex removal and subgraph problems are shown to be P­complete. In addition, a natural lex­ icographicOrdered Vertex Removal and Subgraph Problems Ray Greenlaw Department of Computer Science University­8703196. #12; Vertex Removal and Graph Problems Ray Greenlaw Department of Computer Science FR­35

Greenlaw, Ray

236

Cooperative target convergence using multiple agents  

SciTech Connect (OSTI)

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

237

Algae control problems and practices workshop  

SciTech Connect (OSTI)

Western water resources are continuously facing increased demand from industry and the public. Consequently, many of these resources are required to perform multiple tasks as they cycle through the ecosystem. Many plants and animals depend upon these resources for growth. Algae are one group of plants associated with nutrient and energy cycles in many aquatic ecosystems. Although most freshwater algae are microscopic in size, they are capable of dominating and proliferating to the extent that the value of the water resource for both industrial and domestic needs is compromised. There is a great diversity of aquatic environments and systems in which algae may be found, and there are many varieties of treatment and control techniques available to reduce the impacts of excessive growth. This workshop was organized to exchange information about these control problems and practices.

Pryfogle, P.A. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Ghio, G. [Pacific Gas and Electric Co., San Francisco, CA (United States)

1996-09-01T23:59:59.000Z

238

Large Spectral Library Problem  

SciTech Connect (OSTI)

Hyperspectral imaging produces a spectrum or vector at each image pixel. These spectra can be used to identify materials present in the image. In some cases, spectral libraries representing atmospheric chemicals or ground materials are available. The challenge is to determine if any of the library chemicals or materials exist in the hyperspectral image. The number of spectra in these libraries can be very large, far exceeding the number of spectral channels collected in the ¯eld. Suppose an image pixel contains a mixture of p spectra from the library. Is it possible to uniquely identify these p spectra? We address this question in this paper and refer to it as the Large Spectral Library (LSL) problem. We show how to determine if unique identi¯cation is possible for any given library. We also show that if p is small compared to the number of spectral channels, it is very likely that unique identi¯cation is possible. We show that unique identi¯cation becomes less likely as p increases.

Chilton, Lawrence K.; Walsh, Stephen J.

2008-10-03T23:59:59.000Z

239

About an Optimal Visiting Problem  

SciTech Connect (OSTI)

In this paper we are concerned with the optimal control problem consisting in minimizing the time for reaching (visiting) a fixed number of target sets, in particular more than one target. Such a problem is of course reminiscent of the famous 'Traveling Salesman Problem' and brings all its computational difficulties. Our aim is to apply the dynamic programming technique in order to characterize the value function of the problem as the unique viscosity solution of a suitable Hamilton-Jacobi equation. We introduce some 'external' variables, one per target, which keep in memory whether the corresponding target is already visited or not, and we transform the visiting problem in a suitable Mayer problem. This fact allows us to overcome the lacking of the Dynamic Programming Principle for the originary problem. The external variables evolve with a hysteresis law and the Hamilton-Jacobi equation turns out to be discontinuous.

Bagagiolo, Fabio, E-mail: bagagiol@science.unitn.it; Benetton, Michela [Unversita di Trento, Dipartimento di Matematica (Italy)

2012-02-15T23:59:59.000Z

240

Multiple phase estimation in quantum cloning machines  

E-Print Network [OSTI]

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Self-organizing traffic lights at multiple-street intersections  

E-Print Network [OSTI]

Summary: Traffic light coordination is a complex problem. In this paper, we extend previous work on an abstract model of city traffic to allow for multiple street intersections. We test a self-organizing method in our model, showing that it is close to theoretical optima and superior to a traditional method of traffic light coordination. Abstract: The elementary cellular automaton following rule 184 can mimic particles flowing in one direction at a constant speed. This automaton can therefore model highway traffic. In a recent paper, we have incorporated intersections regulated by traffic lights to this model using exclusively elementary cellular automata. In such a paper, however, we only explored a rectangular grid. We now extend our model to more complex scenarios employing an hexagonal grid. This extension shows first that our model can readily incorporate multiple-way intersections and hence simulate complex scenarios. In addition, the current extension allows us to study and evaluate the behavior of two...

Gershenson, Carlos

2011-01-01T23:59:59.000Z

242

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Löddesöl

1932-07-22T23:59:59.000Z

243

Chapter 3, Section 8, Problem #25  

E-Print Network [OSTI]

The following MATLAB code will generate a graph of this solution curve: ... then MATLAB will try to do standard matrix multiplication and 'division' (multiplication ...

244

Recirculation in multiple wave conversions  

SciTech Connect (OSTI)

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

245

SUFFICIENT WEIGHTED COMPLEMENTARITY PROBLEMS 1 ...  

E-Print Network [OSTI]

SIAM J. Optim., 17(3):871–890,. 2006. [13] F. A. Potra. Corrector-predictor methods for monontone linear complementarity problems in a wide neighborhood of ...

2014-10-02T23:59:59.000Z

246

Environmental lead: insidious health problem  

Science Journals Connector (OSTI)

Environmental lead: insidious health problem ... Several federal programs aim to reduce human exposure to lead, but which source is most dangerous is subject of growing controversy ...

LOIS R. EMBER; C&EN; WASHINGTON

1980-06-23T23:59:59.000Z

247

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

248

Computational problems algorithmsComputational problems, algorithms, runtime, hardness  

E-Print Network [OSTI]

we model set cover as an integer program? · See examples Algorithms and runtime · We would see (a brief introduction to theoretical computer science) slides by Vincent Conitzer Set Cover (a a T of size at most k will suffice Set Cover (a computational problem) · One instance of the set cover problem

Allan, Vicki H.

249

The "Orbitz Problem" Problem found on Web sites of  

E-Print Network [OSTI]

The Interactive Web · The Web is increasingly "dark matter" · Numerous Web APIs: ­ The Common Gateway Interface#12;#12;#12;The "Orbitz Problem" Problem found on Web sites of · Microsoft / Apple for high school Web programmers! Programming the Interactive Web Shriram Krishnamurthi Brown University

De Volder, Kris

250

Solving Multiple Classes of Problems in Parallel with MATLAB*P  

E-Print Network [OSTI]

MATLAB [7] is one of the most widely used mathematical computing environments in technical computing. It is an interactive environment that provides high performance computational routines and an easy-to-use, C-like scripting ...

Choy, Ron

251

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect (OSTI)

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

252

Statistical inference problems for (nonlinear) Stochastic PDEs | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Statistical inference problems for (nonlinear) Stochastic PDEs Statistical inference problems for (nonlinear) Stochastic PDEs Event Sponsor: Mathematics and Computing Science - LANS Seminar Start Date: Dec 11 2013 - 3:00pm Building/Room: Building 240/Room 1406-1407 Location: Argonne National Laboratory Speaker(s): Igor Cialenco Speaker(s) Title: Illinois Institute of Technology Host: Jie Chen Event Website: http://www.mcs.anl.gov/research/LANS/events/listn/detail.php?id=2241 We consider a parameter estimation problem to determine the drift coefficient for a large class of parabolic Stochastic PDEs driven by additive or multiplicative noise. In the first part of the talk, we derive several different classes of estimators based on the first N Fourier modes of a sample path observed continuously on a finite time interval. Second

253

PCx: Optimization Problem Solver | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PCx: Optimization Problem Solver PCx: Optimization Problem Solver PCx is a highly efficient code for solving linear programming optimization problems. In addition to being a useful...

254

Optimization problems with value function objectives  

E-Print Network [OSTI]

max programming problem and the bilevel optimization problem. In this paper, we ... 1. Introduction. An optimization problem with value function objective is a.

2011-11-01T23:59:59.000Z

255

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks  

E-Print Network [OSTI]

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks ad hoc networks. In this paper, we study the important problem of joint routing and server selection for MD video in ad hoc networks. We take a cross-layer approach to formulate the task as a combinatorial

Hou, Y. Thomas

256

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision  

E-Print Network [OSTI]

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision system reliability has become an area of increasing importance. Medical system threats, which include system operation. To address these problems, we build upon our previous threat cataloging methodology

Thornton, Mitchell

257

Automatic noise estimation in images using local statistics. Additive and multiplicative cases  

Science Journals Connector (OSTI)

In this paper, we focus on the problem of automatic noise parameter estimation for additive and multiplicative models and propose a simple and novel method to this end. Specifically we show that if the image to work with has a sufficiently great amount ... Keywords: Gaussian noise, Local statistics, Mode, Noise estimation, Restoration

Santiago Aja-Fernández; Gonzalo Vegas-Sánchez-Ferrero; Marcos Martín-Fernández; Carlos Alberola-López

2009-05-01T23:59:59.000Z

258

Indian Archæology and Indian Problems  

Science Journals Connector (OSTI)

... to his audience in a selection of the problems and possibilities which the study of Indian archæology presents to his mind as calling urgently for investigation—problems no less fascinating in ... out in the triple function of conservation, excavation and publication, he went on to point out with the greatest emphasis that no further advance on sound lines is possible until ...

1939-12-16T23:59:59.000Z

259

Lecture outline Basic inventory problems  

E-Print Network [OSTI]

Lecture outline Basic inventory problems The economic order quantity An inventory game.B. Powell 1 #12;© 2013 W.B. Powell 2 Basic inventory problems Examples: » Products: · Customers consume). · Rainfall randomly replenishes reservoirs. · Release water from dam to maintain level. » Oil being stored

Powell, Warren B.

260

Solving the Nuclear Waste Problem  

Science Journals Connector (OSTI)

Solving the Nuclear Waste Problem ... Of the many problems that beset the nuclear power industry, none has proved as perplexing as taking out the trash. ... Nuclear waste will remain a potential threat to man and the environment for as long as 10,000 years. ...

1988-09-12T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

262

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

263

Spreadsheet modelling for solving combinatorial problems: The vendor selection problem  

E-Print Network [OSTI]

Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers, planners and schedulers can work with them in developing solid and practical Do-It-Yourself Decision Support Systems. Small and Medium size organizations, can apply OR methodologies without the presence of specialized software and trained personnel, which in many cases cannot afford anyway. This paper examines an efficient approach in solving combinatorial programming problems with the use of spreadsheets. A practical application, which demonstrates the approach, concerns the development of a spreadsheet-based DSS for the Multi Item Procurement Problem with Fixed Vendor Cost. The DSS has been build using exclusively standard spreadsheet feature and can solve real problems of substantial size. The benefits and limitations of the approach are also discussed.

Ipsilandis, Pandelis G

2008-01-01T23:59:59.000Z

264

Multiple acousto-optic q-switch  

DOE Patents [OSTI]

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

265

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network [OSTI]

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

266

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

267

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

268

A hybrid artificial neural network: computer simulation approach for scheduling a flow shop with multiple processors  

Science Journals Connector (OSTI)

Depending on the characteristics of the manufacturing system and production objectives, dispatching rules have different efficiencies. In this regard, a multiattribute combinatorial dispatching (MACD) decision problem for scheduling a flow shop with multiple processors environment is presented in this paper. We propose a hybrid artificial neural network (ANN) simulation approach as a valid and superior alternative for solving the MACD decision problem. ANNs are one of the commonly used meta-heuristics and are a proven tool for solving complex optimisation problems. The hybrid approach is capable of modelling a non-linear and stochastic problem. Feed forward, multilayered neural network meta-models were trained through the back propagation learning algorithm to provide a complex MACD problem. The solution quality is illustrated by a case study from a multilayer ceramic capacitor manufacturing plant. The manufacturing lead times produced by the hybrid ANN simulation model turned out to be as valid and superior to the conventional simulation model.

Ali Azadeh; Arash Naghavi; Mohsen Moghaddam

2011-01-01T23:59:59.000Z

269

Strong CP problem and parity  

Science Journals Connector (OSTI)

We analyze the possibility of solving the strong CP problem by imposing parity symmetry. Some simple realizations of such a scheme are given and interesting phenomenological and cosmological consequences are discussed.

S. M. Barr; Darwin Chang; Goran Senjanovi?

1991-11-11T23:59:59.000Z

270

Mosquito Problems after a Storm  

E-Print Network [OSTI]

Areas flooded after a severe storm are prone to mosquito problems. Several mosquito species are a danger to humans because of the diseases they transmit. This publication explains the symptoms of dengue fever, West Nile virus and St. Louis...

Johnsen, Mark

2008-08-05T23:59:59.000Z

271

SOME COMPUTATIONAL PROBLEMS IN MICROFLUIDICS.  

E-Print Network [OSTI]

SOME COMPUTATIONAL PROBLEMS IN MICROFLUIDICS. S. Tancogne, Ch.-H. Bruneau, Th. Colin Institut de is to present some results of flow simulations in microflu- idics. Microfluidics is characterized

Colin, Thierry

272

Multiple-energy Techniques in Industrial Computerized Tomography  

DOE R&D Accomplishments [OSTI]

Considerable effort is being applied to develop multiple-energy industrial CT techniques for materials characterization. Multiple-energy CT can provide reliable estimates of effective Z (Z{sub eff}), weight fraction, and rigorous calculations of absolute density, all at the spatial resolution of the scanner. Currently, a wide variety of techniques exist for CT scanners, but each has certain problems and limitations. Ultimately, the best multi-energy CT technique would combine the qualities of accuracy, reliability, and wide range of application, and would require the smallest number of additional measurements. We have developed techniques for calculating material properties of industrial objects that differ somewhat from currently used methods. In this paper, we present our methods for calculating Z{sub eff}, weight fraction, and density. We begin with the simplest case -- methods for multiple-energy CT using isotopic sources -- and proceed to multiple-energy work with x-ray machine sources. The methods discussed here are illustrated on CT scans of PBX-9502 high explosives, a lexan-aluminum phantom, and a cylinder of glass beads used in a preliminary study to determine if CT can resolve three phases: air, water, and a high-Z oil. In the CT project at LLNL, we have constructed several CT scanners of varying scanning geometries using {gamma}- and x-ray sources. In our research, we employed two of these scanners: pencil-beam CAT for CT data using isotopic sources and video-CAT equipped with an IRT micro-focal x-ray machine source.

Schneberk, D.; Martz, H.; Azevedo, S.

1990-08-01T23:59:59.000Z

273

Monte Carlo source convergence and the Whitesides problem  

SciTech Connect (OSTI)

The issue of fission source convergence in Monte Carlo eigenvalue calculations is of interest because of the potential consequences of erroneous criticality safety calculations. In this work, the authors compare two different techniques to improve the source convergence behavior of standard Monte Carlo calculations applied to challenging source convergence problems. The first method, super-history powering, attempts to avoid discarding important fission sites between generations by delaying stochastic sampling of the fission site bank until after several generations of multiplication. The second method, stratified sampling of the fission site bank, explicitly keeps the important sites even if conventional sampling would have eliminated them. The test problems are variants of Whitesides' Criticality of the World problem in which the fission site phase space was intentionally undersampled in order to induce marginally intolerable variability in local fission site populations. Three variants of the problem were studied, each with a different degree of coupling between fissionable pieces. Both the superhistory powering method and the stratified sampling method were shown to improve convergence behavior, although stratified sampling is more robust for the extreme case of no coupling. Neither algorithm completely eliminates the loss of the most important fissionable piece, and if coupling is absent, the lost piece cannot be recovered unless its sites from earlier generations have been retained. Finally, criteria for measuring source convergence reliability are proposed and applied to the test problems.

Blomquist, R. N.

2000-02-25T23:59:59.000Z

274

Particle-Filter-Based Multisensor Fusion For Solving Low-Frequency Electromagnetic NDE Inverse Problems  

SciTech Connect (OSTI)

Flaw profile characterization from NDE measurements is a typical inverse problem. A novel transformation of this inverse problem into a tracking problem, and subsequent application of a sequential Monte Carlo method called particle filtering, has been proposed by the authors in an earlier publication [1]. In this study, the problem of flaw characterization from multi-sensor data is considered. The NDE inverse problem is posed as a statistical inverse problem and particle filtering is modified to handle data from multiple measurement modes. The measurement modes are assumed to be independent of each other with principal component analysis (PCA) used to legitimize the assumption of independence. The proposed particle filter based data fusion algorithm is applied to experimental NDE data to investigate its feasibility.

Khan, T.; Ramuhalli, Pradeep; Dass, Sarat

2011-06-30T23:59:59.000Z

275

Code design for multiple-input multiple-output broadcast channels  

E-Print Network [OSTI]

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

276

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network [OSTI]

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

277

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network [OSTI]

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

278

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

279

Problem  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for applying the film uses commercially available polymers, dissolving them in common solvents at a normal temperature and pressure, and then using a simple spin, dip, or spray...

280

Problem  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

energy solutions, Sandia and Princeton Power Systems have teamed up to develop the Demand Response Inverter (DRI). Innovative Edge The DRI is a power flow control system that...

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Problem  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is environmentally sealed with a polymer coating and is very small. The battery is a solid-state system employing a lithium phosphorus oxynitride (LiPON) electrolyte and is...

282

Problem  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

challenges for ensuring reliable power for consumers. Because the current electricity grid is aging, updating it is essential to improving the nation's energy security. Greater...

283

Problem  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in small-scale studies, the improved water flux of these membranes is predicted to reduce excess energy costs by 88%, translating into an annual 1.45M savings for a modest 100 mL...

284

PROBLEMS  

E-Print Network [OSTI]

the torsional oscillations of a shaft with a ?ywheel, the ?ow of electric current in .... The units for voltage, resistance, current, charge, capacitance, inductance, and ...

285

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5×106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.71±0.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.36±0.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.82±0.05-0.19+0.21 charged particles per BB¯ decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.62±0.04-0.18+0.24 per BB¯ pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

286

Holographic superconductor with multiple competing condensates  

E-Print Network [OSTI]

Holography is a novel approach to modeling strongly interacting many-body systems. By reorganizing the quantum many-body problem into an equivalent problem in classical gravity, holography makes it relatively easy, for ...

Grabowska, Dorota M

2010-01-01T23:59:59.000Z

287

Optimization Approach for Tomographic Inversion from Multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

this talk, I will discuss the image registration problems and some explorations on a MATLAB-based package called 'FAIR' which can be used for solving the correspondence problem....

288

Lattice Boltzmann simulations of a time-dependent natural convection problem  

E-Print Network [OSTI]

Lattice Boltzmann simulations of a time-dependent natural convection problem Beno^it Trouette September 2, 2013 Abstract A two-dimensional double Multiple-Relaxation-Time thermal lattice Boltzmann-dependent flows as well as the space and time convergence orders. Keywords: Thermal lattice Boltzmann method

Boyer, Edmond

289

Algorithms for an Integer Multicommodity Network Flow Problem with Node Reliability Considerations  

Science Journals Connector (OSTI)

In this paper, we consider the problem of sending a set of multiple commodities from their origin to destination nodes via intermediate hubs. Each hub node is associated with a reliability function, which depends on the total flow that crosses that hub. ... Keywords: Congestion, Cutting planes, Integer programming, Multicommodity flow, Node reliabilities

Bita Tadayon, J. Cole Smith

2014-05-01T23:59:59.000Z

290

Horn's problem and semi-stability for quiver representations W. Crawley-Boevey and Ch. Gei  

E-Print Network [OSTI]

Introduction Given a Hermitian n n matrix H, we write Eig(H) = f 1; 2;:::; ng for the eigen- values of H, whichHorn's problem and semi-stability for quiver representations W. Crawley-Boevey and Ch. Gei 1 we list in decreasing order, and repeat each value according to its multiplicity. We are interested

Crawley-Boevey, William

291

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect (OSTI)

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

292

Galois Groups of Schubert Problems  

E-Print Network [OSTI]

problem on G(1, n) asks for the lines that meet a fixed, but general col- lection of flags L1??1, . . . , Lm??m. This set of lines is described by the intersection of Schubert varieties ?(L1??1) ? ?(L2??2) ? · · · ? ?(Lm??m) . (2.7) Schubert [16] gave...- mension a in G(1, n). If a• := (a1, . . . , am) is a list of positive integers such that a1 + · · ·+ am = 2n?2 = dimG(1, n), then a• is a Schubert problem, so if we consider general linear subspaces L1, . . . , Lm of Pn where dimLi = n?1?ai for i = 1...

Martin Del Campo Sanchez, Abraham

2012-10-19T23:59:59.000Z

293

PJM Interconnection (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

294

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect (OSTI)

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

295

ENGINEERING AND ECONOMIC APPLICATIONS OF COMPLEMENTARITY PROBLEMS  

E-Print Network [OSTI]

ENGINEERING AND ECONOMIC APPLICATIONS OF COMPLEMENTARITY PROBLEMS M. C. FERRIS AND J. S. PANG SIAM problems, variational inequalities, frictional contact, structural engineering, economic equilibria, the subject of complementarity problems, with its diverse applications in engineering, economics, and sciences

Ferris, Michael C.

296

Global problems and global science  

Science Journals Connector (OSTI)

...the facts, and the remaining uncertainties, about...problem of greenhouse gas emissions; it is...reduction of greenhouse gas emissions, especially...solar panels and wind turbines to developing countries...35 7.5 1 natural gas 21 39 18 38 coal...with the average life expectancy for a...

2005-01-01T23:59:59.000Z

297

Substation automation problems and possibilities  

SciTech Connect (OSTI)

The evolutionary growth in the use and application of microprocessors in substations has brought the industry to the point of considering integrated substation protection, control, and monitoring systems. An integrated system holds the promise of greatly reducing the design, documentation, and implementation cost for the substation control, protection, and monitoring systems. This article examines the technical development path and the present implementation problems.

Smith, H.L.

1996-10-01T23:59:59.000Z

298

Inverse Problems and Industrial Mathematics  

E-Print Network [OSTI]

line coke ore charging of ore and coke layers indirect reduction of ore by CO and H2 Inverse Problems in process parameters - charging strategy (distribution of coke-ore layers) - different raw materials Inverse and uniform quality of produced liquid iron - the decrease of coke consumption - a uniform gas mass flow

Fulmek, Markus

299

Asteroid Rangers Problem ID: asteroids  

E-Print Network [OSTI]

optimal relay system will be unique. Input Each test case starts with a line containing an integer n (2 n else, potentially relayed by one or more bases. The cost of any link is directly proportional to the distance between the two bases it connects, so this doesn't seem that hard of a problem. There is one small

California at Berkeley, University of

300

The Retail Planning Problem under Demand Uncertainty.  

E-Print Network [OSTI]

and Rajaram K. , (2000), “Accurate Retail Testing of FashionThe Retail Planning Problem Under Demand Uncertainty GeorgeAbstract We consider the Retail Planning Problem in which

Georgiadis, G.; Rajaram, K.

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

INVERSE SCATTERING PROBLEMS WITH MULTI-FREQUENCIES ...  

E-Print Network [OSTI]

variational problem is studied for the direct scattering; an energy estimate is given ..... It follows from Green's formula and the adjoint problem (2.23) that we have.

2015-01-25T23:59:59.000Z

302

Computational evaluation of two reactor benchmark problems.  

E-Print Network [OSTI]

??A neutronic evaluation of two reactor benchmark problems was performed. The benchmark problems describe typical PWR uranium and plutonium (mixed oxide) fueled lattices. WIMSd4m, a… (more)

Cowan, James Anthony

2012-01-01T23:59:59.000Z

303

On Equilibrium Problems Involving Strongly Pseudomonotone ...  

E-Print Network [OSTI]

ria, in the sense that it includes these problems as particular cases (see for ..... We test the proposed algorithm for this problem with corresponds to the first.

2013-07-05T23:59:59.000Z

304

Multiple phase estimation for arbitrary pure states under white noise  

E-Print Network [OSTI]

In any realistic quantum metrology scenarios, the ultimate precision in the estimation of parameters is limited not only by the so-called Heisenberg scaling, but also the environmental noise encountered by the underlying system. In the context of quantum estimation theory, it is of great significance to carefully evaluate the impact of a specific type of noise on the corresponding quantum Fisher information (QFI) or quantum Fisher information matrix (QFIM). Here we investigate the multiple phase estimation problem for a natural parametrization of arbitrary pure states under white noise. We obtain the explicit expression of the symmetric logarithmic derivative (SLD) and hence the analytical formula of QFIM. Moreover, the attainability of the quantum Cram\\'{e}r-Rao bound (QCRB) is confirmed by the commutability of SLDs and the optimal estimators are elucidated for the experimental purpose. These findings generalize previously known partial results and highlight the role of white noise in quantum metrology.

Yao Yao; Li Ge; Xing Xiao; Xiaoguang Wang; C. P. Sun

2014-09-08T23:59:59.000Z

305

The MARVEL assembly for neutron multiplication  

SciTech Connect (OSTI)

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

306

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

307

Friction and the Multiplicity of Equilibria  

E-Print Network [OSTI]

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity” (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

308

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect (OSTI)

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

309

An analysis of multiple component mooring lines  

E-Print Network [OSTI]

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

310

NASA PLAGUED WITH SPACE PROBLEMS  

Science Journals Connector (OSTI)

NASA PLAGUED WITH SPACE PROBLEMS ... Staged against a ghetto backdrop, Washington Post cartoonist Herblock's question of Vice President Agnew, "You don't feel, then, that when you've seen one planet you've seen them all?" typifies the verbal missiles launched at NASA these days. ... And as if this weren't enough as the agency faces Congress over its next budget, NASA once again finds itself embroiled in questions of science vs. engineering and manned vs. unmanned missions. ...

1969-08-11T23:59:59.000Z

311

BPA LINKED TO HEALTH PROBLEMS  

Science Journals Connector (OSTI)

BPA LINKED TO HEALTH PROBLEMS ... A STUDY PUBLISHED last week in the Journal of the American Medical Association suggests that people with high concentrations of bisphenol A (BPA) in their bodies are more likely to have heart disease, diabetes, and liver damage ( J. Am. ... The American Chemistry Council (ACC), which represents major U.S. chemical manufacturers, has steadfastly defended the safety of BPA and says the new JAMA study has substantial limitations and is far from conclusive. ...

GLENN HESS

2008-09-22T23:59:59.000Z

312

Equations of Motion with Multiple Proper Time: A New Interpretation of Basic Quantum Physics  

E-Print Network [OSTI]

Equations of motion for single particle under two proper time model and three proper time model have been proposed and analyzed. The motions of particle are derived from pure classical method but they exhibit the same properties of quantum physics: the quantum wave equation, de Broglie equations, uncertainty relation, statistical result of quantum wave-function. This shows us a possible new way to interpret quantum physics. We will also prove that physics with multiple proper time does not cause causality problem.

xiaodong Chen

2005-05-15T23:59:59.000Z

313

Probabilistic rank aggregation for multiple SVM ranking.  

E-Print Network [OSTI]

??Learning to rank is a fast growing research problem in Machine Learning and Information Retrieval. Ranking Support Vector Machine (RSVM) is a widely adopted ranking… (more)

Cheung, Chi Wai

2009-01-01T23:59:59.000Z

314

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Broader source: Energy.gov (indexed) [DOE]

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

315

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

316

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

317

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers [EERE]

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

318

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

319

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

320

Building an MLR Model Building a multiple linear regression (MLR) model from data is one of the  

E-Print Network [OSTI]

Chapter 3 Building an MLR Model Building a multiple linear regression (MLR) model from data is one- imation to the data can be difficult. Model building is an iterative process. Given the problem and data but no model, the model building process can often be aided by graphs that help visualize the relationships

Olive, David

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Gas-surface scattering with multiple collisions in the physisorption potential well Guoqing Fan and J. R. Manson  

E-Print Network [OSTI]

Gas-surface scattering with multiple collisions in the physisorption potential well Guoqing Fan The problem of gas-surface collisions is developed in terms of a theoretical formalism that allows calcula gas distributions are considered, a monoenergetic incident beam and an equilibrium gas appropriate

Manson, Joseph R.

322

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network [OSTI]

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

323

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

None

2011-10-06T23:59:59.000Z

324

Symmetric Periodic Orbits in Three Sub-Problems of the N-body Problem  

E-Print Network [OSTI]

We study three sub-problems of the N-body problem that have two degrees of freedom, namely the n-pyramidal problem, the planar double-polygon problem, and the spatial double-polygon problem. We prove the existence of several families of symmetric periodic orbits, including ``Schubart-like" orbits and brake orbits, by using topological shooting arguments.

Nai-Chia Chen

2013-11-17T23:59:59.000Z

325

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled “Formation Control of Multiple Mobile Robots Systems” by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

326

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

327

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

328

Quasi Multiplication and K-groups  

E-Print Network [OSTI]

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

329

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

330

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network [OSTI]

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

331

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

332

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

333

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

334

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

335

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

336

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

337

The multiple vortex nature of tropical cyclogenesis  

E-Print Network [OSTI]

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

338

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Plötzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

339

Jet multiplicities as the QGP thermometer  

E-Print Network [OSTI]

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

340

Supercomputers Tackle Biofuel Production Problems  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

V V E R C O M I N G P L A N T R E C A L C I T R A N C E Supercomputers Tackle BIOFUEL Production Problems If you have ever dealt with an uncooperative, fractious kid or a combative employee, you understand the meaning of "recalcitrance" - over-the-top stubbornness, disobedience, and noncompliance. But recalcitrance is not just a human trait - plants can be recalcitrant, too, and for them it is a matter of survival. Over millions of years, plants have evolved complex structural and chemical mechanisms to ward off assaults on their structural sugars by microbial and animal marauders. So it should be no surprise that when humans attempt to turn plant biomass into biofuels to meet our energy needs, we discover how stubborn and noncompliant our vegetative friends can be. Plant recalcitrance is one of

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Studies of Nonlinear Problems, I  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

. . . ~0s ALAMOS SCIENTIFIC LABORATORY of the UNIVERSITY OF CALIFORNIA ' . c' . .: . Report written: May 1955 Report distributed: LA-1940 h .1 STUDIES OF NONLINEAR PROBLEMS. I . - 4 . . . ._~ Work done by: E. Fermi J. Pasta S. Ulam M. Tsingou PHYSICS Report written by: E. Fermi J. Pasta S. Ulam DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available document. original . - . * * , . ' ABSTRACT " .*. . A one-dimensional dynamical system of 64 particles with forces be- . . . tween neighbors containing nonlinear terms has been studied on the Los Alamos computer MANIAC I. The nonlinear terms considered are quadratic, cubic, and broken linear types. The results are analyzed into Fourier

342

Quantum geometrodynamics creates new problems  

E-Print Network [OSTI]

The development of last years in quantum geometrodynamics highlights new problems which were not obvious in its first formulation proposed by Wheeler and DeWitt. At the first stage the main task was to apply known quantization schemes to gravitational field or a certain cosmological model. This way has led to the realization of the fact that a quantum description of the Universe is impossible without implicit or explicit indication to a reference frame presented by some medium, filling the whole Universe, with its own equation of state and thermodynamical properties. Thus the questions arise, should one seek for a "privileged" reference frame or consider all the variety of gauge conditions and appropriate solutions for the wave function? It is worth noting that thermodynamical properties of such a quantum Universe would also depend on a chosen reference frame to some extent. So, we need a self-consistent quantum theoretical and thermodynamical description of the Universe.

T. P. Shestakova

2008-10-22T23:59:59.000Z

343

The 3He Supply Problem  

SciTech Connect (OSTI)

One of the main uses for 3He is in gas proportional counters for neutron detection. Radiation portal monitors deployed for homeland security and non-proliferation use such detectors. Other uses of 3He are for research detectors, commercial instruments, well logging detectors, dilution refrigerators, for targets or cooling in nuclear research, and for basic research in condensed matter physics. The US supply of 3He comes almost entirely from the decay of tritium used in nuclear weapons by the US and Russia. A few other countries contribute a small amount to the world’s 3He supply. Due to the large increase in use of 3He for homeland security, the supply has dwindled, and can no longer meet the demand. This white paper reviews the problems of supply, utilization, and alternatives.

Kouzes, Richard T.

2009-05-01T23:59:59.000Z

344

Approximation algorithms for the Transportation Problem with ...  

E-Print Network [OSTI]

Sep 25, 2014 ... In the classical transportation problem [15, 2], we are given a set F of m ... covering problem [11] is a special case of the uncapacitated variant ...

2014-09-25T23:59:59.000Z

345

Energy Problems in the Third World  

Science Journals Connector (OSTI)

The energy problems of the last decades of the 20th century will probably pass into history as the transitory problems of societies which coupled their growth and development to the consumption of irreplaceabl...

José Goldemberg

1981-01-01T23:59:59.000Z

346

The Rectilinear Steiner Tree Problem: A Tutorial  

Science Journals Connector (OSTI)

We give a tutorial on the rectilinear Steiner tree problem in the plane. First, fundamental structural results are given with full proofs. Then, recent exact algorithms allowing the solution of problem instanc...

Martin Zachariasen

2001-01-01T23:59:59.000Z

347

Dam choices: Analyses for multiple needs  

Science Journals Connector (OSTI)

...and biodiversity, whereas developers worry about energy and capital for growth. The problem is that unnecessary costs are inflicted...when decision makers consider other energy sources such as natural gas or renewables. These analyses would recognize that fisheries...

Peter M. Kareiva

2012-01-01T23:59:59.000Z

348

Multiple-user quantum optical communication  

E-Print Network [OSTI]

A fundamental understanding of the information carrying capacity of optical channels requires the signal and physical channel to be modeled quantum mechanically. This thesis considers the problems of distributing multi-party ...

Yen, Brent J., 1977-

2005-01-01T23:59:59.000Z

349

Benchmark problems for repository siting models  

SciTech Connect (OSTI)

This report describes benchmark problems to test computer codes used in siting nuclear waste repositories. Analytical solutions, field problems, and hypothetical problems are included. Problems are included for the following types of codes: ground-water flow in saturated porous media, heat transport in saturated media, ground-water flow in saturated fractured media, heat and solute transport in saturated porous media, solute transport in saturated porous media, solute transport in saturated fractured media, and solute transport in unsaturated porous media.

Ross, B.; Mercer, J.W.; Thomas, S.D.; Lester, B.H.

1982-12-01T23:59:59.000Z

350

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network [OSTI]

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

351

Swarm Intelligence and Problem Solving in Telecommunications  

E-Print Network [OSTI]

Swarm Intelligence and Problem Solving in Telecommunications Abstract This paper describes how biologically­inspired agents can be used to solve control problems in Telecommunications. These agents the application of ant­like agents to the problem of routing in telecommunication networks. Introduction

White, Tony

352

Strong CP-Problem in Superstring Theory  

Science Journals Connector (OSTI)

......1992 research-article Articles Strong CP-Problem in Superstring Theory Daijiro...Bern We apply the solution for the strong CP-problem in the 4-dimensional superstring...Vol. 88, No.4, October 1992 Strong CP-Problem in Superstring Theory*) Daijiro......

Daijiro Suematsu

1992-10-01T23:59:59.000Z

353

On the Complexity of the Pancake Problem  

Science Journals Connector (OSTI)

We study the computational complexity of finding a line that bisects simultaneously two sets in the two-dimensional plane, called the pancake problem, using the oracle Turing machine model of Ko. We also study the basic problem of bisecting a set at ... Keywords: #P, Computational complexity, complexity theory of real functions, the pancake problem

Fuxiang Yu

2007-01-01T23:59:59.000Z

354

NPcomplete Problems and Physical Reality Scott Aaronson #  

E-Print Network [OSTI]

be solved e#ciently in the physical universe? I survey proposals including soap bubbles, protein folding­complete problems e#ciently, I argue that by studying them, we can learn something not only about computationNP­complete Problems and Physical Reality Scott Aaronson # Abstract Can NP­complete problems

Aaronson, Scott

355

MULTIPLE SCATTERING POLARIZATION OF SUBSTELLAR-MASS OBJECTS: T DWARFS  

SciTech Connect (OSTI)

While there have been multiple observational programs aimed at detecting linear polarization of optical radiation emitted by ultracool dwarfs, there has been comparatively less rigorous theoretical analysis of the problem. The general expectation has been that the atmospheres of those substellar-mass objects with condensate clouds would give rise to linear polarization due to scattering. Because of rotation-induced non-sphericity, there is expected to be incomplete cancellation of disk-integrated net polarization and thus a finite polarization. For cloudless objects, however, only molecular Rayleigh scattering will contribute to any net polarization and this limit has not been well studied. Hence in this paper we present a detailed multiple scattering analysis of the polarization expected from those T-dwarfs whose spectra show absence of condensates. For this, we develop and solve the full radiative transfer equations for linearly polarized radiation. Only atomic and molecular Rayleigh scattering are considered to be the sources of polarization. We compute the local polarization at different angular directions in a plane-parallel atmosphere calculated for the range of effective temperatures of T dwarfs and then average over the whole surface of the object. The effects of gravity and limb darkening as well as rotation induced non-sphericity are included. It is found that the amount of polarization decreases with the increase in effective temperature. It is also found that significant polarization at any local point in the atmosphere arises only in the optical (B band). However, the disk integrated polarization-even in the B band-is negligible. Hence we conclude that, unlike the case for cloudy L dwarfs, polarization of cloudless T dwarfs by atomic and molecular scattering may not be detectable. In the future we will extend this work to cloudy L and T dwarf atmospheres.

Sengupta, Sujan [Indian Institute of Astrophysics, Koramangala 2nd Block, Bangalore 560 034 (India); Marley, Mark S., E-mail: sujan@iiap.res.i, E-mail: Mark.S.Marley@NASA.go [NASA Ames Research Center, MS-245-3, Moffett Field, CA 94035 (United States)

2009-12-10T23:59:59.000Z

356

Abstract--We propose a partitioning problem in a power system context that weighs the two objectives of minimizing cuts  

E-Print Network [OSTI]

. Anticipation of such events is made difficult by the fundamentally combinatorial nature of the problem a single component. For example, in the WECC Operating Handbook this famous N-1 criterion is stated as "the involved in a brute-force enumeration of multiple contingencies is not practical, not even using

Geddes, Cameron Guy Robinson

357

Ignition problems in scramjet testing  

SciTech Connect (OSTI)

Ignition of H{sub 2} in heated air containing H{sub 2}O, radicals, and dust was investigated for scramjet testing. Using a reduced kinetic model for H{sub 2}{minus}O{sub 2} systems, the effects of H{sub 2}O and radicals in nozzles are discussed in relation to engine testing with vitiation heaters. Analysis using linearized rate-equations suggested that the addition of O atoms was 1.5 times more effective than the addition of H atoms for ignition. This result can be applied to the problem of premature ignition caused by residual radicals and to plasma-jet igniters. Thermal and chemical effects of dust, inevitable in storage air heaters, were studied next. The effects of heat capacity and size of dust were expressed in terms of an exponential integral function. It was found that the radical termination on the surface of dust produces an effect equivalent to heat loss. The inhibition of ignition by dust may result, if the mass fraction of dust becomes 10{sup {minus}3}.

Mitani, Tohru [National Aerospace Lab., Miyagi (Japan)] [National Aerospace Lab., Miyagi (Japan)

1995-05-01T23:59:59.000Z

358

Inverse problems in multifractal analysis  

E-Print Network [OSTI]

Multifractal formalism is designed to describe the distribution at small scales of the elements of $\\mathcal M^+_c(\\R^d)$, the set of positive, finite and compactly supported Borel measures on $\\R^d$. It is valid for such a measure $\\mu$ when its Hausdorff spectrum is the upper semi-continuous function given by the concave Legendre-Fenchel transform of the free energy function $\\tau_\\mu$ associated with $\\mu$; this is the case for fundamental classes of exact dimensional measures. For any function $\\tau$ candidate to be the free energy function of some $\\mu\\in \\mathcal M^+_c(\\R^d)$, we build such a measure, exact dimensional, and obeying the multifractal formalism. This result is extended to a refined formalism considering jointly Hausdorff and packing spectra. Also, for any upper semi-continuous function candidate to be the lower Hausdorff spectrum of some exact dimensional $\\mu\\in\\mathcal M^+_c(\\R^d)$, we build such a measure. Our results transfer to the analoguous inverse problems in multifractal analysis of H\\"older continuous functions.

Julien Barral

2014-09-29T23:59:59.000Z

359

A material's multiple personalities | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

360

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

362

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network [OSTI]

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

363

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

364

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

365

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

366

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network [OSTI]

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

367

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect (OSTI)

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

368

Evolution of isotopic composition of reprocessed uranium during the multiple recycling in light water reactors with natural uranium feed  

SciTech Connect (OSTI)

A complex approach based on the consistent modeling of neutron-physics processes and processes of cascade separation of isotopes is applied for analyzing physical problems of the multiple usage of reprocessed uranium in the fuel cycle of light water reactors. A number of scenarios of multiple recycling of reprocessed uranium in light water reactors are considered. In the process, an excess absorption of neutrons by the {sup 236}U isotope is compensated by re-enrichment in the {sup 235}U isotope. Specific consumptions of natural uranium for re-enrichment of the reprocessed uranium depending on the content of the {sup 232}U isotope are obtained.

Smirnov, A. Yu., E-mail: a.y.smirnoff@rambler.ru; Sulaberidze, G. A. [National Research Nuclear University MEPhI (Russian Federation); Alekseev, P. N.; Dudnikov, A. A.; Nevinitsa, V. A., E-mail: neva@dhtp.kiae.ru; Proselkov, V. N.; Chibinyaev, A. V. [Russian Research Centre Kurchatov Institute (Russian Federation)

2012-12-15T23:59:59.000Z

369

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

370

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

371

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

372

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

373

Multiple failure modes analysis and weighted risk priority number evaluation in FMEA  

Science Journals Connector (OSTI)

Traditionally, failure mode and effects analysis (FMEA) only considers the impact of single failure on the system. For large and complex systems, since multiple failures of components exist, assessing multiple failure modes with all possible combinations is impractical. Pickard et al. [1] introduced a useful method to simultaneously analyze multiple failures for complex systems. However, they did not indicate which failures need to be considered and how to combine them appropriately. This paper extends Pickard’s work by proposing a minimum cut set based method for assessing the impact of multiple failure modes. In addition, traditional FMEA is made by addressing problems in an order from the biggest risk priority number (RPN) to the smallest ones. However, one disadvantage of this approach is that it ignores the fact that three factors (Severity (S), Occurrence (O), Detection (D)) (S, O, D) have the different weights in system rather than equality. For examples, reasonable weights for factors S, O are higher than the weight of D for some non-repairable systems. In this paper, we extended the definition of RPN by multiplying it with a weight parameter, which characterize the importance of the failure causes within the system. Finally, the effectiveness of the method is demonstrated with numerical examples.

Ningcong Xiao; Hong-Zhong Huang; Yanfeng Li; Liping He; Tongdan Jin

2011-01-01T23:59:59.000Z

374

Constrained Graph Optimization: Interdiction and Preservation Problems  

SciTech Connect (OSTI)

The maximum flow, shortest path, and maximum matching problems are a set of basic graph problems that are critical in theoretical computer science and applications. Constrained graph optimization, a variation of these basic graph problems involving modification of the underlying graph, is equally important but sometimes significantly harder. In particular, one can explore these optimization problems with additional cost constraints. In the preservation case, the optimizer has a budget to preserve vertices or edges of a graph, preventing them from being deleted. The optimizer wants to find the best set of preserved edges/vertices in which the cost constraints are satisfied and the basic graph problems are optimized. For example, in shortest path preservation, the optimizer wants to find a set of edges/vertices within which the shortest path between two predetermined points is smallest. In interdiction problems, one deletes vertices or edges from the graph with a particular cost in order to impede the basic graph problems as much as possible (for example, delete edges/vertices to maximize the shortest path between two predetermined vertices). Applications of preservation problems include optimal road maintenance, power grid maintenance, and job scheduling, while interdiction problems are related to drug trafficking prevention, network stability assessment, and counterterrorism. Computational hardness results are presented, along with heuristic methods for approximating solutions to the matching interdiction problem. Also, efficient algorithms are presented for special cases of graphs, including on planar graphs. The graphs in many of the listed applications are planar, so these algorithms have important practical implications.

Schild, Aaron V [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

375

Decomposition of Diagonal Hermitian Quantum Gates Using Multiple-Controlled Pauli Z Gates  

E-Print Network [OSTI]

Quantum logic decomposition refers to decomposing a given quantum gate to a set of physically implementable gates. An approach has been presented to decompose arbitrary diagonal quantum gates to a set of multiplexed-rotation gates around z axis. In this paper, a special class of diagonal quantum gates, namely diagonal Hermitian quantum gates, is considered and a new perspective to the decomposition problem with respect to decomposing these gates is presented. It is first shown that these gates can be decomposed to a set that solely consists of multiple-controlled Z gates. Then a binary representation for the diagonal Hermitian gates is introduced. It is shown that the binary representations of multiple-controlled Z gates form a basis for the vector space that is produced by the binary representations of all diagonal Hermitian quantum gates. Moreover, the problem of decomposing a given diagonal Hermitian gate is mapped to the problem of writing its binary representation in the specific basis mentioned above. Moreover, CZ gate is suggested to be the two-qubit gate in the decomposition library, instead of previously used CNOT gate. Experimental results show that the proposed approach can lead to circuits with lower costs in comparison with the previous ones.

Mahboobeh Houshmand; Morteza Saheb Zamani; Mehdi Sedighi; Mona Arabzadeh

2014-05-26T23:59:59.000Z

376

Parallel solver for semidefinite programming problem having sparse ...  

E-Print Network [OSTI]

Since the computation cost for floating-point multiplications is generally greater ... is approximately proportional to the number of floating-point multiplications.

2010-09-14T23:59:59.000Z

377

Real-time multi-mode neutron multiplicity counter  

DOE Patents [OSTI]

Embodiments are directed to a digital data acquisition method that collects data regarding nuclear fission at high rates and performs real-time preprocessing of large volumes of data into directly useable forms for use in a system that performs non-destructive assaying of nuclear material and assemblies for mass and multiplication of special nuclear material (SNM). Pulses from a multi-detector array are fed in parallel to individual inputs that are tied to individual bits in a digital word. Data is collected by loading a word at the individual bit level in parallel, to reduce the latency associated with current shift-register systems. The word is read at regular intervals, all bits simultaneously, with no manipulation. The word is passed to a number of storage locations for subsequent processing, thereby removing the front-end problem of pulse pileup. The word is used simultaneously in several internal processing schemes that assemble the data in a number of more directly useable forms. The detector includes a multi-mode counter that executes a number of different count algorithms in parallel to determine different attributes of the count data.

Rowland, Mark S; Alvarez, Raymond A

2013-02-26T23:59:59.000Z

378

Detection and track of a stochastic target using multiple measurements  

SciTech Connect (OSTI)

The authors are interested in search and tracking problems. In a search, the target might be located among a number of hiding places. Multiple measurements from various locations might be used to determine the likelihood that a particular hiding place is occupied. An obvious example would be a search for a weak radiation source in a building. Search teams might make many measurements with radiation detectors and analyze this data to determine likely areas for further searching. In this paper the authors present a statistical interpretation of the implications of measurements made on a stochastic system, one which makes random state transitions with known average rates. Knowledge of the system is represented as a statistical ensemble of instances which accord with measurements and prior information. The evolution of ratios of populations in this ensemble due to measurements and stochastic transitions may be calculated efficiently. Applied to target detection and tracking, this approach allows a rigorous definition of probability of detection and probability of false alarm and reveals a computationally useful functional relationship between the two. An example of a linear array of simple counters is considered in detail. For it, accurate analytic approximations are developed for detection and tracking statistics as functions of system parameters. A single measure of effectiveness for individual sensors is found which is a major determinant of system performance and which would be useful for initial sensor design.

Cunningham, C.T.

1995-11-01T23:59:59.000Z

379

Robust Hydraulic Fracture Monitoring (HFM) of Multiple Time Overlapping Events Using a Generalized Discrete Radon Transform  

E-Print Network [OSTI]

In this work we propose a novel algorithm for multiple-event localization for Hydraulic Fracture Monitoring (HFM) through the exploitation of the sparsity of the observed seismic signal when represented in a basis consisting of space time propagators. We provide explicit construction of these propagators using a forward model for wave propagation which depends non-linearly on the problem parameters - the unknown source location and mechanism of fracture, time and extent of event, and the locations of the receivers. Under fairly general assumptions and an appropriate discretization of these parameters we first build an over-complete dictionary of generalized Radon propagators and assume that the data is well represented as a linear superposition of these propagators. Exploiting this structure we propose sparsity penalized algorithms and workflow for super-resolution extraction of time overlapping multiple seismic events from single well data.

Ely, Gregory

2013-01-01T23:59:59.000Z

380

Cosmological Constant Problems and Renormalization Group  

E-Print Network [OSTI]

The Cosmological Constant Problem emerges when Quantum Field Theory is applied to the gravitational theory, due to the enormous magnitude of the induced energy of the vacuum. The unique known solution of this problem involves an extremely precise fine-tuning of the vacuum counterpart. We review a few of the existing approaches to this problem based on the account of the quantum (loop) effects and pay special attention to the ones involving the renormalization group.

Ilya L. Shapiro; Joan Sola

2007-01-05T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Att lösa reglertekniska problem med Modelica.  

E-Print Network [OSTI]

?? The purpose of this thesis is to examine and present the oportunities of solving control problems using Modelica. This is done by creating some… (more)

Hagernäs, Mikael

2009-01-01T23:59:59.000Z

382

Fast methods for inverse wave scattering problems  

E-Print Network [OSTI]

Inverse wave scattering problems arise in many applications including computerized/diffraction tomography, seismology, diffraction/holographic grating design, object identification from radar singals, and semiconductor ...

Lee, Jung Hoon, Ph. D. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

383

The Continuous Time Service Network Design Problem  

E-Print Network [OSTI]

H. Milton Stewart School of Industrial & Systems Engineering, Georgia Institute of Technology, ... i.e., the carrier must solve a Service Network Design problem.

2015-01-02T23:59:59.000Z

384

Modern video informatics: problems and prospects  

Science Journals Connector (OSTI)

This paper discusses modern problems of video informatics in the area of the formation, transmission, processing, analysis, and visualization of video information. The distinguishing...

Vasil’ev, V N; Gurov, I P; Potapov, A S

2012-01-01T23:59:59.000Z

385

INTEGER NETWORK SYNTHESIS PROBLEM FOR HOP ...  

E-Print Network [OSTI]

integer h, (which we call the hop-parameter), we denote by Ph ...... problem, if edges with positive capacities form a tree then obviously, capacity of each.

2009-10-12T23:59:59.000Z

386

Three interrelated problems in reading: A review  

Science Journals Connector (OSTI)

In this review, three interrelated problems are discussed with respect to reading. ... , but rather by some sort of interactive process permitting the extraction of higher order distinctive...

John L. Bradshaw

1975-03-01T23:59:59.000Z

387

Stochastic p-Robust Location Problems  

E-Print Network [OSTI]

We present p-robust models based on two classical facility location problems, ... University, Department of Industrial Engineering and Management Sciences, ...

2004-08-03T23:59:59.000Z

388

Problems of intraplate extensional tectonics, Western United...  

Open Energy Info (EERE)

on the Great Basin Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Proceedings: Problems of intraplate extensional tectonics, Western United...

389

Solving Optimization Problems on Computational Grids 1 ...  

E-Print Network [OSTI]

from the MIPLIB test set. This problem arises in an electricity ... Pataki, Stefan Schmieta, and Sebastian Ce- ria at Columbia used preprocessing, disjunc-.

2000-11-17T23:59:59.000Z

390

Regenerator Location Problem in Flexible Optical Networks  

E-Print Network [OSTI]

Nov 22, 2014 ... Abstract: In this study we introduce the regenerator location problem in flexible optical networks (RLP-FON). With a given traffic demand, ...

BARIS YILDIZ

2014-11-22T23:59:59.000Z

391

Quantum Condensates in Nuclear Matter: Problems  

E-Print Network [OSTI]

In connection with the contribution "Quantum Condensates in Nuclear Matter" some problems are given to become more familiar with the techniques of many-particle physics.

G. Ropke; D. Zablocki

2010-01-11T23:59:59.000Z

392

Streaming cache placement problems: complexity and algorithms  

Science Journals Connector (OSTI)

Multicast networks are used to distribute live content, such as video or audio streams, to a potentially large number of destinations. Streaming caches are deployed in these multicast systems to allow content distribution without network overload. We consider two related problems that arise in multicast networks: the tree cache placement and the flow cache placement problems. These problems are shown to be NP-hard, and we give a proof of hardness of approximation using a gap-preserving reduction. We also present approximation algorithms, as well as special cases where these problems can be solved in polynomial time.

Carlos A.S. Oliveira; Panos M. Pardalos; Oleg A. Prokopyev; Mauricio G.C. Resende

2007-01-01T23:59:59.000Z

393

Global Optimization: Software, Test Problems, and Applications  

E-Print Network [OSTI]

This is followed by a discussion of GO software, test problems and several important types of applications, with additional pointers. The exposition is ...

Janos D. Pinter

394

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network [OSTI]

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

395

Tank Problems Here are some additional problems involving flow in and out of a container. These kinds of problems  

E-Print Network [OSTI]

9­28­1998 Tank Problems Here are some additional problems involving flow in and out of a container­order linear equations for which you can find an integrating factor. Example. A tank contains 20 gallons of pure water. Water containing 2 pounds of dissolved yogurt per gallon enters the tank at 4 gallons per

Ikenaga, Bruce

396

A Thousand Problems in Cosmology: Interaction in the Dark Sector  

E-Print Network [OSTI]

This is one chapter of the collection of problems in cosmology, in which we assemble the problems that concern one of the most distinctive features of modern cosmology---the interaction in the Dark Sector. The evolution of any broadly applied model is accompanied by multiple generalizations that aim to resolve conceptual difficulties and to explain the ever-growing pool of observational data. In the case of Standard Cosmological Model one of the most promising directions of generalization is replacement of the cosmological constant with a more complicated, dynamic, form of dark energy and incorporation of interaction between the dark components---dark energy (DE) and dark matter (DM). Typically, DE models are based on scalar fields minimally coupled to gravity, and do not implement explicit coupling of the field to the background DM. However, there is no fundamental reason for this assumption in the absence of an underlying symmetry which would suppress the coupling. Given that we do not know the true nature of either DE or DM, we cannot exclude the possibility that there is some kind of coupling between them. Whereas interactions between DE and normal matter particles are heavily constrained by observations (e.g. in the solar system and gravitational experiments on Earth), this is not the case for DM particles. In other words, it is possible for the dark components to interact with each other while not being coupled to standard model particles. Therefore, the possibility of DE-DM interaction should be investigated with utmost gravity. This version contains only formulations of 117 problems. The full collection, with solutions included, is available in the form of a wiki-based resource at universeinproblems.com. The cosmological community is welcome to contribute to its development.

Yu. L. Bolotin; V. A. Cherkaskiy; O. A. Lemets; I. V. Tanatarov; D. A. Yerokhin

2013-12-18T23:59:59.000Z

397

New multiplicativity results for qubit maps  

E-Print Network [OSTI]

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

398

Multiple volume compressor for hot gas engine  

DOE Patents [OSTI]

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

399

Multiple frequency method for operating electrochemical sensors  

DOE Patents [OSTI]

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

400

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

402

Non-iterative multiple-attenuation methods: linear inverse solutions to non-linear inverse problems - II. BMG approximation  

Science Journals Connector (OSTI)

......significant if the demultiple process requires the removal of more...suggestions during the review process. We also thank Dr Patrick Lailly...imaging: 63rd Ann. Internat. Mtg., Soc. Expl. Geophys...elimination: 72nd Ann. Internat. Mtg: Soc. of Expl. Geophys......

Luc T. Ikelle; Are Osen; Lasse Amundsen; Yunqing Shen

2004-12-01T23:59:59.000Z

403

Using cluster analysis to identify patterns in students’ responses to contextually different conceptual problems  

Science Journals Connector (OSTI)

This study examined the evolution of student responses to seven contextually different versions of two Force Concept Inventory questions in an introductory physics course at the University of Arkansas. The consistency in answering the closely related questions evolved little over the seven-question exam. A model for the state of student knowledge involving the probability of selecting one of the multiple-choice answers was developed. Criteria for using clustering algorithms to extract model parameters were explored and it was found that the overlap between the probability distributions of the model vectors was an important parameter in characterizing the cluster models. The course data were then clustered and the extracted model showed that students largely fit into two groups both pre- and postinstruction: one that answered all questions correctly with high probability and one that selected the distracter representing the same misconception with high probability. For the course studied, 14% of the students were left with persistent misconceptions post instruction on a static force problem and 30% on a dynamic Newton’s third law problem. These students selected the answer representing the predominant misconception slightly more consistently postinstruction, indicating that the course studied had been ineffective at moving this subgroup of students nearer a Newtonian force concept and had instead moved them slightly farther away from a correct conceptual understanding of these two problems. The consistency in answering pairs of problems with varied physical contexts is shown to be an important supplementary statistic to the score on the problems and suggests that the inclusion of such problem pairs in future conceptual inventories would be efficacious. Multiple, contextually varied questions further probe the structure of students’ knowledge. To allow working instructors to make use of the additional insight gained from cluster analysis, it is our hope that the physics education research community will make these methods available though their Web sites.

John Stewart; Mayo Miller; Christine Audo; Gay Stewart

2012-10-04T23:59:59.000Z

404

A Genetic Algorithm for Coverage Problems  

E-Print Network [OSTI]

or all classes covered) Genetic Algorithm step on P producing child population C: Roulette genetic algorithm 2. A GENETIC ALGORITHM FOR COVER- AGE PROBLEMS We have devised a genetic algorithmA Genetic Algorithm for Coverage Problems Colin Johnson Computing Laboratory, University of Kent

Kent, University of

405

Parameterized Algorithms for Graph Partitioning Problems  

E-Print Network [OSTI]

) time algorithm for any FGPP. Parameterized by p, Max and Min k-Vertex Cover can be solved in times O (1Parameterized Algorithms for Graph Partitioning Problems Hadas Shachnai and Meirav Zehavi are constants defining the problem, and m1, m2 are the cardinalities of the edge sets having both endpoints

Shachnai, Hadas

406

SOLVING CURVED DETONATION RIEMANN PROBLEMS Bruce Bukiet  

E-Print Network [OSTI]

SOLVING CURVED DETONATION RIEMANN PROBLEMS Bruce Bukiet Department of Mathematics, Center to compute accurate solutions to detonation problems without numerically solving differential equations in the thin reaction zone. For planar detonation waves, alge­ braic jump conditions can be used to compute

Bukiet, Bruce

407

PHYSICS PROBLEM SOLVING COOPERATIVE LEARNING GROUPS  

E-Print Network [OSTI]

PHYSICS PROBLEM SOLVING IN COOPERATIVE LEARNING GROUPS A THESIS SUBMITTED TO THE FACULTY OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY December, 1995 #12;PHYSICS PROBLEM SOLVING IN COOPERATIVE Planck Institute, graciously agreed to my videotaping of his Physics 1041 and 1042 students. When I

Minnesota, University of

408

Forest and Carbon offset investments: problems and  

E-Print Network [OSTI]

and problems related to forest investments as C sinks 2. The two markets: ­The "regulated" market ­The voluntary market 3. Some final considerations 1. Mitigation options and problems related to forest (Bioenergy / biofuels) Mitigation options in the forest sector #12;2 Source: Schlamadinger, 2000 2. The two

Pettenella, Davide

409

Mathematics As Problem Solving Math250....  

E-Print Network [OSTI]

Mathematics As Problem Solving Math250.... Instructor: Dr. M. Shiyyab, mathematics Dept. (637 Office Text: Curriculum and Evaluation Standards. National Council of Teachers of Mathematics, 1989, or 1999. Course Objective: 1. To improve your mathematical problem solving ability, including reasoning. 2

410

The multi-stop aircraft routing problem  

E-Print Network [OSTI]

We study the multi-stop aircraft routing problem, determining the sequence of stops and the number of passengers to carry in each segment route. The objective of the aircraft routing problem is to maximize the profit derived from the transportation...

Garci?a Castan?eda, Salvador

1995-01-01T23:59:59.000Z

411

The real problem with Merchant transmission  

SciTech Connect (OSTI)

Current regulatory policy distinguishes transmission investments that have primarily economic benefits from those that primarily enhance reliability. But no such dichotomy exists; congestion and reliability are inter-related in complex ways. Thus, solving the transmission investment problem is more complex than ''fixing'' merchant transmission; investment in the grid must be treated as a systems problem. (author)

Blumsack, Seth; Lave, Lester B.; Ilic, Marija

2008-03-15T23:59:59.000Z

412

Getting Help for Attention Problems Quick Review  

E-Print Network [OSTI]

Getting Help for Attention Problems Quick Review Page 1 of 4 DO I HAVE ATTENTION to ADHD, including other learning disabilities, emotional or medical difficulties. HOW TO GET HELP). #12;Getting Help for Attention Problems Quick Review Page 2 of 4 Local Providers for ADHD Testing

California at Santa Cruz, University of

413

CrowdPhase: crowdsourcing the phase problem  

Science Journals Connector (OSTI)

The idea of attacking the phase problem by crowdsourcing is introduced. Using an interactive, multi-player, web-based system, participants work simultaneously to select phase sets that correspond to better electron-density maps in order to solve low-resolution phasing problems.

Jorda, J.

2014-05-23T23:59:59.000Z

414

CALIFORNIA ENERGY Small HVAC Problems and Potential  

E-Print Network [OSTI]

CALIFORNIA ENERGY COMMISSION Small HVAC Problems and Potential Savings Reports Summary of Problems of the Integrated Design of Small Commercial HVAC Systems research project. The reports are a result of funding: Productivity and Interior Environments Integrated Design of Large Commercial HVAC Systems Integrated Design

415

Global optimization in inverse problem of scatterometry  

E-Print Network [OSTI]

Global optimization in inverse problem of scatterometry Lekbir Afraites1,2 Jerome Hazard3 Patrick as a parametric optimization problem using the Least Square criterion. In this work, a design procedure for global robust optimization is developed using Kriging and global optimization approaches. Robustness

Paris-Sud XI, Université de

416

Lattice Vibration and Random Walk Problems  

Science Journals Connector (OSTI)

......1960 research-article Articles Lattice Vibration and Random Walk Problems Ei Teramoto...Mathematical relations between the lattice vibration and the random walk problems are presented...the frequency spectrum of the lattice vibration can be expressed in terms of the transition......

Ei Teramoto

1960-12-01T23:59:59.000Z

417

Multiple gamma lines from semi-annihilation  

SciTech Connect (OSTI)

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

418

Student's algorithm solves real-world problem  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Student's algorithm solves real-world problem Student's algorithm solves real-world problem Supercomputing Challenge: student's algorithm solves real-world problem Students learn how to use powerful computers to analyze, model, and solve real-world problems. April 3, 2012 Jordon Medlock of Albuquerque's Manzano High School won the 2012 Lab-sponsored Supercomputing Challenge Jordon Medlock of Albuquerque's Manzano High School won the 2012 Lab-sponsored Supercomputing Challenge by creating a computer algorithm that automates the process of counting and analyzing plaques, substances in the blood such as fat and cholesterol found in persons diagnosed with Alzheimer's disease. Contact Kurt Steinhaus (505) 665-7370 Email "The mission of the Supercomputing Challenge is to teach students how to use powerful computers to analyze, model, and solve real-world problems,"

419

A dynamic priority based path planning for cooperation of multiple mobile robots in formation forming  

Science Journals Connector (OSTI)

Abstract Robots that work in a proper formation show several advantages compared to a single complex robot, such as a reduced cost, robustness, efficiency and improved performance. Existing researches focused on the method of keeping the formation shape during the motion, but usually neglect collision constraints or assume a simplified model of obstacles. This paper investigates the path planning of forming a target robot formation in a clutter environment containing unknown obstacles. The contribution lies in proposing an efficient path planner for the multiple mobile robots to achieve their goals through the clutter environment and developing a dynamic priority strategy for cooperation of robots in forming the target formation. A multirobot system is set up to verify the proposed method of robot path planning. Simulations and experiments results demonstrate that the proposed method can successfully address the collision avoidance problem as well as the formation forming problem.

Shuang Liu; Dong Sun; Changan Zhu

2014-01-01T23:59:59.000Z

420

Contributions on secretary problems, independent sets of rectangles and related problems  

E-Print Network [OSTI]

We study three problems arising from different areas of combinatorial optimization. We first study the matroid secretary problem, which is a generalization proposed by Babaioff, Immorlica and Kleinberg of the classical ...

Soto, José Antonio, Ph. D. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Investigating the effects of instruction on problem representation, domain knowledge, and problem solving in physics  

E-Print Network [OSTI]

to the problems. Pre- and posttests designed to measure domain knowledge and problem-solving were given to students in both control and experimental groups. Data were analyzed using Kruskal-Wallis tests and analysis of covariance (ANCOVA). Results indicate... and Control Groups. 3 Skewness and Kurtosis of Composite and Problem-by-Problem Variables for High and Low Representation Groups. . . . . . . . . . . . 35 4 Medians and Chi-square Approximations of Kruskal-Wallis Tests of Physical Representation Scores...

Schulze, Sharon Kay

2012-06-07T23:59:59.000Z

422

Int. Conf. on Computational Methods for Coupled Problems in Science and Engineering COUPLED PROBLEMS 2007  

E-Print Network [OSTI]

. Numerical results are presented for the shock tube problem and for a 2D supersonic flow in a scramjet inlet

Kuzmin, Dmitri

423

Appears at the Very Large Data Bases Journal, Vol. 4, No. 4, pp. 703726, October 1995 Historical Queries along Multiple Lines of Time Evolution +  

E-Print Network [OSTI]

. There are many database applications however, where it is important to capture the history of the database to addressing historical queries assume a single line of time evolution, i.e., a system (database, relation of these multiple­lines of time evolution problems is that portions of the history are shared; answering historical

Tsotras, Vassilis J.

424

Negotiation as a Metaphor for Distributed Problem Solving  

E-Print Network [OSTI]

We describe the concept of distributed problem solving and define it as the cooperative solution of problems by a decentralized and loosely coupled collection of problem solvers. This approach to problem solving offers ...

Davis, Randall

1981-05-01T23:59:59.000Z

425

Some Logic Problems Here are some logic design problems for you to think about. Have fun!  

E-Print Network [OSTI]

1 Some Logic Problems Here are some logic design problems for you to think about. Have fun! Problem 1 You are asked to design the logic to control a solar heating system. The solar system consists of a collector, a rock energy storage bin, a heated space, an auxiliary heater, and various fans and valves

Kozick, Richard J.

426

PROMPT VERSUS PROBLEM: HELPING STUDENTS LEARN TO FRAME PROBLEMS AND THINK CREATIVELY  

E-Print Network [OSTI]

. Creative thinking is needed to approach such problems. What about creative thinking in the engineering creativity rather than building skills or analytical abilities. 2.2 Key Questions Does engineering educationPROMPT VERSUS PROBLEM: HELPING STUDENTS LEARN TO FRAME PROBLEMS AND THINK CREATIVELY JUSTIN Y LAI

Yang, Maria

427

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

428

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

429

A Diagrammatic Approach to the Meander Problem  

E-Print Network [OSTI]

The meander problem is a combinatorial problem which provides a toy model of the compact folding of polymer chains. In this paper we study various questions relating to the enumeration of meander diagrams, using diagrammatical methods. By studying the problem of folding tree graphs, we derive a lower bound on the exponential behaviour of the number of connected meander diagrams. A different diagrammatical method, based on a non-commutative algebra, provides an approximate calculation of the behaviour of the generating functions for both meander and semi-meander diagrams.

M. G. Harris

1998-07-27T23:59:59.000Z

430

An approach for solving of a moving boundary problem  

Science Journals Connector (OSTI)

In this paper we shall study moving boundary problems, and we introduce an approach for solving a wide range of them by using calculus of variations and optimization. First, we transform the problem equivalently into an optimal control problem by defining ... Keywords: Stefan problems, free and moving boundary problems, measure theory, nonlinear PDE, nonlinear boundary value problems, optimal control

Hadi Basirzadeh; Ali Vahidian Kamyad

1986-01-01T23:59:59.000Z

431

How Do We Solve Our Problems  

Science Journals Connector (OSTI)

More often than not, science fiction movies involve crisis management. A serious problem arises—alien invaders, natural disasters, or unforeseen consequences of some new technology, to name just a few—and a so...

Barry B. Luokkala

2014-01-01T23:59:59.000Z

432

Kepler problem and Maxwell fish?eye  

Science Journals Connector (OSTI)

In a certain sense the theory of the Maxwell fish?eye and that of the Kepler problem are formally equivalent. This equivalence and its consequences are described in some detail.

H. A. Buchdahl

1978-01-01T23:59:59.000Z

433

Crowdsourcing suggestions to programming problems for dynamic  

E-Print Network [OSTI]

). Failing tests thus indicate both missing functionality and incorrect program behavior. We implement CrowdCrowdsourcing suggestions to programming problems for dynamic web development languages Abstract Developers increasingly consult online examples and message boards to find solutions to common programming

Hartmann, Björn

434

Online decision problems with large strategy sets  

E-Print Network [OSTI]

In an online decision problem, an algorithm performs a sequence of trials, each of which involves selecting one element from a fixed set of alternatives (the "strategy set") whose costs vary over time. After T trials, the ...

Kleinberg, Robert David

2005-01-01T23:59:59.000Z

435

Simultaneous Solution of Lagrangean Dual Problems Interleaved ...  

E-Print Network [OSTI]

der resource constraints [10, 21] and shortest path net- work routing ... as previous algorithms, on average, but that is signifi- cantly more ... the relative performance across the spectrum. 2 Problem ...... The improvement in tractability with AEO ...

2007-11-05T23:59:59.000Z

436

Nonlinear boundary value problem of magnetic insulation  

E-Print Network [OSTI]

On the basis of generalization of upper and lower solution method to the singular two point boundary value problems, the existence theorem of solutions for the system, which models a process of magnetic insulation in plasma is proved.

A. V. Sinitsyn

2000-09-09T23:59:59.000Z

437

Delaware Transportation Infrastructure Forum Problem Identification Statements  

E-Print Network [OSTI]

2013 Delaware Transportation Infrastructure Forum Problem Identification Statements Sponsored by The Delaware Center for Transportation and the Delaware Department of Transportation Delaware Center for Transportation Your main resource for transportation education and research Identifying Important Issues Related

Firestone, Jeremy

438

PARABOLIC OBSTACLE PROBLEMS APPLIED TO FINANCE A ...  

E-Print Network [OSTI]

1. Introduction. 1.1. Background. The parabolic obstacle problem refers to finding the smallest supper-solution (for a given parabolic ... H. Shahgholian is supported by Swedish Research Council. 1 ...... MR MR2052937 (2005d:35276). [BD97].

2006-03-07T23:59:59.000Z

439

Waste minimization necessary for solving wastewater problems  

SciTech Connect (OSTI)

Developing and implementing waste minimization procedures to correct the wastewater treatment problem are not as simple as identifying the problem. People cannot solve today's problems with the same kind of thinking that caused the problems. Nonetheless, industry primarily is using traditional treatment technologies to reduce wastewater. most companies are upgrading their wastewater treatment plants and installing treatment equipment in process areas whenever technically and economically feasible. The solution to ensuring wastewater compliance is recycling, waste minimization and moving toward zero discharge. Treating wastewater to the best possible quality still creates residual waste that must be disposed. In addition, regulatory limits continue to increase. Although some facilities can close and have closed the loop in certain processes, industry is pursuing waste minimization and the goal of zero discharge, given existing technology and economics. This, companies must taken an innovative approach to reducing wastewater volume and toxicity at the source.

Melody, M.

1993-07-01T23:59:59.000Z

440

The Vehicle Platooning Problem - Optimization Online  

E-Print Network [OSTI]

truck in a platoon has a fuel cost of only c(T) · ?, owing to a reduction in air ...... T. Bektas, and G. Laporte, “The Time-Dependent Pollution-Routing Problem,”.

2014-10-22T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Safeguards and the problem of VERs  

Science Journals Connector (OSTI)

One of the most complex problems facing GATT during the current Uruguay round of trade talks is the reform of Article XIX on temporary protection measures, commonly known as safeguards. Our author argues that, pr...

Phedon Nicolaides

442

A Survey of Network Design Problems  

E-Print Network [OSTI]

This report is a survey of the design of various types of networks that frequently occur in the study of transportation and communication problems. The report contains a general framework which facilitates comparisons ...

Wong, Richard T.

443

A Symmetry Problem for the Infinity Laplacian  

Science Journals Connector (OSTI)

......particular, we need to build suitable viscosity test functions, whose construction involves...the construction of suitable viscosity test functions and involves a result which may...crucial tool to construct suitable viscosity test functions for problem (3). We recall......

Graziano Crasta; Ilaria Fragalà

2014-11-01T23:59:59.000Z

444

Mosquito Problems after a Storm (Spanish)  

E-Print Network [OSTI]

Areas flooded after a severe storm are prone to mosquito problems. Several mosquito species are a danger to humans because of the diseases they transmit. This publication explains the symptoms of dengue fever, West Nile virus and St. Louis...

Johnsen, Mark

2008-08-05T23:59:59.000Z

445

Numerical solution methods for differential game problems  

E-Print Network [OSTI]

Differential game theory provides a potential means for the parametric analysis of combat engagement scenarios. To determine its viability for this type of analysis, three frameworks for solving differential game problems ...

Johnson, Philip A. (Philip Arthur)

2009-01-01T23:59:59.000Z

446

The ? problem and the invisible axion  

Science Journals Connector (OSTI)

The ? term in the supersymmetric standard model is known to be nonzero. Supersymmetry breaking at the intermediate scale may provide the needed ? term and the invisible axion. A possible solution of this ? problem in superstring models is also discussed.

Jihn E. Kim

1992-01-01T23:59:59.000Z

447

A Landscape Analysis of Constraint Satisfaction Problems  

E-Print Network [OSTI]

We discuss an analysis of Constraint Satisfaction problems, such as Sphere Packing, K-SAT and Graph Coloring, in terms of an effective energy landscape. Several intriguing geometrical properties of the solution space become in this light familiar in terms of the well-studied ones of rugged (glassy) energy landscapes. A `benchmark' algorithm naturally suggested by this construction finds solutions in polynomial time up to a point beyond the `clustering' and in some cases even the `thermodynamic' transitions. This point has a simple geometric meaning and can be in principle determined with standard Statistical Mechanical methods, thus pushing the analytic bound up to which problems are guaranteed to be easy. We illustrate this for the graph three and four-coloring problem. For Packing problems the present discussion allows to better characterize the `J-point', proposed as a systematic definition of Random Close Packing, and to place it in the context of other theories of glasses.

Florent Krzakala; Jorge Kurchan

2007-06-18T23:59:59.000Z

448

AGREE-DISAGREE QUESTIONS: PROBLEMS AND SOME  

E-Print Network [OSTI]

AGREE-DISAGREE QUESTIONS: PROBLEMS AND SOME SOLUTIONS Allyson L. Holbrook Associate Professor that established a woman's right to an abortion?" #12;EXAMPLE SCALES: HANDBOOK OF MARKETING SCALES (2010) Ten

Illinois at Chicago, University of

449

Calculating the Habitable Zones of Multiple Star Systems with a New Interactive Web Site  

Science Journals Connector (OSTI)

We have developed a comprehensive methodology and an interactive Web site for calculating the habitable zone (HZ) of multiple star systems. Using the concept of spectral weight factor, as introduced in our previous studies of the calculations of HZ in and around binary star systems, we calculate the contribution of each star (based on its spectral energy distribution) to the total flux received at the top of the atmosphere of an Earth-like planet, and use the models of the HZ of the Sun to determine the boundaries of the HZ in multiple star systems. Our interactive Web site for carrying out these calculations is publicly available at http://astro.twam.info/hz. We discuss the details of our methodology and present its application to some of the multiple star systems detected by the Kepler space telescope. We also present the instructions for using our interactive Web site, and demonstrate its capabilities by calculating the HZ for two interesting analytical solutions of the three-body problem.

Tobias W. A. Müller; Nader Haghighipour

2014-01-01T23:59:59.000Z

450

The Gauge Hierarchy Problem and Planck Oscillators  

E-Print Network [OSTI]

A longstanding question that has puzzled Physicists is the so called gauge hierarchy problem, that is why is there such a wide gap between the mass of a Planck particle, $10^{-5}gms$ and the mass of a typical elementary particle $\\sim 10^{-25}gms$. We show that the answer to this problem lies in a particular characterization of gravitation. This moreover also provides a picture of a Planck scale underpinning for the entire universe itself.

B. G. Sidharth

2005-08-12T23:59:59.000Z

451

Practice Problems Moran & Shapiro, 5th Edition  

E-Print Network [OSTI]

? In Rankine cycle problem presented in the lecture of Nov. 10, 2004 w34s -4 KJ/kg w12s 900 KJ/kg ¯ ¯ ¯ ¯ w34 method for Rankine cycle analysis. · For very rough estimates, the pump work (which is a modest item Problem 8.9: Follow the format of the cycle analysis handed out on Nov. 10, 2004: 1. Draw schematic

452

Time-evolution problem in regge calculus  

Science Journals Connector (OSTI)

The simplectic approximation to Einstein's equations ("Regge calculus") is derived by considering the net to be actually a (singular) Riemannian manifold. Specific nets for open and closed spaces are introduced in terms of which one can formulate the general time-evolution problem, which thereby reduces to the repeated solution of finite sets of coupled nonlinear (algebraic) equations. The initial-value problem is also formulated in simplectic terms.

Rafael Sorkin

1975-07-15T23:59:59.000Z

453

Geological problems in radioactive waste isolation  

SciTech Connect (OSTI)

The problem of isolating radioactive wastes from the biosphere presents specialists in the fields of earth sciences with some of the most complicated problems they have ever encountered. This is especially true for high level waste (HLW) which must be isolated in the underground and away from the biosphere for thousands of years. Essentially every country that is generating electricity in nuclear power plants is faced with the problem of isolating the radioactive wastes that are produced. The general consensus is that this can be accomplished by selecting an appropriate geologic setting and carefully designing the rock repository. Much new technology is being developed to solve the problems that have been raised and there is a continuing need to publish the results of new developments for the benefit of all concerned. The 28th International Geologic Congress that was held July 9--19, 1989 in Washington, DC provided an opportunity for earth scientists to gather for detailed discussions on these problems. Workshop W3B on the subject, Geological Problems in Radioactive Waste Isolation -- A World Wide Review'' was organized by Paul A Witherspoon and Ghislain de Marsily and convened July 15--16, 1989 Reports from 19 countries have been gathered for this publication. Individual papers have been cataloged separately.

Witherspoon, P.A. (ed.)

1991-01-01T23:59:59.000Z

454

Organic light emitting device having multiple separate emissive layers  

DOE Patents [OSTI]

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

455

Simulating variable source problems via post processing of individual particle tallies  

SciTech Connect (OSTI)

Monte Carlo is an extremely powerful method of simulating complex, three dimensional environments without excessive problem simplification. However, it is often time consuming to simulate models in which the source can be highly varied. Similarly difficult are optimization studies involving sources in which many input parameters are variable, such as particle energy, angle, and spatial distribution. Such studies are often approached using brute force methods or intelligent guesswork. One field in which these problems are often encountered is accelerator-driven Boron Neutron Capture Therapy (BNCT) for the treatment of cancers. Solving the reverse problem of determining the best neutron source for optimal BNCT treatment can be accomplished by separating the time-consuming particle-tracking process of a full Monte Carlo simulation from the calculation of the source weighting factors which is typically performed at the beginning of a Monte Carlo simulation. By post-processing these weighting factors on a recorded file of individual particle tally information, the effect of changing source variables can be realized in a matter of seconds, instead of requiring hours or days for additional complete simulations. By intelligent source biasing, any number of different source distributions can be calculated quickly from a single Monte Carlo simulation. The source description can be treated as variable and the effect of changing multiple interdependent source variables on the problem's solution can be determined. Though the focus of this study is on BNCT applications, this procedure may be applicable to any problem that involves a variable source.

Bleuel, D.L.; Donahue, R.J.; Ludewigt, B.A.; Vujic, J.

2000-10-20T23:59:59.000Z

456

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect (OSTI)

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

457

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

458

Building multiple adsorption sites in porous polymer networks...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

459

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

460

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

462

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network [OSTI]

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

463

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

464

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

465

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network [OSTI]

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the… (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

466

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

467

Surface tension of multi-phase flow with multiple junctions governed by the variational principle  

E-Print Network [OSTI]

We explore a computational model of an incompressible fluid with a multi-phase field in three-dimensional Euclidean space. By investigating an incompressible fluid with a two-phase field geometrically, we reformulate the expression of the surface tension for the two-phase field found by Lafaurie, Nardone, Scardovelli, Zaleski and Zanetti (J. Comp. Phys. \\vol{113} \\yr{1994} \\pages{134-147}) as a variational problem related to an infinite dimensional Lie group, the volume-preserving diffeomorphism. The variational principle to the action integral with the surface energy reproduces their Euler equation of the two-phase field with the surface tension. Since the surface energy of multiple interfaces even with singularities is not difficult to be evaluated in general and the variational formulation works for every action integral, the new formulation enables us to extend their expression to that of a multi-phase ($N$-phase, $N\\ge2$) flow and to obtain a novel Euler equation with the surface tension of the multi-phase field. The obtained Euler equation governs the equation of motion of the multi-phase field with different surface tension coefficients without any difficulties for the singularities at multiple junctions. In other words, we unify the theory of multi-phase fields which express low dimensional interface geometry and the theory of the incompressible fluid dynamics on the infinite dimensional geometry as a variational problem. We apply the equation to the contact angle problems at triple junctions. We computed the fluid dynamics for a two-phase field with a wall numerically and show the numerical computational results that for given surface tension coefficients, the contact angles are generated by the surface tension as results of balances of the kinematic energy and the surface energy.

Shigeki Matsutani; Kota Nakano; Katsuhiko Shinjo

2011-08-02T23:59:59.000Z

468

Simple Models of the Protein Folding Problem  

E-Print Network [OSTI]

The protein folding problem has attracted an increasing attention from physicists. The problem has a flavor of statistical mechanics, but possesses the most common feature of most biological problems -- the profound effects of evolution. I will give an introduction to the problem, and then focus on some recent work concerning the so-called ``designability principle''. The designability of a structure is measured by the number of sequences that have that structure as their unique ground state. Structures differ drastically in terms of their designability; highly designable structures emerge with a number of associated sequences much larger than the average. These highly designable structures 1) possess ``proteinlike'' secondary structures and motifs, 2) are thermodynamically more stable, and 3) fold faster than other structures. These results suggest that protein structures are selected in nature because they are readily designed and stable against mutations, and that such selection simultaneously leads to thermodynamic stability and foldability. According to this picture, a key to the protein folding problem is to understand the emergence and the properties of the highly designable structures.

Chao Tang

1999-12-26T23:59:59.000Z

469

Frequency Instability Problems in North American Interconnections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Frequency Instability Problems in Frequency Instability Problems in North American Interconnections May 1, 2011 DOE/NETL-2011/1473 Frequency Instability Problems in North American Interconnections Disclaimer This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement,

470

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

471

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

472

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network [OSTI]

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

473

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network [OSTI]

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

474

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network [OSTI]

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

475

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network [OSTI]

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

476

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network [OSTI]

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

477

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network [OSTI]

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

478

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network [OSTI]

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

479

Rank Reduction for the Local Consistency Problem  

E-Print Network [OSTI]

We address the problem of how simple a solution can be for a given quantum local consistency instance. More specifically, we investigate how small the rank of the global density operator can be if the local constraints are known to be compatible. We prove that any compatible local density operators can be satisfied by a low rank global density operator. Then we study both fermionic and bosonic versions of the N-representability problem as applications. After applying the channel-state duality, we prove that any compatible local channels can be obtained through a global quantum channel with small Kraus rank.

Jianxin Chen; Zhengfeng Ji; Alexander Klyachko; David W. Kribs; Bei Zeng

2012-02-09T23:59:59.000Z

480

Transport Test Problems for Hybrid Methods Development  

SciTech Connect (OSTI)

This report presents 9 test problems to guide testing and development of hybrid calculations for the ADVANTG code at ORNL. These test cases can be used for comparing different types of radiation transport calculations, as well as for guiding the development of variance reduction methods. Cases are drawn primarily from existing or previous calculations with a preference for cases which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22.

Shaver, Mark W.; Miller, Erin A.; Wittman, Richard S.; McDonald, Benjamin S.

2011-12-28T23:59:59.000Z

Note: This page contains sample records for the topic "addthis problem multiple" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

A constrained-based optimization approach for seismic data recovery problems  

E-Print Network [OSTI]

Random and structured noise both affect seismic data, hiding the reflections of interest (primaries) that carry meaningful geophysical interpretation. When the structured noise is composed of multiple reflections, its adaptive cancellation is obtained through time-varying filtering, compensating inaccuracies in given approximate templates. The under-determined problem can then be formulated as a convex optimization one, providing estimates of both filters and primaries. Within this framework, the criterion to be minimized mainly consists of two parts: a data fidelity term and hard constraints modeling a priori information. This formulation may avoid, or at least facilitate, some parameter determination tasks, usually difficult to perform in inverse problems. Not only classical constraints, such as sparsity, are considered here, but also constraints expressed through hyperplanes, onto which the projection is easy to compute. The latter constraints lead to improved performance by further constraining the space ...

Pham, Mai Quyen; Duval, Laurent; Pesquet, Jean-Christophe

2014-01-01T23:59:59.000Z

482

Florence, 28/02/2011: Two applied inverse problems: Introduction 1 -Problem #1: Studying the protein fold via NMR constraints.  

E-Print Network [OSTI]

the protein fold via NMR constraints. In collaboration with the CERM (Centre for Magnetic Resonance problems. #12;Florence, 28/02/2011: Two applied inverse problems: The problem of protein folding 2 H CCN) Backbone #12;Florence, 28/02/2011: Two applied inverse problems: The problem of protein folding 3 Genoma

Pedicini, Marco

483

Introduction Framework Multiscale Expansion Axisymmetric Problems FEM Simulations Postprocessing A Transmission Problem in Electromagnetism with a  

E-Print Network [OSTI]

A Transmission Problem in Electromagnetism with a Singular Interface GABRIEL CALOZ 2 MONIQUE DAUGE 2 ERWAN FAOU 2´eron A Transmission Problem in Electromagnetism with a Singular Interface 1 / 33 inria-00528523,version1-22Oct2010 of electromagnetic fields with depth inside the conductor. The Skin Depth : () = 2/µ0 V. P´eron A Transmission

Paris-Sud XI, Université de

484

Exact and Heuristic Methods for the Weapon Target Assignment Problem  

E-Print Network [OSTI]

The Weapon Target Assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. This problem consists of optimally assigning n weapons to m targets so ...

Ahuja, Ravindra

2004-12-10T23:59:59.000Z

485

Exact and Heuristic Methods for the Weapon Target Assignment Problem  

E-Print Network [OSTI]

The Weapon Target Assignment (WTA) problem is a fundamental problem arising in defense-related applications of operations research. This problem consists of optimally assigning n weapons to m targets so that the total ...

Ahuja, Ravindra K.

2004-04-02T23:59:59.000Z

486

A SEMIDEFINITE APPROACH TO THE Ki COVER PROBLEM 1 ...  

E-Print Network [OSTI]

least one vertex from C. However, note that the usage of “cover” is reversed here: the vertex cover problem is the K2-cover problem, not the K1-cover problem.

2014-01-31T23:59:59.000Z

487

Towards Better Approaches To Decision Support in Logistics Problems  

E-Print Network [OSTI]

Towards Better Approaches To Decision Support in Logistics Problems Ian Davidson and Ryszard a decision support framework for logistics problems. The research covers methodologies, technologies and software tools. The framework considers typical characteristics of real-world logistics problems, common

Davidson, Ian

488

A Software Architecture for an Engineering Collaborative Problem Solving Environment  

E-Print Network [OSTI]

A Software Architecture for an Engineering Collaborative Problem Solving Environment Ismael H. F Environment. The architecture composes a Collaborative Problem Solving Environment that enables engineers-Oriented Architecture (SOA) for a Collaborative Problem Solving Environment for Petroleum Engineering (PE), tailored

Barbosa, Alberto

489

Projection and restriction methods in geometric programming and related problems  

Science Journals Connector (OSTI)

Mathematical programming problems with unattained infima or unbounded optimal solution sets are dual to problems which lackinterior points, e.g., problems for which the Slater condition fails to hold or for which...

R. A. Abrams; C. T. Wu

1978-09-01T23:59:59.000Z

490

Approximation Algorithms for Maximization Problems arising in  

E-Print Network [OSTI]

Approximation Algorithms for Maximization Problems arising in Graph Partitioning Thesis for the M of size k that maximizes : Max­k­Vertex Cover : the weight of edges incident with vertices in U . Max a number of approximation algorithms based on linear and semidefinite programming, and obtain approximation

Langberg, Michael

491

Problems on Non-Equilibrium Statistical Physics  

E-Print Network [OSTI]

energy functional, similar to the problem in dimensional scaling in the H-atom. For the C-atom, we got the ground state energy -37:82 eV with a relative error less than 6 %. The simplest molecular ion, H+ 2 , has been investigated by the quasi...

Kim, Moochan

2011-08-08T23:59:59.000Z

492

Estimating Bounds for Quadratic Assignment Problems Associated ...  

E-Print Network [OSTI]

trix for a hypercube or a Manhattan distance matrix for a rectangular grid arise frequently ... ? is a properly chosen parameter depending only on the associated graph ...... and SDPT3 [31] under Matlab R2008b to solve our problem. In Table 1

2010-09-17T23:59:59.000Z

493

Strong CP problem and flat potential  

Science Journals Connector (OSTI)

We investigate the strong CP problem in an SU(1,1) supergravity model possessing a nonminimal Yang-Mills kinetic energy. The noncompact U?(1)I is broken by nonperturbative QCD effects, and the axionlike field has weird properties from this symmetry breaking.

Kiwoon Choi

1985-03-15T23:59:59.000Z

494

Convergent relaxations of polynomial optimization problems with ...  

E-Print Network [OSTI]

A standard problem in optimization theory is to find the global minimum of a polynomial on a set ..... Since Mk(ˆy) ? 0 for all k, this linear functional is positive ...... International Book Series ... energies via the two-particle reduced density matrix.

2010-01-11T23:59:59.000Z

495

A computational inverse diffraction grating problem  

E-Print Network [OSTI]

Mar 2, 2012 ... od and a variational (finite element) method have been developed in [3,4]. ... problems in diffractive optics, which is to design a grating structure that .... where the free-space quasiperiodic Green function is given ex- plicitly as.

2012-02-29T23:59:59.000Z

496

RESOLVING BEAM TRANSPORT PROBLEMS IN ELECTROSTATIC ACCELERATORS  

E-Print Network [OSTI]

RESOLVING BEAM TRANSPORT PROBLEMS IN ELECTROSTATIC ACCELERATORS J. D. LARSON (*) Oak Ridge National are frequently encounte- red during the design, operation and upgrading of electrostatic accelerators. Examples are provided of analytic procedures that clarify accelerator ion optics and lead to more effective beam

Boyer, Edmond

497

Cherokee Clitics: The Word Boundary Problem  

E-Print Network [OSTI]

The problem of identifying Cherokee clitics is complicated by the fact that the prosodic word, marked by the presence of a tonal boundary, may not match the morphological word. Clitics may or may not respect the the word boundary as marked by tone...

Haag, Marcia

1999-01-01T23:59:59.000Z

498

The LCA Problem Revisited Michael A. Bender  

E-Print Network [OSTI]

The LCA Problem Revisited Michael A. Bender #3; SUNY Stony Brook Mart��n Farach�Colton y Rutgers thus dispel the fre� quently held notion that an optimal LCA computation is unwieldy (LCA), Range Minimum Query (RMQ), Cartesian Tree. 1 Introduction One of the most fundamental

Bender, Michael

499

The LCA Problem Revisited Michael A. Bender  

E-Print Network [OSTI]

The LCA Problem Revisited Michael A. Bender£ SUNY Stony Brook Mart´in Farach-ColtonÝ Rutgers thus dispel the fre- quently held notion that an optimal LCA computation is unwieldy (LCA), Range Minimum Query (RMQ), Cartesian Tree. 1 Introduction One of the most fundamental

Bender, Michael

500

Scientific Knowledge 1. What is the Problem?  

E-Print Network [OSTI]

Chapter 1 Scientific Knowledge 1. What is the Problem? Since the end of World War II, the influence knowledge, medicine and the military being prime examples. If one includes computer technology, one could scientific knowledge.1 In spite of the undeniable successes of post World War II science, there have always

Giere, Ronald N.