National Library of Energy BETA

Sample records for arbitrary code platform

  1. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  2. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  3. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  4. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  5. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  6. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  7. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  8. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  9. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  10. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  11. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  12. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  13. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  14. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  15. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  16. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  19. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  20. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  1. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  2. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  3. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  4. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  10. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  11. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  12. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  13. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  14. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  15. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  16. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  17. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  18. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  19. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  20. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  1. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  2. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  5. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  6. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  7. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  8. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  9. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  10. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  12. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  13. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  14. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  15. Code System to Perform Monte Carlo Simulation of Electron Gamma-Ray Showers in Arbitrary Marerials.

    Energy Science and Technology Software Center (OSTI)

    2002-10-15

    Version 00 PENELOPE performs Monte Carlo simulation of electron-photon showers in arbitrary materials. Initially, it was devised to simulate the PENetration and Energy LOss of Positrons and Electrons in matter; photons were introduced later. The adopted scattering model gives a reliable description of radiation transport in the energy range from a few hundred eV to about 1GeV. PENELOPE generates random electron-photon showers in complex material structures consisting of any number of distinct homogeneous regions (bodies)more » with different compositions. The Penelope Forum list archives and other information can be accessed at http://www.nea.fr/lists/penelope.html. PENELOPE-MPI extends capabilities of PENELOPE-2001 (RSICC C00682MNYCP02; NEA-1525/05) by providing for usage of MPI type parallel drivers and extends the original version's ability to read different types of input data sets such as voxel. The motivation is to increase efficiency of Monte Carlo simulations for medical applications. The physics of the calculations have not been changed, and the original description of PENELOPE-2001 (which follows) is still valid. PENELOPE-2001 contains substantial changes and improvements to the previous versions 1996 and 2000. As for the physics, the model for electron/positron elastic scattering has been revised. Bremsstrahlung emission is now simulated using partial-wave data instead of analytical approximate formulae. Photoelectric absorption in K and L-shells is described from the corresponding partial cross sections. Fluorescence radiation from vacancies in K and L-shells is followed. Refinements were also introduced in electron/positron transport mechanics, mostly to account for energy dependence of the mean free paths for hard events. Simulation routines were re-programmed in a more structured way, and new example MAIN programs were written with a more flexible input and expanded output.« less

  16. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  17. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution...

  18. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  19. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  20. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  1. Arbitrary Lagrangian Eulerian Adaptive Mesh Refinement

    Energy Science and Technology Software Center (OSTI)

    2009-09-29

    This is a simulation code involving an ALE (arbitrary Lagrangian-Eulerian) hydrocode with AMR (adaptive mesh refinement) and pluggable physics packages for material strength, heat conduction, radiation diffusion, and laser ray tracing developed a LLNL, UCSD, and Berkeley Lab. The code is an extension of the open source SAMRAI (Structured Adaptive Mesh Refinement Application Interface) code/library. The code can be used in laser facilities such as the National Ignition Facility. The code is alsi being appliedmore » to slurry flow (landslides).« less

  2. Symmetry tuning of a near one-dimensional 2-shock platform for code validation at the National Ignition Facility

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Khan, S. F.; MacLaren, S. A.; Salmonson, J. D.; Ma, T.; Kyrala, G. A.; Pino, J. E.; Rygg, J. R.; Field, J. E.; Tommasini, R.; Ralph, J. E.; et al

    2016-04-27

    Here, we introduce a new quasi 1-D implosion experimental platform at the National Ignition Facility designed to validate physics models as well as to study various Inertial Confinement Fusion aspects such as implosion symmetry, convergence, hydrodynamic instabilities, and shock timing. The platform has been developed to maintain shell sphericity throughout the compression phase and produce a round hot core at stagnation. This platform utilizes a 2-shock 1 MJ pulse with 340 TW peak power in a near-vacuum AuHohlraum and a CH ablator capsule uniformly doped with 1% Si. We also performed several inflight radiography, symmetry capsule, and shock timing experimentsmore » in order to tune the symmetry of the capsule to near round throughout several epochs of the implosion. Finally, adjusting the relative powers of the inner and outer cones of beams has allowed us to control the drive at the poles and equator of the capsule, thus providing the mechanism to achieve a spherical capsule convergence. Details and results of the tuning experiments are described.« less

  3. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  4. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  5. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  6. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  7. Sandia's Arbitrary Waveform MEMO Actuator

    Energy Science and Technology Software Center (OSTI)

    2003-08-07

    SAMA is a multichannel, arbitrary waveform generator program for driving microelectromechanical systems (MEMS). It allows the user to piece together twelve available wave parts, thereby permitting the user to create practically any waveform, or upload a previously constructed signal. The waveforms (bundled together as a signal) may simultaneously be output through four different channels to actuate MEMS devices, and the number of output channels may be increased depending on the DAQ card or instrument utilized.more » Additionally, real-time changes may be made to the frequency and amplitude. The signal may be paused temporarily. The waveform may be saved to file for future uploading. Recent work for this version has focused on modifications that will allow loading previously generated arbitrary waveforms, independent channel waveform amplification, adding a pause function, separating the "modify waveform: and "end program" functions, and simplifying the user interface by adding test blocks with statements to help the user program and output the desired signals. The program was developed in an effort to alleviate some of the limitations of Micro Driver. For example, Micro Driver will not allow the user to select a segment of a sine wave, but rather the user is limited to choosing either a whole or half sine wave pattern. It therefore becomes quite difficult ot construct partial sine wave patterns out of a "ramp" waveparts for several reasons. First, one must determine on paper how many data points each ramp will cover, and what the slopes of these ramps will be. Second, from what was observed, Micro Driver has difficulty processing more than six distinct waveparts during sequencing. The program will allow the user to input the various waves into the desired sequence; however, it will not allow the user to compile them (by clicking "ok" and returning to the main screen). Third, should the user decide that they want to increase the amplitute of the output signal

  8. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  9. An Arbitrary Precision Computation Package

    Energy Science and Technology Software Center (OSTI)

    2003-06-14

    This package permits a scientist to perform computations using an arbitrarily high level of numeric precision (the equivalent of hundreds or even thousands of digits), by making only minor changes to conventional C++ or Fortran-90 soruce code. This software takes advantage of certain properties of IEEE floating-point arithmetic, together with advanced numeric algorithms, custom data types and operator overloading. Also included in this package is the "Experimental Mathematician's Toolkit", which incorporates many of these facilitiesmore » into an easy-to-use interactive program.« less

  10. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  11. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am...

  12. Efficient isoparametric integration over arbitrary space-filling...

    Office of Scientific and Technical Information (OSTI)

    Efficient isoparametric integration over arbitrary space-filling Voronoi polyhedra for electronic structure calculations Prev Next Title: Efficient isoparametric integration ...

  13. Pre-Amp Box Platform Analysis

    SciTech Connect (OSTI)

    Kirby, K.; Kurita, C.; /Fermilab

    1989-01-17

    A platform to be used for the installation and repair of the high voltage pre-amp boxes on the CC cryostat has been designed to support a uniform load of 30 Ibs./sq. ft. However, according to the standards set by both the American National Standard and the Uniform Building Code, the minimum uniformly distributed design load for a structure used as an 'elevated platform or walkway' is 60 lbs./sq. ft. The existing platform was tested with a uniform load of 40 lbs./sq. ft. with no major problems occurring during the testing. Considering a 40 lbs./sq. ft. load to be the minimum acceptable value for 'residential' use, and the platform in hand to be better categorized as an 'elevated platform or walkway', the platform is carefully re-analyzed for a 60 lbs./sq. ft. uniformly distributed load.

  14. Post-Fabrication Placement of Arbitrary Chemical Functionality...

    Office of Scientific and Technical Information (OSTI)

    Post-Fabrication Placement of Arbitrary Chemical Functionality on Microphase-Separated Thin Films of Amine-Reactive Block Copolymers Citation Details In-Document Search Title: ...

  15. RESRAD Computer Code - Evaluation of Radioactively Contaminated...

    Office of Environmental Management (EM)

    then to improve the models within the codes, to operate on new computer platforms, to use new state of science radiation dose and risk factors, and to calculate cleanup criteria ...

  16. Mode coupling evolution in arbitrary inflationary backgrounds

    SciTech Connect (OSTI)

    Bernardeau, Francis

    2011-02-01

    The evolution of high order correlation functions of a test scalar field in arbitrary inflationary backgrounds is computed. Whenever possible, exact results are derived from quantum field theory calculations. Taking advantage of the fact that such calculations can be mapped, for super-horizon scales, into those of a classical system, we express the expected correlation functions in terms of classical quantities, power spectra, Green functions, that can be easily computed in the long-wavelength limit. Explicit results are presented that extend those already known for a de Sitter background. In particular the expressions of the late time amplitude of bispectrum and trispectrum, as well as the whole high-order correlation structure, are given in terms of the expansion factor behavior. When compared to the case of a de Sitter background, power law inflation and chaotic inflation induced by a massive field are found to induce high order correlation functions the amplitudes of which are amplified by almost one order of magnitude. These results indicate that the dependence of the related non-Gaussian parameters — such as f{sub NL} — on the wave-modes is at percent level.

  17. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically provide the necessary MPI include files and libraries. For Fortran source code use mpif90: % mpif90 -o example.x example.f90 For C source code use...

  18. Stabilized floating platforms

    DOE Patents [OSTI]

    Thomas, David G.

    1976-01-01

    The subject invention is directed to a floating platform for supporting nuclear reactors and the like at selected offshore sites. The platform is provided with a stabilizer mechanism which significantly reduces the effects of wave action upon the platform and which comprises a pair of relatively small floats attached by rigid booms to the platform at locations spaced therefrom for reducing wave pitch, acceleration, and the resonance period of the wave.

  19. Portable code development in C

    SciTech Connect (OSTI)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  20. Single-Species Aerosol Coagulation and Deposition with Arbitrary Size Resolution.

    Energy Science and Technology Software Center (OSTI)

    2012-07-31

    Version 00 SAEROSA solves the dynamic aerosol coagulation and deposition problem with arbitrary computational precision under a variety of conditions. The code includes numerous user-selectable coagulation kernels, alone or in combinations, and permits an arbitrary initial size distribution. Many parameter combinations and what-if scenarios under user control are possible. The output gives the particle size distribution suspended in the carrier fluid initially and after the desired aerosol aging time in terms of both differential andmore » integral aerosol volume concentrations. An auxiliary routine designed for the Mac OSX environment provides plotting capability. The output can be further processed by e.g., spreadsheets. The code has been benchmarked against three computer models, including MAEROS, and analytical models with excellent agreement. The test cases also included scenarios where previously published computational coagulation models lack capabilities or exhibit numerical instabilities. These included narrow, delta function, and non-lognormal initial size distributions, and further conditions, such as the presence of simultaneous coagulation mechanisms, including electrostatic effects, spanning multiple flow-regimes.« less

  1. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  2. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  3. Risk Code?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Identify the Task Risk Code >2 Determine if a Work Control Document is needed What is the Unmitigated Risk Code? Rev.1 09/05/14 Read and Agree to Comply with appropriate mitigation and sign Work Control Documents Is there an approved Work Control Document (WCD)? WORK PLANNING, CONTROL AND AUTHORIZATION FLOW DIAGRAM 1. Define Scope of Work 2. Analyze Hazards 3. Develop and Implement Hazard Controls 4. Perform Work Within Controls 5. Feedback and Continuous Improvement Analyze Hazards and

  4. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  5. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  6. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  7. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  8. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  9. The Integrated TIGER Series Codes

    Energy Science and Technology Software Center (OSTI)

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with anmore » input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.« less

  10. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  11. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  12. Ladder attachment platform

    DOE Patents [OSTI]

    Swygert,; Richard, W [Springfield, SC

    2012-08-28

    A ladder attachment platform is provided that includes a base for attachment to a ladder that has first and second side rails and a plurality of rungs that extend between in a lateral direction. Also included is a user platform for having a user stand thereon that is carried by the base. The user platform may be positioned with respect to the ladder so that it is not located between a first plane that extends through the first side rail and is perpendicular to the lateral direction and a second plane that extends through the second side rail and is perpendicular to the lateral direction.

  13. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High Performance Computing. The default compiler suite is from the Portland Group which is loaded by default at login, along with the PGI compiled Open MPI environment. % module list Currently Loaded Modulefiles: 1) pgi/10.8 2) openmpi/1.4.2 Basic Example Open MPI provides a convenient set of wrapper commands which you should use in

  14. WENO schemes on arbitrary unstructured meshes for laminar, transitional and turbulent flows

    SciTech Connect (OSTI)

    Tsoutsanis, Panagiotis, E-mail: panagiotis.tsoutsanis@cranfield.ac.uk; Antoniadis, Antonios Foivos, E-mail: a.f.antoniadis@cranfield.ac.uk; Drikakis, Dimitris, E-mail: d.drikakis@cranfield.ac.uk

    2014-01-01

    This paper presents the development and implementation of weighted-essentially-non-oscillatory (WENO) schemes for viscous flows on arbitrary unstructured grids. WENO schemes up to fifth-order accurate have been implemented in conjunction with hybrid and non-hybrid unstructured grids. The schemes are investigated with reference to numerical and experimental results for the TaylorGreen vortex, as well as for laminar and turbulent flows around a sphere, and the turbulent shock-wave boundary layer interaction flow problem. The results show that the accuracy of the schemes depends on the arbitrariness of shape and orientation of the unstructured mesh elements, as well as the compactness of directional stencils. The WENO schemes provide a more accurate numerical framework compared to second-order and third-order total variation diminishing (TVD) methods, however, the fifth-order version of the schemes is computationally too expensive to make the schemes practically usable. On the other hand, the third-order variant offers an excellent numerical framework in terms of accuracy and computational cost compared to the fifth-order WENO and second-order TVD schemes. Parallelisation of the CFD code (henceforth labelled as UCNS3D), where the schemes have been implemented, shows that the present methods offer very good scalable performance.

  15. Biochemical Platform Analysis

    SciTech Connect (OSTI)

    2006-06-01

    The objective of this project is to perform analysis for the Biochemical Platform to support the on-going research in biochemical conversion of biomass that will be part of an integrated biorefinery.

  16. Arbitrary unitary transformations on optical states using a quantum memory

    SciTech Connect (OSTI)

    Campbell, Geoff T.; Pinel, Olivier; Hosseini, Mahdi; Buchler, Ben C.; Lam, Ping Koy

    2014-12-04

    We show that optical memories arranged along an optical path can perform arbitrary unitary transformations on frequency domain optical states. The protocol offers favourable scaling and can be used with any quantum memory that uses an off-resonant Raman transition to reversibly transfer optical information to an atomic spin coherence.

  17. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  18. ORNL Flexible Research Platforms

    Broader source: Energy.gov (indexed) [DOE]

    ... data files, LNDB databases, HTTP dataloggers, and virtual data sources. * Send emails or execute code when alarms are triggered. * Create reports. * Use the extensive math ...

  19. code release

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    code release - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  20. Transactional Network Platform: Applications

    SciTech Connect (OSTI)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  1. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  2. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  3. Adaptive reconnection-based arbitrary Lagrangian Eulerian method

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bo, Wurigen; Shashkov, Mikhail

    2015-07-21

    We present a new adaptive Arbitrary Lagrangian Eulerian (ALE) method. This method is based on the reconnection-based ALE (ReALE) methodology of Refs. [35], [34] and [6]. The main elements in a standard ReALE method are: an explicit Lagrangian phase on an arbitrary polygonal (in 2D) mesh in which the solution and positions of grid nodes are updated; a rezoning phase in which a new grid is defined by changing the connectivity (using Voronoi tessellation) but not the number of cells; and a remapping phase in which the Lagrangian solution is transferred onto the new grid. Furthermore, in the standard ReALEmore » method, the rezoned mesh is smoothed by using one or several steps toward centroidal Voronoi tessellation, but it is not adapted to the solution in any way.« less

  4. Manipulator mounted transfer platform

    DOE Patents [OSTI]

    Dobbins, James C.; Hoover, Mark A.; May, Kay W.; Ross, Maurice J.

    1990-01-01

    A transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed frame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control.

  5. Arbitrary waveform generator to improve laser diode driver performance

    DOE Patents [OSTI]

    Fulkerson, Jr, Edward Steven

    2015-11-03

    An arbitrary waveform generator modifies the input signal to a laser diode driver circuit in order to reduce the overshoot/undershoot and provide a "flat-top" signal to the laser diode driver circuit. The input signal is modified based on the original received signal and the feedback from the laser diode by measuring the actual current flowing in the laser diode after the original signal is applied to the laser diode.

  6. A compact, multichannel, and low noise arbitrary waveform generator

    SciTech Connect (OSTI)

    Govorkov, S.; Ivanov, B. I.; Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 ; Il'ichev, E.; Meyer, H.-G.

    2014-05-15

    A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

  7. 3D Multigroup Sn Neutron Transport Code

    Energy Science and Technology Software Center (OSTI)

    2001-02-14

    ATTILA is a 3D multigroup transport code with arbitrary order ansotropic scatter. The transport equation is solved in first order form using a tri-linear discontinuous spatial differencing on an arbitrary tetrahedral mesh. The overall solution technique is source iteration with DSA acceleration of the scattering source. Anisotropic boundary and internal sources may be entered in the form of spherical harmonics moments. Alpha and k eigenvalue problems are allowed, as well as fixed source problems. Forwardmore » and adjoint solutions are available. Reflective, vacumn, and source boundary conditions are available. ATTILA can perform charged particle transport calculations using slowing down (CSD) terms. ATTILA can also be used to peform infra-red steady-state calculations for radiative transfer purposes.« less

  8. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  9. Building Energy Code

    Broader source: Energy.gov [DOE]

    Georgia's Department of Community Affairs periodically reviews, amends and/or updates the state minimum standard codes. Georgia has "mandatory" and "permissive" codes. Georgia State Energy Code...

  10. Microelectromechanical apparatus for elevating and tilting a platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; McWhorter, Paul Jackson; Rodgers, Murray Steven; Sniegowski, Jeffry J.; Barnes, Stephen M.

    2003-04-08

    A microelectromechanical (MEM) apparatus is disclosed which has a platform that can be elevated above a substrate and tilted at an arbitrary angle using a plurality of flexible members which support the platform and control its movement. Each flexible member is further controlled by one or more MEM actuators which act to bend the flexible member. The MEM actuators can be electrostatic comb actuators or vertical zip actuators, or a combination thereof. The MEM apparatus can include a mirror coating to form a programmable mirror for redirecting or switching one or more light beams for use in a projection display. The MEM apparatus with the mirror coating also has applications for switching light beams between optical fibers for use in a local area fiber optic network, or for use in fiber optic telecommunications or data communications systems.

  11. Microelectromechanical apparatus for elevating and tilting a platform

    DOE Patents [OSTI]

    Miller, Samuel Lee; McWhorter, Paul Jackson; Rodgers, Murray Steven; Sniegowski, Jeffry J.; Barnes, Stephen M.

    2004-07-06

    A microelectromechanical (MEM) apparatus is disclosed which has a platform that can be elevated above a substrate and tilted at an arbitrary angle using a plurality of flexible members which support the platform and control its movement. Each flexible member is further controlled by one or more MEM actuators which act to bend the flexible member. The MEM actuators can be electrostatic comb actuators or vertical zip actuators, or a combination thereof. The MEM apparatus can include a mirror coating to form a programmable mirror for redirecting or switching one or more light beams for use in a projection display. The MEM apparatus with-the mirror coating also has applications for switching light beams between optical fibers for use in a local area fiber optic network, or for use in fiber optic telecommunications or data communications systems.

  12. Mobility platform coupling device and method for coupling mobility platforms

    DOE Patents [OSTI]

    Shirey, David L.; Hayward, David R.; Buttz, James H.

    2002-01-01

    A coupling device for connecting a first mobility platform to a second mobility platform in tandem. An example mobility platform is a robot. The coupling device has a loose link mode for normal steering conditions and a locking position, tight link mode for navigation across difficult terrain and across obstacles, for traversing chasms, and for navigating with a reduced footprint in tight steering conditions.

  13. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    NOTE: On March 9, 2016, the State Fire Prevention and Building Code Council adopted major updates to the State Uniform Code and the State Energy Code. The State Energy Code has been updated to 2015...

  14. Common tester platform concept.

    SciTech Connect (OSTI)

    Hurst, Michael James

    2008-05-01

    This report summarizes the results of a case study on the doctrine of a common tester platform, a concept of a standardized platform that can be applicable across the broad spectrum of testing requirements throughout the various stages of a weapons program, as well as across the various weapons programs. The common tester concept strives to define an affordable, next-generation design that will meet testing requirements with the flexibility to grow and expand; supporting the initial development stages of a weapons program through to the final production and surveillance stages. This report discusses a concept investing key leveraging technologies and operational concepts combined with prototype tester-development experiences and practical lessons learned gleaned from past weapons programs.

  15. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  16. ARM - Measurements and Platforms

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Measurements and Platforms Related Links ISDAC Home AAF Home AVP Aircraft Instrumentation, October 14-16, 2008 ARM Data Discovery Browse Data Post-Campaign Data Sets Flight Summary Table (PDF, 440K) ISDAC Wiki Mission Summary Journal Deployment Resources NSA Site ARM Data Plots Quick Links Experiment Planning ISDAC Proposal Abstract Full Proposal (pdf, 1,735K) Science Questions Science Overview Document for ISDAC (pdf, 525K) ISDAC Flight Planning Document (PDF, 216K) Collaborations Logistics

  17. HPC - Platforms Penta Chart

    SciTech Connect (OSTI)

    Trujillo, Angelina Michelle

    2015-10-08

    Strategy, Planning, Acquiring- very large scale computing platforms come and go and planning for immensely scalable machines often precedes actual procurement by 3 years. Procurement can be another year or more. Integration- After Acquisition, machines must be integrated into the computing environments at LANL. Connection to scalable storage via large scale storage networking, assuring correct and secure operations. Management and Utilization – Ongoing operations, maintenance, and trouble shooting of the hardware and systems software at massive scale is required.

  18. CLASIC Measurement Platforms

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 SGP Cloud and Land Surface Interaction Campaign (CLASIC): Measurement Platforms June 2007 Mark A. Miller, Principal Investigator and The CLASIC Steering Committee: Roni Avissar, Larry Berg, Sylvia Edgerton, Marc Fischer, Tom Jackson, Bill Kustas, Pete Lamb, Greg McFarquhar, Qilong Min, Beat Schmid, Margaret Torn, and Dave Turner Work supported by the U.S. Department of Energy, Office of Science, Office of Biological and Environmental Research M.R. Miller et al., DOE/SC-ARM-0704 Contents 1.

  19. Identifying an experimental two-state Hamiltonian to arbitrary accuracy

    SciTech Connect (OSTI)

    Cole, Jared H.; Greentree, Andrew D.; Wellard, Cameron J.; Hollenberg, Lloyd C.L.; Schirmer, Sonia G.; Oi, Daniel K.L.

    2005-06-15

    Precision control of a quantum system requires accurate determination of the effective system Hamiltonian. We develop a method for estimating the Hamiltonian parameters for some unknown two-state system and providing uncertainty bounds on these parameters. This method requires only one measurement basis and the ability to initialize the system in some arbitrary state which is not an eigenstate of the Hamiltonian in question. The scaling of the uncertainty is studied for large numbers of measurements and found to be proportional to the reciprocal of the square root of the number of measurements.

  20. Quantitative phase retrieval with arbitrary pupil and illumination

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Claus, Rene A.; Naulleau, Patrick P.; Neureuther, Andrew R.; Waller, Laura

    2015-10-02

    We present a general algorithm for combining measurements taken under various illumination and imaging conditions to quantitatively extract the amplitude and phase of an object wave. The algorithm uses the weak object transfer function, which incorporates arbitrary pupil functions and partially coherent illumination. The approach is extended beyond the weak object regime using an iterative algorithm. Finally, we demonstrate the method on measurements of Extreme Ultraviolet Lithography (EUV) multilayer mask defects taken in an EUV zone plate microscope with both a standard zone plate lens and a zone plate implementing Zernike phase contrast.

  1. Consistent interaction vertices in arbitrary topological BF theories

    SciTech Connect (OSTI)

    Bizdadea, C.; Cioroianu, E. M.; Saliu, S. O.; Sararu, S. C.; Stanciu-Oprean, L.

    2013-11-13

    Here we extend the previous results from [12] to the computation of all consistent self-interactions for topological BF theories with maximal field spectra in D =5,6,7,8 and present some partial results on possible generalizations on a space-time of arbitrary dimension D. For convenience, the deformation of the solution to the master equation in the context of the BRST-antifield formalism is used as a general method of constructing consistent interacting gauge field theories together with most of the standard hypotheses on quantum field theories on Minkowski space-times.

  2. North Sea platforms revamped

    SciTech Connect (OSTI)

    O'Hare, J.

    1999-12-01

    Many of the early North Sea platforms are reaching their end-of-field life. Most are still equipped with their original drilling package. In a few cases the package has either been removed or decommissioned. The early installations were designed for much simpler and less demanding wells than the horizontal, extended-reach or designer wells common today. Extended-reach wells now can be drilled realistically from ageing platforms, without incurring massive capital expenditure. This can be achieved using the existing drilling package to the limit of its capabilities and supplementing where necessary with relatively minor upgrades or the use of temporary equipment. Drilling even a few more wells from existing platforms not only prolongs field life, it enables any surplus processing capacity to be made available to develop near-field potential with extended-reach drilling (ERD) or by tying back subsea satellite wells, or for processing third-party fluids. The paper describes well design, surface equipment, mud pumps, shakers and solids control equipment, drill cuttings disposal systems, derrick and hoisting system, top drive and drillstring, downhole equipment, well planning, casing wear, logistics, rig preparations, and ERD vs. subsea tie-backs.

  3. Eclipse Parallel Tools Platform

    Energy Science and Technology Software Center (OSTI)

    2005-02-18

    Designing and developing parallel programs is an inherently complex task. Developers must choose from the many parallel architectures and programming paradigms that are available, and face a plethora of tools that are required to execute, debug, and analyze parallel programs i these environments. Few, if any, of these tools provide any degree of integration, or indeed any commonality in their user interfaces at all. This further complicates the parallel developer's task, hampering software engineering practices,more » and ultimately reducing productivity. One consequence of this complexity is that best practice in parallel application development has not advanced to the same degree as more traditional programming methodologies. The result is that there is currently no open-source, industry-strength platform that provides a highly integrated environment specifically designed for parallel application development. Eclipse is a universal tool-hosting platform that is designed to providing a robust, full-featured, commercial-quality, industry platform for the development of highly integrated tools. It provides a wide range of core services for tool integration that allow tool producers to concentrate on their tool technology rather than on platform specific issues. The Eclipse Integrated Development Environment is an open-source project that is supported by over 70 organizations, including IBM, Intel and HP. The Eclipse Parallel Tools Platform (PTP) plug-in extends the Eclipse framwork by providing support for a rich set of parallel programming languages and paradigms, and a core infrastructure for the integration of a wide variety of parallel tools. The first version of the PTP is a prototype that only provides minimal functionality for parallel tool integration of a wide variety of parallel tools. The first version of the PTP is a prototype that only provides minimal functionality for parallel tool integration, support for a small number of parallel architectures

  4. Simulator platform for fast reactor operation and safety technology demonstration

    SciTech Connect (OSTI)

    Vilim, R. B.; Park, Y. S.; Grandy, C.; Belch, H.; Dworzanski, P.; Misterka, J.

    2012-07-30

    A simulator platform for visualization and demonstration of innovative concepts in fast reactor technology is described. The objective is to make more accessible the workings of fast reactor technology innovations and to do so in a human factors environment that uses state-of-the art visualization technologies. In this work the computer codes in use at Argonne National Laboratory (ANL) for the design of fast reactor systems are being integrated to run on this platform. This includes linking reactor systems codes with mechanical structures codes and using advanced graphics to depict the thermo-hydraulic-structure interactions that give rise to an inherently safe response to upsets. It also includes visualization of mechanical systems operation including advanced concepts that make use of robotics for operations, in-service inspection, and maintenance.

  5. Portable Application Code Toolkit

    Energy Science and Technology Software Center (OSTI)

    2009-01-01

    PACT is a set of tools to help software developers create applications that will run on any platform and data that can be written/read on any platform.

  6. Falcon: automated optimization method for arbitrary assessment criteria

    DOE Patents [OSTI]

    Yang, Tser-Yuan; Moses, Edward I.; Hartmann-Siantar, Christine

    2001-01-01

    FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

  7. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, Mark W.; George, William A.

    1986-01-01

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

  8. Conservative remapping and region overlays by intersecting arbitrary polyhedra

    SciTech Connect (OSTI)

    Grandy, J.

    1999-01-20

    An efficient algorithm for first-order grid intersections, by computing geometrically the intersection volume between donor and target zones, is developed for polyhedral meshes. The author examines two applications of grid intersections. One application is first-order remapping, in which zone and node centered fields defined on a given mesh are transferred to a different mesh. The second application is region overlays, in which a region with homogeneous material properties is approximated by a grid of polyhedra and mapped onto an arbitrary hexahedral mesh, creating mixed zones on the boundary of the region. He demonstrates the use of this grid intersection algorithm within the framework of hydrodynamics simulations, and using a domain decomposed mesh, he studies the feasibility of a parallel implementation.

  9. Agile high resolution arbitrary waveform generator with jitterless frequency stepping

    DOE Patents [OSTI]

    Reilly, Peter T. A.; Koizumi, Hideya

    2010-05-11

    Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.

  10. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, M.W.; George, W.A.

    1986-12-16

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

  11. Laplace-Runge-Lenz vector for arbitrary spin

    SciTech Connect (OSTI)

    Nikitin, A. G.

    2013-12-15

    A countable set of superintegrable quantum mechanical systems is presented which admit the dynamical symmetry with respect to algebra so(4). This algebra is generated by the Laplace-Runge-Lenz vector generalized to the case of arbitrary spin. The presented systems describe neutral particles with non-trivial multipole momenta. Their spectra can be found algebraically like in the case of hydrogen atom. Solutions for the systems with spins 1/2 and 1 are presented explicitly, solutions for spin 3/2 can be expressed via solutions of an ordinary differential equation of first order. A more extended version of this paper including detailed calculations is published as an e-print arXiv:1308.4279.

  12. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Mississippi's existing state code is based on the 1977 Model Code for Energy Conservation (MCEC). The existing law does not mandate enforcement by localities, and any revised code will probably...

  13. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The State Building Code Council revised the Washington State Energy Code (WESC) in February 2013, effective July 1, 2013. The WESC is a state-developed code based upon ASHRAE 90.1-2010 and the...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  15. Compliant offshore platform

    SciTech Connect (OSTI)

    Danaczko, M.A.; Finn, L.D.; Glasscock, M.S.; Piazza, M.P.; Steele, K.M.; Weaver, T.O.

    1987-09-29

    A compliant offshore platform is described for use in hydrocarbon drilling and producing operations, comprising: a deck; a substantially rigid vertical tower adapted to support the deck above the ocean surface. The tower has a base and is adapted to pivot relative to the ocean floor about its base in response to the action of waves. The combination of the deck and tower have a net negative buoyancy and are free from guyline support; and means for applying a vertical couple to the tower in response to pivoting of the tower. The couple is applied at a position on the tower intermediate the tower base and the bottom of the wave zone of the ocean environment in which the tower is situated. The vertical couple tends to resist sway of the tower away from the vertical.

  16. Turbine blade platform seal

    DOE Patents [OSTI]

    Zagar, Thomas W.; Schiavo, Anthony L.

    2001-01-01

    A rotating blade group 90 for a turbo-machine having an improved device for sealing the gap 110 between the edges 112,114 of adjacent blade platforms 96,104. The gap 110 between adjacent blades 92,100 is sealed by a seal pin 20 its central portion 110 and by a seal plate 58,60 at each of the front 54 and rear 56 portions. The seal plates 58,60 are inserted into corresponding grooves 62,64 formed in the adjacent edges 112,114 of adjoining blades 92,100 and held in place by end plates 40,42. The end of the seal plates 58,60 may be chamfered 78,80 to improve the seal against the end plate 40,42. The seal pin 20 provides the required damping between the blades 92,100 and the seal plates 58,60 provide improved sealing effectiveness.

  17. Energy Tracking Software Platform

    SciTech Connect (OSTI)

    Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

    2011-04-04

    Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

  18. 11. CONTRACT ID CODE

    National Nuclear Security Administration (NNSA)

    79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY ...

  19. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    The North Carolina State Building Code Council is responsible for developing all state codes. By statute, the Commissioner of Insurance has general supervision over the administration and...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became...

  3. Building Energy Codes: State and Local Code Implementation Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mark Lessans Fellow Building Energy Codes: State and Local Code Implementation Overview ... building code regarding energy efficiency to the revised model code and submit a ...

  4. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy Innovations New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in ...

  5. Manually operated coded switch

    DOE Patents [OSTI]

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  6. The solid angle (geometry factor) for a spherical surface source and an arbitrary detector aperture

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Favorite, Jeffrey A.

    2016-01-13

    It is proven that the solid angle (or geometry factor, also called the geometrical efficiency) for a spherically symmetric outward-directed surface source with an arbitrary radius and polar angle distribution and an arbitrary detector aperture is equal to the solid angle for an isotropic point source located at the center of the spherical surface source and the same detector aperture.

  7. Massive graviton on arbitrary background: derivation, syzygies, applications

    SciTech Connect (OSTI)

    Bernard, Laura; Deffayet, Cédric; Strauss, Mikael von

    2015-06-23

    We give the detailed derivation of the fully covariant form of the quadratic action and the derived linear equations of motion for a massive graviton in an arbitrary background metric (which were presented in arXiv:1410.8302 [hep-th]). Our starting point is the de Rham-Gabadadze-Tolley (dRGT) family of ghost free massive gravities and using a simple model of this family, we are able to express this action and these equations of motion in terms of a single metric in which the graviton propagates, hence removing in particular the need for a “reference metric' which is present in the non perturbative formulation. We show further how 5 covariant constraints can be obtained including one which leads to the tracelessness of the graviton on flat space-time and removes the Boulware-Deser ghost. This last constraint involves powers and combinations of the curvature of the background metric. The 5 constraints are obtained for a background metric which is unconstrained, i.e. which does not have to obey the background field equations. We then apply these results to the case of Einstein space-times, where we show that the 5 constraints become trivial, and Friedmann-Lemaître-Robertson-Walker space-times, for which we correct in particular some results that appeared elsewhere. To reach our results, we derive several non trivial identities, syzygies, involving the graviton fields, its derivatives and the background metric curvature. These identities have their own interest. We also discover that there exist backgrounds for which the dRGT equations cannot be unambiguously linearized.

  8. Optimizing the FLASH code: preparing for Mira BG/Q and improving...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 30, 2013 10:00-11:00 PDT Oakland Scientific Facility Room 238 FLASH is a multi-physics, component-based scientific code which has been used on the largest HPC platforms...

  9. China Low Carbon Platform | Open Energy Information

    Open Energy Info (EERE)

    Low Carbon Platform Jump to: navigation, search Name China Low Carbon Platform AgencyCompany Organization Institute of Development Studies, Climate Change and Development Centre,...

  10. International Economic Platform for Renewable Energies IWR |...

    Open Energy Info (EERE)

    Platform for Renewable Energies IWR Jump to: navigation, search Name: International Economic Platform for Renewable Energies (IWR) Place: Mnster, Germany Zip: 48159 Sector:...

  11. Tidal Energy Test Platform | Open Energy Information

    Open Energy Info (EERE)

    Test Platform Jump to: navigation, search Basic Specifications Facility Name Tidal Energy Test Platform Overseeing Organization University of New Hampshire Hydrodynamics...

  12. Patents protect deepwater platform concepts

    SciTech Connect (OSTI)

    Khurana, S.

    1998-06-22

    Numerous deepwater platform concepts have patents that provide an inventor protection for his new ideas. But an inventor should not be discouraged by the fact that many patents exist. In fact, it may be advantageous to build on existing patents and prior art, and patent new ideas and concepts for reducing costs. Challenges still remain such as for optimizing drilling and production operations simultaneously on deepwater platforms for accessing and producing oil and gas reserves.

  13. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    New Hampshire adopted a mandatory statewide building code in 2002 based on the 2000 IECC. S.B. 81 was enacted in July 2007, and it upgraded the New Hampshire Energy Code to the 2006 IECC. In Dece...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    Legislation passed in March 2010 authorized the Alabama Energy and Residential Code (AERC) Board to adopt mandatory residential and commercial energy codes for all jurisdictions. In 2015, the AER...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    A mandatory energy code is not enforced at the state level. If a local energy code is adopted, it is enforced at the local level. Builders or sellers of new residential buildings (single-family or...

  19. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  20. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Indiana Residential Building Code is based on the 2003 IRC with state amendments (eff. 9/11/05). This code applies to 1 and 2 family dwellings and townhouses. During the adoption process,...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 1993 State Legislature updated the state energy code to the 1989 Model Energy Code (MEC) and established a procedure to update the standard. Then in 1995, following consultation with an...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Florida Building Commission (FBC) is directed to adopt, revise, update, and maintain the Florida Building Code in accordance with Chapter 120 of the state statutes. The code is mandatory...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2006 Iowa enacted H.F. 2361, requiring the State Building Commissioner to adopt energy conservation requirements based on a nationally recognized building energy code. The State Building Code...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    In September 2011 the Nebraska Building Energy Code was updated to the 2009 International Energy Conservation Code (IECC) standards. As with the previous 2003 IECC standards, which had been in...

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    In November of 2015, the Commission adopted the 2015 International Building Code (IBC) with amendments. The Commission did not adopt the 2012 International Energy Conservation Code (IECC) as part...

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more deta...

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    Changes to the energy code are submitted to the Uniform Building Code Commission. The proposed change is reviewed by the Commission at a monthly meeting to decide if it warrants further considera...

  9. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Virginia Uniform Statewide Building Code (USBC) is a statewide minimum requirement that local jurisdictions cannot amend. The code is applicable to all new buildings in the commonwealth. The...

  11. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    Colorado is a home rule state, so no statewide energy code exists, although state government buildings do have specific requirements. Voluntary adoption of energy codes is encouraged and efforts...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the state’s energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 2012 IECC is in effect for all residential and commercial buildings, Idaho schools, and Idaho jurisdictions that adopt and enforce building codes, unless a local code exists that is more...

  15. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  16. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  17. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  18. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    In March 2006, SB 459 was enacted to promote renewable energy and update the state's building energy codes.

  19. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  20. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  1. XSOR codes users manual

    SciTech Connect (OSTI)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  2. Biomass Program 2007 Accomplishments - Biochemical Conversion Platform

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document details accomplishments of the Biomass Program Biochemical Conversion Platform accomplishments in 2007.

  3. Biomass Program 2007 Accomplishments - Thermochemical Conversion Platform

    SciTech Connect (OSTI)

    none,

    2009-10-27

    This document details the accomplishments of the Biomass Program Thermochemical Conversion Platform in 2007.

  4. Biomass Program 2007 Accomplishments - Integrated Biorefinery Platform

    SciTech Connect (OSTI)

    none,

    2008-06-01

    This document details the accomplishments of the Biomass Program Integrated Biorefinery Platform in 2007.

  5. National Bioenergy Center Biochemical Platform Integration Project

    SciTech Connect (OSTI)

    Not Available

    2008-07-01

    April through June 2008 update on activities of the National Bioenergy Center's Biochemical Platform Integration Project.

  6. INL Subsurface Wireless Sensor Platform

    SciTech Connect (OSTI)

    Dennis C. Kunerth; John M. Svoboda; James T. Johnson

    2005-10-01

    The Idaho National Laboratory is developing a versatile micro-power sensor interface platform for periodic subsurface sensing of environmental variables important to waste disposal sites such as volumetric moisture, water potential, and temperature. The key characteristics of the platform architecture are that the platform is passive until externally energized --no internal power source is required -- and that it communicates with a "reader" via short-range telemetry - no wires penetrate the subsurface. Other significant attributes include the potential for a long service life and a compact size that makes it well suited for retrofitting existing landfill structures. Functionally, the sensor package is "read" by a short-range induction coil that activates and powers the sensor platform as well as detects the sensor output via a radio frequency signal generated by the onboard programmable interface controller microchip. As a result, the platform has a functional subsurface communication range of approximately 10 to 12 ft. and can only accept sensors that require low power to operate.

  7. DLLExternalCode

    Energy Science and Technology Software Center (OSTI)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read frommore » files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.« less

  8. DLLExternalCode

    SciTech Connect (OSTI)

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  9. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-25

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v∥, μ) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v∥ and μ are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy.more » Furthermore, topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.« less

  10. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    SciTech Connect (OSTI)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-15

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v{sub Parallel-To }, {mu}) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v{sub Parallel-To} and {mu} are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy. Topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.

  11. Persistent Monitoring Platforms Final Report

    SciTech Connect (OSTI)

    Bennett, C L

    2007-02-22

    This project was inspired and motivated by the need to provide better platforms for persistent surveillance. In the years since the inception of this work, the need for persistence of surveillance platforms has become even more widely appreciated, both within the defense community and the intelligence community. One of the most demanding technical requirements for such a platform involves the power plant and energy storage system, and this project concentrated almost exclusively on the technology associated with this system for a solar powered, high altitude, unmanned aircraft. An important realization for the feasibility of such solar powered aircraft, made at the outset of this project, was that thermal energy may be stored with higher specific energy density than for any other known practical form of rechargeable energy storage. This approach has proved to be extraordinarily fruitful, and a large number of spin-off applications of this technology were developed in the course of this project.

  12. CBP PHASE I CODE INTEGRATION

    SciTech Connect (OSTI)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  13. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  14. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  15. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  16. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  17. Trace collection for simulation driven co-design of exascale platforms and

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    codes | Argonne Leadership Computing Facility Trace collection for simulation driven co-design of exascale platforms and codes PI Name: David Evensky PI Email: evensky@sandia.gov Institution: Sandia National Laboratories Allocation Program: INCITE Allocation Hours at ALCF: 5 Million Year: 2011 Research Domain: Computer Science A key problem facing application developers is that the exascale machines which they are targeting will not be available for roughly another seven years. Developers

  18. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention

  19. Code of Conduct

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Governance » Ethics, Accountability, Contract » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Ethics and Compliance Group (505) 667-7506 Email Code of Conduct Los Alamos National Laboratory is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our

  20. Long range hopping mobility platform.

    SciTech Connect (OSTI)

    Spletzer, Barry Louis; Fischer, Gary John

    2003-03-01

    Sandia National Laboratories has developed a mesoscale hopping mobility platform (Hopper) to overcome the longstanding problems of mobility and power in small scale unmanned vehicles. The system provides mobility in situations such as negotiating tall obstacles and rough terrain that are prohibitive for other small ground base vehicles. The Defense Advanced Research Projects Administration (DARPA) provided the funding for the hopper project.

  1. 2009 Analysis Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program’s Analysis platform review meeting, held on February 18, 2009, at the Marriott Residence Inn, National Harbor, Maryland.

  2. 2009 Infrastructure Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass program‘s Infrastructure platform review meeting, held on February 19, 2009, at the Marriott Residence Inn, National Harbor, Maryland.

  3. 2009 Feedstocks Platform Review Report

    SciTech Connect (OSTI)

    Ferrell, John

    2009-12-01

    This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy Biomass Program‘s Feedstock platform review meeting, held on April 8–10, 2009, at the Grand Hyatt Washington, Washington, D.C.

  4. TOUGH+ v1.5 Core Code

    Energy Science and Technology Software Center (OSTI)

    2015-08-27

    TOUGH+ v1.5 is a numerical code for the simulation of multi-phase, multi-component flow and transport of mass and heat through porous and fractured media, and represents the third update of the code since its first release [Moridis et al., 2008]. TOUGH+ is a successor to the TOUGH2 [Pruess et al., 1991; 2012] family of codes for multi-component, multiphase fluid and heat flow developed at the Lawrence Berkeley National Laboratory. It is written in standard FORTRANmore » 95/2003, and can be run on any computational platform (workstations, PC, Macintosh). TOUGH+ v1.5 employs dynamic memory allocation, thus minimizing storage requirements. It has a completely modular structure, follows the tenets of Object-Oriented Programming (OOP), and involves the advanced features of FORTRAN 95/2003, i.e., modules, derived data types, the use of pointers, lists and trees, data encapsulation, defined operators and assignments, operator extension and overloading, use of generic procedures, and maximum use of the powerful intrinsic vector and matrix processing operations. TOUGH+ v1.5 is the core code for its family of applications, i.e., the part of the code that is common to all its applications. It provides a description of the underlying physics and thermodynamics of non-isothermal flow, of the mathematical and numerical approaches, as well as a detailed explanation of the general (common to all applications) input requirements, options, capabilities and output specifications. The core code cannot run by itself: it needs to be coupled with the code for the specific TOUGH+ application option that describes a particular type of problem. The additional input requirements specific to a particular TOUGH+ application options and related illustrative examples can be found in the corresponding User’s Manual.« less

  5. TOUGH+ v1.5 Core Code

    SciTech Connect (OSTI)

    2015-08-27

    TOUGH+ v1.5 is a numerical code for the simulation of multi-phase, multi-component flow and transport of mass and heat through porous and fractured media, and represents the third update of the code since its first release [Moridis et al., 2008]. TOUGH+ is a successor to the TOUGH2 [Pruess et al., 1991; 2012] family of codes for multi-component, multiphase ?uid and heat ?ow developed at the Lawrence Berkeley National Laboratory. It is written in standard FORTRAN 95/2003, and can be run on any computational platform (workstations, PC, Macintosh). TOUGH+ v1.5 employs dynamic memory allocation, thus minimizing storage requirements. It has a completely modular structure, follows the tenets of Object-Oriented Programming (OOP), and involves the advanced features of FORTRAN 95/2003, i.e., modules, derived data types, the use of pointers, lists and trees, data encapsulation, defined operators and assignments, operator extension and overloading, use of generic procedures, and maximum use of the powerful intrinsic vector and matrix processing operations. TOUGH+ v1.5 is the core code for its family of applications, i.e., the part of the code that is common to all its applications. It provides a description of the underlying physics and thermodynamics of non-isothermal flow, of the mathematical and numerical approaches, as well as a detailed explanation of the general (common to all applications) input requirements, options, capabilities and output specifications. The core code cannot run by itself: it needs to be coupled with the code for the specific TOUGH+ application option that describes a particular type of problem. The additional input requirements specific to a particular TOUGH+ application options and related illustrative examples can be found in the corresponding User?s Manual.

  6. Shields - Code Coupling

    SciTech Connect (OSTI)

    Vernon, Louis James

    2015-03-02

    This PowerPoint presentation focuses on the history and benefits of the Space Weather Modeling Framework (SWMF) code and collaborative software development.

  7. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  8. Building Energy Codes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    David Cohan Program Manager Building Energy Codes April 22, 2014 Presentation Outline * Mission * Goals * Program Organization * StrategiesRoles * Near-Term Focus * Measuring ...

  9. Improving Code Compliance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    provisions in International Energy Conservation Code (IECC) through proof-of-concept ... This includes updating recommendations based on newer CBECs or BPD energy statistics. ...

  10. Top NAICS Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Related Products Manufacturing for Measuring, Displaying, Top Ten NAICS Codes Dollar Value 511210 Software Publishers 334516 Analytical Laboratory Instrument Manufacturing...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    Kansas adopted the 2006 International Energy Conservation Code (IECC) as "the applicable state standard" for commercial and industrial buildings. Enforcement is provided by local jurisdictions; t...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    Pennsylvania Department of Labor and Industry (DLI) has the authority to upgrade commercial and residential energy standards through the regulatory process. The current code, the 2009 UCC, became...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Maryland Building Performance Standards (MBPS) are adopted by the Maryland Department of Housing and Community Development (DHCD) Codes Administration. As required by legislation passed in...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Connecticut Office of the State Building Inspector establishes and enforces building, electrical, mechanical, plumbing and energy code requirements by reviewing, developing, adopting and...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Office of the State Fire Marshal is granted the authority to promulgate amendments, revisions, and alternative compliance methods for the code.

  16. Building Energy Codes Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program U.S. Department of Energy Building Technologies Office Jeremy Williams, Project Manager Building Technologies Peer Review April 2014 Presentation Overview: * Introduction * Statutory Requirements * Program Structure * Recent accomplishments 2 Introduction: Background NATIONAL STATE LOCAL Building codes are developed through national industry consensus processes with input from industry representatives, trade organizations, government officials, and the general public Model energy codes

  17. Lichenase and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2000-08-15

    The present invention provides a fungal lichenase, i.e., an endo-1,3-1,4-.beta.-D-glucanohydrolase, its coding sequence, recombinant DNA molecules comprising the lichenase coding sequences, recombinant host cells and methods for producing same. The present lichenase is from Orpinomyces PC-2.

  18. THE MCNPX MONTE CARLO RADIATION TRANSPORT CODE

    SciTech Connect (OSTI)

    WATERS, LAURIE S.; MCKINNEY, GREGG W.; DURKEE, JOE W.; FENSIN, MICHAEL L.; JAMES, MICHAEL R.; JOHNS, RUSSELL C.; PELOWITZ, DENISE B.

    2007-01-10

    MCNPX (Monte Carlo N-Particle eXtended) is a general-purpose Monte Carlo radiation transport code with three-dimensional geometry and continuous-energy transport of 34 particles and light ions. It contains flexible source and tally options, interactive graphics, and support for both sequential and multi-processing computer platforms. MCNPX is based on MCNP4B, and has been upgraded to most MCNP5 capabilities. MCNP is a highly stable code tracking neutrons, photons and electrons, and using evaluated nuclear data libraries for low-energy interaction probabilities. MCNPX has extended this base to a comprehensive set of particles and light ions, with heavy ion transport in development. Models have been included to calculate interaction probabilities when libraries are not available. Recent additions focus on the time evolution of residual nuclei decay, allowing calculation of transmutation and delayed particle emission. MCNPX is now a code of great dynamic range, and the excellent neutronics capabilities allow new opportunities to simulate devices of interest to experimental particle physics; particularly calorimetry. This paper describes the capabilities of the current MCNPX version 2.6.C, and also discusses ongoing code development.

  19. Theoretical investigation of resonant frequencies of unstrapped magnetron with arbitrary side resonators

    SciTech Connect (OSTI)

    Yue, Song; Zhang, Zhao-chuan; Gao, Dong-ping

    2015-04-15

    In this paper, a sector steps approximation method is proposed to investigate the resonant frequencies of magnetrons with arbitrary side resonators. The arbitrary side resonator is substituted with a series of sector steps, in which the spatial harmonics of electromagnetic field are also considered. By using the method of admittance matching between adjacent steps, as well as field continuity conditions between side resonators and interaction regions, the dispersion equation of magnetron with arbitrary side resonators is derived. Resonant frequencies of magnetrons with five common kinds of side resonators are calculated with sector steps approximation method and computer simulation softwares, in which the results have a good agreement. The relative error is less than 2%, which verifies the validity of sector steps approximation method.

  20. 2011 Biomass Program Platform Peer Review: Feedstock

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Feedstock Platform Review Report BIOMASS PROGRAM FEEDSTOCK 2011 Platform Review Report An Independent Evaluation of Platform Activities for FY 2010 and FY 2011 Review Date April 6-8, 2011 February 2012 Department of Energy Washington, D.C. 20585 Dear Colleague: This document summarizes the recommendations and evaluations provided by an independent external panel of experts at the U.S. Department of Energy, Offce of Energy Effciency and Renewable Energy, Biomass Program's Feedstock Platform

  1. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  2. Thermodynamic Model for Fluid-Fluid Interfacial Areas in Porous Media for Arbitrary Drainage-Imbibition Sequences

    SciTech Connect (OSTI)

    Schroth, Martin H.; Oostrom, Mart; Dobson, Richard; Zeyer, Josef

    2008-08-01

    Fluid/fluid interfacial areas are important in controlling the rate of mass and energy transfer between fluid phases in porous media. We present a modified thermodynamically based model (TBM) to predict fluid/fluid interfacial areas in porous media for arbitrary drainage/imbibition sequences. The TBM explicitly distinguishes between interfacial areas associated with continuous (free) and isolated (entrapped) nonwetting fluids. The model is restricted to two-fluid systems in which (1) no significant conversion of mechanical work into heat occurs, (2) the wetting fluid completely wets the porous mediums solid surfaces, and (3) no changes in interfacial area due to mass transfer between phases occur. We show example calculations for two different drainage/imbibition sequences in two porous media: a highly uniform silica sand and a well-graded silt. The TBMs predictions for interfacial area associated with free nonwetting-fluid are identical to those of a previously published geometry-based model (GBM). However, predictions for interfacial area associated with entrapped nonwetting-fluid are consistently larger in the TBM than in the GBM. Although a comparison of model predictions with experimental data is currently only possible to a limited extent, good general agreement was found for the TBM. As required model parameters are commonly used as inputs for or tracked during multifluid-flow simulations, the modified TBM may be easily incorporated in numerical codes.

  3. Regional Climate Change Adaptation Platform for Asia | Open Energy...

    Open Energy Info (EERE)

    Climate Change Adaptation Platform for Asia Jump to: navigation, search Logo: Regional Climate Change Adaptation Platform for Asia Name Regional Climate Change Adaptation Platform...

  4. Standard Energy Efficiency Data Platform | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commercial Buildings Analysis Tools Standard Energy Efficiency Data Platform Standard Energy Efficiency Data Platform The SEED Platform(tm) makes it easy to utilize and share ...

  5. MHK Technologies/Titan Platform | Open Energy Information

    Open Energy Info (EERE)

    construction and crane ships The platform along with the wind turbine and wave energy converters are assembled on shore with the platform legs raised The platform and...

  6. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  7. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    example.x example.c For C++ source code use CC % CC -fast -o example.x example.C All compilers on Hopper, PGI, Pathscale, Cray, GNU, and Intel, are provided via five programming...

  8. Compressible Astrophysics Simulation Code

    Energy Science and Technology Software Center (OSTI)

    2007-07-18

    This is an astrophysics simulation code involving a radiation diffusion module developed at LLNL coupled to compressible hydrodynamics and adaptive mesh infrastructure developed at LBNL. One intended application is to neutrino diffusion in core collapse supernovae.

  9. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    On May 2014, Delaware updated its energy code to 2012 IECC with amendments for residential sector and ASHRAE 90.1-2010 with amendments for the commercial sector. The Delaware specific amendments to...

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  11. National Energy Codes Conference

    Broader source: Energy.gov [DOE]

    Join us in Nashville, TN March 23-26, 2015 for the National Energy Codes Conference! Additional details, including registration information, a preliminary agenda, the application for the Jeffrey A...

  12. Compiling Codes on Cori

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  13. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  14. Tribal Green Building Codes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    with even amount of white space between photos and header Tribal Green Building Codes Chelsea Chee November 1 3, 2012 SAND 2012---9858C Photos placed in horizontal position with ...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Massachusetts Board of Building Regulations and Standards has authority to promulgate the Massachusetts State Building Code (MSBC). The energy provisions in the MSBC were developed by the Boa...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Oregon Energy Code amendments were most recently updated for both residential and non-residential construction in 2014. In October 2010 Oregon also adopted the Oregon Solar Installation...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    Both State building codes adoption and enforcement efforts fall under the purview of the State Fire Marshal’s Office within the Department of Commerce and Insurance (C&I). Any changes to the...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Texas State Energy Conservation Office (SECO) by rule may choose to adopt the latest published editions of the energy efficiency provisions of the International Residential Code (IRC) or the...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    Missouri does not have a statewide building or energy code for private residential and commercial buildings, and there currently is no state regulatory agency authorized to promulgate, adopt, or...

  20. PNNL Energy Codes Portfolio

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PNNL Energy Codes Portfolio 2015 Building Technologies Office Peer Review ADOPT COMPLY DEVELOP Bing Liu bing.liu@pnnl.gov Rosemarie Bartlett rosemarie.bartlett@pnnl.gov Pacific Northwest National Laboratory Project Summary Timeline: Multi-year program in support of DOE statutory requirements Key Milestones: 1. DOE's Determinations on 90.1-2013 and 2015 IECC 2. Update DOE's Energy odes ost-Effectiveness Methodology 3. Commercial Codes Roadmap 4. 90.1-2013 and 2015 IECC Cost Analyses 5.

  1. Generating code adapted for interlinking legacy scalar code and...

    Office of Scientific and Technical Information (OSTI)

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a ...

  2. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy ... system knowledge that may limit effective implementation of new and existing standards. ...

  3. Turbine engine airfoil and platform assembly

    DOE Patents [OSTI]

    Campbell, Christian X.; James, Allister W.; Morrison, Jay A.

    2012-07-31

    A turbine airfoil (22A) is formed by a first process using a first material. A platform (30A) is formed by a second process using a second material that may be different from the first material. The platform (30A) is assembled around a shank (23A) of the airfoil. One or more pins (36A) extend from the platform into holes (28) in the shank (23A). The platform may be formed in two portions (32A, 34A) and placed around the shank, enclosing it. The two platform portions may be bonded to each other. Alternately, the platform (30B) may be cast around the shank (23B) using a metal alloy with better castability than that of the blade and shank, which may be specialized for thermal tolerance. The pins (36A-36D) or holes for them do not extend to an outer surface (31) of the platform, avoiding stress concentrations.

  4. Nevada Energy Code for Buildings

    Office of Energy Efficiency and Renewable Energy (EERE)

    Legislation signed in 2009 changed the process of adopting building codes in the state. Previously, the statewide code would only apply to local governments that had not already adopted a code,...

  5. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  6. On-chip generation of Einstein-Podolsky-Rosen states with arbitrary symmetry

    SciTech Connect (OSTI)

    Grfe, Markus; Heilmann, Ren; Nolte, Stefan; Szameit, Alexander

    2015-05-04

    We experimentally demonstrate a method for integrated-optical generation of two-photon Einstein-Podolsky-Rosen states featuring arbitrary symmetries. In our setting, we employ detuned directional couplers to impose a freely tailorable phase between the two modes of the state. Our results allow to mimic the quantum random walk statistics of bosons, fermions, and anyons, particles with fractional exchange statistics.

  7. COBRA-SFS: A thermal-hydraulic analysis code for spent fuel storage and transportation casks

    SciTech Connect (OSTI)

    Michener, T.E.; Rector, D.R.; Cuta, J.M.; Dodge, R.E.; Enderlin, C.W.

    1995-09-01

    COBRA-SFS is a general thermal-hydraulic analysis computer code for prediction of material temperatures and fluid conditions in a wide variety of systems. The code has been validated for analysis of spent fuel storage systems, as part of the Commercial Spent Fuel Management Program of the US Department of Energy. The code solves finite volume equations representing the conservation equations for mass, moment, and energy for an incompressible single-phase heat transfer fluid. The fluid solution is coupled to a finite volume solution of the conduction equation in the solid structure of the system. This document presents a complete description of Cycle 2 of COBRA-SFS, and consists of three main parts. Part 1 describes the conservation equations, constitutive models, and solution methods used in the code. Part 2 presents the User Manual, with guidance on code applications, and complete input instructions. This part also includes a detailed description of the auxiliary code RADGEN, used to generate grey body view factors required as input for radiative heat transfer modeling in the code. Part 3 describes the code structure, platform dependent coding, and program hierarchy. Installation instructions are also given for the various platform versions of the code that are available.

  8. FAA Smoke Transport Code

    Energy Science and Technology Software Center (OSTI)

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a codemore » obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.« less

  9. Bucket platform cooling scheme and related method

    DOE Patents [OSTI]

    Abuaf, Nesim; Barb, Kevin Joseph; Chopra, Sanjay; Kercher, David Max; Kellock, Iain Robertson; Lenahan, Dean Thomas; Nellian, Sankar; Starkweather, John Howard; Lupe, Douglas Arthur

    2002-01-01

    A turbine bucket includes an airfoil extending from a platform, having high and low pressure sides; a wheel mounting portion; a hollow shank portion located radially between the platform and the wheel mounting portion, the platform having an under surface. An impingement cooling plate is located in the hollow shank portion, spaced from the under surface, and the impingement plate is formed with a plurality of impingement cooling holes therein.

  10. Gas turbine bucket with impingement cooled platform

    DOE Patents [OSTI]

    Jones, Raphael Durand

    2002-01-01

    In a turbine bucket having an airfoil portion and a root portion, with a substantially planar platform at an interface between the airfoil portion and root portion, a platform cooling arrangement including at least one bore in the root portion and at least one impingement cooling tube seated in the bore, the tube extending beyond the bore with an outlet in close proximity to a targeted area on an underside of the platform.