National Library of Energy BETA

Sample records for arbitrary scripting code

  1. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  2. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  3. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am...

  4. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  5. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  6. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  7. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  8. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  9. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  10. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  11. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  12. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  13. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  14. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  15. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  16. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  17. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  18. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  20. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  1. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  2. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  3. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  4. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  5. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  7. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  9. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  10. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  13. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  14. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  15. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  16. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  17. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  18. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  19. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  20. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  1. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  2. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  3. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  4. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  7. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  8. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  9. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  10. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  11. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  12. cogent_ats_scripts

    Energy Science and Technology Software Center (OSTI)

    2012-09-30

    The Cogent ATS Scripts are a collection of a dozen Python scripts which coordinate regression testing between COGENT (a plasma physics code) and ATS (an automated software testing system).

  13. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  14. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  15. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  16. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  17. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code in a user's browser session in context of an affected site. 2) Certain input ... code in a user's browser session in context of an affected site. 3) Certain input ...

  18. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  19. SCRIPTS FSM

    Energy Science and Technology Software Center (OSTI)

    003648MLTPL00 Scripts for Scalable Monitoring of Parallel Filesystem Infrastructure https://github.com/bacaldwell

  20. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  1. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  2. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  3. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  4. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  5. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  6. Code System to Perform Monte Carlo Simulation of Electron Gamma-Ray Showers in Arbitrary Marerials.

    Energy Science and Technology Software Center (OSTI)

    2002-10-15

    Version 00 PENELOPE performs Monte Carlo simulation of electron-photon showers in arbitrary materials. Initially, it was devised to simulate the PENetration and Energy LOss of Positrons and Electrons in matter; photons were introduced later. The adopted scattering model gives a reliable description of radiation transport in the energy range from a few hundred eV to about 1GeV. PENELOPE generates random electron-photon showers in complex material structures consisting of any number of distinct homogeneous regions (bodies)more » with different compositions. The Penelope Forum list archives and other information can be accessed at http://www.nea.fr/lists/penelope.html. PENELOPE-MPI extends capabilities of PENELOPE-2001 (RSICC C00682MNYCP02; NEA-1525/05) by providing for usage of MPI type parallel drivers and extends the original version's ability to read different types of input data sets such as voxel. The motivation is to increase efficiency of Monte Carlo simulations for medical applications. The physics of the calculations have not been changed, and the original description of PENELOPE-2001 (which follows) is still valid. PENELOPE-2001 contains substantial changes and improvements to the previous versions 1996 and 2000. As for the physics, the model for electron/positron elastic scattering has been revised. Bremsstrahlung emission is now simulated using partial-wave data instead of analytical approximate formulae. Photoelectric absorption in K and L-shells is described from the corresponding partial cross sections. Fluorescence radiation from vacancies in K and L-shells is followed. Refinements were also introduced in electron/positron transport mechanics, mostly to account for energy dependence of the mean free paths for hard events. Simulation routines were re-programmed in a more structured way, and new example MAIN programs were written with a more flexible input and expanded output.« less

  7. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  8. Energy Citations Database (ECD) - Widget Code

    Office of Scientific and Technical Information (OSTI)

    Widget Inclusion Code <script type"textjavascript" src"http:cdn.widgetserver.comsyndicationsubscriberInsertWidget.js"><script> type"textjavascript">if (WIDGETBOX)...

  9. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  10. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution...

  11. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  12. T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The BlackBerry Web Desktop Manager not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the BlackBerry Web Desktop Manager software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  13. Dpkg-Scripts

    Energy Science and Technology Software Center (OSTI)

    2007-09-24

    dpkg-scripts is a set of utilities for building and manipulating "dep" packages rooted in/usr/local. It works in conjunction with a modified version of the dpkg utility from Devian Linux and performs the following functions: build package from subversion or working cipy, edit a package, verify md5sums of files in an installed package, execute an installed package's unit tests, build a web page listing all installed packages and their documentation, obtain the soure code of anmore » installed package, auto-generate dotkits for packages, find unpackaged files in/usr/local, and auto-generate wrappers that set up the environment for a package executable and run it.« less

  14. V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters

  15. Example Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Example Batch Scripts Example Batch Scripts Sample Batch Scripts One of the most noted differences between the Hopper system and other NERSC systems is the number of cores per node is NOT a power of two. This means if you want to run a job on 32 cores, two nodes will be used and some cores will remain idle. Basic Batch Script This script uses the default 24 cores per node, (except on the remainder node when the number of cores requested is not a multiple of 24) #PBS -q debug #PBS -l

  16. Parallel Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Parallel Batch Scripts Parallel Batch Scripts Parallel Environments on Genepool You can run parallel jobs that use MPI or OpenMP on Genepool as long as you make the appropriate changes to your submission script! To investigate the parallel environments that are available on Genepool, you can use Command Description qconf -sp <pename> Show the configuration for the specified parallel environment. qconf -spl Show a list of all currently configured parallel environments. Basic Parallel

  17. Example Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Example Batch Scripts Example Batch Scripts Here are some sample job scripts that cover the most of the use cases on Edison. If you find anything that you need is missing, please let us know at consult at nersc dot gov. Note, Edison queue may still undergo configuration change as we gain more insight about how Slurm works with Edison workload. Basic Job Scripts #!/bin/bash -l #SBATCH -p regular #SBATCH -N 2 #SBATCH -t 04:00:00 #SBATCH -J my_job #SBATCH -o my_job.o%j #SBATCH -L SCRATCH,project

  18. HSI Shell Script

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This script assumes that you have previously interactively logged into HSI at least once to encrypt your usernamepassword. bincsh First copy the data and program source from ...

  19. scriptEnv - loading modules before starting a script

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    scriptEnv - loading modules before starting a script scriptEnv - loading modules before starting a script In some cases a script needs to load modules before the script can be executed, but it can often be inconvenient or impossible to provide wrapper scripts which load the needed modules. CGI scripts on the gpweb resources or in the NERSC portal environment which require the genepool-specific python/perl/R or databases configuration modules are a strong example of this. NERSC provides the

  20. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  1. Example batch scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Example batch scripts Example batch scripts Access to the BurstBuffer resource is integrated with the Scheduler of the system (i.e. SLURM). The Scheduler provides the ability to provision the BurstBuffer resource to be shared by a set of users or jobs. Using the Burst Buffer on Cori Phase 1 can be as simple as adding a line to your slurm batch script. Here we give examples of how to use the Burst Buffer as a scratch space and as a persistent reservation, and how to stage data in and out of the

  2. Batch Script Examples

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Batch Script Examples Batch Script Examples My First Script This is a simple example that you can use to make sure that your settings are correct before submitting more complicated jobs. First, copy the contents of hello.sh into a file. genepool% cat hello.sh #!/bin/bash sleep 120 echo "Hello World" Then submit your job with the qsub command genepool% qsub hello.sh Monitor your job with the qstat command: genepool% qs -u <username> You can also get more detailed information about

  3. Web service performance script

    Energy Science and Technology Software Center (OSTI)

    2009-08-01

    This python script, available from ESRI and modified here, checks a server at specified intervals to ensure that web services remain up and running. If any are found to be off, they are automatically turned back on.

  4. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  5. Nagios Down-Time scripts

    SciTech Connect (OSTI)

    Buddeberg, Patrick

    2014-11-11

    The Nagios Down-Time scripts are a set of Python scripts that create a commandline interface to Nagios' scheduled down-times. This allows for large-scale management of down-times, beyond what is feasible with the default web interface. Additionally, one of the scripts can be setup to periodically send emails of down-times that are scheduled to end within a specified amount of time after the script has been run; for example, it could run once a day and send an email including down-times ending within the next 24 hours.

  6. Nagios Down-Time scripts

    Energy Science and Technology Software Center (OSTI)

    2014-11-11

    The Nagios Down-Time scripts are a set of Python scripts that create a commandline interface to Nagios' scheduled down-times. This allows for large-scale management of down-times, beyond what is feasible with the default web interface. Additionally, one of the scripts can be setup to periodically send emails of down-times that are scheduled to end within a specified amount of time after the script has been run; for example, it could run once a day andmore » send an email including down-times ending within the next 24 hours.« less

  7. Laboratory Equipment Donation Program - LEDP Widget Code

    Office of Scientific and Technical Information (OSTI)

    Widget Inclusion Code Copy the code below and paste it to your website or blog: <script type"textjavascript" src"http:cdn.widgetserver.comsyndicationsubscriber...

  8. Repast for Python Scripting.

    SciTech Connect (OSTI)

    Collier, N.; North, M. J.; Decision and Information Sciences

    2005-01-01

    Repast for Python Scripting (RepastPy) is a rapid application development (RAD) tool for producing simulations from the Repast agent simulation framework. Using a point-and-click component based interface, users can easily construct a simulation and then use a special subset of the Python programming language to define agent behaviors. RepastPy is the next generation of Repast visual development tools superceding the older SimBuilder tool and incorporating a streamlined user interface, improved Python language support, and the latest improvements to Repast. RepastPy now provides the ability to export RepastPy models to Java, allowing users to then work in the traditional Repast for Java environment.

  9. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  10. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-043: Perl Locale::Maketext Module 'compile()' Multiple Code Injection Vulnerabilities ... Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft ...

  11. Revising the worksheet with L3: a language and environment foruser-script interaction

    SciTech Connect (OSTI)

    Hohn, Michael H.

    2008-01-22

    This paper describes a novel approach to the parameter anddata handling issues commonly found in experimental scientific computingand scripting in general. The approach is based on the familiarcombination of scripting language and user interface, but using alanguage expressly designed for user interaction and convenience. The L3language combines programming facilities of procedural and functionallanguages with the persistence and need-based evaluation of data flowlanguages. It is implemented in Python, has access to all Pythonlibraries, and retains almost complete source code compatibility to allowsimple movement of code between the languages. The worksheet interfaceuses metadata produced by L3 to provide selection of values through thescriptit self and allow users to dynamically evolve scripts withoutre-running the prior versions. Scripts can be edited via text editors ormanipulated as structures on a drawing canvas. Computed values are validscripts and can be used further in other scripts via simplecopy-and-paste operations. The implementation is freely available underan open-source license.

  12. 2012 PATRIOT SCRIPT User's Guide

    SciTech Connect (OSTI)

    Cuellar, Leticia; Cleland, Timothy J.; Kubicek, Deborah A.; Mathis, Mark M.; Stroud, Phillip D.

    2012-05-31

    PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

  13. Arbitrary Lagrangian Eulerian Adaptive Mesh Refinement

    Energy Science and Technology Software Center (OSTI)

    2009-09-29

    This is a simulation code involving an ALE (arbitrary Lagrangian-Eulerian) hydrocode with AMR (adaptive mesh refinement) and pluggable physics packages for material strength, heat conduction, radiation diffusion, and laser ray tracing developed a LLNL, UCSD, and Berkeley Lab. The code is an extension of the open source SAMRAI (Structured Adaptive Mesh Refinement Application Interface) code/library. The code can be used in laser facilities such as the National Ignition Facility. The code is alsi being appliedmore » to slurry flow (landslides).« less

  14. HyRAM Testing Script.

    SciTech Connect (OSTI)

    Parkins, Owen

    2014-12-01

    The testing script is to provide a method of inspections to HyRAM (v1.0.0.244 Alpha) application features. This document will lead participants through the use of the application to make sure the application performs as designed. If a feature of the application becomes non-working, this script will relay useful information back to the designers of the application so that the feature can be fixed. This is essential to keep the application updated and performing as designed so that the users of this program can be satisfied. There will be frequent updates of this document to ensure proper testing of future application versions.

  15. Scripted Building Energy Modeling and Analysis: Preprint

    SciTech Connect (OSTI)

    Hale, E.; Macumber, D.; Benne, K.; Goldwasser, D.

    2012-08-01

    Building energy modeling and analysis is currently a time-intensive, error-prone, and nonreproducible process. This paper describes the scripting platform of the OpenStudio tool suite (http://openstudio.nrel.gov) and demonstrates its use in several contexts. Two classes of scripts are described and demonstrated: measures and free-form scripts. Measures are small, single-purpose scripts that conform to a predefined interface. Because measures are fairly simple, they can be written or modified by inexperienced programmers.

  16. Parallel, Distributed Scripting with Python

    SciTech Connect (OSTI)

    Miller, P J

    2002-05-24

    Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI library gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.

  17. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  18. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  19. A Freely Available Matlab Script for Automatic Spatial Drift...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: A Freely Available Matlab Script for Automatic Spatial Drift Correction. Citation Details In-Document Search Title: A Freely Available Matlab Script for Automatic ...

  20. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  1. Script for Monitoring Infiniband Switch Links

    Energy Science and Technology Software Center (OSTI)

    2015-09-08

    This script ingests a configuration file and parses it to determine an Infiniband network topology, specifically the port information for switches. It then loops over the fabric to determine which, if any, ports do not meet their desired configuration.

  2. Scripted Building Energy Modeling and Analysis (Presentation)

    SciTech Connect (OSTI)

    Macumber, D.

    2012-10-01

    Building energy analysis is often time-intensive, error-prone, and non-reproducible. Entire energy analyses can be scripted end-to-end using the OpenStudio Ruby API. Common tasks within an analysis can be automated using OpenStudio Measures. Graphical user interfaces (GUI's) and component libraries reduce time, decrease errors, and improve repeatability in energy modeling.

  3. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  4. Script identification from images using cluster-based templates

    DOE Patents [OSTI]

    Hochberg, J.G.; Kelly, P.M.; Thomas, T.R.

    1998-12-01

    A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script. 17 figs.

  5. Script identification from images using cluster-based templates

    DOE Patents [OSTI]

    Hochberg, Judith G.; Kelly, Patrick M.; Thomas, Timothy R.

    1998-01-01

    A computer-implemented method identifies a script used to create a document. A set of training documents for each script to be identified is scanned into the computer to store a series of exemplary images representing each script. Pixels forming the exemplary images are electronically processed to define a set of textual symbols corresponding to the exemplary images. Each textual symbol is assigned to a cluster of textual symbols that most closely represents the textual symbol. The cluster of textual symbols is processed to form a representative electronic template for each cluster. A document having a script to be identified is scanned into the computer to form one or more document images representing the script to be identified. Pixels forming the document images are electronically processed to define a set of document textual symbols corresponding to the document images. The set of document textual symbols is compared to the electronic templates to identify the script.

  6. The Swift Parallel Scripting Language for ALCF Systems | Argonne Leadership

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computing Facility Projects bgclang Compiler Cobalt Scheduler GLEAN Petrel Swift The Swift Parallel Scripting Language for ALCF Systems Swift is an implicitly parallel functional language that makes it easier to script higher-level applications or workflows composed from serial or parallel programs. Recently made available across ALCF systems, it has been used to script application workflows in a broad range of diverse disciplines from protein structure prediction to modeling global

  7. Sandia's Arbitrary Waveform MEMO Actuator

    Energy Science and Technology Software Center (OSTI)

    2003-08-07

    SAMA is a multichannel, arbitrary waveform generator program for driving microelectromechanical systems (MEMS). It allows the user to piece together twelve available wave parts, thereby permitting the user to create practically any waveform, or upload a previously constructed signal. The waveforms (bundled together as a signal) may simultaneously be output through four different channels to actuate MEMS devices, and the number of output channels may be increased depending on the DAQ card or instrument utilized.more » Additionally, real-time changes may be made to the frequency and amplitude. The signal may be paused temporarily. The waveform may be saved to file for future uploading. Recent work for this version has focused on modifications that will allow loading previously generated arbitrary waveforms, independent channel waveform amplification, adding a pause function, separating the "modify waveform: and "end program" functions, and simplifying the user interface by adding test blocks with statements to help the user program and output the desired signals. The program was developed in an effort to alleviate some of the limitations of Micro Driver. For example, Micro Driver will not allow the user to select a segment of a sine wave, but rather the user is limited to choosing either a whole or half sine wave pattern. It therefore becomes quite difficult ot construct partial sine wave patterns out of a "ramp" waveparts for several reasons. First, one must determine on paper how many data points each ramp will cover, and what the slopes of these ramps will be. Second, from what was observed, Micro Driver has difficulty processing more than six distinct waveparts during sequencing. The program will allow the user to input the various waves into the desired sequence; however, it will not allow the user to compile them (by clicking "ok" and returning to the main screen). Third, should the user decide that they want to increase the amplitute of the output signal

  8. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure...

  9. V-028: Splunk Multiple Cross-Site Scripting and Denial of Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    28: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities V-028: Splunk Multiple Cross-Site Scripting and Denial of Service Vulnerabilities November 20, 2012 -...

  10. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, ...

  11. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  12. An Arbitrary Precision Computation Package

    Energy Science and Technology Software Center (OSTI)

    2003-06-14

    This package permits a scientist to perform computations using an arbitrarily high level of numeric precision (the equivalent of hundreds or even thousands of digits), by making only minor changes to conventional C++ or Fortran-90 soruce code. This software takes advantage of certain properties of IEEE floating-point arithmetic, together with advanced numeric algorithms, custom data types and operator overloading. Also included in this package is the "Experimental Mathematician's Toolkit", which incorporates many of these facilitiesmore » into an easy-to-use interactive program.« less

  13. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  14. V-216: Drupal Monster Menus Module Security Bypass and Script...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP ...

  15. Scripts for Scalable Monitoring of Parallel Filesystem Infrastructure

    Energy Science and Technology Software Center (OSTI)

    2014-02-27

    Scripts for scalable monitoring of parallel filesystem infrastructure provide frameworks for monitoring the health of block storage arrays and large InfiniBand fabrics. The block storage framework uses Python multiprocessing to within scale the number monitored arrays to scale with the number of processors in the system. This enables live monitoring of HPC-scale filesystem with 10-50 storage arrays. For InfiniBand monitoring, there are scripts included that monitor InfiniBand health of each host along with visualization toolsmore » for mapping the topology of complex fabric topologies.« less

  16. Scripts for Scalable Monitoring of Parallel Filesystem Infrastructure

    SciTech Connect (OSTI)

    2014-02-27

    Scripts for scalable monitoring of parallel filesystem infrastructure provide frameworks for monitoring the health of block storage arrays and large InfiniBand fabrics. The block storage framework uses Python multiprocessing to within scale the number monitored arrays to scale with the number of processors in the system. This enables live monitoring of HPC-scale filesystem with 10-50 storage arrays. For InfiniBand monitoring, there are scripts included that monitor InfiniBand health of each host along with visualization tools for mapping the topology of complex fabric topologies.

  17. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain ...

  18. Scripts and Dynamic Pages on Websites Outside of the Energy.gov Drupal Environment

    Broader source: Energy.gov [DOE]

    This page describes the requirements for developing scripts and dynamic pages on EERE websites outside of Energy.gov. The use of scripting allows the creation of dynamic websites that allow user...

  19. V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

  20. V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

  1. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting ...

  2. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  3. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  5. T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting Attacks Arbitrary Code | Department of Energy 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A

  6. Microsoft Word - 02.20.07.CAES.script.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INL Video 1 CAES video script Groundbreaking Ceremony Feb. 20, 2007 Blake Hall, Idaho State Board of Education member This is a great opportunity for the State Board of Education to be present today with our universities and with private industry and government to announce the groundbreaking for the Center for Advanced Energy Studies. Arthur Vailas, Idaho State University president This partnership creates a core facility, a core resource, worldwide, that brings the best intellectual capital -

  7. Efficient isoparametric integration over arbitrary space-filling...

    Office of Scientific and Technical Information (OSTI)

    Efficient isoparametric integration over arbitrary space-filling Voronoi polyhedra for electronic structure calculations Prev Next Title: Efficient isoparametric integration ...

  8. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  9. SAE2.py : a python script to automate parameter studies using SCREAMER with application to magnetic switching on Z.

    SciTech Connect (OSTI)

    Orndorff-Plunkett, Franklin

    2011-05-01

    The SCREAMER simulation code is widely used at Sandia National Laboratories for designing and simulating pulsed power accelerator experiments on super power accelerators. A preliminary parameter study of Z with a magnetic switching retrofit illustrates the utility of the automating script for optimizing pulsed power designs. SCREAMER is a circuit based code commonly used in pulsed-power design and requires numerous iterations to find optimal configurations. System optimization using simulations like SCREAMER is by nature inefficient and incomplete when done manually. This is especially the case when the system has many interactive elements whose emergent effects may be unforeseeable and complicated. For increased completeness, efficiency and robustness, investigators should probe a suitably confined parameter space using deterministic, genetic, cultural, ant-colony algorithms or other computational intelligence methods. I have developed SAE2 - a user-friendly, deterministic script that automates the search for optima of pulsed-power designs with SCREAMER. This manual demonstrates how to make input decks for SAE2 and optimize any pulsed-power design that can be modeled using SCREAMER. Application of SAE2 to magnetic switching on model of a potential Z refurbishment illustrates the power of SAE2. With respect to the manual optimization, the automated optimization resulted in 5% greater peak current (10% greater energy) and a 25% increase in safety factor for the most highly stressed element.

  10. V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 0: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities V-230: IBM TRIRIGA Application Platform Multiple Cross-Site Scripting Vulnerabilities August 29, 2013 - 4:10am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM TRIRIGA Application Platform, which can be exploited by malicious people to conduct cross-site scripting attacks. PLATFORM: IBM TRIRIGA Application Platform 2.x ABSTRACT: The vulnerabilities are

  11. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  12. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  13. V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Symantec’s Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages.

  14. T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

  15. Post-Fabrication Placement of Arbitrary Chemical Functionality...

    Office of Scientific and Technical Information (OSTI)

    Post-Fabrication Placement of Arbitrary Chemical Functionality on Microphase-Separated Thin Films of Amine-Reactive Block Copolymers Citation Details In-Document Search Title: ...

  16. Writing World-Wide Web CGI scripts in the REXX language

    SciTech Connect (OSTI)

    Cottrell, R.L.A.

    1996-03-01

    This talk is aimed at people who have experience with REXX and are interested in using it to write WWW CGI scripts. As part of this, the author describes several functions that are available in a library of REXX functions that simplify writing WWW CGI scripts. This library is freely available at //www.slac.standard.edu/slac/www/tool/cgi-rexx/.

  17. Mode coupling evolution in arbitrary inflationary backgrounds

    SciTech Connect (OSTI)

    Bernardeau, Francis

    2011-02-01

    The evolution of high order correlation functions of a test scalar field in arbitrary inflationary backgrounds is computed. Whenever possible, exact results are derived from quantum field theory calculations. Taking advantage of the fact that such calculations can be mapped, for super-horizon scales, into those of a classical system, we express the expected correlation functions in terms of classical quantities, power spectra, Green functions, that can be easily computed in the long-wavelength limit. Explicit results are presented that extend those already known for a de Sitter background. In particular the expressions of the late time amplitude of bispectrum and trispectrum, as well as the whole high-order correlation structure, are given in terms of the expansion factor behavior. When compared to the case of a de Sitter background, power law inflation and chaotic inflation induced by a massive field are found to induce high order correlation functions the amplitudes of which are amplified by almost one order of magnitude. These results indicate that the dependence of the related non-Gaussian parameters — such as f{sub NL} — on the wave-modes is at percent level.

  18. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically provide the necessary MPI include files and libraries. For Fortran source code use mpif90: % mpif90 -o example.x example.f90 For C source code use...

  19. Python interface generator for Fortran based codes (a code development aid)

    Energy Science and Technology Software Center (OSTI)

    2012-02-22

    Forthon generates links between Fortran and Python. Python is a high level, object oriented, interactive and scripting language that allows a flexible and versatile interface to computational tools. The Forthon package generates the necessary wrapping code which allows access to the Fortran database and to the Fortran subroutines and functions. This provides a development package where the computationally intensive parts of a code can be written in efficient Fortran, and the high level controlling codemore » can be written in the much more versatile Python language.« less

  20. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  1. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clickjacking, and File Upload Attacks | Department of Energy 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer

  2. V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attacks | Department of Energy 9: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740

  3. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  4. Single-Species Aerosol Coagulation and Deposition with Arbitrary Size Resolution.

    Energy Science and Technology Software Center (OSTI)

    2012-07-31

    Version 00 SAEROSA solves the dynamic aerosol coagulation and deposition problem with arbitrary computational precision under a variety of conditions. The code includes numerous user-selectable coagulation kernels, alone or in combinations, and permits an arbitrary initial size distribution. Many parameter combinations and what-if scenarios under user control are possible. The output gives the particle size distribution suspended in the carrier fluid initially and after the desired aerosol aging time in terms of both differential andmore » integral aerosol volume concentrations. An auxiliary routine designed for the Mac OSX environment provides plotting capability. The output can be further processed by e.g., spreadsheets. The code has been benchmarked against three computer models, including MAEROS, and analytical models with excellent agreement. The test cases also included scenarios where previously published computational coagulation models lack capabilities or exhibit numerical instabilities. These included narrow, delta function, and non-lognormal initial size distributions, and further conditions, such as the presence of simultaneous coagulation mechanisms, including electrostatic effects, spanning multiple flow-regimes.« less

  5. Poly 3D fault modeling scripts/data for permeability potential of Washington State geothermal prospects

    SciTech Connect (OSTI)

    Michael Swyer

    2015-02-05

    Matlab scripts/functions and data used to build Poly3D models and create permeability potential GIS layers for 1) Mount St Helen's, 2) Wind River Valley, and 3) Mount Baker geothermal prospect areas located in Washington state.

  6. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  7. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  8. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  9. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  10. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  11. V-216: Drupal Monster Menus Module Security Bypass and Script Insertion

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 6: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and

  12. Risk Code?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Identify the Task Risk Code >2 Determine if a Work Control Document is needed What is the Unmitigated Risk Code? Rev.1 09/05/14 Read and Agree to Comply with appropriate mitigation and sign Work Control Documents Is there an approved Work Control Document (WCD)? WORK PLANNING, CONTROL AND AUTHORIZATION FLOW DIAGRAM 1. Define Scope of Work 2. Analyze Hazards 3. Develop and Implement Hazard Controls 4. Perform Work Within Controls 5. Feedback and Continuous Improvement Analyze Hazards and

  13. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  14. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  15. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  16. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  17. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  18. The Integrated TIGER Series Codes

    Energy Science and Technology Software Center (OSTI)

    2006-01-15

    ITS is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. Our goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects one of the many ITS codes. The ease with which the makefile system is applied combines with anmore » input scheme based on order-independent descriptive keywords that makes maximum use of defaults and intemal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 5.0, the latest version of ITS, contains (1) improvements to the ITS 3.0 continuous-energy codes, (2) multigroup codes with adjoint transport capabilities, (3) parallel implementations of all ITS codes, (4) a general purpose geometry engine for linking with CAD or other geometry formats, and (5) the Cholla facet geometry library. Moreover, the general user friendliness of the software has been enhanced through increased internal error checking and improved code portability.« less

  19. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  20. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High Performance Computing. The default compiler suite is from the Portland Group which is loaded by default at login, along with the PGI compiled Open MPI environment. % module list Currently Loaded Modulefiles: 1) pgi/10.8 2) openmpi/1.4.2 Basic Example Open MPI provides a convenient set of wrapper commands which you should use in

  1. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  2. WENO schemes on arbitrary unstructured meshes for laminar, transitional and turbulent flows

    SciTech Connect (OSTI)

    Tsoutsanis, Panagiotis, E-mail: panagiotis.tsoutsanis@cranfield.ac.uk; Antoniadis, Antonios Foivos, E-mail: a.f.antoniadis@cranfield.ac.uk; Drikakis, Dimitris, E-mail: d.drikakis@cranfield.ac.uk

    2014-01-01

    This paper presents the development and implementation of weighted-essentially-non-oscillatory (WENO) schemes for viscous flows on arbitrary unstructured grids. WENO schemes up to fifth-order accurate have been implemented in conjunction with hybrid and non-hybrid unstructured grids. The schemes are investigated with reference to numerical and experimental results for the TaylorGreen vortex, as well as for laminar and turbulent flows around a sphere, and the turbulent shock-wave boundary layer interaction flow problem. The results show that the accuracy of the schemes depends on the arbitrariness of shape and orientation of the unstructured mesh elements, as well as the compactness of directional stencils. The WENO schemes provide a more accurate numerical framework compared to second-order and third-order total variation diminishing (TVD) methods, however, the fifth-order version of the schemes is computationally too expensive to make the schemes practically usable. On the other hand, the third-order variant offers an excellent numerical framework in terms of accuracy and computational cost compared to the fifth-order WENO and second-order TVD schemes. Parallelisation of the CFD code (henceforth labelled as UCNS3D), where the schemes have been implemented, shows that the present methods offer very good scalable performance.

  3. Arbitrary unitary transformations on optical states using a quantum memory

    SciTech Connect (OSTI)

    Campbell, Geoff T.; Pinel, Olivier; Hosseini, Mahdi; Buchler, Ben C.; Lam, Ping Koy

    2014-12-04

    We show that optical memories arranged along an optical path can perform arbitrary unitary transformations on frequency domain optical states. The protocol offers favourable scaling and can be used with any quantum memory that uses an off-resonant Raman transition to reversibly transfer optical information to an atomic spin coherence.

  4. Please use "gres" settings in your batch scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Please use "gres" settings in your batch scripts Please use "gres" settings in your batch scripts September 4, 2012 by Helen He We would like to encourage you to use the generic resources ("gres") setting for various file systems that your batch jobs use. This feature is currently available on Hopper and Carver. The advantage of this setting is that your jobs won't start (thus won't fail) during a scheduled file system maintenance. The syntax for the

  5. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  6. code release

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    code release - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  7. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  8. Patriot Script 1.0.13 User Guide for PEM 1.3.2

    SciTech Connect (OSTI)

    Cleland, Timothy James; Kubicek, Deborah Ann; Stroud, Phillip David; Cuellar-Hengartner, Leticia; Mathis, Mark

    2015-11-02

    This document provides an updated user guide for Patriot Script Version 1.0.13, for release with PEM 1.3.1 (LAUR-1422817) that adds description and instructions for the new excursion capability (see section 4.5.1).

  9. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.

  10. Adaptive reconnection-based arbitrary Lagrangian Eulerian method

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bo, Wurigen; Shashkov, Mikhail

    2015-07-21

    We present a new adaptive Arbitrary Lagrangian Eulerian (ALE) method. This method is based on the reconnection-based ALE (ReALE) methodology of Refs. [35], [34] and [6]. The main elements in a standard ReALE method are: an explicit Lagrangian phase on an arbitrary polygonal (in 2D) mesh in which the solution and positions of grid nodes are updated; a rezoning phase in which a new grid is defined by changing the connectivity (using Voronoi tessellation) but not the number of cells; and a remapping phase in which the Lagrangian solution is transferred onto the new grid. Furthermore, in the standard ReALEmore » method, the rezoned mesh is smoothed by using one or several steps toward centroidal Voronoi tessellation, but it is not adapted to the solution in any way.« less

  11. Arbitrary waveform generator to improve laser diode driver performance

    DOE Patents [OSTI]

    Fulkerson, Jr, Edward Steven

    2015-11-03

    An arbitrary waveform generator modifies the input signal to a laser diode driver circuit in order to reduce the overshoot/undershoot and provide a "flat-top" signal to the laser diode driver circuit. The input signal is modified based on the original received signal and the feedback from the laser diode by measuring the actual current flowing in the laser diode after the original signal is applied to the laser diode.

  12. A compact, multichannel, and low noise arbitrary waveform generator

    SciTech Connect (OSTI)

    Govorkov, S.; Ivanov, B. I.; Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 ; Il'ichev, E.; Meyer, H.-G.

    2014-05-15

    A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

  13. 3D Multigroup Sn Neutron Transport Code

    Energy Science and Technology Software Center (OSTI)

    2001-02-14

    ATTILA is a 3D multigroup transport code with arbitrary order ansotropic scatter. The transport equation is solved in first order form using a tri-linear discontinuous spatial differencing on an arbitrary tetrahedral mesh. The overall solution technique is source iteration with DSA acceleration of the scattering source. Anisotropic boundary and internal sources may be entered in the form of spherical harmonics moments. Alpha and k eigenvalue problems are allowed, as well as fixed source problems. Forwardmore » and adjoint solutions are available. Reflective, vacumn, and source boundary conditions are available. ATTILA can perform charged particle transport calculations using slowing down (CSD) terms. ATTILA can also be used to peform infra-red steady-state calculations for radiative transfer purposes.« less

  14. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  15. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    Georgia's Department of Community Affairs periodically reviews, amends and/or updates the state minimum standard codes. Georgia has "mandatory" and "permissive" codes. Georgia State Energy Code...

  17. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    NOTE: On March 9, 2016, the State Fire Prevention and Building Code Council adopted major updates to the State Uniform Code and the State Energy Code. The State Energy Code has been updated to 2015...

  18. Quantitative phase retrieval with arbitrary pupil and illumination

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Claus, Rene A.; Naulleau, Patrick P.; Neureuther, Andrew R.; Waller, Laura

    2015-10-02

    We present a general algorithm for combining measurements taken under various illumination and imaging conditions to quantitatively extract the amplitude and phase of an object wave. The algorithm uses the weak object transfer function, which incorporates arbitrary pupil functions and partially coherent illumination. The approach is extended beyond the weak object regime using an iterative algorithm. Finally, we demonstrate the method on measurements of Extreme Ultraviolet Lithography (EUV) multilayer mask defects taken in an EUV zone plate microscope with both a standard zone plate lens and a zone plate implementing Zernike phase contrast.

  19. Consistent interaction vertices in arbitrary topological BF theories

    SciTech Connect (OSTI)

    Bizdadea, C.; Cioroianu, E. M.; Saliu, S. O.; Sararu, S. C.; Stanciu-Oprean, L.

    2013-11-13

    Here we extend the previous results from [12] to the computation of all consistent self-interactions for topological BF theories with maximal field spectra in D =5,6,7,8 and present some partial results on possible generalizations on a space-time of arbitrary dimension D. For convenience, the deformation of the solution to the master equation in the context of the BRST-antifield formalism is used as a general method of constructing consistent interacting gauge field theories together with most of the standard hypotheses on quantum field theories on Minkowski space-times.

  20. Identifying an experimental two-state Hamiltonian to arbitrary accuracy

    SciTech Connect (OSTI)

    Cole, Jared H.; Greentree, Andrew D.; Wellard, Cameron J.; Hollenberg, Lloyd C.L.; Schirmer, Sonia G.; Oi, Daniel K.L.

    2005-06-15

    Precision control of a quantum system requires accurate determination of the effective system Hamiltonian. We develop a method for estimating the Hamiltonian parameters for some unknown two-state system and providing uncertainty bounds on these parameters. This method requires only one measurement basis and the ability to initialize the system in some arbitrary state which is not an eigenstate of the Hamiltonian in question. The scaling of the uncertainty is studied for large numbers of measurements and found to be proportional to the reciprocal of the square root of the number of measurements.

  1. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  2. U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in ajax links before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed...

  3. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  4. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, Mark W.; George, William A.

    1986-01-01

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg.sub.2 Cl.sub.2, corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H.sub.2 O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H.sub.2 O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered.

  5. Conservative remapping and region overlays by intersecting arbitrary polyhedra

    SciTech Connect (OSTI)

    Grandy, J.

    1999-01-20

    An efficient algorithm for first-order grid intersections, by computing geometrically the intersection volume between donor and target zones, is developed for polyhedral meshes. The author examines two applications of grid intersections. One application is first-order remapping, in which zone and node centered fields defined on a given mesh are transferred to a different mesh. The second application is region overlays, in which a region with homogeneous material properties is approximated by a grid of polyhedra and mapped onto an arbitrary hexahedral mesh, creating mixed zones on the boundary of the region. He demonstrates the use of this grid intersection algorithm within the framework of hydrodynamics simulations, and using a domain decomposed mesh, he studies the feasibility of a parallel implementation.

  6. Falcon: automated optimization method for arbitrary assessment criteria

    DOE Patents [OSTI]

    Yang, Tser-Yuan; Moses, Edward I.; Hartmann-Siantar, Christine

    2001-01-01

    FALCON is a method for automatic multivariable optimization for arbitrary assessment criteria that can be applied to numerous fields where outcome simulation is combined with optimization and assessment criteria. A specific implementation of FALCON is for automatic radiation therapy treatment planning. In this application, FALCON implements dose calculations into the planning process and optimizes available beam delivery modifier parameters to determine the treatment plan that best meets clinical decision-making criteria. FALCON is described in the context of the optimization of external-beam radiation therapy and intensity modulated radiation therapy (IMRT), but the concepts could also be applied to internal (brachytherapy) radiotherapy. The radiation beams could consist of photons or any charged or uncharged particles. The concept of optimizing source distributions can be applied to complex radiography (e.g. flash x-ray or proton) to improve the imaging capabilities of facilities proposed for science-based stockpile stewardship.

  7. Method of preparing mercury with an arbitrary isotopic distribution

    DOE Patents [OSTI]

    Grossman, M.W.; George, W.A.

    1986-12-16

    This invention provides for a process for preparing mercury with a predetermined, arbitrary, isotopic distribution. In one embodiment, different isotopic types of Hg[sub 2]Cl[sub 2], corresponding to the predetermined isotopic distribution of Hg desired, are placed in an electrolyte solution of HCl and H[sub 2]O. The resulting mercurous ions are then electrolytically plated onto a cathode wire producing mercury containing the predetermined isotopic distribution. In a similar fashion, Hg with a predetermined isotopic distribution is obtained from different isotopic types of HgO. In this embodiment, the HgO is dissolved in an electrolytic solution of glacial acetic acid and H[sub 2]O. The isotopic specific Hg is then electrolytically plated onto a cathode and then recovered. 1 fig.

  8. Agile high resolution arbitrary waveform generator with jitterless frequency stepping

    DOE Patents [OSTI]

    Reilly, Peter T. A.; Koizumi, Hideya

    2010-05-11

    Jitterless transition of the programmable clock waveform is generated employing a set of two coupled direct digital synthesis (DDS) circuits. The first phase accumulator in the first DDS circuit runs at least one cycle of a common reference clock for the DDS circuits ahead of the second phase accumulator in the second DDS circuit. As a phase transition through the beginning of a phase cycle is detected from the first phase accumulator, a first phase offset word and a second phase offset word for the first and second phase accumulators are calculated and loaded into the first and second DDS circuits. The programmable clock waveform is employed as a clock input for the RAM address controller. A well defined jitterless transition in frequency of the arbitrary waveform is provided which coincides with the beginning of the phase cycle of the DDS output signal from the second DDS circuit.

  9. Laplace-Runge-Lenz vector for arbitrary spin

    SciTech Connect (OSTI)

    Nikitin, A. G.

    2013-12-15

    A countable set of superintegrable quantum mechanical systems is presented which admit the dynamical symmetry with respect to algebra so(4). This algebra is generated by the Laplace-Runge-Lenz vector generalized to the case of arbitrary spin. The presented systems describe neutral particles with non-trivial multipole momenta. Their spectra can be found algebraically like in the case of hydrogen atom. Solutions for the systems with spins 1/2 and 1 are presented explicitly, solutions for spin 3/2 can be expressed via solutions of an ordinary differential equation of first order. A more extended version of this paper including detailed calculations is published as an e-print arXiv:1308.4279.

  10. Running Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... MPI for Python (mpi4py, pyMPI) These expose MPI standard bindings to the Python programming language. Documentation on mpi4py is available here and useful collection of example ...

  11. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Mississippi's existing state code is based on the 1977 Model Code for Energy Conservation (MCEC). The existing law does not mandate enforcement by localities, and any revised code will probably...

  12. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The State Building Code Council revised the Washington State Energy Code (WESC) in February 2013, effective July 1, 2013. The WESC is a state-developed code based upon ASHRAE 90.1-2010 and the...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  14. 11. CONTRACT ID CODE

    National Nuclear Security Administration (NNSA)

    79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY ...

  15. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    The North Carolina State Building Code Council is responsible for developing all state codes. By statute, the Commissioner of Insurance has general supervision over the administration and...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became...

  19. Building Energy Codes: State and Local Code Implementation Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mark Lessans Fellow Building Energy Codes: State and Local Code Implementation Overview ... building code regarding energy efficiency to the revised model code and submit a ...

  20. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy Innovations New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in ...

  1. Manually operated coded switch

    DOE Patents [OSTI]

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  2. The solid angle (geometry factor) for a spherical surface source and an arbitrary detector aperture

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Favorite, Jeffrey A.

    2016-01-13

    It is proven that the solid angle (or geometry factor, also called the geometrical efficiency) for a spherically symmetric outward-directed surface source with an arbitrary radius and polar angle distribution and an arbitrary detector aperture is equal to the solid angle for an isotropic point source located at the center of the spherical surface source and the same detector aperture.

  3. T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input before displaying the input.

  4. Massive graviton on arbitrary background: derivation, syzygies, applications

    SciTech Connect (OSTI)

    Bernard, Laura; Deffayet, Cédric; Strauss, Mikael von

    2015-06-23

    We give the detailed derivation of the fully covariant form of the quadratic action and the derived linear equations of motion for a massive graviton in an arbitrary background metric (which were presented in arXiv:1410.8302 [hep-th]). Our starting point is the de Rham-Gabadadze-Tolley (dRGT) family of ghost free massive gravities and using a simple model of this family, we are able to express this action and these equations of motion in terms of a single metric in which the graviton propagates, hence removing in particular the need for a “reference metric' which is present in the non perturbative formulation. We show further how 5 covariant constraints can be obtained including one which leads to the tracelessness of the graviton on flat space-time and removes the Boulware-Deser ghost. This last constraint involves powers and combinations of the curvature of the background metric. The 5 constraints are obtained for a background metric which is unconstrained, i.e. which does not have to obey the background field equations. We then apply these results to the case of Einstein space-times, where we show that the 5 constraints become trivial, and Friedmann-Lemaître-Robertson-Walker space-times, for which we correct in particular some results that appeared elsewhere. To reach our results, we derive several non trivial identities, syzygies, involving the graviton fields, its derivatives and the background metric curvature. These identities have their own interest. We also discover that there exist backgrounds for which the dRGT equations cannot be unambiguously linearized.

  5. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    Legislation passed in March 2010 authorized the Alabama Energy and Residential Code (AERC) Board to adopt mandatory residential and commercial energy codes for all jurisdictions. In 2015, the AER...

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    A mandatory energy code is not enforced at the state level. If a local energy code is adopted, it is enforced at the local level. Builders or sellers of new residential buildings (single-family or...

  9. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  10. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Indiana Residential Building Code is based on the 2003 IRC with state amendments (eff. 9/11/05). This code applies to 1 and 2 family dwellings and townhouses. During the adoption process,...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 1993 State Legislature updated the state energy code to the 1989 Model Energy Code (MEC) and established a procedure to update the standard. Then in 1995, following consultation with an...

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  13. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Florida Building Commission (FBC) is directed to adopt, revise, update, and maintain the Florida Building Code in accordance with Chapter 120 of the state statutes. The code is mandatory...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2006 Iowa enacted H.F. 2361, requiring the State Building Commissioner to adopt energy conservation requirements based on a nationally recognized building energy code. The State Building Code...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    In September 2011 the Nebraska Building Energy Code was updated to the 2009 International Energy Conservation Code (IECC) standards. As with the previous 2003 IECC standards, which had been in...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    In November of 2015, the Commission adopted the 2015 International Building Code (IBC) with amendments. The Commission did not adopt the 2012 International Energy Conservation Code (IECC) as part...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more deta...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    Changes to the energy code are submitted to the Uniform Building Code Commission. The proposed change is reviewed by the Commission at a monthly meeting to decide if it warrants further considera...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Virginia Uniform Statewide Building Code (USBC) is a statewide minimum requirement that local jurisdictions cannot amend. The code is applicable to all new buildings in the commonwealth. The...

  2. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    Colorado is a home rule state, so no statewide energy code exists, although state government buildings do have specific requirements. Voluntary adoption of energy codes is encouraged and efforts...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the state’s energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 2012 IECC is in effect for all residential and commercial buildings, Idaho schools, and Idaho jurisdictions that adopt and enforce building codes, unless a local code exists that is more...

  6. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-01-01

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  7. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2001-02-20

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    New Hampshire adopted a mandatory statewide building code in 2002 based on the 2000 IECC. S.B. 81 was enacted in July 2007, and it upgraded the New Hampshire Energy Code to the 2006 IECC. In Dece...

  9. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  10. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    In March 2006, SB 459 was enacted to promote renewable energy and update the state's building energy codes.

  11. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  12. U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input.

  13. XSOR codes users manual

    SciTech Connect (OSTI)

    Jow, Hong-Nian; Murfin, W.B.; Johnson, J.D.

    1993-11-01

    This report describes the source term estimation codes, XSORs. The codes are written for three pressurized water reactors (Surry, Sequoyah, and Zion) and two boiling water reactors (Peach Bottom and Grand Gulf). The ensemble of codes has been named ``XSOR``. The purpose of XSOR codes is to estimate the source terms which would be released to the atmosphere in severe accidents. A source term includes the release fractions of several radionuclide groups, the timing and duration of releases, the rates of energy release, and the elevation of releases. The codes have been developed by Sandia National Laboratories for the US Nuclear Regulatory Commission (NRC) in support of the NUREG-1150 program. The XSOR codes are fast running parametric codes and are used as surrogates for detailed mechanistic codes. The XSOR codes also provide the capability to explore the phenomena and their uncertainty which are not currently modeled by the mechanistic codes. The uncertainty distributions of input parameters may be used by an. XSOR code to estimate the uncertainty of source terms.

  14. DLLExternalCode

    Energy Science and Technology Software Center (OSTI)

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read frommore » files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.« less

  15. DLLExternalCode

    SciTech Connect (OSTI)

    Greg Flach, Frank Smith

    2014-05-14

    DLLExternalCode is the a general dynamic-link library (DLL) interface for linking GoldSim (www.goldsim.com) with external codes. The overall concept is to use GoldSim as top level modeling software with interfaces to external codes for specific calculations. The DLLExternalCode DLL that performs the linking function is designed to take a list of code inputs from GoldSim, create an input file for the external application, run the external code, and return a list of outputs, read from files created by the external application, back to GoldSim. Instructions for creating the input file, running the external code, and reading the output are contained in an instructions file that is read and interpreted by the DLL.

  16. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    SciTech Connect (OSTI)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-15

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v{sub Parallel-To }, {mu}) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v{sub Parallel-To} and {mu} are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy. Topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.

  17. Simulation of neoclassical transport with the continuum gyrokinetic code COGENT

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Dorf, M. A.; Cohen, R. H.; Dorr, M.; Rognlien, T.; Hittinger, J.; Compton, J.; Colella, P.; Martin, D.; McCorquodale, P.

    2013-01-25

    The development of the continuum gyrokinetic code COGENT for edge plasma simulations is reported. The present version of the code models a nonlinear axisymmetric 4D (R, v∥, μ) gyrokinetic equation coupled to the long-wavelength limit of the gyro-Poisson equation. Here, R is the particle gyrocenter coordinate in the poloidal plane, and v∥ and μ are the guiding center velocity parallel to the magnetic field and the magnetic moment, respectively. The COGENT code utilizes a fourth-order finite-volume (conservative) discretization combined with arbitrary mapped multiblock grid technology (nearly field-aligned on blocks) to handle the complexity of tokamak divertor geometry with high accuracy.more » Furthermore, topics presented are the implementation of increasingly detailed model collision operators, and the results of neoclassical transport simulations including the effects of a strong radial electric field characteristic of a tokamak pedestal under H-mode conditions.« less

  18. Generating code adapted for interlinking legacy scalar code and extended vector code

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-06-04

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a different register configuration than the legacy ABI. First compiled code is generated based on the source code, the first compiled code comprising code for accommodating the difference in register configurations used by the extended ABI and the legacy ABI. The first compiled code and second compiled code are intermixed to generate intermixed code, the second compiled code being compiled code that uses the legacy ABI. The intermixed code comprises at least one call instruction that is one of a call from the first compiled code to the second compiled code or a call from the second compiled code to the first compiled code. The code for accommodating the difference in register configurations is associated with the at least one call instruction.

  19. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  20. Code of Conduct

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Governance » Ethics, Accountability, Contract » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Ethics and Compliance Group (505) 667-7506 Email Code of Conduct Los Alamos National Laboratory is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our

  1. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention

  2. Shields - Code Coupling

    SciTech Connect (OSTI)

    Vernon, Louis James

    2015-03-02

    This PowerPoint presentation focuses on the history and benefits of the Space Weather Modeling Framework (SWMF) code and collaborative software development.

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    Kansas adopted the 2006 International Energy Conservation Code (IECC) as "the applicable state standard" for commercial and industrial buildings. Enforcement is provided by local jurisdictions; t...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    Pennsylvania Department of Labor and Industry (DLI) has the authority to upgrade commercial and residential energy standards through the regulatory process. The current code, the 2009 UCC, became...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Maryland Building Performance Standards (MBPS) are adopted by the Maryland Department of Housing and Community Development (DHCD) Codes Administration. As required by legislation passed in...

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Connecticut Office of the State Building Inspector establishes and enforces building, electrical, mechanical, plumbing and energy code requirements by reviewing, developing, adopting and...

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Office of the State Fire Marshal is granted the authority to promulgate amendments, revisions, and alternative compliance methods for the code.

  8. Building Energy Codes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    David Cohan Program Manager Building Energy Codes April 22, 2014 Presentation Outline * Mission * Goals * Program Organization * StrategiesRoles * Near-Term Focus * Measuring ...

  9. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  10. Improving Code Compliance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    provisions in International Energy Conservation Code (IECC) through proof-of-concept ... This includes updating recommendations based on newer CBECs or BPD energy statistics. ...

  11. Top NAICS Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Related Products Manufacturing for Measuring, Displaying, Top Ten NAICS Codes Dollar Value 511210 Software Publishers 334516 Analytical Laboratory Instrument Manufacturing...

  12. Lichenase and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang; Ljungdahl, Lars G.; Chen, Huizhong

    2000-08-15

    The present invention provides a fungal lichenase, i.e., an endo-1,3-1,4-.beta.-D-glucanohydrolase, its coding sequence, recombinant DNA molecules comprising the lichenase coding sequences, recombinant host cells and methods for producing same. The present lichenase is from Orpinomyces PC-2.

  13. Building Energy Codes Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program U.S. Department of Energy Building Technologies Office Jeremy Williams, Project Manager Building Technologies Peer Review April 2014 Presentation Overview: * Introduction * Statutory Requirements * Program Structure * Recent accomplishments 2 Introduction: Background NATIONAL STATE LOCAL Building codes are developed through national industry consensus processes with input from industry representatives, trade organizations, government officials, and the general public Model energy codes

  14. Theoretical investigation of resonant frequencies of unstrapped magnetron with arbitrary side resonators

    SciTech Connect (OSTI)

    Yue, Song; Zhang, Zhao-chuan; Gao, Dong-ping

    2015-04-15

    In this paper, a sector steps approximation method is proposed to investigate the resonant frequencies of magnetrons with arbitrary side resonators. The arbitrary side resonator is substituted with a series of sector steps, in which the spatial harmonics of electromagnetic field are also considered. By using the method of admittance matching between adjacent steps, as well as field continuity conditions between side resonators and interaction regions, the dispersion equation of magnetron with arbitrary side resonators is derived. Resonant frequencies of magnetrons with five common kinds of side resonators are calculated with sector steps approximation method and computer simulation softwares, in which the results have a good agreement. The relative error is less than 2%, which verifies the validity of sector steps approximation method.

  15. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  16. Thermodynamic Model for Fluid-Fluid Interfacial Areas in Porous Media for Arbitrary Drainage-Imbibition Sequences

    SciTech Connect (OSTI)

    Schroth, Martin H.; Oostrom, Mart; Dobson, Richard; Zeyer, Josef

    2008-08-01

    Fluid/fluid interfacial areas are important in controlling the rate of mass and energy transfer between fluid phases in porous media. We present a modified thermodynamically based model (TBM) to predict fluid/fluid interfacial areas in porous media for arbitrary drainage/imbibition sequences. The TBM explicitly distinguishes between interfacial areas associated with continuous (free) and isolated (entrapped) nonwetting fluids. The model is restricted to two-fluid systems in which (1) no significant conversion of mechanical work into heat occurs, (2) the wetting fluid completely wets the porous mediums solid surfaces, and (3) no changes in interfacial area due to mass transfer between phases occur. We show example calculations for two different drainage/imbibition sequences in two porous media: a highly uniform silica sand and a well-graded silt. The TBMs predictions for interfacial area associated with free nonwetting-fluid are identical to those of a previously published geometry-based model (GBM). However, predictions for interfacial area associated with entrapped nonwetting-fluid are consistently larger in the TBM than in the GBM. Although a comparison of model predictions with experimental data is currently only possible to a limited extent, good general agreement was found for the TBM. As required model parameters are commonly used as inputs for or tracked during multifluid-flow simulations, the modified TBM may be easily incorporated in numerical codes.

  17. Compressible Astrophysics Simulation Code

    Energy Science and Technology Software Center (OSTI)

    2007-07-18

    This is an astrophysics simulation code involving a radiation diffusion module developed at LLNL coupled to compressible hydrodynamics and adaptive mesh infrastructure developed at LBNL. One intended application is to neutrino diffusion in core collapse supernovae.

  18. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    On May 2014, Delaware updated its energy code to 2012 IECC with amendments for residential sector and ASHRAE 90.1-2010 with amendments for the commercial sector. The Delaware specific amendments to...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  20. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    example.x example.c For C++ source code use CC % CC -fast -o example.x example.C All compilers on Hopper, PGI, Pathscale, Cray, GNU, and Intel, are provided via five programming...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Massachusetts Board of Building Regulations and Standards has authority to promulgate the Massachusetts State Building Code (MSBC). The energy provisions in the MSBC were developed by the Boa...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Oregon Energy Code amendments were most recently updated for both residential and non-residential construction in 2014. In October 2010 Oregon also adopted the Oregon Solar Installation...

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    Both State building codes adoption and enforcement efforts fall under the purview of the State Fire Marshal’s Office within the Department of Commerce and Insurance (C&I). Any changes to the...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Texas State Energy Conservation Office (SECO) by rule may choose to adopt the latest published editions of the energy efficiency provisions of the International Residential Code (IRC) or the...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    Missouri does not have a statewide building or energy code for private residential and commercial buildings, and there currently is no state regulatory agency authorized to promulgate, adopt, or...

  6. Tribal Green Building Codes

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    with even amount of white space between photos and header Tribal Green Building Codes Chelsea Chee November 1 3, 2012 SAND 2012---9858C Photos placed in horizontal position with ...

  7. Compiling Codes on Cori

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  8. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  9. National Energy Codes Conference

    Broader source: Energy.gov [DOE]

    Join us in Nashville, TN March 23-26, 2015 for the National Energy Codes Conference! Additional details, including registration information, a preliminary agenda, the application for the Jeffrey A...

  10. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  11. PNNL Energy Codes Portfolio

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PNNL Energy Codes Portfolio 2015 Building Technologies Office Peer Review ADOPT COMPLY DEVELOP Bing Liu bing.liu@pnnl.gov Rosemarie Bartlett rosemarie.bartlett@pnnl.gov Pacific Northwest National Laboratory Project Summary Timeline: Multi-year program in support of DOE statutory requirements Key Milestones: 1. DOE's Determinations on 90.1-2013 and 2015 IECC 2. Update DOE's Energy odes ost-Effectiveness Methodology 3. Commercial Codes Roadmap 4. 90.1-2013 and 2015 IECC Cost Analyses 5.

  12. Generating code adapted for interlinking legacy scalar code and...

    Office of Scientific and Technical Information (OSTI)

    Mechanisms for intermixing code are provided. Source code is received for compilation using an extended Application Binary Interface (ABI) that extends a legacy ABI and uses a ...

  13. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy ... system knowledge that may limit effective implementation of new and existing standards. ...

  14. Nevada Energy Code for Buildings

    Office of Energy Efficiency and Renewable Energy (EERE)

    Legislation signed in 2009 changed the process of adopting building codes in the state. Previously, the statewide code would only apply to local governments that had not already adopted a code,...

  15. On-chip generation of Einstein-Podolsky-Rosen states with arbitrary symmetry

    SciTech Connect (OSTI)

    Grfe, Markus; Heilmann, Ren; Nolte, Stefan; Szameit, Alexander

    2015-05-04

    We experimentally demonstrate a method for integrated-optical generation of two-photon Einstein-Podolsky-Rosen states featuring arbitrary symmetries. In our setting, we employ detuned directional couplers to impose a freely tailorable phase between the two modes of the state. Our results allow to mimic the quantum random walk statistics of bosons, fermions, and anyons, particles with fractional exchange statistics.

  16. FAA Smoke Transport Code

    Energy Science and Technology Software Center (OSTI)

    2006-10-27

    FAA Smoke Transport Code, a physics-based Computational Fluid Dynamics tool, which couples heat, mass, and momentum transfer, has been developed to provide information on smoke transport in cargo compartments with various geometries and flight conditions. The software package contains a graphical user interface for specification of geometry and boundary conditions, analysis module for solving the governing equations, and a post-processing tool. The current code was produced by making substantial improvements and additions to a codemore » obtained from a university. The original code was able to compute steady, uniform, isothermal turbulent pressurization. In addition, a preprocessor and postprocessor were added to arrive at the current software package.« less

  17. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  18. The WARP Code: Modeling High Intensity Ion Beams

    SciTech Connect (OSTI)

    Grote, David P.; Friedman, Alex; Vay, Jean-Luc; Haber, Irving

    2005-03-15

    The Warp code, developed for heavy-ion driven inertial fusion energy studies, is used to model high intensity ion (and electron) beams. Significant capability has been incorporated in Warp, allowing nearly all sections of an accelerator to be modeled, beginning with the source. Warp has as its core an explicit, three-dimensional, particle-in-cell model. Alongside this is a rich set of tools for describing the applied fields of the accelerator lattice, and embedded conducting surfaces (which are captured at sub-grid resolution). Also incorporated are models with reduced dimensionality: an axisymmetric model and a transverse 'slice' model. The code takes advantage of modern programming techniques, including object orientation, parallelism, and scripting (via Python). It is at the forefront in the use of the computational technique of adaptive mesh refinement, which has been particularly successful in the area of diode and injector modeling, both steady-state and time-dependent. In the presentation, some of the major aspects of Warp will be overviewed, especially those that could be useful in modeling ECR sources. Warp has been benchmarked against both theory and experiment. Recent results will be presented showing good agreement of Warp with experimental results from the STS500 injector test stand. Additional information can be found on the web page http://hif.lbl.gov/theory/WARP{sub s}ummary.html.

  19. The WARP Code: Modeling High Intensity Ion Beams

    SciTech Connect (OSTI)

    Grote, D P; Friedman, A; Vay, J L; Haber, I

    2004-12-09

    The Warp code, developed for heavy-ion driven inertial fusion energy studies, is used to model high intensity ion (and electron) beams. Significant capability has been incorporated in Warp, allowing nearly all sections of an accelerator to be modeled, beginning with the source. Warp has as its core an explicit, three-dimensional, particle-in-cell model. Alongside this is a rich set of tools for describing the applied fields of the accelerator lattice, and embedded conducting surfaces (which are captured at sub-grid resolution). Also incorporated are models with reduced dimensionality: an axisymmetric model and a transverse ''slice'' model. The code takes advantage of modern programming techniques, including object orientation, parallelism, and scripting (via Python). It is at the forefront in the use of the computational technique of adaptive mesh refinement, which has been particularly successful in the area of diode and injector modeling, both steady-state and time-dependent. In the presentation, some of the major aspects of Warp will be overviewed, especially those that could be useful in modeling ECR sources. Warp has been benchmarked against both theory and experiment. Recent results will be presented showing good agreement of Warp with experimental results from the STS500 injector test stand. Additional information can be found on the web page http://hif.lbl.gov/theory/WARP{_}summary.html.

  20. ELLIPT2D: A Flexible Finite Element Code Written Python

    SciTech Connect (OSTI)

    Pletzer, A.; Mollis, J.C.

    2001-03-22

    The use of the Python scripting language for scientific applications and in particular to solve partial differential equations is explored. It is shown that Python's rich data structure and object-oriented features can be exploited to write programs that are not only significantly more concise than their counter parts written in Fortran, C or C++, but are also numerically efficient. To illustrate this, a two-dimensional finite element code (ELLIPT2D) has been written. ELLIPT2D provides a flexible and easy-to-use framework for solving a large class of second-order elliptic problems. The program allows for structured or unstructured meshes. All functions defining the elliptic operator are user supplied and so are the boundary conditions, which can be of Dirichlet, Neumann or Robbins type. ELLIPT2D makes extensive use of dictionaries (hash tables) as a way to represent sparse matrices.Other key features of the Python language that have been widely used include: operator over loading, error handling, array slicing, and the Tkinter module for building graphical use interfaces. As an example of the utility of ELLIPT2D, a nonlinear solution of the Grad-Shafranov equation is computed using a Newton iterative scheme. A second application focuses on a solution of the toroidal Laplace equation coupled to a magnetohydrodynamic stability code, a problem arising in the context of magnetic fusion research.

  1. Electrical Circuit Simulation Code

    Energy Science and Technology Software Center (OSTI)

    2001-08-09

    Massively-Parallel Electrical Circuit Simulation Code. CHILESPICE is a massively-arallel distributed-memory electrical circuit simulation tool that contains many enhanced radiation, time-based, and thermal features and models. Large scale electronic circuit simulation. Shared memory, parallel processing, enhance convergence. Sandia specific device models.

  2. The effect of periodic wavy profile on suppressing window multipactor under arbitrary electromagnetic mode

    SciTech Connect (OSTI)

    Chang, C.; Liu, Y. S.; Chen, C. H.; Guo, L. T.; Li, S.; Wu, X. L.; Verboncoeur, J.

    2015-01-05

    The three-dimensional periodic ripple profile with each unit of rotational symmetric surface is proposed to suppress multipactor for arbitrary electromagnetic mode with any polarization. The field distribution and multipactor electron dynamics on the wavy surface are studied to illustrate the multipactor inhibition mechanism. High power microwave experiment was conducted to demonstrate the effect of wavy surface on significantly improving the window power capacity.

  3. Finite Element Analysis Code

    Energy Science and Technology Software Center (OSTI)

    2006-03-08

    MAPVAR-KD is designed to transfer solution results from one finite element mesh to another. MAPVAR-KD draws heavily from the structure and coding of MERLIN II, but it employs a new finite element data base, EXODUS II, and offers enhanced speed and new capabilities not available in MERLIN II. In keeping with the MERLIN II documentation, the computational algorithms used in MAPVAR-KD are described. User instructions are presented. Example problems are included to demonstrate the operationmore » of the code and the effects of various input options. MAPVAR-KD is a modification of MAPVAR in which the search algorithm was replaced by a kd-tree-based search for better performance on large problems.« less

  4. Confocal coded aperture imaging

    DOE Patents [OSTI]

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  5. Coded credentials: A primer

    SciTech Connect (OSTI)

    Wright, L.J.

    1988-02-01

    The need to identify people is an age-old requirement that has taken many forms over the ages. With the advent of the age of technology, the need has become more acute and many methods have been devised to help with the identification process. This report is designed to be a primer on one of those methods - the coded credential, e.g., a credential that is compatible with computerized access control systems.

  6. THREAT OF MALICIOUS CODE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    THREAT OF MALICIOUS CODE The Department of Energy (DOE) is strongly committed to the protection of all DOE assets from cyber attack and malicious exploitation. This includes information, networks, hardware, software, and mobile devices. DOE's continued diligence in this arena is critical in today's constantly-evolving cyber threat landscape. A recently cited incident involved senior officials receiving unsolicited free phone chargers. Luckily, the source was legitimate and did not result in a

  7. Coding Archives - Nercenergy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Coding What Certificates Should My Microsoft Exchange Server Have? Much like any other network application, in order to secure the functionality and safety of Microsoft Exchange Servers, it's essential to adopt specific certificates. Due to the literally thousands, if not millions, of security threats bombarding your Exchange Server every day, these certificates ensure users have a safe messaging experience while simultaneously safeguarding your data and sensitive information from being

  8. Bar coded retroreflective target

    DOE Patents [OSTI]

    Vann, Charles S.

    2000-01-01

    This small, inexpensive, non-contact laser sensor can detect the location of a retroreflective target in a relatively large volume and up to six degrees of position. The tracker's laser beam is formed into a plane of light which is swept across the space of interest. When the beam illuminates the retroreflector, some of the light returns to the tracker. The intensity, angle, and time of the return beam is measured to calculate the three dimensional location of the target. With three retroreflectors on the target, the locations of three points on the target are measured, enabling the calculation of all six degrees of target position. Until now, devices for three-dimensional tracking of objects in a large volume have been heavy, large, and very expensive. Because of the simplicity and unique characteristics of this tracker, it is capable of three-dimensional tracking of one to several objects in a large volume, yet it is compact, light-weight, and relatively inexpensive. Alternatively, a tracker produces a diverging laser beam which is directed towards a fixed position, and senses when a retroreflective target enters the fixed field of view. An optically bar coded target can be read by the tracker to provide information about the target. The target can be formed of a ball lens with a bar code on one end. As the target moves through the field, the ball lens causes the laser beam to scan across the bar code.

  9. MELCOR computer code manuals

    SciTech Connect (OSTI)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L.; Hodge, S.A.; Hyman, C.R.; Sanders, R.L.

    1995-03-01

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  10. Idaho Code | Open Energy Information

    Open Energy Info (EERE)

    Not provided DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Idaho Code Citation Idaho Code (2014). Retrieved from "http:en.openei.org...

  11. Finite Element Analysis Code

    Energy Science and Technology Software Center (OSTI)

    2005-06-26

    Exotxt is an analysis code that reads finite element results data stored in an exodusII file and generates a file in a structured text format. The text file can be edited or modified via a number of text formatting tools. Exotxt is used by analysis to translate data from the binary exodusII format into a structured text format which can then be edited or modified and then either translated back to exodusII format or tomore » another format.« less

  12. Finite Element Analysis Code

    Energy Science and Technology Software Center (OSTI)

    2005-05-07

    CONEX is a code for joining sequentially in time multiple exodusll database files which all represent the same base mesh topology and geometry. It is used to create a single results or restart file from multiple results or restart files which typically arise as the result of multiple restarted analyses. CONEX is used to postprocess the results from a series of finite element analyses. It can join sequentially the data from multiple results databases intomore » a single database which makes it easier to postprocess the results data.« less

  13. JOY computer code

    SciTech Connect (OSTI)

    Couch, R.G.; Albright, E.L.; Alexander, N.B.

    1983-01-01

    JOY is a 3-dimensional multifluid Eulerian hydrocode in Cartesian coordinates. It contains an elastic-plastic treatment and a shock-initiation model for high explosives (HE). Development of JOY was funded by the Ballistic Missile Defense Advanced Technology Center (BMDATC). The intended use of the code was for the study of hypervelocity impacts. The ultimate goal was to perform a structural analysis of objects subject to such impacts. JOY was designed to treat the early-impact phases where material motion is complicated, and then transfer information to DYNA3D for the longer-timescale analysis.

  14. T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input.

  15. Study of stopping power for a proton moving in a plasma with arbitrary degeneracy

    SciTech Connect (OSTI)

    Zhang, Ya; Song, Yuan-Hong; Wang, You-Nian [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)] [School of Physics and Optoelectronic Technology, Dalian University of Technology, Dalian 116024 (China)

    2013-10-15

    Excitation of bulk solid electrons with arbitrary degeneracy, by external charged particles, is investigated by a two-dimensional nonlinear quantum hydrodynamic (QHD) model. The nonlinear stopping power and wake potential are calculated by solving the nonlinear QHD equations with the flux corrected transport numerical method. Two cases of fully degenerated and partially degenerated electrons are compared and discussed in the same self-consistent QHD model. Our results are consistent with the well known dielectric calculation of the stopping power at higher velocity, but include the nonlinear terms of the interactions and give larger stopping power at smaller velocity.

  16. Conditional generation of arbitrary single-mode quantum states of light by repeated photon subtractions

    SciTech Connect (OSTI)

    Fiurasek, Jaromir; Garcia-Patron, Raul; Cerf, Nicolas J.

    2005-09-15

    We propose a scheme for the conditional generation of arbitrary finite superpositions of Fock states in a single mode of a traveling optical field. The setup requires a source of squeezed vacuum states, beam splitters, strong coherent beams, photodetectors with single-photon sensitivity, and a final squeezer. If we want to generate a squeezed superposition of Fock states, which is sufficient in several applications, then the last squeezer is not even needed. The thrust of this method is that it achieves a high fidelity without requiring photodetectors with a high efficiency or a single-photon resolution. The possibility to improve its scaling by using a quantum memory is also discussed.

  17. Effect of a polynomial arbitrary dust size distribution on dust acoustic solitons

    SciTech Connect (OSTI)

    Ishak-Boushaki, M.; Djellout, D.; Annou, R.

    2012-07-15

    The investigation of dust-acoustic solitons when dust grains are size-distributed and ions adiabatically heated is conducted. The influence of an arbitrary dust size-distribution described by a polynomial function on the properties of dust acoustic waves is investigated. An energy-like integral equation involving Sagdeev potential is derived. The solitary solutions are shown to undergo a transformation into cnoidal ones under some physical conditions. The dust size-distribution can significantly affect both lower and upper critical Mach numbers for both solitons and cnoidal solutions.

  18. Spontaneous electromagnetic fluctuations in unmagnetized plasmas. VI. Transverse, collective mode for arbitrary distribution functions

    SciTech Connect (OSTI)

    Felten, T.; Schlickeiser, R.; Research Department Plasmas with Complex Interactions, Ruhr-Universität Bochum, D-44780 Bochum

    2013-10-15

    Using the general expressions for the magnetic fluctuation spectrum from uncorrelated plasma particles, it is shown that an isotropic, unmagnetized plasma with arbitrary momentum distribution function spontaneously emits an aperiodic, collective, transverse, damped mode. The collective mode with the dispersion relation γ(k) provides the strongest contribution to the magnetic field fluctuation spectrum. Its existence has been proven before for Maxwellian and Lorentzian plasma distribution functions. Here it is demonstrated that this collective aperiodic mode exists in any isotropic unmagnetized, irrespective of the explicit form of the momentum distribution of plasma particles.

  19. Recursive polarization of nuclear spins in diamond at arbitrary magnetic fields

    SciTech Connect (OSTI)

    Pagliero, Daniela; Laraoui, Abdelghani; Henshaw, Jacob D.; Meriles, Carlos A.

    2014-12-15

    We introduce an alternate route to dynamically polarize the nuclear spin host of nitrogen-vacancy (NV) centers in diamond. Our approach articulates optical, microwave, and radio-frequency pulses to recursively transfer spin polarization from the NV electronic spin. Using two complementary variants of the same underlying principle, we demonstrate nitrogen nuclear spin initialization approaching 80% at room temperature both in ensemble and single NV centers. Unlike existing schemes, our approach does not rely on level anti-crossings and is thus applicable at arbitrary magnetic fields. This versatility should prove useful in applications ranging from nanoscale metrology to sensitivity-enhanced NMR.

  20. Code Tables | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Code Tables U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Code Tables Action Code The action code identifies the type of activity being reported in a transaction. The Action Code table shows the valid action codes. Nature of Transaction (TI) Code The financial code signifies the nature of the financial or contractual activity that is involved in the transaction. The Nature of Transaction (TI) Code table shows the valid action

  1. Southeast Energy Efficiency Alliance's Building Energy Codes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013 ...

  2. Utah Code Annotated | Open Energy Information

    Open Energy Info (EERE)

    Code Ann. DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Utah Code Annotated Citation Utah Code Annotated (2014). Retrieved from...

  3. Product Service Codes @ Headquarters | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Service Codes @ Headquarters A listing of Product Service Codes used at Headquarters Procurement Services PDF icon Produce Service Codes @ Headquarters.pdf More Documents &...

  4. Cal. Wat. Code 13376 | Open Energy Information

    Open Energy Info (EERE)

    Cal. Wat. Code 13376Legal Abstract Cal. Wat. Code 13376, current through August 14, 2014. Published NA Year Signed or Took Effect 2014 Legal Citation Cal. Wat. Code...

  5. Cal. Wat. Code 13320 | Open Energy Information

    Open Energy Info (EERE)

    Cal. Wat. Code 13320Legal Abstract Cal. Wat. Code 13320, current through August 13, 2014. Published NA Year Signed or Took Effect 1969 Legal Citation Cal. Wat. Code...

  6. Cal. Wat. Code 13369 | Open Energy Information

    Open Energy Info (EERE)

    Cal. Wat. Code 13369Legal Abstract Cal. Wat. Code 13369, current through August 13, 2014. Published NA Year Signed or Took Effect 1969 Legal Citation Cal. Wat. Code...

  7. Cal. Wat. Code 13373 | Open Energy Information

    Open Energy Info (EERE)

    Cal. Wat. Code 13373Legal Abstract Cal. Wat. Code 13373, current through August 14, 2014. Published NA Year Signed or Took Effect 1987 Legal Citation Cal. Wat. Code...

  8. Cal. Wat. Code 13160 | Open Energy Information

    Open Energy Info (EERE)

    Cal. Wat. Code 13160Legal Abstract Cal. Wat. Code 13160, current through August 13, 2014. Published NA Year Signed or Took Effect 1969 Legal Citation Cal. Wat. Code...

  9. Effect of separation efficiency on repository loading values in fuel cycle scenario analysis codes

    SciTech Connect (OSTI)

    Radel, T.E.; Wilson, P.P.H.; Grady, R.M.; Bauer, T.H.

    2007-07-01

    Fuel cycle scenario analysis codes are valuable tools for investigating the effects of various decisions on the performance of the nuclear fuel cycle as a whole. Until recently, repository metrics in such codes were based on mass and were independent of the isotopic composition of the waste. A methodology has been developed for determining peak repository loading for an arbitrary set of isotopics based on the heat load restrictions and current geometry specifications for the Yucca Mountain repository. This model was implemented in the VISION fuel cycle scenario analysis code and is used here to study the effects of separation efficiencies on repository loading for various AFCI fuel cycle scenarios. Improved separations efficiencies are shown to have continuing technical benefit in fuel cycles that recycle Am and Cm, but a substantial benefit can be achieved with modest separation efficiencies. (authors)

  10. Arbitrary amplitude solitary and shock waves in an unmagnetized quantum dusty electron-positron-ion plasma

    SciTech Connect (OSTI)

    Rouhani, M. R.; Akbarian, A.; Mohammadi, Z.

    2013-08-15

    The behavior of quantum dust ion acoustic soliton and shocks in a plasma including inertialess quantum electrons and positrons, classical cold ions, and stationary negative dust grains are studied, using arbitrary amplitude approach. The effect of dissipation due to viscosity of ions is taken into account. The numerical analysis of Sagdeev potential for small value of quantum diffraction parameter (H) shows that for chosen plasma, only compressive solitons can exist and the existence domain of this type of solitons is decreased by increasing dust density (d). Additionally, the possibility of propagation of both subsonic and supersonic compressive solitons is investigated. It is shown that there is a critical dust density above which only supersonic solitons are observed. Moreover, increasing d leads to a reduction in the existence domain of compressive solitons and the possibility of propagation of rarefactive soliton is provided. So, rarefactive solitons are observed only due to the presence of dust particles in this model quantum plasma. Furthermore, numerical solution of governed equations for arbitrary amplitude shock waves has been investigated. It is shown that only compressive large amplitude shocks can propagate. Finally, the effects of plasma parameters on these structures are investigated. This research will be helpful in understanding the properties of dense astrophysical (i.e., white dwarfs and neutron stars) and laboratory dusty plasmas.

  11. A Comparative Study of Different Reconstruction Schemes for a Reconstructed Discontinuous Galerkin Method on Arbitrary Grids

    SciTech Connect (OSTI)

    Hong Luo; Hanping Xiao; Robert Nourgaliev; Chunpei Cai

    2011-06-01

    A comparative study of different reconstruction schemes for a reconstruction-based discontinuous Galerkin, termed RDG(P1P2) method is performed for compressible flow problems on arbitrary grids. The RDG method is designed to enhance the accuracy of the discontinuous Galerkin method by increasing the order of the underlying polynomial solution via a reconstruction scheme commonly used in the finite volume method. Both Green-Gauss and least-squares reconstruction methods and a least-squares recovery method are implemented to obtain a quadratic polynomial representation of the underlying discontinuous Galerkin linear polynomial solution on each cell. These three reconstruction/recovery methods are compared for a variety of compressible flow problems on arbitrary meshes to access their accuracy and robustness. The numerical results demonstrate that all three reconstruction methods can significantly improve the accuracy of the underlying second-order DG method, although the least-squares reconstruction method provides the best performance in terms of both accuracy and robustness.

  12. Development code for sensitivity and uncertainty analysis of input on the MCNPX for neutronic calculation in PWR core

    SciTech Connect (OSTI)

    Hartini, Entin Andiwijayakusuma, Dinan

    2014-09-30

    This research was carried out on the development of code for uncertainty analysis is based on a statistical approach for assessing the uncertainty input parameters. In the butn-up calculation of fuel, uncertainty analysis performed for input parameters fuel density, coolant density and fuel temperature. This calculation is performed during irradiation using Monte Carlo N-Particle Transport. The Uncertainty method based on the probabilities density function. Development code is made in python script to do coupling with MCNPX for criticality and burn-up calculations. Simulation is done by modeling the geometry of PWR terrace, with MCNPX on the power 54 MW with fuel type UO2 pellets. The calculation is done by using the data library continuous energy cross-sections ENDF / B-VI. MCNPX requires nuclear data in ACE format. Development of interfaces for obtaining nuclear data in the form of ACE format of ENDF through special process NJOY calculation to temperature changes in a certain range.

  13. Explosive Formulation Code Naming SOP

    SciTech Connect (OSTI)

    Martz, H. E.

    2014-09-19

    The purpose of this SOP is to provide a procedure for giving individual HME formulations code names. A code name for an individual HME formulation consists of an explosive family code, given by the classified guide, followed by a dash, -, and a number. If the formulation requires preparation such as packing or aging, these add additional groups of symbols to the X-ray specimen name.

  14. NEEP Building Energy Codes Project

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    * Markets value and prioritize energy efficiency - Rating and Disclosure ( VT, Cambridge, MA) * Robust & qualified building energy code work force: DE, RI, MA, MD, NY * ...

  15. City of Austin- Zoning Code

    Broader source: Energy.gov [DOE]

    The Zoning Code also allows for preservation plans in historic districts to incorporate sustainability measures such as solar technologies and other energy generation and efficiency measures.

  16. Technical Assistance: Increasing Code Compliance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technologies Office Peer Review Rosemarie Bartlett ... energy codes resulting in higher-performing buildings that ... feedback * Provide education and training materials in ...

  17. Clark County- Energy Conservation Code

    Broader source: Energy.gov [DOE]

    In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...

  18. Marin County- Solar Access Code

    Broader source: Energy.gov [DOE]

    Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...

  19. Equation-of-State Test Suite for the DYNA3D Code

    SciTech Connect (OSTI)

    Benjamin, Russell D.

    2015-11-05

    This document describes the creation and implementation of a test suite for the Equationof- State models in the DYNA3D code. A customized input deck has been created for each model, as well as a script that extracts the relevant data from the high-speed edit file created by DYNA3D. Each equation-of-state model is broken apart and individual elements of the model are tested, as well as testing the entire model. The input deck for each model is described and the results of the tests are discussed. The intent of this work is to add this test suite to the validation suite presently used for DYNA3D.

  20. Telescope Adaptive Optics Code

    Energy Science and Technology Software Center (OSTI)

    2005-07-28

    The Telescope AO Code has general adaptive optics capabilities plus specialized models for three telescopes with either adaptive optics or active optics systems. It has the capability to generate either single-layer or distributed Kolmogorov turbulence phase screens using the FFT. Missing low order spatial frequencies are added using the Karhunen-Loeve expansion. The phase structure curve is extremely dose to the theoreUcal. Secondly, it has the capability to simulate an adaptive optics control systems. The defaultmore » parameters are those of the Keck II adaptive optics system. Thirdly, it has a general wave optics capability to model the science camera halo due to scintillation from atmospheric turbulence and the telescope optics. Although this capability was implemented for the Gemini telescopes, the only default parameter specific to the Gemini telescopes is the primary mirror diameter. Finally, it has a model for the LSST active optics alignment strategy. This last model is highly specific to the LSST« less

  1. MODIFICATION OF THE MOOG SPECTRAL SYNTHESIS CODES TO ACCOUNT FOR ZEEMAN BROADENING OF SPECTRAL LINES

    SciTech Connect (OSTI)

    Deen, Casey P.

    2013-09-15

    In an attempt to widen access to the study of magnetic fields in stellar astronomy, I present MOOGStokes, a version of the MOOG one-dimensional local thermodynamic equilibrium radiative transfer code, overhauled to incorporate a Stokes vector treatment of polarized radiation through a magnetic medium. MOOGStokes is a suite of three complementary programs, which together can synthesize the disk-averaged emergent spectrum of a star with a magnetic field. The first element (a pre-processing script called CounterPoint) calculates for a given magnetic field strength, wavelength shifts, and polarizations for the components of Zeeman-sensitive lines. The second element (a MOOG driver called SynStokes derived from the existing MOOG driver Synth) uses the list of Zeeman-shifted absorption lines together with the existing machinery of MOOG to synthesize the emergent spectrum at numerous locations across the stellar disk, accounting for stellar and magnetic field geometry. The third and final element (a post-processing script called DiskoBall) calculates the disk-averaged spectrum by weighting the individual emergent spectra by limb darkening and projected area, and applying the effects of Doppler broadening. All together, the MOOGStokes package allows users to synthesize emergent spectra of stars with magnetic fields in a familiar computational framework. MOOGStokes produces disk-averaged spectra for all Stokes vectors ( I, Q, U, V ), normalized by the continuum. MOOGStokes agrees well with the predictions of INVERS10 a polarized radiative transfer code with a long history of use in the study of stellar magnetic fields. In the non-magnetic limit, MOOGStokes also agrees with the predictions of the scalar version of MOOG.

  2. Two-particle multichannel systems in a finite volume with arbitrary spin

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Briceno, Raul A.

    2014-04-08

    The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. With hadronic systems the rangemore » of the interaction is set by the inverse of the pion mass, mπ, and as a result the formalism presented is suitable for mπL>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.« less

  3. High-speed multi-frame dynamic transmission electron microscope image acquisition system with arbitrary timing

    DOE Patents [OSTI]

    Reed, Bryan W.; DeHope, William J.; Huete, Glenn; LaGrange, Thomas B.; Shuttlesworth, Richard M.

    2016-02-23

    An electron microscope is disclosed which has a laser-driven photocathode and an arbitrary waveform generator (AWG) laser system ("laser"). The laser produces a train of temporally-shaped laser pulses each being of a programmable pulse duration, and directs the laser pulses to the laser-driven photocathode to produce a train of electron pulses. An image sensor is used along with a deflector subsystem. The deflector subsystem is arranged downstream of the target but upstream of the image sensor, and has a plurality of plates. A control system having a digital sequencer controls the laser and a plurality of switching components, synchronized with the laser, to independently control excitation of each one of the deflector plates. This allows each electron pulse to be directed to a different portion of the image sensor, as well as to enable programmable pulse durations and programmable inter-pulse spacings.

  4. High-speed multiframe dynamic transmission electron microscope image acquisition system with arbitrary timing

    DOE Patents [OSTI]

    Reed, Bryan W.; DeHope, William J.; Huete, Glenn; LaGrange, Thomas B.; Shuttlesworth, Richard M.

    2015-10-20

    An electron microscope is disclosed which has a laser-driven photocathode and an arbitrary waveform generator (AWG) laser system ("laser"). The laser produces a train of temporally-shaped laser pulses of a predefined pulse duration and waveform, and directs the laser pulses to the laser-driven photocathode to produce a train of electron pulses. An image sensor is used along with a deflector subsystem. The deflector subsystem is arranged downstream of the target but upstream of the image sensor, and has two pairs of plates arranged perpendicular to one another. A control system controls the laser and a plurality of switching components synchronized with the laser, to independently control excitation of each one of the deflector plates. This allows each electron pulse to be directed to a different portion of the image sensor, as well as to be provided with an independently set duration and independently set inter-pulse spacings.

  5. Device For Determining Therophysical Properties Of A Multi-Component Gas At Arbitrary Temperature And Pressure

    DOE Patents [OSTI]

    Morrow, Thomas B.; Behring, II, Kendricks A.

    2005-02-01

    A computer product for determining thermodynamic properties of a natural gas hydrocarbon, when the speed of sound in the gas is known at an arbitrary temperature and pressure. Thus, the known parameters are the sound speed, temperature, pressure, and concentrations of any dilute components of the gas. The method uses a set of reference gases and their calculated density and speed of sound values to estimate the density of the subject gas. Additional calculations can be made to estimate the molecular weight of the subject gas, which can then be used as the basis for mass flow calculations, to determine the speed of sound at standard pressure and temperature, and to determine various thermophysical characteristics of the gas.

  6. Nonlinear oscillations and waves in an arbitrary mass ratio cold plasma

    SciTech Connect (OSTI)

    Verma, Prabal Singh

    2011-12-15

    It is well known that nonlinear standing oscillations in an arbitrary mass ratio cold plasma always phase mix away. However, there exist nonlinear electron-ion traveling wave solutions, which do not exhibit phase mixing because they have zero ponderomotive force. The existence of these waves has been demonstrated using a perturbation method. Moreover, it is shown that cold plasma BGK waves [Albritton et al., Nucl. Fusion 15, 1199 (1975)] phase mix away if ions are allowed to move and the scaling of phase mixing is found to be different from earlier work [Sengupta et al., Phys. Rev. Lett. 82, 1867 (1999)]. Phase mixing of these waves has been further verified in 1-D particle in cell simulation.

  7. Two-particle multichannel systems in a finite volume with arbitrary spin

    SciTech Connect (OSTI)

    Briceno, Raul A.

    2014-04-08

    The quantization condition for two-particle systems with arbitrary number of two-body open coupled channels, spin and masses in a finite cubic volume with either periodic or twisted boundary conditions is presented. The condition presented is in agreement with all previous studies of two-body systems in a finite volume. The result is relativistic, holds for all momenta below the three- and four-particle thresholds, and is exact up to exponential volume corrections that are governed by L/r, where L is the spatial extent of the volume and r is the range of the interactions between the particles. With hadronic systems the range of the interaction is set by the inverse of the pion mass, mπ, and as a result the formalism presented is suitable for mπL>>1. Implications of the formalism for the studies of multichannel baryon-baryon systems are discussed.

  8. ACCELERATION PHYSICS CODE WEB REPOSITORY.

    SciTech Connect (OSTI)

    WEI, J.

    2006-06-26

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  9. Accelerator Physics Code Web Repository

    SciTech Connect (OSTI)

    Zimmermann, F.; Basset, R.; Bellodi, G.; Benedetto, E.; Dorda, U.; Giovannozzi, M.; Papaphilippou, Y.; Pieloni, T.; Ruggiero, F.; Rumolo, G.; Schmidt, F.; Todesco, E.; Zotter, B.W.; Payet, J.; Bartolini, R.; Farvacque, L.; Sen, T.; Chin, Y.H.; Ohmi, K.; Oide, K.; Furman, M.; /LBL, Berkeley /Oak Ridge /Pohang Accelerator Lab. /SLAC /TRIUMF /Tech-X, Boulder /UC, San Diego /Darmstadt, GSI /Rutherford /Brookhaven

    2006-10-24

    In the framework of the CARE HHH European Network, we have developed a web-based dynamic accelerator-physics code repository. We describe the design, structure and contents of this repository, illustrate its usage, and discuss our future plans, with emphasis on code benchmarking.

  10. Portable code development in C

    SciTech Connect (OSTI)

    Brown, S.A.

    1990-11-06

    With a new generation of high performance computers appearing around us on a time scale of months, a new challenge for developers of simulation codes is to write and maintain production codes that are both highly portable and maximally efficient. My contention is that C is the language that is both best suited to that goal and is widely available today. GLF is a new code written mainly in C which is intended to have all of the XRASER physics and run on any platform of interest. It demonstrates the power of the C paradigm for code developers and flexibility and ease of use for the users. Three fundamental problems are discussed: the C/UNIX development environment; the supporting tools and libraries which handle data and graphics portability issues; and the advantages of C in numerical simulation code development.

  11. Local invariants of stabilizer codes

    SciTech Connect (OSTI)

    Nest, Maarten van den; Dehaene, Jeroen; Moor, Bart de

    2004-09-01

    In Phys. Rev. A 58, 1833 (1998), Grassl et al. presented a family of polynomial invariants which separate the orbits of multiqubit density operators {rho} under the action of the local unitary group. We consider this family of invariants for the class of those {rho} that are the projection operators describing stabilizer codes and give a complete translation of these invariants into the binary framework in which stabilizer codes are usually described. Such an investigation of local invariants of quantum codes is of natural importance in quantum coding theory, since locally equivalent codes have the same error-correcting capabilities and local invariants are powerful tools to explore their structure. Moreover, the present result is relevant in the context of multipartite entanglement and the development of the measurement-based model of quantum computation known as the one-way quantum computer.

  12. Building Codes Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Codes Resources Building Codes Resources Some commercial and/or residential construction codes mandate certain energy performance requirements for the design, materials, and equipment used in new construction and renovations. State-wide minimum codes may be amended by local jurisdictions to be more stringent if energy performance requirements are lacking or liberal. Find building codes resources below. DOE Resources Building Energy Codes Program: Resource Center Building Energy Codes Program:

  13. Codes and Standards Activities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Activities » Codes and Standards Activities Codes and Standards Activities The Fuel Cell Technologies Office works with code development organizations, code officials, industry experts, and national laboratory scientists to draft new model codes and equipment standards that cover emerging hydrogen technologies for consideration by the various code enforcing jurisdictions. DOE's codes and standards activities are focused on: Developing training programs for state and local officials that

  14. T-597: WordPress Multiple Security Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Attackers can exploit these issues to perform unauthorized actions in the context of the logged-in user, crash the affected application and therefore deny service to legitimate users, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials or launch other attacks.

  15. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  16. ETR/ITER systems code

    SciTech Connect (OSTI)

    Barr, W.L.; Bathke, C.G.; Brooks, J.N.; Bulmer, R.H.; Busigin, A.; DuBois, P.F.; Fenstermacher, M.E.; Fink, J.; Finn, P.A.; Galambos, J.D.; Gohar, Y.; Gorker, G.E.; Haines, J.R.; Hassanein, A.M.; Hicks, D.R.; Ho, S.K.; Kalsi, S.S.; Kalyanam, K.M.; Kerns, J.A.; Lee, J.D.; Miller, J.R.; Miller, R.L.; Myall, J.O.; Peng, Y-K.M.; Perkins, L.J.; Spampinato, P.T.; Strickler, D.J.; Thomson, S.L.; Wagner, C.E.; Willms, R.S.; Reid, R.L.

    1988-04-01

    A tokamak systems code capable of modeling experimental test reactors has been developed and is described in this document. The code, named TETRA (for Tokamak Engineering Test Reactor Analysis), consists of a series of modules, each describing a tokamak system or component, controlled by an optimizer/driver. This code development was a national effort in that the modules were contributed by members of the fusion community and integrated into a code by the Fusion Engineering Design Center. The code has been checked out on the Cray computers at the National Magnetic Fusion Energy Computing Center and has satisfactorily simulated the Tokamak Ignition/Burn Experimental Reactor II (TIBER) design. A feature of this code is the ability to perform optimization studies through the use of a numerical software package, which iterates prescribed variables to satisfy a set of prescribed equations or constraints. This code will be used to perform sensitivity studies for the proposed International Thermonuclear Experimental Reactor (ITER). 22 figs., 29 tabs.

  17. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    Codes and Standards Concerns in Energy Innovations February 24, 2016 3:00PM to 4:30PM EST The Building America Program is hosting a free webinar that will provide an overview ...

  18. Comparison of linac simulation codes

    SciTech Connect (OSTI)

    Nath, S.; Ryne, Robert D.; Stovall, J.; Takeda, H.; Xiang, J.; Young, L.; Pichoff, N.; Uriot, D.; Crandall, K.

    2001-01-25

    The Spallation Neutron Source (SNS) project is a collaborative effort between Brookhaven, Argonne, Jefferson, Lawrence Berkeley, Los Alamos and Oak Ridge National Laboratories. Los Alamos is responsible for the design of the linac for this accelerator complex. The code PARMILA, developed at Los Alamos is widely used for proton linac design and beam dynamics studies. The most updated version includes superconducting structures among others. In recent years, some other codes have also been developed which primarily focuses on the studies of the beam dynamics. In this paper, we compare the simulation results and discuss physics aspects of the different linac design and beam dynamics simulation codes.

  19. State building energy codes status

    SciTech Connect (OSTI)

    1996-09-01

    This document contains the State Building Energy Codes Status prepared by Pacific Northwest National Laboratory for the U.S. Department of Energy under Contract DE-AC06-76RL01830 and dated September 1996. The U.S. Department of Energy`s Office of Codes and Standards has developed this document to provide an information resource for individuals interested in energy efficiency of buildings and the relevant building energy codes in each state and U.S. territory. This is considered to be an evolving document and will be updated twice a year. In addition, special state updates will be issued as warranted.

  20. Analytical theory for the dark-soliton interaction in nonlocal nonlinear materials with an arbitrary degree of nonlocality

    SciTech Connect (OSTI)

    Kong Qian; Wang, Q.; Bang, O.; Krolikowski, W.

    2010-07-15

    We investigate theoretically the interaction of dark solitons in materials with a spatially nonlocal nonlinearity. In particular we do this analytically and for arbitrary degree of nonlocality. We employ the variational technique to show that nonlocality induces an attractive force in the otherwise repulsive soliton interaction.

  1. ComPASS! SciDAC-3! Scalable'Arbitrary-Order'Pseudo-Spectral'Electromagne9c'Solver''

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ComPASS! SciDAC-3! Scalable'Arbitrary-Order'Pseudo-Spectral'Electromagne9c'Solver'' J.-L.'Vay 1 ,'T.'Drummond 1 ,'A.'Koniges 1 ,'B.'B.'Godfrey 1,2 ,'I.'Haber 2 ' 1 Lawrence'Berkeley'Na9onal'Laboratory,' 2 University'of'Maryland'' fds

  2. NAICS Codes @ Headquarters | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NAICS Codes @ Headquarters NAICS Codes @ Headquarters A listing of NAICS codes used at Headquarters Procurement Services NAICS Codes @ Headquarters.pdf (37.93 KB) More Documents & Publications Product Service Codes @ Headquarters Management & Operating Subcontract Reporting Capability (MOSRC) Downloads Historical Procurement Information

  3. code | OpenEI Community

    Open Energy Info (EERE)

    by Graham7781(2017) Super contributor 14 April, 2014 - 09:48 National Day of Civic Hacking code community data Event hacking international national OpenEI The National Day of...

  4. electromagnetics, eddy current, computer codes

    Energy Science and Technology Software Center (OSTI)

    2002-03-12

    TORO Version 4 is designed for finite element analysis of steady, transient and time-harmonic, multi-dimensional, quasi-static problems in electromagnetics. The code allows simulation of electrostatic fields, steady current flows, magnetostatics and eddy current problems in plane or axisymmetric, two-dimensional geometries. TORO is easily coupled to heat conduction and solid mechanics codes to allow multi-physics simulations to be performed.

  5. Edge equilibrium code for tokamaks

    SciTech Connect (OSTI)

    Li, Xujing; Drozdov, Vladimir V.

    2014-01-15

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

  6. Spatial shaping for generating arbitrary optical dipole traps for ultracold degenerate gases

    SciTech Connect (OSTI)

    Lee, Jeffrey G.; Hill, W. T.

    2014-10-15

    We present two spatial-shaping approaches phase and amplitude for creating two-dimensional optical dipole potentials for ultracold neutral atoms. When combined with an attractive or repulsive Gaussian sheet formed by an astigmatically focused beam, atoms are trapped in three dimensions resulting in planar confinement with an arbitrary network of potentials a free-space atom chip. The first approach utilizes an adaptation of the generalized phase-contrast technique to convert a phase structure embedded in a beam after traversing a phase mask, to an identical intensity profile in the image plane. Phase masks, and a requisite phase-contrast filter, can be chemically etched into optical material (e.g., fused silica) or implemented with spatial light modulators; etching provides the highest quality while spatial light modulators enable prototyping and realtime structure modification. This approach was demonstrated on an ensemble of thermal atoms. Amplitude shaping is possible when the potential structure is made as an opaque mask in the path of a dipole trap beam, followed by imaging the shadow onto the plane of the atoms. While much more lossy, this very simple and inexpensive approach can produce dipole potentials suitable for containing degenerate gases. High-quality amplitude masks can be produced with standard photolithography techniques. Amplitude shaping was demonstrated on a Bose-Einstein condensate.

  7. Correlated-intensity velocimeter for arbitrary reflector for laser-produced plasma experiments

    SciTech Connect (OSTI)

    Wang Zhehui; Luo Shengnian; Barnes, Cris W.; Briggs, Matthew E.; Paisley, Dennis L.; Paul, Stephen F.

    2006-10-15

    A laser-based technique, called correlated-intensity velocimeter for arbitrary reflector (CIVAR), is described for velocity measurement of reflecting surfaces in real time. Velocity versus time is an important measurement in laser-produced high-energy density plasma experiments because the motion of the surface depends on both the equation of the state of the surface material and laser-produced plasma. The physics and working principle of CIVAR are the same as those of a previous concept that resolves Doppler shift of plasma light emission using a pair of narrow passband interference filters. One unique feature of CIVAR is that a reflected laser beam is used instead of plasma emission. Therefore, CIVAR is applicable to both emitting and nonemitting reflecting surfaces. Other advantages of CIVAR include its simplicity, lower cost, and unambiguous data analysis that can be fully automated. The design of a single-point CIVAR is described in detail with emphasis on laser wavelength selection and signal-to-noise ratio. The single-point CIVAR system can be expanded into a multiple-point system straightforwardly. It is possible to use CIVAR concept to construct a two-dimensional imaging system for a nonuniform velocity field of a large reflecting surface; such a velocity imaging system may have applications beyond laser-produced plasma experiments, for example, in shock compression of condensed matter.

  8. Suite of Software Objects for Arbitrary Spatial Partitioning of Modeling Dataset

    Energy Science and Technology Software Center (OSTI)

    1997-04-30

    SpatialDataSet is an abstract superclass for a suite of object classes which associate data structures with specific regions (Cells) or points (PCells) in two or three-dimensional space. The data structure carried by these Cells/PCells are arbitrary in layout, but the same layout is used for every Cell/PCell within the SpatialDataSet. The SpatialDataSet objects are used within ANL''s Dynamic Information Architecture System (DIAS) to carry spatially distributed attributes of terrestrial, aquatic, and atmospheric objects in amore » simulation domain. DIAS is a flexible object based software framework for concurrent, multidisciplinary modeling. The SpatialDataSet allows access to the information carried within them without requiring knowledge of the details of the spatial partitioning of the data on the part of the requesting agent. The suite of SpatialDataSet objects can be used within object based software architectures other than DIAS. SpatialDataSet has many subclasses covering different modes of partitioning two or three dimensional space, including various forms of grids, meshes, networks, patchworks, etc.« less

  9. Simulating the daylight performance of fenestration systems and spaces of arbitrary complexity: The IDC method. Revision

    SciTech Connect (OSTI)

    Papamichael, K.; Beltran, L.

    1993-04-01

    A new method to simulate the daylight performance of fenestration systems and spaces is presented. This new method, named IDC (Integration of Directional Coefficients), allows the simulation of the daylight performance of fenestration systems and spaces of arbitrary complexity, under any sun, sky and ground conditions. The IDC method is based on the combination of scale model photometry and computer-based simulation. Physical scale models are used to experimentally determine a comprehensive set of {open_quotes}directional illuminance coefficients{close_quotes} at reference points of interest, which are then used in analytical, computer-based routines, to determine daylight factors or actual daylight illuminance values under any sun, sky and ground conditions. The main advantage of the IDC method is its applicability to any optically complex environment. Moreover, the computer-based analytical routines are fast enough to allow for hourly simulation of the daylight performance over the course of an entire year. However, the method requires appropriate experimental facilities for the determination of the Directional Coefficients. The IDC method has been implemented and used successfully in inter-validation procedures with various daylight simulation computer programs. Currently, it is used to simulate the daylight performance of fenestration systems that incorporate optically complex components, such as Venetian blinds, optically treated light shelves and light pipes.

  10. Simulating the daylight performance of fenestration systems and spaces of arbitrary complexity: The IDC method

    SciTech Connect (OSTI)

    Papamichael, K.; Beltran, L.

    1993-04-01

    A new method to simulate the daylight performance of fenestration systems and spaces is presented. This new method, named IDC (Integration of Directional Coefficients), allows the simulation of the daylight performance of fenestration systems and spaces of arbitrary complexity, under any sun, sky and ground conditions. The IDC method is based on the combination of scale model photometry and computer-based simulation. Physical scale models are used to experimentally determine a comprehensive set of ``directional illuminance coefficients`` at reference points of interest, which are then used in analytical, computer-based routines, to determine daylight factors or actual daylight illuminance values under any sun, sky and ground conditions. The main advantage of the IDC method is its applicability to any optically complex environment. Moreover, the computer-based analytical routines are fast enough to allow for hourly simulation of the daylight performance over the course of an entire year. However, the method requires appropriate experimental facilities for the determination of the Directional Coefficients. The IDC method has been implemented and used successfully in inter-validation procedures with various daylight simulation computer programs. Currently, it is used to simulate the daylight performance of fenestration systems that incorporate optically comp1ex components, such as Venetian blinds, optically treated light shelves and light pipes.

  11. A 6 kV arbitrary waveform generator for the Tevatron Electron Lens

    SciTech Connect (OSTI)

    Pfeffer, H.; Saewert, G.

    2011-11-09

    This paper reports on a 6 kV modulator built and installed at Fermilab to drive the electron gun anode for the Tevatron Electron Lens (TEL). The TEL was built with the intention of shifting the individual (anti)proton bunch tunes to even out the tune spread among all 36 bunches with the desire of improving Tevatron integrated luminosity. This modulator is essentially a 6 kV arbitrary waveform generator that enables the TEL to define the electron beam intensity on a bunch-by-bunch basis. A voltage waveform is constructed having a 7 μs duration that corresponds to the tune shift requirements of a 12-bunch (anti)proton beam pulse train. This waveform is played out for any one or all three bunch trains in the Tevatron. The programmed waveform voltages transition to different levels at time intervals corresponding to the 395 ns bunch spacing. In addition, complex voltage waveforms can be played out at a sustained rate of 143 kHz over the full 6 kV output range. This paper describes the novel design of the inductive adder topology employing five transformers. It describes the design aspects that minimize switching losses for this multi-kilovolt, high repetition rate and high duty factor application.

  12. A point-centered arbitrary Lagrangian Eulerian hydrodynamic approach for tetrahedral meshes

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Morgan, Nathaniel R.; Waltz, Jacob I.; Burton, Donald E.; Charest, Marc R.; Canfield, Thomas R.; Wohlbier, John G.

    2015-02-24

    We present a three dimensional (3D) arbitrary Lagrangian Eulerian (ALE) hydrodynamic scheme suitable for modeling complex compressible flows on tetrahedral meshes. The new approach stores the conserved variables (mass, momentum, and total energy) at the nodes of the mesh and solves the conservation equations on a control volume surrounding the point. This type of an approach is termed a point-centered hydrodynamic (PCH) method. The conservation equations are discretized using an edge-based finite element (FE) approach with linear basis functions. All fluxes in the new approach are calculated at the center of each tetrahedron. A multidirectional Riemann-like problem is solved atmore » the center of the tetrahedron. The advective fluxes are calculated by solving a 1D Riemann problem on each face of the nodal control volume. A 2-stage Runge–Kutta method is used to evolve the solution forward in time, where the advective fluxes are part of the temporal integration. The mesh velocity is smoothed by solving a Laplacian equation. The details of the new ALE hydrodynamic scheme are discussed. Results from a range of numerical test problems are presented.« less

  13. A point-centered arbitrary Lagrangian Eulerian hydrodynamic approach for tetrahedral meshes

    SciTech Connect (OSTI)

    Morgan, Nathaniel R.; Waltz, Jacob I.; Burton, Donald E.; Charest, Marc R.; Canfield, Thomas R.; Wohlbier, John G.

    2015-02-24

    We present a three dimensional (3D) arbitrary Lagrangian Eulerian (ALE) hydrodynamic scheme suitable for modeling complex compressible flows on tetrahedral meshes. The new approach stores the conserved variables (mass, momentum, and total energy) at the nodes of the mesh and solves the conservation equations on a control volume surrounding the point. This type of an approach is termed a point-centered hydrodynamic (PCH) method. The conservation equations are discretized using an edge-based finite element (FE) approach with linear basis functions. All fluxes in the new approach are calculated at the center of each tetrahedron. A multidirectional Riemann-like problem is solved at the center of the tetrahedron. The advective fluxes are calculated by solving a 1D Riemann problem on each face of the nodal control volume. A 2-stage RungeKutta method is used to evolve the solution forward in time, where the advective fluxes are part of the temporal integration. The mesh velocity is smoothed by solving a Laplacian equation. The details of the new ALE hydrodynamic scheme are discussed. Results from a range of numerical test problems are presented.

  14. A 6 kV arbitrary waveform generator for the Tevatron Electron Lens

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Pfeffer, H.; Saewert, G.

    2011-11-09

    This paper reports on a 6 kV modulator built and installed at Fermilab to drive the electron gun anode for the Tevatron Electron Lens (TEL). The TEL was built with the intention of shifting the individual (anti)proton bunch tunes to even out the tune spread among all 36 bunches with the desire of improving Tevatron integrated luminosity. This modulator is essentially a 6 kV arbitrary waveform generator that enables the TEL to define the electron beam intensity on a bunch-by-bunch basis. A voltage waveform is constructed having a 7 μs duration that corresponds to the tune shift requirements of amore » 12-bunch (anti)proton beam pulse train. This waveform is played out for any one or all three bunch trains in the Tevatron. The programmed waveform voltages transition to different levels at time intervals corresponding to the 395 ns bunch spacing. In addition, complex voltage waveforms can be played out at a sustained rate of 143 kHz over the full 6 kV output range. This paper describes the novel design of the inductive adder topology employing five transformers. It describes the design aspects that minimize switching losses for this multi-kilovolt, high repetition rate and high duty factor application.« less

  15. Resonant ultrasound spectroscopy for materials with high damping and samples of arbitrary geometry

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Remillieux, Marcel C.; Ulrich, T. J.; Payan, Cédric; Rivière, Jacques; Lake, Colton R.; Le Bas, Pierre -Yves

    2015-07-23

    This paper describes resonant ultrasound spectroscopy (RUS) as a powerful and established technique for measuring elastic constants of a material with general anisotropy. The first step of this technique consists of extracting resonance frequencies and damping from the vibrational frequency spectrum measured on a sample with free boundary conditions. An inversion technique is then used to retrieve the elastic tensor from the measured resonance frequencies. As originally developed, RUS has been mostly applicable to (i) materials with small damping such that the resonances of the sample are well separated and (ii) samples with simple geometries for which analytical solutions exist.more » In this paper, these limitations are addressed with a new RUS approach adapted to materials with high damping and samples of arbitrary geometry. Resonances are extracted by fitting a sum of exponentially damped sinusoids to the measured frequency spectrum. The inversion of the elastic tensor is achieved with a genetic algorithm, which allows searching for a global minimum within a discrete and relatively wide solution space. First, the accuracy of the proposed approach is evaluated against numerical data simulated for samples with isotropic symmetry and transversely isotropic symmetry. Subsequently, the applicability of the approach is demonstrated using experimental data collected on a composite structure consisting of a cylindrical sample of Berea sandstone glued to a large piezoelectric disk. In the proposed experiments, RUS is further enhanced by the use of a 3-D laser vibrometer allowing the visualization of most of the modes in the frequency band studied.« less

  16. Resonant ultrasound spectroscopy for materials with high damping and samples of arbitrary geometry

    SciTech Connect (OSTI)

    Remillieux, Marcel C.; Ulrich, T. J.; Payan, Cédric; Rivière, Jacques; Lake, Colton R.; Le Bas, Pierre -Yves

    2015-07-23

    This paper describes resonant ultrasound spectroscopy (RUS) as a powerful and established technique for measuring elastic constants of a material with general anisotropy. The first step of this technique consists of extracting resonance frequencies and damping from the vibrational frequency spectrum measured on a sample with free boundary conditions. An inversion technique is then used to retrieve the elastic tensor from the measured resonance frequencies. As originally developed, RUS has been mostly applicable to (i) materials with small damping such that the resonances of the sample are well separated and (ii) samples with simple geometries for which analytical solutions exist. In this paper, these limitations are addressed with a new RUS approach adapted to materials with high damping and samples of arbitrary geometry. Resonances are extracted by fitting a sum of exponentially damped sinusoids to the measured frequency spectrum. The inversion of the elastic tensor is achieved with a genetic algorithm, which allows searching for a global minimum within a discrete and relatively wide solution space. First, the accuracy of the proposed approach is evaluated against numerical data simulated for samples with isotropic symmetry and transversely isotropic symmetry. Subsequently, the applicability of the approach is demonstrated using experimental data collected on a composite structure consisting of a cylindrical sample of Berea sandstone glued to a large piezoelectric disk. In the proposed experiments, RUS is further enhanced by the use of a 3-D laser vibrometer allowing the visualization of most of the modes in the frequency band studied.

  17. Example of Environmental Restoration Code of Accounts

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    This chapter describes the fundamental structure of an example remediation cost code system, lists and describes the Level 1 cost codes, and lists the Level 2 and Level 3 cost codes.

  18. Example Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Examining Future Global Transportation Energy Demand For EIA Energy Conference July 11, 2016 | Washington, DC By John Maples Outline * Model overview - Passenger travel - Freight travel - Energy consumption for 16 regions: * USA, Canada, Mexico/Chile, OECD Europe, Japan, S. Korea, Australia/New Zealand * Russia, Non-OECD Europe/Eurasia, China, India, Non-OECD Asia, Middle East, Africa, Brazil, Other South/Central * IEO2016 Reference case transportation projections * Preliminary scenario results

  19. Swift Parallel Scripting:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Data Analytics at Extreme Scale Michael W ilde wilde@anl.gov h2p:swi7---lang.org ... S . K atz, K etan M aheshwari, Michael W ilde, J usOn W ozniak, Y angxinye Y ang ...

  20. Example Hopper Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    batch system must wait for the desired big memory nodes to become available. Running Hybrid MPIOpenMP Applications Hybrid MPIOpenMP Example: New Recommendations (recommended)...

  1. PFTP Shell Script

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This example assumes that you have a ".netrc" file in your home directory with the appropriate encrypted password. See HPSS Paswords. bincsh First, copy the source from the ...

  2. Example Batch Scripts

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Job Steps and Dependencies There is a qsub option -W dependdependencylist or a Torque Keyword PBS -W dependdependencylist for job dependencies. The most commonly used ...

  3. SPEERs Building Energy Codes Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... of the REEO's, we are learning quickly, responding to ... Energy Code Compliance Collaborative in Oklahoma. *Double ... regional code datastrategies - provide technical ...

  4. Finite Element Scalar Diffraction Theory Code

    Energy Science and Technology Software Center (OSTI)

    1993-08-18

    This computer code calculates the optical diffraction field for diffraction through two-dimensional apertures to aid optical system design. The code allows plotting of the diffraction field.

  5. Building Energy Code | Open Energy Information

    Open Energy Info (EERE)

    Building Energy Code Jump to: navigation, search Building energy codes adopted by states (and some local governments) require commercial andor residential construction to adhere...

  6. Building Energy Codes | Open Energy Information

    Open Energy Info (EERE)

    Building Energy Codes Jump to: navigation, search Building energy codes adopted by states (and some local governments) require commercial andor residential construction to adhere...

  7. Building Energy Codes Collaborative Technical Assistance for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Collaborative Technical Assistance for States Building Energy Codes Collaborative Technical ... 2014 BTO Peer Review Southeast Energy Efficiency Alliance's Building Energy Codes ...

  8. National Template: Hydrogen Vehicle and Infrastructure Codes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hydrogen Vehicle and Infrastructure Codes and Standards (Fact Sheet), NREL (National Renewable Energy Laboratory) National Template: Hydrogen Vehicle and Infrastructure Codes and ...

  9. Nevada Administrative Code | Open Energy Information

    Open Energy Info (EERE)

    Not provided DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Nevada Administrative Code Citation Nevada Administrative Code (2014)....

  10. Arizona Administrative Code | Open Energy Information

    Open Energy Info (EERE)

    Arizona Administrative Code Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: Arizona Administrative CodeLegal Abstract This...

  11. Chemistry and Material Sciences Codes at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chemistry and Material Sciences Codes Chemistry and Material Sciences Codes at NERSC April 6, 2011 Last edited: 2016-04-29 11:35:1

  12. Design Code Survey Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Design Code Survey Form Design Code Survey Form Survey of Safety Software Used in Design of Structures, Systems, and Components 1. Introduction The Department's Implementation Plan ...

  13. Action Codes Table | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Action Codes Table Action codes *U.S.: **IAEA: A - Shipper's original data A B - Receiver's data accepting shipper's weights without measurement W C - Shipper's adjustment or ...

  14. Green Codes and Programs | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    This webinar covers green building codes, standards, and programs. Transcript Presentation (1.87 MB) More Documents & Publications Energy Code Compliance and Enforcement Best ...

  15. ASME Code Efforts Supporting HTGRs

    SciTech Connect (OSTI)

    D.K. Morton

    2012-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  16. ASME Code Efforts Supporting HTGRs

    SciTech Connect (OSTI)

    D.K. Morton

    2011-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  17. ASME Code Efforts Supporting HTGRs

    SciTech Connect (OSTI)

    D.K. Morton

    2010-09-01

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  18. Sensor Authentication: Embedded Processor Code

    SciTech Connect (OSTI)

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048 point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking

  19. Validation issues for SSI codes

    SciTech Connect (OSTI)

    Philippacopoulos, A.J.

    1995-02-01

    The paper describes the results of a recent work which was performed to verify computer code predictions in the SSI area. The first part of the paper is concerned with analytic solutions of the system response. The mathematical derivations are reasonably reduced by the use of relatively simple models which capture fundamental ingredients of the physics of the system motion while allowing for the response to be obtained analytically. Having established explicit forms of the system response, numerical solutions from three computer codes are presented in comparative format.

  20. T-549: Adobe ColdFusion 9.0.1 CHF1 and earlier

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in Adobe ColdFusion before 9.0.1 CHF1 allows remote attackers to inject arbitrary web script or HTML via vectors involving a "tag script.

  1. Tribal Legal Code: Umpqua Indian Utility Cooperative

    Broader source: Energy.gov [DOE]

    Provides an example tribal utility legal code. Also includes an example tribal energy development vision statement.

  2. Building Energy Codes Program Logic Model

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    provide funding to help measure & improve code compliance The Building Energy Codes Program aims to "lock in" savings from energy codes by participating in code development processes and supporting local and state governments in the adoption and implementation of progressively more advanced building energy codes across the country. External Influences: DOE budget, Construction industry, Real estate market, State/local policies & budget Objectives Activities / Partners Outputs

  3. Temporal evolution of bubble tip velocity in classical Rayleigh-Taylor instability at arbitrary Atwood numbers

    SciTech Connect (OSTI)

    Liu, W. H.; HEDPS and CAPT, Peking University, Beijing 100871 ; Wang, L. F.; Ye, W. H.; Institute of Applied Physics and Computational Mathematics, Beijing 100088; Department of Physics, Zhejiang University, Hangzhou 310027 ; He, X. T.; Institute of Applied Physics and Computational Mathematics, Beijing 100088

    2013-06-15

    In this research, the temporal evolution of the bubble tip velocity in Rayleigh-Taylor instability (RTI) at arbitrary Atwood numbers and different initial perturbation velocities with a discontinuous profile in irrotational, incompressible, and inviscid fluids (i.e., classical RTI) is investigated. Potential models from Layzer [Astrophys. J. 122, 1 (1955)] and perturbation velocity potentials from Goncharov [Phys. Rev. Lett. 88, 134502 (2002)] are introduced. It is found that the temporal evolution of bubble tip velocity [u(t)] depends essentially on the initial perturbation velocity [u(0)]. First, when the u(0)

  4. Integrated TIGER Series of Coupled Electron/Photon Monte Carlo Transport Codes System.

    Energy Science and Technology Software Center (OSTI)

    2012-11-30

    Version: 00 Distribution is restricted to US Government Agencies and Their Contractors Only. The Integrated Tiger Series (ITS) is a powerful and user-friendly software package permitting state-of-the-art Monte Carlo solution of linear time-independent coupled electron/photon radiation transport problems, with or without the presence of macroscopic electric and magnetic fields of arbitrary spatial dependence. The goal has been to simultaneously maximize operational simplicity and physical accuracy. Through a set of preprocessor directives, the user selects onemore » of the many ITS codes. The ease with which the makefile system is applied combines with an input scheme based on order-independent descriptive keywords that makes maximum use of defaults and internal error checking to provide experimentalists and theorists alike with a method for the routine but rigorous solution of sophisticated radiation transport problems. Physical rigor is provided by employing accurate cross sections, sampling distributions, and physical models for describing the production and transport of the electron/photon cascade from 1.0 GeV down to 1.0 keV. The availability of source code permits the more sophisticated user to tailor the codes to specific applications and to extend the capabilities of the codes to more complex applications. Version 6, the latest version of ITS, contains (1) improvements to the ITS 5.0 codes, and (2) conversion to Fortran 95. The general user friendliness of the software has been enhanced through memory allocation to reduce the need for users to modify and recompile the code.« less

  5. GeoPhysical Analysis Code

    Energy Science and Technology Software Center (OSTI)

    2011-05-21

    GPAC is a code that integrates open source libraries for element formulations, linear algebra, and I/O with two main LLNL-Written components: (i) a set of standard finite elements physics solvers for rersolving Darcy fluid flow, explicit mechanics, implicit mechanics, and fluid-mediated fracturing, including resolution of contact both implicity and explicity, and (ii) a MPI-based parallelization implementation for use on generic HPC distributed memory architectures. The resultant code can be used alone for linearly elastic problemsmore » and problems involving hydraulic fracturing, where the mesh topology is dynamically changed. The key application domain is for low-rate stimulation and fracture control in subsurface reservoirs (e.g., enhanced geothermal sites and unconventional shale gas stimulation). GPAC also has interfaces to call external libraries for, e.g., material models and equations of state; however, LLNL-developed EOS and material models will not be part of the current release.« less

  6. CBP PHASE I CODE INTEGRATION

    SciTech Connect (OSTI)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was

  7. Multidimensional Fuel Performance Code: BISON

    Energy Science and Technology Software Center (OSTI)

    2014-09-03

    BISON is a finite element based nuclear fuel performance code applicable to a variety of fuel forms including light water reactor fuel rods, TRISO fuel particles, and metallic rod and plate fuel (Refs. [a, b, c]). It solves the fully-coupled equations of thermomechanics and species diffusion and includes important fuel physics such as fission gas release and material property degradation with burnup. BISON is based on the MOOSE framework (Ref. [d]) and can therefore efficientlymore » solve problems on 1-, 2- or 3-D meshes using standard workstations or large high performance computers. BISON is also coupled to a MOOSE-based mesoscale phase field material property simulation capability (Refs. [e, f]). As described here, BISON includes the code library named FOX, which was developed concurrent with BISON. FOX contains material and behavioral models that are specific to oxide fuels.« less

  8. Sensor Authentication: Embedded Processor Code

    Energy Science and Technology Software Center (OSTI)

    2012-09-25

    Described is the c code running on the embedded Microchip 32bit PIC32MX575F256H located on the INL developed noise analysis circuit board. The code performs the following functions: Controls the noise analysis circuit board preamplifier voltage gains of 1, 10, 100, 000 Initializes the analog to digital conversion hardware, input channel selection, Fast Fourier Transform (FFT) function, USB communications interface, and internal memory allocations Initiates high resolution 4096 point 200 kHz data acquisition Computes complex 2048more » point FFT and FFT magnitude. Services Host command set Transfers raw data to Host Transfers FFT result to host Communication error checking« less

  9. Multidimensional Fuel Performance Code: BISON

    SciTech Connect (OSTI)

    2014-09-03

    BISON is a finite element based nuclear fuel performance code applicable to a variety of fuel forms including light water reactor fuel rods, TRISO fuel particles, and metallic rod and plate fuel (Refs. [a, b, c]). It solves the fully-coupled equations of thermomechanics and species diffusion and includes important fuel physics such as fission gas release and material property degradation with burnup. BISON is based on the MOOSE framework (Ref. [d]) and can therefore efficiently solve problems on 1-, 2- or 3-D meshes using standard workstations or large high performance computers. BISON is also coupled to a MOOSE-based mesoscale phase field material property simulation capability (Refs. [e, f]). As described here, BISON includes the code library named FOX, which was developed concurrent with BISON. FOX contains material and behavioral models that are specific to oxide fuels.

  10. GUI for Structural Mechanics Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of GUI for Structural Mechanics Codes The TRACC Cluster gives its users a lot of flexibility when it comes to requesting software version of LS-DYNA and computational resources for submitted jobs. To fully utilize that flexibility, users need to get familiar with on-line documentation of all the installed releases of different software and modules on the cluster. As on other LINUX based HPC systems, the submission and controlling of LS-DYNA is done through text commands. Especially

  11. City Code Non-Transferable

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    City Code Non-Transferable If the sales tax permit at this location becomes invalid then all associated permits will become invalid. If the business changes location or ownership or is discontinued for any reason, this permit must be returned to the Oklahoma Tax Commission for cancellation WITH AN EXPLANATION ON THE REVERSE SIDE. PLEASE POST IN CONSPICUOUS PLACE GENERAL ELECTRIC COMPANY 4211 METRO PKWY FORT MYERS FL 33916-9406 443111 8010 March 6, 2014 2102181888 Effective Expires Business

  12. Anelastic Strain Recovery Analysis Code

    Energy Science and Technology Software Center (OSTI)

    1995-04-05

    ASR4 is a nonlinear least-squares regression of Anelastic Strain Recovery (ASR) data for the purpose of determining in situ stress orientations and magnitudes. ASR4 fits the viscoelastic model of Warpinski and Teufel to measure ASR data, calculates the stress orientations directly, and stress magnitudes if sufficient input data are available. The code also calculates the stress orientation using strain-rosette equations, and it calculates stress magnitudes using Blanton''s approach, assuming sufficient input data are available.

  13. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect (OSTI)

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  14. Quantum error-correcting codes and devices

    DOE Patents [OSTI]

    Gottesman, Daniel

    2000-10-03

    A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

  15. California Water Code | Open Energy Information

    Open Energy Info (EERE)

    OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: California Water CodeLegal Abstract Code governing the usage of water resources in the state of...

  16. N. Mariana Islands- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  17. Building Energy Code | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Type Building Energy Code Summary Much of the information presented in this summary is drawn from the U.S. Department of Energy's (DOE) Building Energy Codes Program ...

  18. DOE Research and Development Accomplishments QR Code

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    QR Code qrcode A Quick Response (QR) code is a two-dimensional barcode containing alphanumeric text that can be read/scanned by designated barcode readers and camera phones. QR codes can contain a wide variety of information, including URLs that can direct users to websites. The QR code for access to DOE R&D Accomplishments is available on this web page. Top

  19. Energy Code Compliance and Enforcement Best Practices

    Broader source: Energy.gov [DOE]

    This webinar covers how to access current practices, compliance best practices, and enforce best practices with energy code compliances.

  20. Safety, Codes and Standards Technical Publications

    Broader source: Energy.gov [DOE]

    Technical information about safety, codes and standards published in technical reports, conference proceedings, journal articles, and websites is provided here.

  1. Code_Saturne | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Transfer Debugging & Profiling Performance Tools & APIs Software & Libraries Boost CPMD Code_Saturne GAMESS GPAW GROMACS LAMMPS MADNESS QBox IBM References Cooley Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Code_Saturne What is Code_Saturne? Code_Saturne is general-purpose Computational Fluid Dynamics (CFD) software of Électricité de France (EDF), one of the

  2. Cost Codes and the Work Breakdown Structure

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    The chapter discusses the purpose of the work breakdown structure (WBS) and code of account (COA) cost code system, shows the purpose and fundamental structure of both the WBS and the cost code system, and explains the interface between the two systems.

  3. Ultra-narrow bandwidth voice coding

    DOE Patents [OSTI]

    Holzrichter, John F.; Ng, Lawrence C.

    2007-01-09

    A system of removing excess information from a human speech signal and coding the remaining signal information, transmitting the coded signal, and reconstructing the coded signal. The system uses one or more EM wave sensors and one or more acoustic microphones to determine at least one characteristic of the human speech signal.

  4. Mosaic of coded aperture arrays

    DOE Patents [OSTI]

    Fenimore, Edward E.; Cannon, Thomas M.

    1980-01-01

    The present invention pertains to a mosaic of coded aperture arrays which is capable of imaging off-axis sources with minimum detector size. Mosaics of the basic array pattern create a circular on periodic correlation of the object on a section of the picture plane. This section consists of elements of the central basic pattern as well as elements from neighboring patterns and is a cyclic version of the basic pattern. Since all object points contribute a complete cyclic version of the basic pattern, a section of the picture, which is the size of the basic aperture pattern, contains all the information necessary to image the object with no artifacts.

  5. Building Energy Codes Program Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Overview 2014 Building Technologies Office Peer Review Bing Liu bing.liu@pnnl.gov Pacific Northwest National Laboratory ADOPT COMPLY DEVELOP FY12 FY13 FY14 $6.8M $4.8M $4.0M Program Summary Timeline: Multi-year program in support of DOE statutory requirements Key Milestones: 1. Update Building Energy Codes Cost-Effectiveness Methodology (Aug 2014) 2. Revised Compliance Methodology (Sept 2014) 3. 90.1-2013 Cost Analysis (Oct 2014) 4. REScheck Update Including Enhancements (Aug 2014) 5.

  6. Integro-differential modeling of ICRH wave propagation and damping at arbitrary cyclotron harmonics and wavelengths in tokamaks

    SciTech Connect (OSTI)

    Van Eester, D.; Lerche, E.

    2014-02-12

    Both at low and higher cyclotron harmonics, properly accounting for finite Larmor radius effects is crucial in many ion cyclotron resonance frequency heating scenarios creating high energy tails. The present paper discusses ongoing work to extend the 1D TOMCAT wave equation solver [D. Van Eester and R. Koch, Plasma Phys. Contr. Fusion 40 (1998) 1949] to arbitrary harmonics and arbitrary wavelengths. Rather than adopting the particle position, the guiding center position is used as the independent variable when writing down an expression for the dielectric response. Adopting a philosophy originally due to Kaufman [A.N. Kaufman, Phys. Fluids 15 (1972) 1063], the relevant dielectric response in the Galerkin formalism is written in a form where the electric field and the test function vector appear symmetrically, which yields a power balance equation that guarantees non-negative absorption for any wave type for Maxwellian plasmas. Moreover, this choice of independent variable yields intuitive expressions that can directly be linked to the corresponding expressions in the RF diffusion operator. It also guarantees that a positive definite power transfer from waves to particles is ensured for any of the wave modes in a plasma in which all populations have a Maxwellian distribution, as is expected from first principles. Rather than relying on a truncated Taylor series expansion of the dielectric response, an integro-differential approach that retains all finite Larmor radius effects [D. Van Eester and E. Lerche, Plasma Phys. Control. Fusion 55 (2013) 055008] is proposed.

  7. In-hardware demonstration of model-independent adaptive tuning of noisy systems with arbitrary phase drift

    SciTech Connect (OSTI)

    Scheinker, Alexander; Baily, Scott; Young, Daniel; Kolski, Jeffrey S.; Prokop, Mark

    2014-08-01

    In this work, an implementation of a recently developed model-independent adaptive control scheme, for tuning uncertain and time varying systems, is demonstrated on the Los Alamos linear particle accelerator. The main benefits of the algorithm are its simplicity, ability to handle an arbitrary number of components without increased complexity, and the approach is extremely robust to measurement noise, a property which is both analytically proven and demonstrated in the experiments performed. We report on the application of this algorithm for simultaneous tuning of two buncher radio frequency (RF) cavities, in order to maximize beam acceptance into the accelerating electromagnetic field cavities of the machine, with the tuning based only on a noisy measurement of the surviving beam current downstream from the two bunching cavities. The algorithm automatically responds to arbitrary phase shift of the cavity phases, automatically re-tuning the cavity settings and maximizing beam acceptance. Because it is model independent it can be utilized for continuous adaptation to time-variation of a large system, such as due to thermal drift, or damage to components, in which the remaining, functional components would be automatically re-tuned to compensate for the failing ones. We start by discussing the general model-independent adaptive scheme and how it may be digitally applied to a large class of multi-parameter uncertain systems, and then present our experimental results.

  8. In-hardware demonstration of model-independent adaptive tuning of noisy systems with arbitrary phase drift

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Scheinker, Alexander; Baily, Scott; Young, Daniel; Kolski, Jeffrey S.; Prokop, Mark

    2014-08-01

    In this work, an implementation of a recently developed model-independent adaptive control scheme, for tuning uncertain and time varying systems, is demonstrated on the Los Alamos linear particle accelerator. The main benefits of the algorithm are its simplicity, ability to handle an arbitrary number of components without increased complexity, and the approach is extremely robust to measurement noise, a property which is both analytically proven and demonstrated in the experiments performed. We report on the application of this algorithm for simultaneous tuning of two buncher radio frequency (RF) cavities, in order to maximize beam acceptance into the accelerating electromagnetic fieldmore » cavities of the machine, with the tuning based only on a noisy measurement of the surviving beam current downstream from the two bunching cavities. The algorithm automatically responds to arbitrary phase shift of the cavity phases, automatically re-tuning the cavity settings and maximizing beam acceptance. Because it is model independent it can be utilized for continuous adaptation to time-variation of a large system, such as due to thermal drift, or damage to components, in which the remaining, functional components would be automatically re-tuned to compensate for the failing ones. We start by discussing the general model-independent adaptive scheme and how it may be digitally applied to a large class of multi-parameter uncertain systems, and then present our experimental results.« less

  9. RELAP5/MOD3 code manual

    SciTech Connect (OSTI)

    Sloan, S.M.; Schultz, R.R.; Wilson, G.E.

    1994-06-01

    Summaries of RELAP5/MOD3 code assessments, a listing of the assessment matrix, and a chronology of the various versions of the code are given. Results from these code assessments have been used to formulate a compilation of some of the strengths and weaknesses of the code. These results are documented in the report. Volume 7 was designed to be updated periodically and to include the results of the latest code assessments as they become available. Consequently, users of Volume 7 should ensure that the latest revision is available.

  10. National Agenda for Hydrogen Codes and Standards

    SciTech Connect (OSTI)

    Blake, C.

    2010-05-01

    This paper provides an overview of hydrogen codes and standards with an emphasis on the national effort supported and managed by the U.S. Department of Energy (DOE). With the help and cooperation of standards and model code development organizations, industry, and other interested parties, DOE has established a coordinated national agenda for hydrogen and fuel cell codes and standards. With the adoption of the Research, Development, and Demonstration Roadmap and with its implementation through the Codes and Standards Technical Team, DOE helps strengthen the scientific basis for requirements incorporated in codes and standards that, in turn, will facilitate international market receptivity for hydrogen and fuel cell technologies.

  11. Infrared absorption of trans-1-chloromethylallyl and trans-1-methylallyl radicals produced in photochemical reactions of trans-1,3-butadiene and C Script-Small-L {sub 2} in solid para-hydrogen

    SciTech Connect (OSTI)

    Bahou, Mohammed; Wu, Jen-Yu; Tanaka, Keiichi; Lee, Yuan-Pern

    2012-08-28

    The reactions of chlorine and hydrogen atoms with trans-1,3-butadiene in solid para-hydrogen (p-H{sub 2}) were investigated with infrared (IR) absorption spectra. When a p-H{sub 2} matrix containing C Script-Small-L {sub 2} and trans-1,3-butadiene was irradiated with ultraviolet light at 365 nm, intense lines at 650.3, 809.0, 962.2, 1240.6 cm{sup -1}, and several weaker ones due to the trans-1-chloromethylallyl radical, Bullet (CH{sub 2}CHCH)CH{sub 2}C Script-Small-L , appeared. Observed wavenumbers and relative intensities agree with the anharmonic vibrational wavenumbers and IR intensities predicted with the B3PW91/6-311++g(2d, 2p) method. That the C Script-Small-L atom adds primarily to the terminal carbon atom of trans-1,3-butadiene is in agreement with the path of minimum energy predicted theoretically, but in contrast to the reaction of C Script-Small-L + propene in solid p-H{sub 2}[J. Amicangelo and Y.-P. Lee, J. Phys. Chem. Lett. 1, 2956 (2010)] in which the addition of C Script-Small-L to the central C atom is favored, likely through steric effects in a p-H{sub 2} matrix. A second set of lines, intense at 781.6, 957.9, 1433.6, 2968.8, 3023.5, 3107.3 cm{sup -1}, were observed when the UV-irradiated C Script-Small-L {sub 2}/trans-1,3-butadiene/p-H{sub 2} matrix was further irradiated with IR light from a SiC source. These lines are assigned to the trans-1-methylallyl radical, Bullet (CH{sub 2}CHCH)CH{sub 3}, produced from reaction of 1,3-butadiene with a H atom resulted from the reaction of C Script-Small-L atoms with solid p-H{sub 2} exposed to IR radiation.

  12. The United States Code - Printing, Title 44 Excerpts | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The United States Code - Printing, Title 44 Excerpts The United States Code - Printing, Title 44 Excerpts The United States Code - Printing, Title 44 Excerpts PDF icon The United ...

  13. Webinar: Residential Energy Code Compliance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Webinar: Residential Energy Code Compliance Webinar: Residential Energy Code Compliance View the Code Compliance Funding Opportunity video or see the slides below. This webinar ...

  14. US DRIVE Hydrogen Codes and Standards Technical Team Roadmap...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hydrogen Codes and Standards Technical Team Roadmap US DRIVE Hydrogen Codes and Standards Technical Team Roadmap The Hydrogen Codes and Standards Tech Team (CSTT) mission is to ...

  15. Interface requirements to couple thermal-hydraulic codes to 3D neutronic codes

    SciTech Connect (OSTI)

    Langenbuch, S.; Austregesilo, H.; Velkov, K.

    1997-07-01

    The present situation of thermalhydraulics codes and 3D neutronics codes is briefly described and general considerations for coupling of these codes are discussed. Two different basic approaches of coupling are identified and their relative advantages and disadvantages are discussed. The implementation of the coupling for 3D neutronics codes in the system ATHLET is presented. Meanwhile, this interface is used for coupling three different 3D neutronics codes.

  16. Terrain-Responsive Atmospheric Code

    Energy Science and Technology Software Center (OSTI)

    1991-11-20

    The Terrain-Responsive Atmospheric Code (TRAC) is a real-time emergency response modeling capability designed to advise Emergency Managers of the path, timing, and projected impacts from an atmospheric release. TRAC evaluates the effects of both radiological and non-radiological hazardous substances, gases and particulates. Using available surface and upper air meteorological information, TRAC realistically treats complex sources and atmospheric conditions, such as those found in mountainous terrain. TRAC calculates atmospheric concentration, deposition, and dose for more thanmore » 25,000 receptor locations within 80 km of the release point. Human-engineered output products support critical decisions on the type, location, and timing of protective actions for workers and the public during an emergency.« less

  17. A System And Method To Determine Thermophysical Properties Of A Multi-Component Gas At Arbitrary Temperature And Pressure

    DOE Patents [OSTI]

    Morrow, Thomas E.; Behring, II, Kendricks A.

    2004-03-09

    A method to determine thermodynamic properties of a natural gas hydrocarbon, when the speed of sound in the gas is known at an arbitrary temperature and pressure. Thus, the known parameters are the sound speed, temperature, pressure, and concentrations of any dilute components of the gas. The method uses a set of reference gases and their calculated density and speed of sound values to estimate the density of the subject gas. Additional calculations can be made to estimate the molecular weight of the subject gas, which can then be used as the basis for mass flow calculations, to determine the speed of sound at standard pressure and temperature, and to determine various thermophysical characteristics of the gas.

  18. Acoustic wave propagation in uniform glow discharge plasma at an arbitrary angle between the electric field and wave vectors

    SciTech Connect (OSTI)

    Soukhomlinov, Vladimir; Gerasimov, Nikolay; Sheverev, Valery A.

    2008-08-15

    This paper extends the recently reported one-dimensional model for sound propagation in glow discharge plasma to arbitrary mutual orientation of the plasma electric field and acoustic wave vectors. The results demonstrate that an acoustic wave in plasma may amplify, attenuate, or remain unchanged depending on the angle between these vectors and on the power input into the discharge. Quantitative evaluations indicate that for glow discharge plasma of a self-sustained discharge in air at the electric current densities of the order of 100 mA cm{sup -2}, a gain of as much as 1 m{sup -1} at 0 deg. angle between the vectors changes to similar strength attenuation for the 90 deg. angle.

  19. Group representations, error bases and quantum codes

    SciTech Connect (OSTI)

    Knill, E

    1996-01-01

    This report continues the discussion of unitary error bases and quantum codes. Nice error bases are characterized in terms of the existence of certain characters in a group. A general construction for error bases which are non-abelian over the center is given. The method for obtaining codes due to Calderbank et al. is generalized and expressed purely in representation theoretic terms. The significance of the inertia subgroup both for constructing codes and obtaining the set of transversally implementable operations is demonstrated.

  20. Integrated Codes | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Integrated Codes Integrated codes contain the mathematical descriptions of the physical processes relating to nuclear weapon systems and describe what the nation knows about how nuclear weapons function. This subprogram funds the critical skills needed to develop, maintain and interpret the results of the large-scale integrated simulation codes that are needed for Stockpile Stewardship Program (SSP) maintenance, the Life Extension Programs (LEP), Significant Finding Investigation (SFI)

  1. Codes and Standards Technical Team Roadmap

    SciTech Connect (OSTI)

    2013-06-01

    The Hydrogen Codes and Standards Tech Team (CSTT) mission is to enable and facilitate the appropriate research, development, & demonstration (RD&D) for the development of safe, performance-based defensible technical codes and standards that support the technology readiness and are appropriate for widespread consumer use of fuel cells and hydrogen-based technologies with commercialization by 2020. Therefore, it is important that the necessary codes and standards be in place no later than 2015.

  2. CASL - The Michigan Parallel Characteristics Transport Code

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Michigan Parallel Characteristics Transport Code Verification of MPACT: The Michigan Parallel Characteristics Transport Code Benjamin Collins, Brendan Kochunas, Daniel Jabbay, Thomas Downar, William Martin Department of Nuclear Engineering and Radiological Sciences University of Michigan Andrew Godfrey Oak Ridge National Laboroatory MPACT (Michigan PArallel Characteristics Transport Code) is a new reactor analysis tool being developed at the University of Michigan as an advanced pin-resolved

  3. The CZTU uranium concentration analysis code

    SciTech Connect (OSTI)

    Clark, D., LLNL

    1998-07-17

    A {sup 235}U analysis code, CZTU, has been written that can non- destructively evaluate the percentage of {sup 235}U in a uranium sample from the analysis of the emitted gamma rays. This code utilizes gamma spectra measured from room temperature Cadmium Zinc Telluride (CdZnTe or CZT) detectors. It has an accuracy midway between that obtained with sodium iodide and germanium crystal detectors. This report describes how to use the code, some results, limitations and design considerations.

  4. NERSC Selects 20 NESAP Code Teams

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Selects 20 NESAP Code Teams NERSC Selects 20 NESAP Code Teams NERSC Exascale Scientific Applications Program projects to launch in Fall 2014 August 25, 2014 Contact: Kathy Kincade, +1 510 495 2124, kkincade@lbl.gov onesandzeros The National Energy Research Scientific Computing Center (NERSC) has accepted 20 projects into the NERSC Exascale Scientific Applications Program (NESAP), a new collaborative effort that partners NERSC, Intel and Cray resources with code teams across the U.S. to prepare

  5. Continuous Intercomparison of Radiation Codes (CIRC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intercomparison of Radiation Codes (CIRC) * Sponsored by ARM and endorsed by GEWEX Radiation Panel * Aims to become the standard for documenting the performance of SW and LW RT codes in Large-Scale Models * Goal is to have RT codes of IPCC models report performance against the CIRC cases * Phase I to be launched in the following weeks: http://www.circ-project.org Differences from previous intercomparisons: * Observation-tested LBL calculations to used as radiative benchmarks * Benchmark results

  6. Codes and Standards | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Basics » Codes and Standards Codes and Standards Currently, thirteen U.S. and two international standards development organizations (SDOs) are developing and publishing the majority of the voluntary domestic codes and standards. These organizations typically work with the public and private sectors to craft standards. In the U.S., the American National Standards Institute (ANSI) coordinates standards development, provides guidance on consensus building, recommends that no more than one standard

  7. A 2.5D boundary element formulation for modeling damped waves in arbitrary cross-section waveguides and cavities

    SciTech Connect (OSTI)

    Mazzotti, M.; Civil, Architectural and Environmental Engineering Department, Drexel University, 3141 Chestnut St., Philadelphia, PA 19104 ; Bartoli, I.; Marzani, A.; Viola, E.

    2013-09-01

    Highlights: Dispersive properties of viscoelastic waveguides and cavities are computed using a regularized 2.5D BEM. Linear viscoelasticity is introduced at the constitutive level by means of frequency dependent complex moduli. A contour integral algorithm is used to solve the nonlinear eigenvalue problem. The Sommerfeld radiation condition is used to select the permissible Riemann sheets. Attenuation of surface waves in cavities approaches the attenuation of Rayleigh waves. -- Abstract: A regularized 2.5D boundary element method (BEM) is proposed to predict the dispersion properties of damped stress guided waves in waveguides and cavities of arbitrary cross-section. The wave attenuation, induced by material damping, is introduced using linear viscoelastic constitutive relations and described in a spatial manner by the imaginary component of the axial wavenumber. The discretized dispersive wave equation results in a nonlinear eigenvalue problem, which is solved obtaining complex axial wavenumbers for a fixed frequency using a contour integral algorithm. Due to the singular characteristics and the multivalued feature of the wave equation, the requirement of holomorphicity inside the contour region over the complex wavenumber plane is fulfilled by the introduction of the Sommerfeld branch cuts and by the choice of the permissible Riemann sheets. A post processing analysis is developed for the extraction of the energy velocity of propagative guided waves. The reliability of the method is demonstrated by comparing the results obtained for a rail and a bar with square cross-section with those obtained from a 2.5D Finite Element formulation also known in literature as Semi Analytical Finite Element (SAFE) method. Next, to show the potential of the proposed numerical framework, dispersion properties are predicted for surface waves propagating along cylindrical cavities of arbitrary cross-section. It is demonstrated that the attenuation of surface waves approaches

  8. Final Report A Multi-Language Environment For Programmable Code Optimization and Empirical Tuning

    SciTech Connect (OSTI)

    Yi, Qing; Whaley, Richard Clint; Qasem, Apan; Quinlan, Daniel

    2013-11-23

    This report summarizes our effort and results of building an integrated optimization environment to effectively combine the programmable control and the empirical tuning of source-to-source compiler optimizations within the framework of multiple existing languages, specifically C, C++, and Fortran. The environment contains two main components: the ROSE analysis engine, which is based on the ROSE C/C++/Fortran2003 source-to-source compiler developed by Co-PI Dr.Quinlan et. al at DOE/LLNL, and the POET transformation engine, which is based on an interpreted program transformation language developed by Dr. Yi at University of Texas at San Antonio (UTSA). The ROSE analysis engine performs advanced compiler analysis, identifies profitable code transformations, and then produces output in POET, a language designed to provide programmable control of compiler optimizations to application developers and to support the parameterization of architecture-sensitive optimizations so that their configurations can be empirically tuned later. This POET output can then be ported to different machines together with the user application, where a POET-based search engine empirically reconfigures the parameterized optimizations until satisfactory performance is found. Computational specialists can write POET scripts to directly control the optimization of their code. Application developers can interact with ROSE to obtain optimization feedback as well as provide domain-specific knowledge and high-level optimization strategies. The optimization environment is expected to support different levels of automation and programmer intervention, from fully-automated tuning to semi-automated development and to manual programmable control.

  9. Safety, Codes, and Standards Fact Sheet | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Cell Technologies Office describing hydrogen safety, codes, and standards. Safety, Codes, and Standards (781.31

  10. City of San Francisco- Green Building Code

    Broader source: Energy.gov [DOE]

    San Francisco adopted a mandatory green building code for new construction projects in September 2008, establishing strict guidelines for residential and commercial buildings according to the...

  11. Maine Uniform Building and Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Maine Uniform Building and Energy Code includes the statewide minimum requirements that all new construction and additions to existing buildings must satisfy. Exceptions include log homes, ma...

  12. National Agenda for Hydrogen Codes and Standards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Standards, codes, and regulations governing its storage, distribution, and use at industrial sites are well established. The use of hydrogen as an energy carrier for consumer ...

  13. Alaska Administrative Code | Open Energy Information

    Open Energy Info (EERE)

    library Legal Document- RegulationRegulation: Alaska Administrative CodeLegal Published NA Year Signed or Took Effect 2013 Legal Citation Not provided DOI Not Provided Check for...

  14. Integrated Codes | National Nuclear Security Administration ...

    National Nuclear Security Administration (NNSA)

    Specialized codes have detailed physics focused on unique applications (e.g., radiation transport or ICF laser-plasma interactions) or are specific applications such as problem ...

  15. TNRC 191 - Antiquities Code | Open Energy Information

    Open Energy Info (EERE)

    Code section for preservation of antiquities. Published NA Year Signed or Took Effect 1977 Legal Citation TNRC 191 (1977) DOI Not Provided Check for DOI availability: http:...

  16. Prosper Sustainably Webinar: Tribal Environmental Codes Development

    Broader source: Energy.gov [DOE]

    Hosted by Prosper Sustainably, this webinar will provide a brief overview and guidance on the process of drafting tribal environmental codes, ordinances, and regulations that cover environmental...

  17. 1. CONTRACT ID CODE PAGE OF PAGES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CONTRACT ID CODE PAGE OF PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT I1 1 1 3 2. AMvEND)MENfmODIFICATION NO. 3 EFFECT IVE DATE (M'D/)Y) 4 REQUISITION/PURCHASE REQ. NO 5.PROJECT NO. (If applicable, 240 See Block 16C 12EM000054 T 6. ISSUFD BY CODE 7. ADMINISTE'RED BY GIf aher than Item 6)1 CODE U.S. Department of Energy Office of River Protection P. 0. Box 450, MS 1-6-60 Richland, WA 99352 8 NAvM AND ADDRESS OF CONTRACTOR (No., wreel, county, Sltate and ZIP code) 9A. AMENDMENT OF

  18. Example Cost Codes for Construction Projects

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    This chapter provides an example outline of cost items and their corresponding cost codes that may be used for construction projects.

  19. Building Energy Codes Program | Department of Energy

    Office of Environmental Management (EM)

    The Building Technologies Office (BTO) supports greater adoption of residential and commercial building energy codes through collaborative efforts with local governments and ...

  20. Texas Natural Resources Code | Open Energy Information

    Open Energy Info (EERE)

    Resources CodeLegal Abstract This regulation governs the law pertaining to natural resources management in Texas. Published NA Year Signed or Took Effect 2014 Legal...

  1. Summer Coding Camp | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    education@anl.gov Summer Coding Camp At Argonne's summer coding camp, high school students have a once in a lifetime opportunity to learn how to code from some the best and brightest computer scientists in the nation. In this free five-day enrichment experience, students learn how to code in Python, connect with Argonne computer scientists and program a robot via a Raspberry Pi. Through the course of this program, participants can expect to: enhance their problem-solving and teamwork skills

  2. " Row: NAICS Codes; Column: Energy Sources...

    U.S. Energy Information Administration (EIA) Indexed Site

    and",,"Coke"," ","Row" "Code(a)","Subsector and ... 324,"Petroleum and Coal ... Division, Form EIA-810, 'Monthly Refinery Report' for 2002.

  3. " Row: NAICS Codes; Column: Energy Sources...

    U.S. Energy Information Administration (EIA) Indexed Site

    Energy Sources","Row" "Code(a)","Subsector and ... 324,"Petroleum and Coal ... Division, Form EIA-810, 'Monthly Refinery Report' for 2002.

  4. A Multigroup Reaction Cross-Section Collapsing Code and Library of 154-Group Fission-Product Cross Sections.

    Energy Science and Technology Software Center (OSTI)

    1983-03-23

    Version 01/02 The code reads multigroup cross sections from a compatible data file and collapses user-selected reaction cross sections to any few-group structure using one of a variety of user neutron flux spectrum options given below: Option Flux description 1 Built-in function including Maxwellian, fission, fusion and slowing-down regions and requiring user-specified parameters and energy-region boundaries. 2 Set of log-log flux-energy interpolation points read from input cross-section data file. 3 Set of log-log flux-energy interpolationmore » points read from user-supplied card input. 4 - 6 Histogram flux values read from user-supplied card input in arbitrary group structure in units of flux-per unit-energy, flux-per-unit lethargy, or integral group flux. LAFPX-E may be used to collapse any set of multigroup reaction cross sections furnished in the required format. However, the code was developed for, and is furnished with, a library of 154-group fission-product cross sections processed from ENDF/B-IV with a typical light water reactor (LWR) flux spectrum and temperature. Four-group radiative capture cross sections produced for LWR calculations are tabulated in the code documentation and are incorporated in the EPRI-CINDER data library, RSIC Code Package CCC-309.« less

  5. Interface requirements to couple thermal hydraulics codes to severe accident codes: ICARE/CATHARE

    SciTech Connect (OSTI)

    Camous, F.; Jacq, F.; Chatelard, P.

    1997-07-01

    In order to describe with the same code the whole sequence of severe LWR accidents, up to the vessel failure, the Institute of Protection and Nuclear Safety has performed a coupling of the severe accident code ICARE2 to the thermalhydraulics code CATHARE2. The resulting code, ICARE/CATHARE, is designed to be as pertinent as possible in all the phases of the accident. This paper is mainly devoted to the description of the ICARE2-CATHARE2 coupling.

  6. Spent fuel pool analysis using TRACE code

    SciTech Connect (OSTI)

    Sanchez-Saez, F.; Carlos, S.; Villanueva, J. F.; Martorell, S.

    2012-07-01

    The storage requirements of Spent Fuel Pools have been analyzed with the purpose to increase their rack capacities. In the past, the thermal limits have been mainly evaluated with conservative codes developed for this purpose, although some works can be found in which a best estimate code is used. The use of best estimate codes is interesting as they provide more realistic calculations and they have the capability of analyzing a wide range of transients that could affect the Spent Fuel Pool. Two of the most representative thermal-hydraulic codes are RELAP-5 and TRAC. Nowadays, TRACE code is being developed to make use of the more favorable characteristics of RELAP-5 and TRAC codes. Among the components coded in TRACE that can be used to construct the model, it is interesting to use the VESSEL component, which has the capacity of reproducing three dimensional phenomena. In this work, a thermal-hydraulic model of the Maine Yankee spent fuel pool using the TRACE code is developed. Such model has been used to perform a licensing calculation and the results obtained have been compared with experimental measurements made at the pool, showing a good agreement between the calculations predicted by TRACE and the experimental data. (authors)

  7. Monte Carlo Nucleon Meson Transport Code System.

    Energy Science and Technology Software Center (OSTI)

    2000-11-17

    Version 00 NMTC/JAERI97 is an upgraded version of the code system NMTC/JAERI, which was developed in 1982 at JAERI and is based on the CCC-161/NMTC code system. NMTC/JAERI97 simulates high energy nuclear reactions and nucleon-meson transport processes.

  8. Development of probabilistic multimedia multipathway computer codes.

    SciTech Connect (OSTI)

    Yu, C.; LePoire, D.; Gnanapragasam, E.; Arnish, J.; Kamboj, S.; Biwer, B. M.; Cheng, J.-J.; Zielen, A. J.; Chen, S. Y.; Mo, T.; Abu-Eid, R.; Thaggard, M.; Sallo, A., III.; Peterson, H., Jr.; Williams, W. A.; Environmental Assessment; NRC; EM

    2002-01-01

    The deterministic multimedia dose/risk assessment codes RESRAD and RESRAD-BUILD have been widely used for many years for evaluation of sites contaminated with residual radioactive materials. The RESRAD code applies to the cleanup of sites (soils) and the RESRAD-BUILD code applies to the cleanup of buildings and structures. This work describes the procedure used to enhance the deterministic RESRAD and RESRAD-BUILD codes for probabilistic dose analysis. A six-step procedure was used in developing default parameter distributions and the probabilistic analysis modules. These six steps include (1) listing and categorizing parameters; (2) ranking parameters; (3) developing parameter distributions; (4) testing parameter distributions for probabilistic analysis; (5) developing probabilistic software modules; and (6) testing probabilistic modules and integrated codes. The procedures used can be applied to the development of other multimedia probabilistic codes. The probabilistic versions of RESRAD and RESRAD-BUILD codes provide tools for studying the uncertainty in dose assessment caused by uncertain input parameters. The parameter distribution data collected in this work can also be applied to other multimedia assessment tasks and multimedia computer codes.

  9. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  10. Teleportation of a two-qubit arbitrary unknown state using a four-qubit genuine entangled state with the combination of bell-state measurements

    SciTech Connect (OSTI)

    Dong, Li; Xiu, Xiao-Ming, E-mail: xiuxiaomingdl@126.com [Dalian University of Technology, School of Physics and Optoelectronic Technology (China)] [Dalian University of Technology, School of Physics and Optoelectronic Technology (China); Ren, Yuan-Peng [Bohai University, Higher Professional Technical Institute (China)] [Bohai University, Higher Professional Technical Institute (China); Gao, Ya-Jun [Bohai University, College of Mathematics and Physics (China)] [Bohai University, College of Mathematics and Physics (China); Yi, X. X. [Dalian University of Technology, School of Physics and Optoelectronic Technology (China)] [Dalian University of Technology, School of Physics and Optoelectronic Technology (China)

    2013-01-15

    We propose a protocol transferring an arbitrary unknown two-qubit state using the quantum channel of a four-qubit genuine entangled state. Simplifying the four-qubit joint measurement to the combination of Bell-state measurements, it can be realized more easily with currently available technologies.

  11. RH-TRU Waste Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2007-07-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits

  12. Alternative Fuels Data Center: Codes and Standards Basics

    Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

    Codes and Standards Basics to someone by E-mail Share Alternative Fuels Data Center: Codes and Standards Basics on Facebook Tweet about Alternative Fuels Data Center: Codes and Standards Basics on Twitter Bookmark Alternative Fuels Data Center: Codes and Standards Basics on Google Bookmark Alternative Fuels Data Center: Codes and Standards Basics on Delicious Rank Alternative Fuels Data Center: Codes and Standards Basics on Digg Find More places to share Alternative Fuels Data Center: Codes and

  13. A Novel Phase-Coherent Programmable Clock for High-Precision Arbitrary Waveform Generation Applied to Digital Ion Trap Mass Spectrometry

    SciTech Connect (OSTI)

    Koizumi, Hideya; Jatko, William Bruce; Andrews Jr, William H; Whitten, William B; Reilly, Pete

    2010-01-01

    Digital ion trap (DIT) mass spectrometry requires the ability to precisely and accurately produce waveforms. The quality of the mass spectra produced in terms of resolution and mass accuracy depend on the resolution and precision of the applied waveforms. This publication reveals a novel method for the production of arbitrary waveforms in general and then applies the method to the production of DIT waveforms. Arbitrary waveforms can be created by varying the clock frequency input to a programmable read only memory that is then input to a digital-to-analog converter (DAC). The arbitrary waveform is composed of a defined number of points that are triggered to be written after programmed numbers of clock cycles to define the arbitrary waveform. The novelty introduced here is that the direct digital synthesis (DDS) generated clock frequency can be precisely changed as the arbitrary waveform is written because we have developed a method to rapidly switch the DDS frequency exactly at the end of the output clock cycle allowing exact timing of multiple transitions to produce precise and temporally complex waveforms. Changing the frequency only at the end of the output clock cycle is a phase coherent process that permits precise timing between each point in the arbitrary waveform. The waveform generation technique was demonstrated by creating a prototype that was used to operate a digital ion trap mass spectrometer. The jitter in the phase-coherent DDS TTL output that was used as the frequency variable clock was 20 ps. This jitter represents the realizable limit of precision for waveform generation. The rectangular waveforms used to operate the mass spectrometer were created with counters that increased the jitter to 100 ps. The mass resolution achieved was 5000 at m/z = 414. This resolution corresponds to a jitter of 275 ps assuming DC fluctuations and overshoots in the waveform are insignificant. Resolution should improve with increasing mass because the waveforms have

  14. Report on a workshop concerning code validation

    SciTech Connect (OSTI)

    None

    1996-12-01

    The design of wind turbine components is becoming more critical as turbines become lighter and more dynamically active. Computer codes that will reliably predict turbine dynamic response are, therefore, more necessary than before. However, predicting the dynamic response of very slender rotating structures that operate in turbulent winds is not a simple matter. Even so, codes for this purpose have been developed and tested in North America and in Europe, and it is important to disseminate information on this subject. The purpose of this workshop was to allow those involved in the wind energy industry in the US to assess the progress invalidation of the codes most commonly used for structural/aero-elastic wind turbine simulation. The theme of the workshop was, ``How do we know it`s right``? This was the question that participants were encouraged to ask themselves throughout the meeting in order to avoid the temptation of presenting information in a less-than-critical atmosphere. Other questions posed at the meeting are: What is the proof that the codes used can truthfully represent the field data? At what steps were the codes tested against known solutions, or against reliable field data? How should the designer or user validate results? What computer resources are needed? How do codes being used in Europe compare with those used in the US? How does the code used affect industry certification? What can be expected in the future?

  15. Code System to Calculate Neutron and Gamma-Ray Skyshine Doses Using the Integral Line-Beam Method.

    Energy Science and Technology Software Center (OSTI)

    2000-11-16

    Version 03 This package includes the SKYNEUT 1.1, SKYDOSE 2.3, MCSKY 2.3 and SKYCONES 1.1 codes plus the DLC-188/SKYDATA library to form a comprehensive system for calculating skyshine doses. See the author's web site for related information: http://athena.mne.ksu.edu/~jks/ SKYNEUT evaluates the neutron and neutron-induced secondary gamma-ray skyshine doses from an isotropic, point, neutron source collimated by three simple geometries: an open silo, a vertical black (perfectly absorbing) wall, and a rectangular building. The source maymore » emit monoenergetic neutrons or neutrons with an arbitrary multigroup spectrum of energies. SKYDOSE evaluates the gamma-ray skyshine dose from an isotropic, monoenergetic, point gamma-photon source collimated by three simple geometries: (1) a source in a silo, (2) a source behind an infinitely long, vertical, black wall, and (3) a source in a rectangular building. In all three geometries an optional overhead slab shield may be specified. MCSKY evaluates the gamma-ray skyshine dose from an isotropic, monoenergetic, point gamma-photon source collimated into either a vertical cone (i.e., silo geometry) or into a vertically oriented structure with an N-sided polygon cross section. An overhead laminate shield composed of two different materials is assumed, although shield thicknesses of zero may be specified to model an unshielded SKYSHINE source. SKYCONES evaluates the skyshine doses produced by a point neutron or gamma-photon source emitting, into the atmosphere, radiation that is collimated into an upward conical annulus between two arbitrary polar angles. The source is assumed to be axially (azimuthally) symmetric about a vertical axis through the source and can have an arbitrary polyenergetic spectrum. Nested contiguous annular cones can thus be used to represent the energy and polar-angle dependence of a skyshine source emitting radiation into the atmosphere.« less

  16. Section 23: Models and Computer Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Application-2014 for the Waste Isolation Pilot Plant Models and Computer Codes (40 CFR § 194.23) United States Department of Energy Waste Isolation Pilot Plant Carlsbad Field Office Carlsbad, New Mexico Compliance Recertification Application 2014 Models and Computer Codes (40 CFR § 194.23) Table of Contents 23.0 Models and Computer Codes (40 CFR § 194.23) 23.1 Requirements 23.2 40 CFR § 194.23(a)(1) 23.2.1 Background 23.2.2 1998 Certification Decision 23.2.3 Changes in the CRA-2004 23.2.4

  17. In-facility transport code review

    SciTech Connect (OSTI)

    Spore, J.W.; Boyack, B.E.; Bohl, W.R.

    1996-07-01

    The following computer codes were reviewed by the In-Facility Transport Working Group for application to the in-facility transport of radioactive aerosols, flammable gases, and/or toxic gases: (1) CONTAIN, (2) FIRAC, (3) GASFLOW, (4) KBERT, and (5) MELCOR. Based on the review criteria as described in this report and the versions of each code available at the time of the review, MELCOR is the best code for the analysis of in-facility transport when multidimensional effects are not significant. When multi-dimensional effects are significant, GASFLOW should be used.

  18. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2006-12-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits

  19. TRACKING CODE DEVELOPMENT FOR BEAM DYNAMICS OPTIMIZATION

    SciTech Connect (OSTI)

    Yang, L.

    2011-03-28

    Dynamic aperture (DA) optimization with direct particle tracking is a straight forward approach when the computing power is permitted. It can have various realistic errors included and is more close than theoretical estimations. In this approach, a fast and parallel tracking code could be very helpful. In this presentation, we describe an implementation of storage ring particle tracking code TESLA for beam dynamics optimization. It supports MPI based parallel computing and is robust as DA calculation engine. This code has been used in the NSLS-II dynamics optimizations and obtained promising performance.

  20. Regulatory impacts on code validation and use

    SciTech Connect (OSTI)

    McKamy, J.

    1994-09-01

    The Criticality Engineering Programs branch of Nuclear Safety Engineering at EG&G Rocky Flats is in the process of developing procedures for KENO code validation which demonstrate compliance with the requirements of DOE Order 5700.6B (NQA-1). Detailed and documented processes must be implemented to acquire, install, and validate the codes. Many of the requirements of DOE Order 5700.6B simply require documenting {open_quotes}good practices,{close_quotes} while others are not possible due to the nature of verifying and validating 20-year-old codes against 30-year-old benchmarks.

  1. Microsoft Word - Foreign Obligation Codes.docx

    National Nuclear Security Administration (NNSA)

    Obligation Codes - Updated March 2014 Transaction Code Material Balance Code Obligation 1 31 85 Australia 32 86 Canada 33 87 EURATOM 34 88 Japan 35 89 Peoples' Republic of China 36 C1 Russia 37 A8 Switzerland 38 A1 Argentina 39 A2 Brazil 40 A3 Chile 65 C4 Japan/Russia 66 C5 EURATOM/Russia 67 C6 Australia/Japan/Russia 68 C7 Canada/Japan/Russia 69 C8 EURATOM/Japan/Russia 70 B1 Les Centrifuge Enrichment/Japan 71 B2 Australia/Japan/Les Centrifuge Enrichment 72 B3 Canada/Japan/Les Centrifuge

  2. Generalized Procedure for Improved Accuracy of Thermal Contact Resistance Measurements for Materials With Arbitrary Temperature-Dependent Thermal Conductivity

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Sayer, Robert A.

    2014-06-26

    Thermal contact resistance (TCR) is most commonly measured using one-dimensional steady-state calorimetric techniques. In the experimental methods we utilized, a temperature gradient is applied across two contacting beams and the temperature drop at the interface is inferred from the temperature profiles of the rods that are measured at discrete points. During data analysis, thermal conductivity of the beams is typically taken to be an average value over the temperature range imposed during the experiment. Our generalized theory is presented and accounts for temperature-dependent changes in thermal conductivity. The procedure presented enables accurate measurement of TCR for contacting materials whose thermalmore » conductivity is any arbitrary function of temperature. For example, it is shown that the standard technique yields TCR values that are about 15% below the actual value for two specific examples of copper and silicon contacts. Conversely, the generalized technique predicts TCR values that are within 1% of the actual value. The method is exact when thermal conductivity is known exactly and no other errors are introduced to the system.« less

  3. Optical spin-to-orbital angular momentum conversion in ultra-thin metasurfaces with arbitrary topological charges

    SciTech Connect (OSTI)

    Bouchard, Frdric; De Leon, Israel; Schulz, Sebastian A.; Upham, Jeremy; Karimi, Ebrahim; Boyd, Robert W.

    2014-09-08

    Orbital angular momentum associated with the helical phase-front of optical beams provides an unbounded space for both classical and quantum communications. Among the different approaches to generate and manipulate orbital angular momentum states of light, coupling between spin and orbital angular momentum allows a faster manipulation of orbital angular momentum states because it depends on manipulating the polarisation state of light, which is simpler and generally faster than manipulating conventional orbital angular momentum generators. In this work, we design and fabricate an ultra-thin spin-to-orbital angular momentum converter, based on plasmonic nano-antennas and operating in the visible wavelength range that is capable of converting spin to an arbitrary value of orbital angular momentum ?. The nano-antennas are arranged in an array with a well-defined geometry in the transverse plane of the beam, possessing a specific integer or half-integer topological charge q. When a circularly polarised light beam traverses this metasurface, the output beam polarisation switches handedness and the orbital angular momentum changes in value by ?=2q? per photon. We experimentally demonstrate ? values ranging from 1 to 25 with conversion efficiencies of 8.6%??0.4%. Our ultra-thin devices are integratable and thus suitable for applications in quantum communications, quantum computations, and nano-scale sensing.

  4. An Efficient Format for Nearly Constant-Time Access to Arbitrary Time Intervals in Large Trace Files

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Chan, Anthony; Gropp, William; Lusk, Ewing

    2008-01-01

    A powerful method to aid in understanding the performance of parallel applications uses log or trace files containing time-stamped events and states (pairs of events). These trace files can be very large, often hundreds or even thousands of megabytes. Because of the cost of accessing and displaying such files, other methods are often used that reduce the size of the tracefiles at the cost of sacrificing detail or other information. This paper describes a hierarchical trace file format that provides for display of an arbitrary time window in a time independent of the total size of the file andmore » roughly proportional to the number of events within the time window. This format eliminates the need to sacrifice data to achieve a smaller trace file size (since storage is inexpensive, it is necessary only to make efficient use of bandwidth to that storage). The format can be used to organize a trace file or to create a separate file of annotations that may be used with conventional trace files. We present an analysis of the time to access all of the events relevant to an interval of time and we describe experiments demonstrating the performance of this file format.« less

  5. Generalized Procedure for Improved Accuracy of Thermal Contact Resistance Measurements for Materials With Arbitrary Temperature-Dependent Thermal Conductivity

    SciTech Connect (OSTI)

    Sayer, Robert A.

    2014-06-26

    Thermal contact resistance (TCR) is most commonly measured using one-dimensional steady-state calorimetric techniques. In the experimental methods we utilized, a temperature gradient is applied across two contacting beams and the temperature drop at the interface is inferred from the temperature profiles of the rods that are measured at discrete points. During data analysis, thermal conductivity of the beams is typically taken to be an average value over the temperature range imposed during the experiment. Our generalized theory is presented and accounts for temperature-dependent changes in thermal conductivity. The procedure presented enables accurate measurement of TCR for contacting materials whose thermal conductivity is any arbitrary function of temperature. For example, it is shown that the standard technique yields TCR values that are about 15% below the actual value for two specific examples of copper and silicon contacts. Conversely, the generalized technique predicts TCR values that are within 1% of the actual value. The method is exact when thermal conductivity is known exactly and no other errors are introduced to the system.

  6. Advanced Imaging Optics Utilizing Wavefront Coding.

    SciTech Connect (OSTI)

    Scrymgeour, David; Boye, Robert; Adelsberger, Kathleen

    2015-06-01

    Image processing offers a potential to simplify an optical system by shifting some of the imaging burden from lenses to the more cost effective electronics. Wavefront coding using a cubic phase plate combined with image processing can extend the system's depth of focus, reducing many of the focus-related aberrations as well as material related chromatic aberrations. However, the optimal design process and physical limitations of wavefront coding systems with respect to first-order optical parameters and noise are not well documented. We examined image quality of simulated and experimental wavefront coded images before and after reconstruction in the presence of noise. Challenges in the implementation of cubic phase in an optical system are discussed. In particular, we found that limitations must be placed on system noise, aperture, field of view and bandwidth to develop a robust wavefront coded system.

  7. Duplication of coding segments in genetic programming

    SciTech Connect (OSTI)

    Haynes, T.

    1996-12-31

    Research into the utility of non-coding segments, or introns, in genetic-based encodings has shown that they expedite the evolution of solutions in domains by protecting building blocks against destructive crossover. We consider a genetic programming system where non-coding segments can be removed, and the resultant chromosomes returned into the population. This parsimonious repair leads to premature convergence, since as we remove the naturally occurring non-coding segments, we strip away their protective backup feature. We then duplicate the coding segments in the repaired chromosomes, and place the modified chromosomes into the population. The duplication method significantly improves the learning rate in the domain we have considered. We also show that this method can be applied to other domains.

  8. Monte Carlo Ion Transport Analysis Code.

    Energy Science and Technology Software Center (OSTI)

    2009-04-15

    Version: 00 TRIPOS is a versatile Monte Carlo ion transport analysis code. It has been applied to the treatment of both surface and bulk radiation effects. The media considered is composed of multilayer polyatomic materials.

  9. Photovoltaic Online Training Course for Code Officials

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Photovoltaic Online Training Course for Code Officials is a free online training tool for those officials who conduct reviews and inspections of residential PV systems. Throughout the course's...

  10. Safety, codes and standards for hydrogen installations :

    SciTech Connect (OSTI)

    Harris, Aaron P.; Dedrick, Daniel E.; LaFleur, Angela Christine; San Marchi, Christopher W.

    2014-04-01

    Automakers and fuel providers have made public commitments to commercialize light duty fuel cell electric vehicles and fueling infrastructure in select US regions beginning in 2014. The development, implementation, and advancement of meaningful codes and standards is critical to enable the effective deployment of clean and efficient fuel cell and hydrogen solutions in the energy technology marketplace. Metrics pertaining to the development and implementation of safety knowledge, codes, and standards are important to communicate progress and inform future R&D investments. This document describes the development and benchmarking of metrics specific to the development of hydrogen specific codes relevant for hydrogen refueling stations. These metrics will be most useful as the hydrogen fuel market transitions from pre-commercial to early-commercial phases. The target regions in California will serve as benchmarking case studies to quantify the success of past investments in research and development supporting safety codes and standards R&D.

  11. City of Los Angeles- Zoning Code

    Broader source: Energy.gov [DOE]

    Chapter I of Los Angeles' Municipal Code, Height of Building or Structures, provides an exemption for solar energy devices, or similar structures. They may be erected above the height limit...

  12. Prescriptive Codes: A Cure or a Curse?

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 26, 2012, and addressed the question Do codes and standards get in the way of high performance?"

  13. Stretch/Reach Codes | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transcript PDF icon Presentation More Documents & Publications Green Codes and Programs Low-to-No Cost Strategy for Energy Efficiency in Public Buildings Effective O&M Policy in ...

  14. Codes & standards research, development & demonstration Roadmap

    SciTech Connect (OSTI)

    None, None

    2008-07-22

    This Roadmap is a guide to the Research, Development & Demonstration activities that will provide data required for SDOs to develop performance-based codes and standards for a commercial hydrogen fueled transportation sector in the U.S.

  15. Software infrastructure progress in the RAVEN code

    SciTech Connect (OSTI)

    Cogliati, Joshua J.; Rabiti, Cristian; Permann, Cody J.

    2015-03-01

    The milestones have been achieved. RAVEN has been migrated to Gitlab which adds new abilities for code review and management. Standalone RAVEN framework packages have been created for OSX and two Linux distributions.

  16. Superdense coding interleaved with forward error correction

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Humble, Travis S.; Sadlier, Ronald J.

    2016-05-12

    Superdense coding promises increased classical capacity and communication security but this advantage may be undermined by noise in the quantum channel. We present a numerical study of how forward error correction (FEC) applied to the encoded classical message can be used to mitigate against quantum channel noise. By studying the bit error rate under different FEC codes, we identify the unique role that burst errors play in superdense coding, and we show how these can be mitigated against by interleaving the FEC codewords prior to transmission. As a result, we conclude that classical FEC with interleaving is a useful methodmore » to improve the performance in near-term demonstrations of superdense coding.« less

  17. RESRAD Computer Code - Evaluation of Radioactively Contaminated...

    Office of Environmental Management (EM)

    then to improve the models within the codes, to operate on new computer platforms, to use new state of science radiation dose and risk factors, and to calculate cleanup criteria ...

  18. Edge Equilibrium Code (EEC) For Tokamaks

    SciTech Connect (OSTI)

    Li, Xujling

    2014-02-24

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids

  19. Safety, Codes, and Standards | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety, Codes, and Standards Safety, Codes, and Standards Hydrogen, in vast quantities, has been used safely for many years in chemical and metallurgical applications, the food industry, and the space program. As hydrogen and fuel cells begin to play a greater role in meeting the energy needs of our nation and the world, minimizing the safety hazards related to the use of hydrogen as a fuel is essential. DOE is working to develop and implement practices and procedures that will ensure safety in

  20. Priority coding for control room alarms

    DOE Patents [OSTI]

    Scarola, Kenneth; Jamison, David S.; Manazir, Richard M.; Rescorl, Robert L.; Harmon, Daryl L.

    1994-01-01

    Indicating the priority of a spatially fixed, activated alarm tile on an alarm tile array by a shape coding at the tile, and preferably using the same shape coding wherever the same alarm condition is indicated elsewhere in the control room. The status of an alarm tile can change automatically or by operator acknowledgement, but tones and/or flashing cues continue to provide status information to the operator.

  1. Code 4 Armor - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced Materials Advanced Materials Find More Like This Return to Search Code 4 Armor Y-12 National Security Complex Contact Y12 About This Technology Publications: PDF Document Publication Fact Sheet (227 KB) PDF Document Publication Poster (958 KB) PDF Document Publication Patent (179 KB) Technology Marketing Summary For DoD, law enforcement, and private security organizations that need personnel protection, Code 4 Armor is a multi-impact, customizable, monolithic armor technology. Unlike

  2. Value of Laboratory Experiments for Code Validations

    SciTech Connect (OSTI)

    Wawersik, W.R.

    1998-12-14

    Numerical codes have become indispensable for designing underground structures and interpretating the behavior of geologic systems. Because of the complexities of geologic systems, however, code calculations often are associated with large quantitative uncertainties. This papers presents three examples to demonstrate the value of laboratory(or bench scale) experiments to evaluate the predictive capabilities of such codes with five major conclusions: Laboratory or bench-scale experiments are a very cost-effective, controlled means of evaluating and validating numerical codes, not instead of but before or at least concurrent with the implementation of in situ studies. The design of good laboratory validation tests must identifj what aspects of a code are to be scrutinized in order to optimize the size, geometry, boundary conditions, and duration of the experiments. The design of good and sometimes difficult numerical analyses and sensitivity studies. Laboratory validation tests must involve: Good validation experiments will generate independent data sets to identify the combined effect of constitutive models, model generalizations, material parameters, and numerical algorithms. Successfid validations of numerical codes mandate a close collaboration between experimentalists and analysts drawing from the full gamut of observations, measurements, and mathematical results.

  3. scriptEnv - loading modules before starting a script

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    gpweb resources or in the NERSC portal environment which require the genepool-specific pythonperlR or databases configuration modules are a strong example of this. NERSC provides...

  4. General Purpose Monte Carlo Codes for Neutron and Photon Transport Calculations based on Continuous Energy and Multigroup Methods.

    Energy Science and Technology Software Center (OSTI)

    2008-02-29

    Version 00 (1) Problems to be solved: MVP/GMVP II can solve eigenvalue and fixed-source problems. The multigroup code GMVP can solve forward and adjoint problems for neutron, photon and neutron-photon coupled transport. The continuous-energy code MVP can solve only the forward problems. Both codes can also perform time-dependent calculations. (2) Geometry description: MVP/GMVP employs combinatorial geometry to describe the calculation geometry. It describes spatial regions by the combination of the 3-dimensional objects (BODIes). Currently, themore » following objects (BODIes) can be used. - BODIes with linear surfaces : half space, parallelepiped, right parallelepiped, wedge, right hexagonal prism - BODIes with quadratic surface and linear surfaces : cylinder, sphere, truncated right cone, truncated elliptic cone, ellipsoid by rotation, general ellipsoid - Arbitrary quadratic surface and torus The rectangular and hexagonal lattice geometry can be used to describe the repeated geometry. Furthermore, the statistical geometry model is available to treat coated fuel particles or pebbles for high temperature reactors. (3) Particle sources: The various forms of energy-, angle-, space- and time-dependent distribution functions can be specified. See Abstract for more detail.« less

  5. About the Oil and Gas Field Code Master List

    U.S. Energy Information Administration (EIA) Indexed Site

    About the Oil and Gas Field Code Master List 1 April 30, 2012 About the Oil and Gas Field Code Master List The U.S. Energy Information Administration's (EIA) Oil and Gas Field Code ...

  6. Building Energy Codes Newsletter: Setting the Standard-February 2010

    SciTech Connect (OSTI)

    U.S. Department of Energy

    2010-02-01

    This newsletter from the U.S. Department of Energy Buildng Energy Codes Program keeps readers up to date on energy code standards; the February 2010 issue focuses on helping states with code adoption, compliance, and resources.

  7. Building Energy Code for the District of Columbia

    Broader source: Energy.gov [DOE]

    The DC Energy Conservation Code is updated regularly as national codes are revised or if a change is proposed by local code enforcement officials, industry, design professionals, or other...

  8. PNNL: Codes Portfolio - 2015 Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Codes Portfolio - 2015 Peer Review PNNL: Codes Portfolio - 2015 Peer Review Presenter: Bing Liu, PNNL View the Presentation PNNL: Codes Portfolio - 2015 Peer Review (3.13 MB) More ...

  9. Code of Record Standard Review Plan (SRP) | Department of Energy

    Office of Environmental Management (EM)

    Code of Record Standard Review Plan (SRP) Code of Record Standard Review Plan (SRP) The objective of this Standard Review Plan (SRP) on Code of Record (COR) is to provide guidance ...

  10. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  11. NAICS Codes @ Headquarters Description: NAICS Codes used at Headquarters Procurement Services

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NAICS Codes @ Headquarters Description: NAICS Codes used at Headquarters Procurement Services Filters: Signed Date only show values between , Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001'), Date Signed only show values between '05/01/2011' and '04/30/2012', Last Modified Date only show values between Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 341

  12. Energy Code Enforcement Training Manual : Covering the Washington State Energy Code and the Ventilation and Indoor Air Quality Code.

    SciTech Connect (OSTI)

    Washington State Energy Code Program

    1992-05-01

    This manual is designed to provide building department personnel with specific inspection and plan review skills and information on provisions of the 1991 edition of the Washington State Energy Code (WSEC). It also provides information on provisions of the new stand-alone Ventilation and Indoor Air Quality (VIAQ) Code.The intent of the WSEC is to reduce the amount of energy used by requiring energy-efficient construction. Such conservation reduces energy requirements, and, as a result, reduces the use of finite resources, such as gas or oil. Lowering energy demand helps everyone by keeping electricity costs down. (It is less expensive to use existing electrical capacity efficiently than it is to develop new and additional capacity needed to heat or cool inefficient buildings.) The new VIAQ Code (effective July, 1991) is a natural companion to the energy code. Whether energy-efficient or not, an homes have potential indoor air quality problems. Studies have shown that indoor air is often more polluted than outdoor air. The VIAQ Code provides a means of exchanging stale air for fresh, without compromising energy savings, by setting standards for a controlled ventilation system. It also offers requirements meant to prevent indoor air pollution from building products or radon.

  13. Alternative Fuels Data Center: Biodiesel Codes, Standards, and Safety

    Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

    Codes, Standards, and Safety to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Codes, Standards, and Safety on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Codes, Standards, and Safety on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Codes, Standards, and Safety on Google Bookmark Alternative Fuels Data Center: Biodiesel Codes, Standards, and Safety on Delicious Rank Alternative Fuels Data Center: Biodiesel Codes, Standards, and Safety on Digg Find

  14. Southeast Energy Efficiency Alliance's Building Energy Codes Project |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013 Building Technologies Office's Program Peer Review bldgcodes04_zweig_040213.pdf (708.72 KB) More Documents & Publications State and Local Code Implementation: Southeast Region - 2014 BTO Peer Review Stretch/Reach Codes Energy Code Compliance and Enforcement Best Practices

  15. Current Approaches to Safety, Codes and Standards | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety, Codes & Standards » Current Approaches to Safety, Codes and Standards Current Approaches to Safety, Codes and Standards Current approaches to hydrogen and fuel cells safety, codes and standards are based on existing practices, guidelines, and codes and standards developed as a result of hydrogen's use in the chemical and aerospace industries. While some codes and standards for hydrogen and hydrogen-related systems are already available, in many cases they do not fully address the

  16. DOE Safety, Codes, and Standards Activities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety, Codes & Standards » DOE Safety, Codes, and Standards Activities DOE Safety, Codes, and Standards Activities DOE's safety R&D activities are aimed at developing sensors to detect hydrogen leaks in hydrogen and fuel cell systems. DOE's codes and standards activities are focused on coordinating and accelerating the efforts of major standards and model code development organizations and regulatory agencies so the required standards, codes, and regulations for hydrogen technologies

  17. Technical Assistance: Increasing Code Compliance - 2014 BTO Peer Review |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Assistance: Increasing Code Compliance - 2014 BTO Peer Review Technical Assistance: Increasing Code Compliance - 2014 BTO Peer Review Presenter: Rosemarie Bartlett, Pacific Northwest National Laboratory View the Presentation Technical Assistance: Increasing Code Compliance - 2014 BTO Peer Review (1.08 MB) More Documents & Publications PNNL: Codes Portfolio - 2015 Peer Review Building Energy Codes Program - 2014 BTO Peer Review Building Energy Codes Program Overview -

  18. DOE Codes Program Overview - 2015 Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Codes Program Overview - 2015 Peer Review DOE Codes Program Overview - 2015 Peer Review Presenter: David Cohan, DOE View the Presentation DOE Codes Program Overview - 2015 Peer Review (571.96 KB) More Documents & Publications Building Energy Codes Program Overview - 2015 BTO Peer Review State and Local Code Implementation: State Energy Officials - 2014 BTO Peer Review Building Energy Codes Program Overview - 2016 BTO Peer Review

  19. Building America Webinar: Resolving Codes and Standards Issues to Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Innovations | Department of Energy Resolving Codes and Standards Issues to Energy Innovations Building America Webinar: Resolving Codes and Standards Issues to Energy Innovations This webinar provided an overview of how Building America has impacted codes and standards in the past through technical and market innovations. The presenter also described new content on the Building America Solution Center that will help builders meet code requirements and will help code officials apply codes to

  20. TOUGH+ v1.5 Core Code

    Energy Science and Technology Software Center (OSTI)

    2015-08-27

    TOUGH+ v1.5 is a numerical code for the simulation of multi-phase, multi-component flow and transport of mass and heat through porous and fractured media, and represents the third update of the code since its first release [Moridis et al., 2008]. TOUGH+ is a successor to the TOUGH2 [Pruess et al., 1991; 2012] family of codes for multi-component, multiphase fluid and heat flow developed at the Lawrence Berkeley National Laboratory. It is written in standard FORTRANmore » 95/2003, and can be run on any computational platform (workstations, PC, Macintosh). TOUGH+ v1.5 employs dynamic memory allocation, thus minimizing storage requirements. It has a completely modular structure, follows the tenets of Object-Oriented Programming (OOP), and involves the advanced features of FORTRAN 95/2003, i.e., modules, derived data types, the use of pointers, lists and trees, data encapsulation, defined operators and assignments, operator extension and overloading, use of generic procedures, and maximum use of the powerful intrinsic vector and matrix processing operations. TOUGH+ v1.5 is the core code for its family of applications, i.e., the part of the code that is common to all its applications. It provides a description of the underlying physics and thermodynamics of non-isothermal flow, of the mathematical and numerical approaches, as well as a detailed explanation of the general (common to all applications) input requirements, options, capabilities and output specifications. The core code cannot run by itself: it needs to be coupled with the code for the specific TOUGH+ application option that describes a particular type of problem. The additional input requirements specific to a particular TOUGH+ application options and related illustrative examples can be found in the corresponding User’s Manual.« less