National Library of Energy BETA

Sample records for attack detection toolkit

  1. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This ...

  2. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Environmental Management (EM)

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber ...

  3. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Environmental Management (EM)

    Portaledge, March 2010 | Department of Energy Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection

  4. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  5. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Environmental Management (EM)

    Cyber Security Audit and Attack Detection Toolkit Adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems, these tools often lack the intelligence necessary to be effective in control systems. This two-year project aims to integrate control system intelligence into widely deployed vulnerability scanners and SEM, and to

  6. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers

  7. A toolkit for detecting technical surprise.

    SciTech Connect (OSTI)

    Trahan, Michael Wayne; Foehse, Mark C.

    2010-10-01

    The detection of a scientific or technological surprise within a secretive country or institute is very difficult. The ability to detect such surprises would allow analysts to identify the capabilities that could be a military or economic threat to national security. Sandia's current approach utilizing ThreatView has been successful in revealing potential technological surprises. However, as data sets become larger, it becomes critical to use algorithms as filters along with the visualization environments. Our two-year LDRD had two primary goals. First, we developed a tool, a Self-Organizing Map (SOM), to extend ThreatView and improve our understanding of the issues involved in working with textual data sets. Second, we developed a toolkit for detecting indicators of technical surprise in textual data sets. Our toolkit has been successfully used to perform technology assessments for the Science & Technology Intelligence (S&TI) program.

  8. Supervisor Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supervisor Toolkit

  9. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  10. Financing Initiatives Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Potential Toolkit Building Energy Assessment Toolkit Power System Screening and Design Toolkit Land Use Assessment Toolkit Bioenergy Assessment Toolkit Transportation...

  11. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  12. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

  13. Agricultural Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agricultural-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors...

  14. Commercial Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Commercial-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors Technology...

  15. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  16. LEDSGP/tools/toolkits | Open Energy Information

    Open Energy Info (EERE)

    Knowledge Portals LEDS Benefits Back to top LEDS-Related Toolkits DIA Toolkit This Development Impacts Assessment Toolkit helps country, regional, and local policymakers...

  17. Better Buildings Training Toolkit

    Broader source: Energy.gov [DOE]

    The Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value of providing training opportunities for contractors, staff, and volunteers.

  18. Quarterly Cybersecurity Awareness Campaigns and Toolkits | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Quarterly Cybersecurity Awareness Campaigns and Toolkits Quarterly Cybersecurity Awareness Campaigns and Toolkits The OCIO coordinates quarterly cybersecurity awareness campaigns ...

  19. Workplace Charging Toolkit: Workshop Speaker Outreach Letter...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Outreach Letter Template More Documents & Publications Workplace Charging Toolkit: Workshop Host Outreach Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction...

  20. Structural Simulation Toolkit. Lunch & Learn

    SciTech Connect (OSTI)

    Moore, Branden J.; Voskuilen, Gwendolyn Renae; Rodrigues, Arun F.; Hammond, Simon David; Hemmert, Karl Scott

    2015-09-01

    This is a presentation outlining a lunch and learn lecture for the Structural Simulation Toolkit, supported by Sandia National Laboratories.

  1. NREL: International Activities - Geospatial Toolkits

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Geospatial Toolkit The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource assessment. The non-resource, country-specific data for each toolkit comes from a variety of agencies within each country as well as from global datasets. Funding for the toolkit was provided by the United States Agency for International Development (USAID), United States Trade and Development

  2. The model coupling toolkit.

    SciTech Connect (OSTI)

    Larson, J. W.; Jacob, R. L.; Foster, I.; Guo, J.

    2001-04-13

    The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form a high-performance coupled modeling system? We present our solution to this problem--The Model Coupling Toolkit (MCT). We explain how our effort to construct the Next-Generation Coupler for NCAR Community Climate System Model motivated us to create this toolkit. We describe in detail the conceptual design of the MCT and explain its usage in constructing parallel coupled models. We present preliminary performance results for the toolkit's parallel data transfer facilities. Finally, we outline an agenda for future development of the MCT.

  3. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  4. Social Media Toolkit

    Broader source: Energy.gov [DOE]

    This Better Buildings Residential Network toolkit can be used to help residential energy efficiency programs learn to engage potential customers through social media. Social media can build brand awareness concerning home energy upgrades and the entities working on them, which can lead to more energy upgrade projects taking place in the long run.

  5. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Laboratory (NREL). It integrates resource data and geographic information systems (GIS) - for integrated resource assessment. The Geospatial Toolkit (GsT) is a map-based...

  6. Bioenergy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Bioenergy Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities DevelopBAU Stage 4:...

  7. REEEP Toolkits | Open Energy Information

    Open Energy Info (EERE)

    Policiesdeployment programs, Resource assessment, Pathways analysis, Background analysis Resource Type: Dataset References: REEEP Toolkit 1 This article is a stub. You...

  8. Building Energy Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  9. Impact Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  10. Supporting Small Forest Enterprises: A Facilitator's Toolkit...

    Open Energy Info (EERE)

    Small Forest Enterprises: A Facilitator's Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Supporting Small Forest Enterprises: A Facilitator's Toolkit Agency...

  11. Multiphysics Application Coupling Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-12-02

    This particular consortium implementation of the software integration infrastructure will, in large part, refactor portions of the Rocstar multiphysics infrastructure. Development of this infrastructure originated at the University of Illinois DOE ASCI Center for Simulation of Advanced Rockets (CSAR) to support the center's massively parallel multiphysics simulation application, Rocstar, and has continued at IllinoisRocstar, a small company formed near the end of the University-based program. IllinoisRocstar is now licensing these new developments as free, openmore » source, in hopes to help improve their own and others' access to infrastructure which can be readily utilized in developing coupled or composite software systems; with particular attention to more rapid production and utilization of multiphysics applications in the HPC environment. There are two major pieces to the consortium implementation, the Application Component Toolkit (ACT), and the Multiphysics Application Coupling Toolkit (MPACT). The current development focus is the ACT, which is (will be) the substrate for MPACT. The ACT itself is built up from the components described in the technical approach. In particular, the ACT has the following major components: 1.The Component Object Manager (COM): The COM package provides encapsulation of user applications, and their data. COM also provides the inter-component function call mechanism. 2.The System Integration Manager (SIM): The SIM package provides constructs and mechanisms for orchestrating composite systems of multiply integrated pieces.« less

  12. Mesh Quality Improvement Toolkit

    Energy Science and Technology Software Center (OSTI)

    2002-11-15

    MESQUITE is a linkable software library to be used by simulation and mesh generation tools to improve the quality of meshes. Mesh quality is improved by node movement and/or local topological modifications. Various aspects of mesh quality such as smoothness, element shape, size, and orientation are controlled by choosing the appropriate mesh qualtiy metric, and objective function tempate, and a numerical optimization solver to optimize the quality of meshes, MESQUITE uses the TSTT mesh interfacemore » specification to provide an interoperable toolkit that can be used by applications which adopt the standard. A flexible code design makes it easy for meshing researchers to add additional mesh quality metrics, templates, and solvers to develop new quality improvement algorithms by making use of the MESQUITE infrastructure.« less

  13. TOOLKIT FOR ADVANCED OPTIMIZATION

    Energy Science and Technology Software Center (OSTI)

    2000-10-13

    The TAO project focuses on the development of software for large scale optimization problems. TAO uses an object-oriented design to create a flexible toolkit with strong emphasis on the reuse of external tools where appropriate. Our design enables bi-directional connection to lower level linear algebra support (for example, parallel sparse matrix data structures) as well as higher level application frameworks. The Toolkist for Advanced Optimization (TAO) is aimed at teh solution of large-scale optimization problemsmore » on high-performance architectures. Our main goals are portability, performance, scalable parallelism, and an interface independent of the architecture. TAO is suitable for both single-processor and massively-parallel architectures. The current version of TAO has algorithms for unconstrained and bound-constrained optimization.« less

  14. Application experiences with the Globus toolkit.

    SciTech Connect (OSTI)

    Brunett, S.

    1998-06-09

    The Globus grid toolkit is a collection of software components designed to support the development of applications for high-performance distributed computing environments, or ''computational grids'' [14]. The Globus toolkit is an implementation of a ''bag of services'' architecture, which provides application and tool developers not with a monolithic system but rather with a set of stand-alone services. Each Globus component provides a basic service, such as authentication, resource allocation, information, communication, fault detection, and remote data access. Different applications and tools can combine these services in different ways to construct ''grid-enabled'' systems. The Globus toolkit has been used to construct the Globus Ubiquitous Supercomputing Testbed, or GUSTO: a large-scale testbed spanning 20 sites and included over 4000 compute nodes for a total compute power of over 2 TFLOPS. Over the past six months, we and others have used this testbed to conduct a variety of application experiments, including multi-user collaborative environments (tele-immersion), computational steering, distributed supercomputing, and high throughput computing. The goal of this paper is to review what has been learned from these experiments regarding the effectiveness of the toolkit approach. To this end, we describe two of the application experiments in detail, noting what worked well and what worked less well. The two applications are a distributed supercomputing application, SF-Express, in which multiple supercomputers are harnessed to perform large distributed interactive simulations; and a tele-immersion application, CAVERNsoft, in which the focus is on connecting multiple people to a distributed simulated world.

  15. SEP Toolkit Overview | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SEP Toolkit Overview SEP Toolkit Overview PDF icon Overview.pdf More Documents & Publications Industrial SEP Ratepayer-funded Accelerator Factsheet SEP Overview Slides Superior Energy Performance: Better Plants Webinar

  16. The Configuration Space Toolkit (C-Space Toolkit or CSTK) Ver. 2.5 beta

    Energy Science and Technology Software Center (OSTI)

    2010-02-24

    The C-Space Toolkit provides a software library that makes it easier to program motion planning, simulation, robotics, and virtual reality codes using the Configuration Space abstraction. Key functionality (1) enables the user to special create representations of movable and stationary rigid geometric objects, and (2) perform fast distance, interference (clash) detection, collision detection, closest-feature pairs, and contact queries in terms of object configuration. Not only can queries be computed at any given point in configurationmore » space, but they can be done exactly over linear-translational path segments and approximately for rotational path segments. Interference detection and distance computations can be done with respect to the Minkowski sum of the original geometry and a piece of convex geometry. The Toolkit takes as raw model input (1) collections of convex polygons that form the boundaries of models and (2) convex polyhedra, cones, cylinders, and discs that are models and model components. Configurations are given in terms of homogeneous transforms. A simple OpenGL-based system for displaying and animating the geometric objects is included in the implementation. This version, 2.5 Beta, incorporates feature additions and enhancements, improvements in algorithms, improved robustness, bug fixes and cleaned-up source code, better compliance with standards and recent programming convention, changes to the build process for the software, support for more recent hardware and software platforms, and improvements to documentation and source-code comments.« less

  17. Parallel Power Grid Simulation Toolkit

    Energy Science and Technology Software Center (OSTI)

    2015-09-14

    ParGrid is a 'wrapper' that integrates a coupled Power Grid Simulation toolkit consisting of a library to manage the synchronization and communication of independent simulations. The included library code in ParGid, named FSKIT, is intended to support the coupling multiple continuous and discrete even parallel simulations. The code is designed using modern object oriented C++ methods utilizing C++11 and current Boost libraries to ensure compatibility with multiple operating systems and environments.

  18. Voluntary Initiative: Partnerships Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Partnerships Toolkit Voluntary Initiative: Partnerships Toolkit Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, non-profit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success. PDF icon Voluntary Initiative: Partnerships Toolkit More Documents &

  19. Designing Incentives Toolkit Better Buildings Residential Network

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Designing Incentives Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.gov/bbrn T his Better Buildings Residential Network toolkit addresses the challenges and opportunities of using incentives to increase the volume of home energy upgrades. The topic was chosen as a priority by Residential Network members, who also served on a working group that reviewed this toolkit. Residential energy efficiency programs offer incentives as a way to encourage action from

  20. Workplace Charging Toolkit: Workshop Outreach Presentation Template...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Outreach Presentation Template Workplace Charging Toolkit: Workshop Outreach Presentation Template Educate workshop attendees and employers about the benefits of workplace charging...

  1. Sustainable Forest Finance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    "This Toolkit has been developed jointly by PricewaterhouseCoopers (PwC) and the World Business Council for Sustainable Development (WBCSD). It is a globally applicable resource...

  2. WPN 10-3: Procurement Toolkit CD

    Broader source: Energy.gov [DOE]

    To issue the Procurement Toolkit CD to all Grantees, to share with their local agencies, for use in the Weatherization Assistance Program.

  3. Workplace Charging Toolkit: Workshop Speaker Instruction Letter...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template Inform speakers participating in the employer experience panel about their role in the event. File General ...

  4. Category:LEDS Toolkit | Open Energy Information

    Open Energy Info (EERE)

    meant to support the creation and implementation of a Low Emission Development Strategy. Pages in category "LEDS Toolkit" The following 14 pages are in this category, out of...

  5. TransportToolkit Prototype | Open Energy Information

    Open Energy Info (EERE)

    AgencyCompany Organization: Nick Langle ComplexityEase of Use: Not Available Cost: Free Transport Toolkit Region(s): Asia, Europe, Africa & Middle East, Australia & North...

  6. Project Screening and Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  7. LEDSGP/Transportation Toolkit/Tools | Open Energy Information

    Open Energy Info (EERE)

    Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Tools for Low Emission Development Strategies in Transportation...

  8. Galvin Electricity Initiative Policy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Galvin Electricity Initiative Policy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Galvin Electricity Initiative Policy Toolkit AgencyCompany Organization:...

  9. Technology Cost and Performance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  10. Policy and Program Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  11. Transportation Assessment Toolkit/Home | Open Energy Information

    Open Energy Info (EERE)

    Transport Bikes in Spain Toolkit for Low Emissions Development Strategies in Transport Red buses Toolkit for Low Emissions Development Strategies in Transport A Rationale and...

  12. Climate Change and Clean Energy Project (CEnergy) Toolkit | Open...

    Open Energy Info (EERE)

    Project (CEnergy) Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Change and Clean Energy Project (CEnergy) Toolkit AgencyCompany Organization:...

  13. Renewable Energy and Energy Efficiency Toolkit Website | Open...

    Open Energy Info (EERE)

    Toolkit Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy and Energy Efficiency Toolkit Website Focus Area: Renewable Energy Topics: Policy...

  14. LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information

    Open Energy Info (EERE)

    Contact Us < LEDSGP | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Contacts for the LEDS GP...

  15. Python-ARM Radar Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-03-17

    The Python-ARM Radar Toolkit (Py-ART) is a collection of radar quality control and retrieval codes which all work on two unifying Python objects: the PyRadar and PyGrid objects. By building ingests to several popular radar formats and then abstracting the interface Py-ART greatly simplifies data processing over several other available utilities. In addition Py-ART makes use of Numpy arrays as its primary storage mechanism enabling use of existing and extensive community software tools.

  16. BioenergizeME Infographic Challenge Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit BioenergizeME Infographic Challenge Toolkit Toolkit for the BioenergizeME Infographic Challenge. PDF icon bioenergizeme_toolkit.pdf More Documents & Publications Webinar: BioenergizeME Office Hours Webinar: Guide to the 2016 BioenergizeME Infographic Challenge BioenergizeME Infographic Challenge Flyer Webinar: BioenergizeME Office Hours Webinar: Biomass Basics

  17. TECA: A Parallel Toolkit for Extreme Climate Analysis

    SciTech Connect (OSTI)

    Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

    2012-03-12

    We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

  18. Data Exploration Toolkit for serial diffraction experiments

    Office of Scientific and Technical Information (OSTI)

    ... Clustering was performed using the SciPy Python package (Oliphant, 2007). 2.2. Crystal ... the clustering toolkit from within a Python script within the cctbx.xfel environment. ...

  19. Better Buildings Residential Network Social Media Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Social Media Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.gov/bbrn 1 T his Better Buildings Residential Network toolkit can be used to help residential energy efficiency programs learn to engage potential customers through social media. Social media can build brand awareness concerning home energy upgrades and the entities working on them, which can lead to more energy upgrade projects taking place in the long run. Residential Network members provided input

  20. NYSERDA-Wind Energy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    NYSERDA-Wind Energy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: NYSERDA-Wind Energy Toolkit AgencyCompany Organization: New York State Energy Research and...

  1. NOAA Webinar: The U.S. Climate Resilience Toolkit

    Broader source: Energy.gov [DOE]

    Hosted by the National Oceanic and Atmospheric Administration (NOAA), this webinar will demonstrate the U.S. Climate Resilience Toolkit.

  2. ORISE: Radiological Terrorism Toolkit | How ORISE is Making a Difference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiological Terrorism Toolkit ORISE partners with CDC to develop Radiological Terrorism: A Toolkit for Public Health Officials Radiological Terrorism: A Toolkit for Public Health Officials How ORISE is Making a Difference Working closely with the Centers for Disease Control and Prevention (CDC), the Oak Ridge Institute for Science and Education (ORISE) distributed more than 400 radiological terrorism toolkits filled with key resources, such as training guidelines, clinical directives, details

  3. Workplace Charging Toolkit: Outreach Letter Template | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Reach out to employers in your community who may be interested in offering workplace charging with this template. File General Outreach Letter Template File Clean Cities Branded Outreach Letter Template More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction

  4. Workplace Charging Toolkit: Press Release Template | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Raise the profile of employers in the community who are offering workplace charging and encourage the adoption of workplace charging among other employers through this press release template. File General Press Release Template File Clean Cities Branded Press Release Template More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach

  5. Workplace Charging Toolkit: Workshop Host Outreach Letter Template |

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Approach employers in your community that already have workplace charging to serve as a workshop host. File General Host Outreach Letter Template File Clean Cities Branded Host Outreach Letter Template More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Workshop Invitation Template Workplace Charging Toolkit: Workshop Speaker Instruction

  6. Workplace Charging Toolkit: Workshop Invitation Template | Department of

    Broader source: Energy.gov (indexed) [DOE]

    Energy Engage possible workplace charging event attendees with this template invitation. File General Workshop Invitation Template File Clean Cities Branded Workshop Invitation Template More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Workshop Agenda Template Workplace Charging Toolkit: Workshop Host Outreach

  7. SIERRA Toolkit v. 1.0

    Energy Science and Technology Software Center (OSTI)

    2010-02-24

    The SIERRA Toolkit is a collection of libraries to facilitate the development of parallel engineering analysis applications. These libraries supply basic core services that an engineering analysis application may need such as a parallel distributed and dynamic mesh database (for unstructured meshes), mechanics algorithm support (parallel infrastructure only), interfaces to parallel solvers, parallel mesh and data I/O, and various utilities (timers, diagnostic tools, etc.).The toolkit is intended to reduce the effort required to develop anmore » engineering analysis application by removing the need to develop core capabilities that most every application would require.« less

  8. 2030 District Program and Small Commercial Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2030 District Program and Small Commercial Toolkit 2014 Building Technologies Office Peer Review Cindy Regnier, CMRegnier@lbl.gov Lawrence Berkeley National Lab Project Summary (New Project) Timeline: Start date: October 1, 2013 Planned end date: March 30, 2016 Key Milestones 1. Develop program resources and tools, 9/30/14 2. Complete demonstrations, 9/30/15 3. Deployment to other 2030 Districts, 3/30/16 Budget: Total DOE $ to date: $2M (for program and toolkit, no dollars are applied to

  9. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth's weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  10. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth`s weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  11. Portable Extensible Toolkit for Scientific Computation

    Energy Science and Technology Software Center (OSTI)

    1995-06-30

    PETSC2.0 is a software toolkit for portable, parallel (and serial) numerical solution of partial differential equations and minimization problems. It includes software for the solution of linear and nonlinear systems of equations. These codes are written in a data-structure-neutral manner to enable easy reuse and flexibility.

  12. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  13. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  14. Voluntary Initiative on Incentives: Toolkit Training Webinar | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Initiative on Incentives: Toolkit Training Webinar Voluntary Initiative on Incentives: Toolkit Training Webinar Better Buildings Residential Network Peer Exchange Call Series: Voluntary Initiative on Incentives: Toolkit Training Webinar, Call Slides and Discussion Summary, March 26, 2015. PDF icon Call Slides and Discussion Summary More Documents & Publications Generating Energy Efficiency Project Leads and Allocating Leads to Contractors Making Evaluations Work for Your

  15. LBNL: Architecture 2030 District Program and Small Commercial Toolkit |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit Lead Performer: Lawrence Berkeley National Laboratory - Berkeley, CA Partners: - Architecture 2030 - Santa Fe, NM - Cleveland 2030 District - Cleveland, OH - Green Building Alliance/Pittsburgh 2030 District - Pittsburgh, PA - Seattle 2030 District - Seattle, WA -

  16. Supply Chain Risk Management (SCRM) Awareness Toolkit | Department of

    Energy Savers [EERE]

    Energy Supply Chain Risk Management (SCRM) Awareness Toolkit Supply Chain Risk Management (SCRM) Awareness Toolkit The Office of the Chief Information Officer (OCIO) Supply Chain Risk Management (SCRM) Resource Center developed the SCRM Awareness Toolkit to introduce DOE employees to the basic terms and concepts of the technology supply chain and associated threats. For additional information on the DOE Enterprise SCRM Resource Center and program initiatives, please contact Sue Farrand at

  17. Online Toolkit Fosters Bioenergy Innovation | Department of Energy

    Energy Savers [EERE]

    Online Toolkit Fosters Bioenergy Innovation Online Toolkit Fosters Bioenergy Innovation January 21, 2011 - 2:27pm Addthis Learn more about the Bioenergy Knowledge Discovery Framework, an online data sharing and mapping toolkit. Paul Bryan Biomass Program Manager, Office of Energy Efficiency & Renewable Energy What will the project do? The $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a facility that will nearly triple the amount of

  18. LBNL: Architecture 2030 District Program and Small Commercial Toolkit |

    Energy Savers [EERE]

    Department of Energy LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit Lead Performer: Lawrence Berkeley National Laboratory - Berkeley, CA Partners: - Architecture 2030 - Santa Fe, NM - Cleveland 2030 District - Cleveland, OH - Green Building Alliance/Pittsburgh 2030 District - Pittsburgh, PA - Seattle 2030 District - Seattle, WA -

  19. Grid-Connected Renewable Energy Generation Toolkit-Biomass |...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Grid-Connected Renewable Energy Generation Toolkit-Biomass AgencyCompany Organization: United States Agency for...

  20. Distributed Renewable Energy Finance and Policy Toolkit | Open...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Distributed Renewable Energy Finance and Policy Toolkit AgencyCompany Organization: Clean Energy States Alliance...

  1. Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)

    SciTech Connect (OSTI)

    Young, K.

    2014-04-01

    Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

  2. LEDSGP/DIA-Toolkit/Request Assistance | Open Energy Information

    Open Energy Info (EERE)

    Impacts Assessment Toolkit Home Tools Request Assistance Remote Expert Assistance on LEDS The Low Emission Development Strategies (LEDS) Global Partnership provides timely,...

  3. Workplace Charging Toolkit: Workshop Host Outreach Letter Template...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Host Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach Letter Template Approach employers in your community that already have workplace charging to serve ...

  4. Category:Wind Working Group Toolkit | Open Energy Information

    Open Energy Info (EERE)

    search This wiki-based Wind Working Group Toolkit provides links to information, methods, and resources. This wiki is a work in progress, and we welcome your contributions....

  5. ORISE: Radiological Terrorism Toolkit | How ORISE is Making a...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Education (ORISE) distributed more than 400 radiological terrorism toolkits filled with key resources, such as training guidelines, clinical directives, details about radioactive...

  6. LEDSGP/DIA-Toolkit/Uses | Open Energy Information

    Open Energy Info (EERE)

    (DIA) Toolkit offers a structured way to consider the impact of proposed low emission development strategies (LEDS) on other national or local priorities, and provides links to...

  7. The structural simulation toolkit :a tool for exploring parallel...

    Office of Scientific and Technical Information (OSTI)

    for exploring parallel architectures and applications. Citation Details In-Document Search Title: The structural simulation toolkit :a tool for exploring parallel architectures ...

  8. Integrated: Geospatial Toolkit GIS data for Nicaragua from NREL...

    Open Energy Info (EERE)

    Nicaragua from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  9. Integrated: Geospatial Toolkit GIS data for Cuba from NREL -...

    Open Energy Info (EERE)

    Cuba from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  10. Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  11. Integrated: Geospatial Toolkit GIS data for India from NREL ...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  12. ORISE: Pandemic Flu Toolkits | How ORISE is Making a Difference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workshops that have been presented to the Asia-Pacific Economic Cooperation (APEC) and other nations around the world. By developing training toolkits and providing...

  13. ACHP - Section 106 Applicant Toolkit | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: ACHP - Section 106 Applicant ToolkitPermittingRegulatory GuidanceGuide...

  14. Geospatial Toolkit (GsT) Webinar | Open Energy Information

    Open Energy Info (EERE)

    wikiGsT Equivalent URI: cleanenergysolutions.orgcontentgeospatial-toolkit-gst Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance...

  15. WRI-The Governance of Forests Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Publications Website: pdf.wri.orgworkingpapersgfitenureindicatorssep09.pdf Cost: Free WRI-The Governance of Forests Toolkit Screenshot References: WRI-The Governance of...

  16. Advanced Network Toolkit for Assessments and Remote Mapping ...

    Broader source: Energy.gov (indexed) [DOE]

    Uses existing information to passively map control systems networks and identify cyber security perimeters Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)...

  17. Quarterly Cybersecurity Awareness Campaigns and Toolkits | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Quarterly Cybersecurity Awareness Campaigns and Toolkits Quarterly Cybersecurity Awareness Campaigns and Toolkits The OCIO coordinates quarterly cybersecurity awareness campaigns and Federal awareness programs to provide DOE employees with timely information on current cyber threats, recommended mitigations, and sound practices. Documents Available for Download April 6, 2015 January 2015 Cybersecurity Awareness Campaign - Phishing April 6, 2015 July 2014 Cybersecurity Awareness

  18. Workplace Charging Toolkit: Workshop Agenda Template | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Develop a streamlined workshop with this half-day agenda focused on introductory-level PEV education and firsthand employer workplace charging experience. File General Workshop Agenda Template File Clean Cities Branded Workshop Agenda Template More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template Workplace Charging Challenge Summit 2014: Session 1, Track A Workplace Charging Toolkit: Workshop Invitation

  19. Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template |

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Inform speakers participating in the employer experience panel about their role in the event. File General Speaker Instruction Letter Template File Clean Cities Branded Speaker Instruction Letter Template More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach

  20. Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template |

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Invite employers in your community that already have charging to speak on an employer experience panel. File General Speaker Outreach Letter Template File Clean Cities Branded Speaker Outreach Letter Template More Documents & Publications Workplace Charging Toolkit: Workshop Host Outreach Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction

  1. An Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B; Payne, Patricia W

    2012-01-01

    Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

  2. 2030 District Program and Small Commercial Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cindy Regnier, CMRegnier@lbl.gov Lawrence Berkeley National Lab Vincent Martinez, martinez@architecture2030.org Architecture 2030 2030 District Program and Small Commercial Toolkit 2015 Building Technologies Office Peer Review 2 Project Summary Timeline: Start date: October 1, 2013 Planned end date: March 30, 2016 Key Milestones 1. Develop program resources and tools, 9/30/14 2. Complete demonstrations, 9/30/15 3. Deployment to other 2030 Districts, 3/30/16 Budget: Total DOE $ to date: $2M (for

  3. MCS Large Cluster Systems Software Toolkit

    Energy Science and Technology Software Center (OSTI)

    2002-11-01

    This package contains a number of systems utilities for managing a set of computers joined in a "cluster". The utilities assist a team of systems administrators in managing the cluster by automating routine tasks, centralizing information, and monitoring individual computers within the cluster. Included in the toolkit are scripts used to boot a computer from a floppy, a program to turn on and off the power to a system, and a system for using amore »database to organize cluster information.« less

  4. Graph algorithms in the titan toolkit.

    SciTech Connect (OSTI)

    McLendon, William Clarence, III; Wylie, Brian Neil

    2009-10-01

    Graph algorithms are a key component in a wide variety of intelligence analysis activities. The Graph-Based Informatics for Non-Proliferation and Counter-Terrorism project addresses the critical need of making these graph algorithms accessible to Sandia analysts in a manner that is both intuitive and effective. Specifically we describe the design and implementation of an open source toolkit for doing graph analysis, informatics, and visualization that provides Sandia with novel analysis capability for non-proliferation and counter-terrorism.

  5. Parallel Climate Analysis Toolkit (ParCAT)

    Energy Science and Technology Software Center (OSTI)

    2013-06-30

    The parallel analysis toolkit (ParCAT) provides parallel statistical processing of large climate model simulation datasets. ParCAT provides parallel point-wise average calculations, frequency distributions, sum/differences of two datasets, and difference-of-average and average-of-difference for two datasets for arbitrary subsets of simulation time. ParCAT is a command-line utility that can be easily integrated in scripts or embedded in other application. ParCAT supports CMIP5 post-processed datasets as well as non-CMIP5 post-processed datasets. ParCAT reads and writes standard netCDF files.

  6. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Trust Anchor Lifecycle Attack Protection Trust Anchor Lifecycle Attack Protection Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation PDF icon Trust Anchor Lifecycle Attack Protection More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of the Cyber Security

  7. WAP Memorandum 015: Weatherization Financial Toolkit – 2 CFR 200 Regulations and Procurement Procedures

    Broader source: Energy.gov [DOE]

    This Memorandum serves to update and supersede the Financial Toolkit, previously issued in Weatherization Program Notice (WPN) 12-4, Weatherization Assistance Program Financial Management Training Toolkit dated December 9, 2011, and the Procurement Toolkit previously issued in WPN 10-3, Procurement Toolkit CD, dated October 30, 2009.

  8. Data Exploration Toolkit for serial diffraction experiments

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zeldin, Oliver B.; Brewster, Aaron S.; Hattne, Johan; Uervirojnangkoorn, Monarin; Lyubimov, Artem Y.; Zhou, Qiangjun; Zhao, Minglei; Weis, William I.; Sauter, Nicholas K.; Brunger, Axel T.

    2015-01-23

    Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many distinct crystals and/or different regions of the same crystal. Combined with other sources of XFEL shot-to-shot variation, this introduces significant heterogeneity into the diffraction data, complicating processing and interpretation. To enable researchers to get the most from their collected data, a toolkit is presented that provides insights into the quality of, and the variation present in, serial crystallography datamore » sets. These tools operate on the unmerged, partial intensity integration results from many individual crystals, and can be used on two levels: firstly to guide the experimental strategy during data collection, and secondly to help users make informed choices during data processing.« less

  9. Monitoring Extreme-scale Lustre Toolkit

    SciTech Connect (OSTI)

    Brim, Michael J; Lothian, Josh

    2015-01-01

    We discuss the design and ongoing development of the Monitoring Extreme-scale Lustre Toolkit (MELT), a unified Lustre performance monitoring and analysis infrastructure that provides continuous, low-overhead summary information on the health and performance of Lustre, as well as on-demand, in-depth problem diagnosis and root-cause analysis. The MELT infrastructure leverages a distributed overlay network to enable monitoring of center-wide Lustre filesystems where clients are located across many network domains. We preview interactive command-line utilities that help administrators and users to observe Lustre performance at various levels of resolution, from individual servers or clients to whole filesystems, including job-level reporting. Finally, we discuss our future plans for automating the root-cause analysis of common Lustre performance problems.

  10. Solar for Safety, Security, and Resilience Toolkit

    Broader source: Energy.gov [DOE]

    There is a growing interest in using renewable energy options like solar to improve community resiliency. During extreme weather events, solar can help prevent power outages by providing emergency energy to critical facilities and recovery efforts. Solar can provide electricity to remote or less accessible areas, and is flexible enough to be a mobile or temporary power source. In addition to resiliency planning, there are efforts to promote new safety education and guidelines for solar installation, especially related to fire prevention. Also, there is rising interest in how solar can influence homeland security. The Solar for Safety, Security, and Resilience Toolkit demonstrates the different ways of thinking about and incorporating solar energy into ongoing public safety, homeland security, and resiliency initiatives.

  11. Integrated: Geospatial Toolkit for Honduras from NREL - Datasets...

    Open Energy Info (EERE)

    and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

  12. Template:RegulatoryToolkitHeader | Open Energy Information

    Open Energy Info (EERE)

    Toolkit banner, typically across the top of the page, which features a unique blue color scheme and simple menu. Parameters none Usage It should be called in the following...

  13. On-Bill Financing for Energy Efficiency Improvements Toolkit | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Improvements Toolkit On-Bill Financing for Energy Efficiency Improvements Toolkit Provides some benefits and barriers to on-bill programs. Author: American Counsel for Energy-Efficient Economy On-Bill Financing for Energy Efficiency Improvements More Documents & Publications Financing Energy Upgrades for K-12 School Districts On-Bill Financing for Energy Efficiency Improvements: A Review of Current Program Challenges, Opportunities, and Best Practices Reduce Risk, Increase

  14. Data Exploration Toolkit for serial diffraction experiments (Journal

    Office of Scientific and Technical Information (OSTI)

    Article) | SciTech Connect Data Exploration Toolkit for serial diffraction experiments Citation Details In-Document Search Title: Data Exploration Toolkit for serial diffraction experiments Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many

  15. The structural simulation toolkit : a tool for bridging the

    Office of Scientific and Technical Information (OSTI)

    architectural/microarchitectural evaluation gap. (Conference) | SciTech Connect The structural simulation toolkit : a tool for bridging the architectural/microarchitectural evaluation gap. Citation Details In-Document Search Title: The structural simulation toolkit : a tool for bridging the architectural/microarchitectural evaluation gap. Abstract not provided. Authors: Murphy, Richard. ; Rodrigues, Arun F. ; Kogge, Peter [1] ; Underwood, Keith Douglas + Show Author Affiliations University

  16. The structural simulation toolkit :a tool for exploring parallel

    Office of Scientific and Technical Information (OSTI)

    architectures and applications. (Conference) | SciTech Connect structural simulation toolkit :a tool for exploring parallel architectures and applications. Citation Details In-Document Search Title: The structural simulation toolkit :a tool for exploring parallel architectures and applications. No abstract prepared. Authors: Kogge, Peter [1] ; Murphy, Richard C. ; Rodrigues, Arun F. ; Underwood, Keith Douglas + Show Author Affiliations (Univeristy of Notre Dame, Notre Dame, IN) Publication

  17. Performance Based Service Acquisition Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement and Acquisition » Guidance » Contracting for Support Services » Performance Based Service Acquisition Toolkit Performance Based Service Acquisition Toolkit Performance-based Service Acquisition (PBA) means an acquisition structured around the results to be achieved as opposed to the manner by which the work is to be performed. Performance-based Work Statement (PWS) means that a statement of work for performance-based acquisitions that describes the required results in clear,

  18. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  19. UQ Toolkit v 2.0

    Energy Science and Technology Software Center (OSTI)

    2013-10-03

    The Uncertainty Quantification (UQ) Toolkit is a software library for the characterizaton and propagation of uncertainties in computational models. For the characterization of uncertainties, Bayesian inference tools are provided to infer uncertain model parameters, as well as Bayesian compressive sensing methods for discovering sparse representations of high-dimensional input-output response surfaces, and also Karhunen-Loève expansions for representing stochastic processes. Uncertain parameters are treated as random variables and represented with Polynomial Chaos expansions (PCEs). The library implementsmore » several spectral basis function types (e.g. Hermite basis functions in terms of Gaussian random variables or Legendre basis functions in terms of uniform random variables) that can be used to represent random variables with PCEs. For propagation of uncertainty, tools are provided to propagate PCEs that describe the input uncertainty through the computational model using either intrusive methods (Galerkin projection of equations onto basis functions) or non-intrusive methods (perform deterministic operation at sampled values of the random values and project the obtained results onto basis functions).« less

  20. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  1. Validation of Power Output for the WIND Toolkit

    SciTech Connect (OSTI)

    King, J.; Clifton, A.; Hodge, B. M.

    2014-09-01

    Renewable energy integration studies require wind data sets of high quality with realistic representations of the variability, ramping characteristics, and forecast performance for current wind power plants. The Wind Integration National Data Set (WIND) Toolkit is meant to be an update for and expansion of the original data sets created for the weather years from 2004 through 2006 during the Western Wind and Solar Integration Study and the Eastern Wind Integration Study. The WIND Toolkit expands these data sets to include the entire continental United States, increasing the total number of sites represented, and it includes the weather years from 2007 through 2012. In addition, the WIND Toolkit has a finer resolution for both the temporal and geographic dimensions. Three separate data sets will be created: a meteorological data set, a wind power data set, and a forecast data set. This report describes the validation of the wind power data set.

  2. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  3. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agency through its Office of Research and Development (Interagency Agreement %23 DW8992192801). The material in this document has been subject to technical and policy review by the U.S. EPA, and approved for publication. The views expressed by individual authors, however, are their own, and do not necessarily reflect those of the U.S. Environmental Protection Agency. Mention of trade names, products, or services does not convey official U.S. EPA approval, endorsement, or recommendation. The Water Security Toolkit is an extension of the Threat Ensemble Vulnerability Assessment-Sensor Place- ment Optimization Tool (TEVA-SPOT), which was also developed with funding from the U.S. Environ- mental Protection Agency through its Office of Research and Development (Interagency Agreement %23 DW8992192801). The authors acknowledge the following individuals for their contributions to the devel- opment of TEVA-SPOT: Jonathan Berry (Sandia National Laboratories), Erik Boman (Sandia National Laboratories), Lee Ann Riesen (Sandia National Laboratories), James Uber (University of Cincinnati), and Jean-Paul Watson (Sandia National Laboratories). iii Acronyms ATUS American Time-Use Survey BLAS Basic linear algebra sub-routines CFU Colony-forming unit CVAR Conditional value at risk CWS Contamination warning system EA Evolutionary algorithm EDS Event detection system EPA U.S. Environmental Protection Agency EC Extent of Contamination ERD EPANET results database file GLPK GNU Linear Programming Kit GRASP Greedy randomized adaptive sampling process HEX Hexadecimal HTML HyperText markup language INP EPANET input file LP Linear program MC Mass consumed MILP Mixed integer linear program MIP Mixed integer program MSX Multi-species extension for EPANET NFD Number of failed detections NS Number of sensors NZD Non-zero demand PD Population dosed PE Population exposed PK Population killed TAI Threat assessment input file TCE Tailed-conditioned expectation TD Time to detection TEC Timed extent of contamination TEVA Threat ensemble vulnerability assessment TSB Tryptic soy broth TSG Threat scenario generation file TSI Threat simulation input file VAR Value at risk VC Volume consumed WST Water Security Toolkit YML YAML configuration file format for WST iv Symbols Notation Definition Example %7B , %7D set brackets %7B 1,2,3 %7D means a set containing the values 1,2, and 3. [?] is an element of s [?] S means that s is an element of the set S . [?] for all s = 1 [?] s [?] S means that the statement s = 1 is true for all s in set S . P summation P n i =1 s i means s 1 + s 2 + * * * + s n . %5C set minus S %5C T means the set that contains all those elements of S that are not in set T . %7C given %7C is used to define conditional probability. P ( s %7C t ) means the prob- ability of s occurring given that t occurs. %7C ... %7C cardinality Cardinality of a set is the number of elements of the set. If set S = %7B 2,4,6 %7D , then %7C S %7C = 3. v

  4. Incident Management Preparedness and Coordination Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability tomore » be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is used to provide various map displays for the Tasks and Maps panels. Unlike typical maps however, the OGV display is highly interactive and can be customized, automated, and animated to meet the needs of the user. It is also a means to both import and export geospatial data from or to existing GIS systems. The built-in simulation capability can be used as the basis of table-top exercises.« less

  5. Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    NREL developed the Geospatial Toolkit (GsT), a map-based software application that integrates resource data and geographic information systems (GIS) for integrated resource assessment. A variety of agencies within countries, along with global datasets, provided country-specific data. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Toolkits are available for 21 countries and each one can be downloaded separately. The source code for the toolkit is also available. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

  6. Capturing and Using Knowledge about the Use of Visualization Toolkits

    SciTech Connect (OSTI)

    Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

    2012-11-02

    When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

  7. Workplace Charging Toolkit: Example Events | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Example Events Workplace Charging Toolkit: Example Events This section provides links to previous successful workplace charging events. These link directly to the organization's website and contain event agendas and presentation materials. Workplace Charging for Electric Vehicles - Chicago Area Clean Cities Workplace Charging: Employer Policy and Cost Considerations - Chicago Area Clean Cities Drive Electric Northern Colorado Workplace Charging Challenge Launch - Northern Colorado Clean Cities

  8. Cubit Mesh Generation Toolkit V11.1

    Energy Science and Technology Software Center (OSTI)

    2009-03-25

    CUBIT prepares models to be used in computer-based simulation of real-world events. CUBIT is a full-featured software toolkit for robust generation of two- and three-dimensional finite element meshes (grids) and geometry preparation. Its main goal is to reduce the time to generate meshes, particularly large hex meshes of complicated, interlocking assemblies.

  9. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  10. Workplace Charging Toolkit: Workshop Best Practices | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Best Practices Workplace Charging Toolkit: Workshop Best Practices These best practices for planning, organizing, and executing a successful and educational workplace charging event have been developed based on lessons learned from more than 20 employer workplace charging events held across the U.S. between 2013 and 2015. Event Objective and Messaging Most workplace charging events fall into three major categories: stakeholder engagement, employer education, and employer recognition. Events

  11. Workplace Charging Toolkit: Workshop Outreach Templates | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Outreach Templates Workplace Charging Toolkit: Workshop Outreach Templates These templates have been developed based on lessons learned from more than 20 employer workplace charging events held across the U.S. between 2013 and 2015. Workshop Agenda Template - Develop a streamlined workshop with this half-day agenda focused on introductory-level PEV education and firsthand employer workplace charging experience. Workshop Host Outreach Letter Template - Approach employers in your

  12. Guide to Using the WIND Toolkit Validation Code

    SciTech Connect (OSTI)

    Lieberman-Cribbin, W.; Draxl, C.; Clifton, A.

    2014-12-01

    In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to provide information on wind speed, wind direction, temperature, surface air pressure, and air density on more than 126,000 locations across the United States from 2007 to 2013. The numerical weather prediction model output, gridded at 2-km and at a 5-minute resolution, was further converted to detail the wind power production time series of existing and potential wind facility sites. For users of the dataset it is important that the information presented in the WIND Toolkit is accurate and that errors are known, as then corrective steps can be taken. Therefore, we provide validation code written in R that will be made public to provide users with tools to validate data of their own locations. Validation is based on statistical analyses of wind speed, using error metrics such as bias, root-mean-square error, centered root-mean-square error, mean absolute error, and percent error. Plots of diurnal cycles, annual cycles, wind roses, histograms of wind speed, and quantile-quantile plots are created to visualize how well observational data compares to model data. Ideally, validation will confirm beneficial locations to utilize wind energy and encourage regional wind integration studies using the WIND Toolkit.

  13. LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline ...

    Open Energy Info (EERE)

    a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Key Actions for Low-Emission Development in Transportation...

  14. RAPID Toolkit: Facilitating Utility-Scale Renewable Energy Development; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    2015-04-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit provides information about permits and regulations that affect renewable energy and bulk transmission projects.

  15. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  16. The Wind Integration National Dataset (WIND) toolkit (Presentation)

    SciTech Connect (OSTI)

    Caroline Draxl: NREL

    2014-01-01

    Regional wind integration studies require detailed wind power output data at many locations to perform simulations of how the power system will operate under high penetration scenarios. The wind datasets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as being time synchronized with available load profiles.As described in this presentation, the WIND Toolkit fulfills these requirements by providing a state-of-the-art national (US) wind resource, power production and forecast dataset.

  17. Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit combines the former Geothermal Regulatory Roadmap, National Environmental Policy Act (NEPA) Database, and other resources into a Web-based tool that gives the regulatory and utility-scale geothermal developer communities rapid and easy access to permitting information. RAPID currently comprises five tools - Permitting Atlas, Regulatory Roadmap, Resource Library, NEPA Database, and Best Practices. A beta release of an additional tool, the Permitting Wizard, is scheduled for late 2014. Because of the huge amount of information involved, RAPID was developed in a wiki platform to allow industry and regulatory agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users. In 2014, the content was expanded to include regulatory requirements for utility-scale solar and bulk transmission development projects. Going forward, development of the RAPID Toolkit will focus on expanding the capabilities of current tools, developing additional tools, including additional technologies, and continuing to increase stakeholder involvement.

  18. Detect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Detect Detect Scientists and engineers develop detection technologies for every conceivable type of explosive under a variety of scenarios. v Detection technologies for every conceivable type of explosive Los Alamos scientists and engineers develop detection technologies for every conceivable type of explosive under a variety of scenarios. Detection methods range from trace and signature characterization to bulk detection and new methods that address homemade or esoteric explosives. Los Alamos

  19. Overview and Meteorological Validation of the Wind Integration National Dataset toolkit

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Clifton, A.; McCaa, J.

    2015-04-13

    The Wind Integration National Dataset (WIND) Toolkit described in this report fulfills these requirements, and constitutes a state-of-the-art national wind resource data set covering the contiguous United States from 2007 to 2013 for use in a variety of next-generation wind integration analyses and wind power planning. The toolkit is a wind resource data set, wind forecast data set, and wind power production and forecast data set derived from the Weather Research and Forecasting (WRF) numerical weather prediction model. WIND Toolkit data are available online for over 116,000 land-based and 10,000 offshore sites representing existing and potential wind facilities.

  20. Toolkit for Installing Solar on K-12 Schools | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit for Installing Solar on K-12 Schools Toolkit for Installing Solar on K-12 Schools Following the release of The Solar Foundation's Brighter Future: A Study on Solar in U.S. Schools under the Solar Outreach Partnership, the organization has been working to help more K-12 public schools go solar through its technical assistance program. As part of this effort, they developed the Toolkit for Installing Solar on K-12 Schools to compile new and existing resources, designed to provide public

  1. PHISICS TOOLKIT: MULTI-REACTOR TRANSMUTATION ANALYSIS UTILITY - MRTAU

    SciTech Connect (OSTI)

    Andrea Alfonsi; Cristian Rabiti; Aaron S. Epiney; Yaqi Wang; Joshua Cogliati

    2012-04-01

    The principal idea of this paper is to present the new capabilities available in the PHISICS toolkit, connected with the implementation of the depletion code MRTAU, a generic depletion/ decay/burn-up code developed at the Idaho National Laboratory. It is programmed in a modular structure and modern FORTRAN 95/2003. The code tracks the time evolution of the isotopic concentration of a given material accounting for nuclear reaction happening in presence of neutron flux and also due to natural decay. MRTAU has two different methods to perform the depletion calculation, in order to let the user choose the best one respect his needs. Both the methodologies and some significant results are reported in this paper.

  2. MeSh ToolKit v1.2

    Energy Science and Technology Software Center (OSTI)

    2004-05-15

    MSTK or Mesh Toolkit is a mesh framework that allows users to represent, manipulate and query unstructured 3D arbitrary topology meshes in a general manner without the need to code their own data structures. MSTK is a flexible framework in that is allows (or will eventually allow) a wide variety of underlying representations for the mesh while maintaining a common interface. It will allow users to choose from different mesh representations either at initialization ormoreduring the program execution so that the optimal data structures are used for the particular algorithm. The interaction of users and applications with MSTK is through a functional interface that acts as through the mesh always contains vertices, edges, faces and regions and maintains connectivity between all these entities.less

  3. Energy Department Announces Publication of Better Buildings Energy Data Accelerator Resources Toolkit

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy today announced the publication of a high-impact, informational resources toolkit through its Better Buildings Energy Data Accelerator developed in partnership with 18...

  4. Wind Integration National Dataset (WIND) Toolkit; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    Draxl, Caroline; Hodge, Bri-Mathias

    2015-07-14

    A webinar about the Wind Integration National Dataset (WIND) Toolkit was presented by Bri-Mathias Hodge and Caroline Draxl on July 14, 2015. It was hosted by the Southern Alliance for Clean Energy. The toolkit is a grid integration data set that contains meteorological and power data at a 5-minute resolution across the continental United States for 7 years and hourly power forecasts.

  5. The NetLogger Toolkit V2.0

    Energy Science and Technology Software Center (OSTI)

    2003-03-28

    The NetLogger Toolkit is designed to monitor, under actual operating conditions, the behavior of all the elements of the application-to-application communication path in order to determine exactly where time is spent within a complex system Using NetLogger, distnbuted application components are modified to produce timestamped logs of "interesting" events at all the critical points of the distributed system Events from each component are correlated, which allov^ one to characterize the performance of all aspects ofmore » the system and network in detail. The NetLogger Toolkit itself consists of four components an API and library of functions to simplify the generation of application-level event logs, a set of tools for collecting and sorting log files, an event archive system, and a tool for visualization and analysis of the log files In order to instrument an application to produce event logs, the application developer inserts calls to the NetLogger API at all the critical points in the code, then links the application with the NetLogger library All the tools in the NetLogger Toolkit share a common log format, and assume the existence of accurate and synchronized system clocks NetLogger messages can be logged using an easy-to-read text based format based on the lETF-proposed ULM format, or a binary format that can still be used through the same API but that is several times faster and smaller, with performance comparable or better than binary message formats such as MPI, XDR, SDDF-Binary, and PBIO. The NetLogger binary format is both highly efficient and self-describing, thus optimized for the dynamic message construction and parsing of application instrumentation. NetLogger includes an "activation" API that allows NetLogger logging to be turned on, off, or modified by changing an external file This IS useful for activating logging in daemons/services (e g GndFTP server). The NetLogger reliability API provides the ability to specify backup logging locations and penodically try to reconnect broken TCP pipe. A typical use for this is to store data on local disk while net is down. An event archiver can log one or more incoming NetLogger streams to a local disk file (netlogd) or to a mySQL database (netarchd). We have found exploratory, visual analysis of the log event data to be the most useful means of determining the causes of performance anomalies The NetLogger Visualization tool, niv, has been developed to provide a flexible and interactive graphical representation of system-level and application-level events.« less

  6. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:www.nnsa.energy.govmediaroompressreleasesncstateconsortium

  7. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  8. Microgrid Design Toolkit (MDT) Technical Documentation and Component Summaries

    SciTech Connect (OSTI)

    Arguello, Bryan; Gearhart, Jared Lee; Jones, Katherine A.; Eddy, John P.

    2015-09-01

    The Microgrid Design Toolkit (MDT) is a decision support software tool for microgrid designers to use during the microgrid design process. The models that support the two main capabilities in MDT are described. The first capability, the Microgrid Sizing Capability (MSC), is used to determine the size and composition of a new microgrid in the early stages of the design process. MSC is a mixed-integer linear program that is focused on developing a microgrid that is economically viable when connected to the grid. The second capability is focused on refining a microgrid design for operation in islanded mode. This second capability relies on two models: the Technology Management Optimization (TMO) model and Performance Reliability Model (PRM). TMO uses a genetic algorithm to create and refine a collection of candidate microgrid designs. It uses PRM, a simulation based reliability model, to assess the performance of these designs. TMO produces a collection of microgrid designs that perform well with respect to one or more performance metrics.

  9. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:nnsa.energy.govmediaroompressreleasesncstateconsortium

  10. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  11. XOP 2.1 - a new version of the x-ray optics software toolkit. (Conference)

    Office of Scientific and Technical Information (OSTI)

    | SciTech Connect XOP 2.1 - a new version of the x-ray optics software toolkit. Citation Details In-Document Search Title: XOP 2.1 - a new version of the x-ray optics software toolkit. No abstract prepared. Authors: Sanchez del Rio, M. ; Dejus, R. J. Publication Date: 2003-09-09 OSTI Identifier: 828855 Report Number(s): ANL/XFD/CP-111417 TRN: US0404349 DOE Contract Number: W-31-109-ENG-38 Resource Type: Conference Resource Relation: Conference: 8th International Conference on Synchrotron

  12. Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study

    SciTech Connect (OSTI)

    Wang, Na

    2013-03-13

    This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

  13. Toolkit Model for SN-03 Final Proposal (ratecases/sn03)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model SN CRAC ToolKit Model Variable, Flat SN CRAC, 80% TPP (TK187SN-03FS3BPA-PropVariableFlatSNN24-Jun-03.xls, 3.1 MB) Data Input Files (required to run the above...

  14. Phase 1 Development Report for the SESSA Toolkit.

    SciTech Connect (OSTI)

    Knowlton, Robert G.; Melton, Brad J; Anderson, Robert J.

    2014-09-01

    The Site Exploitation System for Situational Awareness ( SESSA ) tool kit , developed by Sandia National Laboratories (SNL) , is a comprehensive de cision support system for crime scene data acquisition and Sensitive Site Exploitation (SSE). SESSA is an outgrowth of another SNL developed decision support system , the Building R estoration Operations Optimization Model (BROOM), a hardware/software solution for data acquisition, data management, and data analysis. SESSA was designed to meet forensic crime scene needs as defined by the DoD's Military Criminal Investigation Organiza tion (MCIO) . SESSA is a very comprehensive toolki t with a considerable amount of database information managed through a Microsoft SQL (Structured Query Language) database engine, a Geographical Information System (GIS) engine that provides comprehensive m apping capabilities, as well as a an intuitive Graphical User Interface (GUI) . An electronic sketch pad module is included. The system also has the ability to efficiently generate necessary forms for forensic crime scene investigations (e.g., evidence submittal, laboratory requests, and scene notes). SESSA allows the user to capture photos on site, and can read and generate ba rcode labels that limit transcription errors. SESSA runs on PC computers running Windows 7, but is optimized for touch - screen tablet computers running Windows for ease of use at crime scenes and on SSE deployments. A prototype system for 3 - dimensional (3 D) mapping and measur e ments was also developed to complement the SESSA software. The mapping system employs a visual/ depth sensor that captures data to create 3D visualizations of an interior space and to make distance measurements with centimeter - level a ccuracy. Output of this 3D Model Builder module provides a virtual 3D %22walk - through%22 of a crime scene. The 3D mapping system is much less expensive and easier to use than competitive systems. This document covers the basic installation and operation of th e SESSA tool kit in order to give the user enough information to start using the tool kit . SESSA is currently a prototype system and this documentation covers the initial release of the tool kit . Funding for SESSA was provided by the Department of Defense (D oD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL) . ACKNOWLEDGEMENTS The authors wish to acknowledge the funding support for the development of the Site Exploitation System for Situational Awareness (SESSA) toolkit from the Department of Defense (DoD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL). Special thanks to Mr. Garold Warner, of DFSC, who served as the Project Manager. Individuals that worked on the design, functional attributes, algorithm development, system arc hitecture, and software programming include: Robert Knowlton, Brad Melton, Robert Anderson, and Wendy Amai.

  15. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  16. Voluntary Initiative: Partnership Toolkit, from the U.S. Department of Energy's Better Buildings initiative.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voluntary Initiative: Partnerships Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, non-profit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success. Definition Partnerships are relationships between two or more

  17. News Release: Advanced Network Toolkit for Assessments and Remote Mapping (ANTFARM)

    Office of Environmental Management (EM)

    No-Cost ANTFARM Tool Maps Control System Networks to Help Implement Cyber Security Standards Funded under the Department of Energy's National SCADA Test Bed Program, Sandia National Laboratories recently released a new software tool that will aid energy utility owners in mapping and visualizing their control system networks-a critical first step in meeting the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) standards. The Advanced Network Toolkit

  18. Better Buildings Residential Network Peer Exchange Call Series: Voluntary Initiative on Incentives: Toolkit Training Webinar Call Slides and Discussion Summary, March 26, 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voluntary Initiative on Incentives: Toolkit Training Webinar Call Slides and Discussion Summary March 26, 2015 Agenda  Call Logistics and Introductions  Opening Poll  Residential Network and Peer Exchange Call Overview  Poll on Incentives Experience  Designing Incentives Toolkit:  Toolkit Overview, Jonathan Cohen, U.S. DOE  Featured Speakers:  Brian Kennedy, Austin Energy  Dana Fischer, Efficiency Maine  Q&A and Discussion  Closing Poll 2 Call Participants

  19. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  20. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F. (Schenectady, NY); Buono, Donald P. (Schenectady, NY)

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  1. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  2. A toolkit for integrated deterministic and probabilistic assessment for hydrogen infrastructure.

    SciTech Connect (OSTI)

    Groth, Katrina; Tchouvelev, Andrei V.

    2014-03-01

    There has been increasing interest in using Quantitative Risk Assessment [QRA] to help improve the safety of hydrogen infrastructure and applications. Hydrogen infrastructure for transportation (e.g. fueling fuel cell vehicles) or stationary (e.g. back-up power) applications is a relatively new area for application of QRA vs. traditional industrial production and use, and as a result there are few tools designed to enable QRA for this emerging sector. There are few existing QRA tools containing models that have been developed and validated for use in small-scale hydrogen applications. However, in the past several years, there has been significant progress in developing and validating deterministic physical and engineering models for hydrogen dispersion, ignition, and flame behavior. In parallel, there has been progress in developing defensible probabilistic models for the occurrence of events such as hydrogen release and ignition. While models and data are available, using this information is difficult due to a lack of readily available tools for integrating deterministic and probabilistic components into a single analysis framework. This paper discusses the first steps in building an integrated toolkit for performing QRA on hydrogen transportation technologies and suggests directions for extending the toolkit.

  3. Modeling of a Flooding Induced Station Blackout for a Pressurized Water Reactor Using the RISMC Toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven R; Smith, Curtis L; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua J; Kinoshita, Robert A

    2011-07-01

    In the Risk Informed Safety Margin Characterization (RISMC) approach we want to understand not just the frequency of an event like core damage, but how close we are (or are not) to key safety-related events and how might we increase our safety margins. The RISMC Pathway uses the probabilistic margin approach to quantify impacts to reliability and safety by coupling both probabilistic (via stochastic simulation) and mechanistic (via physics models) approaches. This coupling takes place through the interchange of physical parameters and operational or accident scenarios. In this paper we apply the RISMC approach to evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., system activation) and to perform statistical analyses (e.g., run multiple RELAP-7 simulations where sequencing/timing of events have been changed according to a set of stochastic distributions). By using the RISMC toolkit, we can evaluate how power uprate affects the system recovery measures needed to avoid core damage after the PWR lost all available AC power by a tsunami induced flooding. The simulation of the actual flooding is performed by using a smooth particle hydrodynamics code: NEUTRINO.

  4. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  5. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  6. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  7. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code called NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.

  8. Advancements in Wind Integration Study Data Modeling: The Wind Integration National Dataset (WIND) Toolkit; Preprint

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Orwig, K.; Jones, W.; Searight, K.; Getman, D.; Harrold, S.; McCaa, J.; Cline, J.; Clark, C.

    2013-10-01

    Regional wind integration studies in the United States require detailed wind power output data at many locations to perform simulations of how the power system will operate under high-penetration scenarios. The wind data sets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as be time synchronized with available load profiles. The Wind Integration National Dataset (WIND) Toolkit described in this paper fulfills these requirements. A wind resource dataset, wind power production time series, and simulated forecasts from a numerical weather prediction model run on a nationwide 2-km grid at 5-min resolution will be made publicly available for more than 110,000 onshore and offshore wind power production sites.

  9. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code calledmore » NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.« less

  10. Multi-Physics Demonstration Problem with the SHARP Reactor Simulation Toolkit

    SciTech Connect (OSTI)

    Merzari, E.; Shemon, E. R.; Yu, Y. Q.; Thomas, J. W.; Obabko, A.; Jain, Rajeev; Mahadevan, Vijay; Tautges, Timothy; Solberg, Jerome; Ferencz, Robert Mark; Whitesides, R.

    2015-12-21

    This report describes to employ SHARP to perform a first-of-a-kind analysis of the core radial expansion phenomenon in an SFR. This effort required significant advances in the framework Multi-Physics Demonstration Problem with the SHARP Reactor Simulation Toolkit used to drive the coupled simulations, manipulate the mesh in response to the deformation of the geometry, and generate the necessary modified mesh files. Furthermore, the model geometry is fairly complex, and consistent mesh generation for the three physics modules required significant effort. Fully-integrated simulations of a 7-assembly mini-core test problem have been performed, and the results are presented here. Physics models of a full-core model of the Advanced Burner Test Reactor have also been developed for each of the three physics modules. Standalone results of each of the three physics modules for the ABTR are presented here, which provides a demonstration of the feasibility of the fully-integrated simulation.

  11. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral triggers to help focus the analysts attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  12. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  13. Detection and Analysis of Threatsto the Energy Sector (DATES), March 2010

    Broader source: Energy.gov [DOE]

    A security monitoring capability featuring multiple detection algorithms and cross-domain event correlation for defense against cyber attacks on energy control systems.

  14. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Environmental Management (EM)

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  15. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  16. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  17. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  18. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  19. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  20. Collaborative Defense of Transmission and Distribution Protection and Control Devices against Cyber Attacks (CODEF)

    Office of Environmental Management (EM)

    Collaborative Defense of Transmission and Distribution Protection and Control Devices against Cyber Attacks (CODEF) Real-time cybersecurity with power grid devices working together to validate commands and operations Background A cyber attack against a utility's sensor network could pose a risk of energy delivery disruption. For example, an attacker could attempt to maliciously control the operation of switching devices to weaken the state of a power system. Access to the utility network may

  1. Paint for detection of corrosion and warning of chemical and radiological attack

    DOE Patents [OSTI]

    Farmer, Joseph C. (Tracy, CA)

    2010-08-24

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  2. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  3. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  4. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  5. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  6. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  7. Design and Fabrication of Cherenkov Counters for the Detection of SNM

    SciTech Connect (OSTI)

    Erickson, Anna S.; Lanza, Richard; Galaitsis, Anthony; Hynes, Michael; Blackburn, Brandon; Bernstein, Adam

    2011-12-13

    The need for large-size detectors for long-range active interrogation (AI) detection of SNM has generated interest in water-based detector technologies. Water Cherenkov Detectors (WCD) were selected for this research because of their transportability, scalability, and an inherent energy threshold. The detector design and analysis was completed using the Geant4 toolkit. It was demonstrated both computationally and experimentally that it is possible to use WCD to detect and characterize gamma rays. Absolute efficiency of the detector (with no energy cuts applied) was determined to be around 30% for a {sup 60}Co source.

  8. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  9. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  10. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  11. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  12. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  13. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  14. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  15. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  16. Livermore Metagenomics Analysis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-10-01

    LMAT is designed to take as input a collection of raw metagenomic sequencer reads, and search each read against a reference genome database and assign a taxonomic label and confidence value to each read and report a summary of the predicted taxonomic contents of the metagenomic sample.

  17. Binary Optics Toolkit

    Energy Science and Technology Software Center (OSTI)

    1996-04-02

    This software is a set of tools for the design and analysis of binary optics. It consists of a series of stand-alone programs written in C and some scripts written in an application-specific language interpreted by a CAD program called DW2000. This software can be used to optimize the design and placement of a complex lens array from input to output and produce contours, mask designs, and data exported for diffractive optic analysis.

  18. MCS Systems Administration Toolkit

    Energy Science and Technology Software Center (OSTI)

    2001-09-30

    This package contains a number of systems administration utilities to assist a team of system administrators in managing a computer environment by automating routine tasks and centralizing information. Included are utilities to help install software on a network of computers and programs to make an image of a disk drive, to manage and distribute configuration files for a number of systems, and to run self-testss on systems, as well as an example of using amore » database to manage host information and various utilities.« less

  19. AISL Development Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-13

    AISLDT is a library of utility functions supporting other AISL software. Code provides various utility functions for Common Lisp, including an object-oriented database, distributed objects, logic query engine, web content management, chart drawing, packet sniffing, text processing, and various data structures.

  20. Pizza.py Toolkit

    Energy Science and Technology Software Center (OSTI)

    2006-01-01

    Pizza.py is a loosely integrated collection of tools, many of which provide support for the LAMMPS molecular dynamics and ChemCell cell modeling packages. There are tools to create input files. convert between file formats, process log and dump files, create plots, and visualize and animate simulation snapshots. Software packages that are wrapped by Pizza.py. so they can invoked from within Python, include GnuPlot, MatLab, Raster3d. and RasMol. Pizza.py is written in Python and runs onmore » any platform that supports Python. Pizza.py enhances the standard Python interpreter in a few simple ways. Its tools are Python modules which can be invoked interactively, from scripts, or from GUIs when appropriate. Some of the tools require additional Python packages to be installed as part of the users Python. Others are wrappers on software packages (as listed above) which must be available on the users system. It is easy to modify or extend Pizza.py with new functionality or new tools, which need not have anything to do with LAMMPS or ChemCell.« less

  1. Residential Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Events Expand News & Events Skip navigation links Residential Residential Lighting Energy Star Appliances Consumer Electronics Heat Pump Water Heaters Electric Storage Water...

  2. NREL Fleet Analysis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2006-12-31

    The software analyzes large time-dependent data sets from fleets of vehicles and their fueling infrastructure to characterize performance metrics including efficiency, durability, fueling rates and usage patterns.

  3. ppt-toolkit.com

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Spend by State - Fiscal Year 2014 Color Key: More than 1 million 300,000 to 1 million 100,000 to 300,000 5,000 to 100,000 Less than 5,000...

  4. Solar Site Survey Toolkit

    Broader source: Energy.gov [DOE]

    After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

  5. Portable Application Code Toolkit

    Energy Science and Technology Software Center (OSTI)

    2009-01-01

    PACT is a set of tools to help software developers create applications that will run on any platform and data that can be written/read on any platform.

  6. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  7. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  8. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  9. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  10. Detection Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chemistry for Measurement and Detection Science Chemistry for Measurement and Detection Science Project Description Chemistry used in measurement and detection science plays a crucial role in the Laboratory's Science of Signatures scientific thrust. Measurement and detection science areas that require chemistry include nuclear and radiological, materials, biological, energy, climate, and space. Los Alamos scientists integrate chemical-science capabilities to ensure that the Laboratory can

  11. Genomics-enabled sensor platform for rapid detection of viruses related to

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    disease outbreak. (Technical Report) | SciTech Connect Genomics-enabled sensor platform for rapid detection of viruses related to disease outbreak. Citation Details In-Document Search Title: Genomics-enabled sensor platform for rapid detection of viruses related to disease outbreak. Bioweapons and emerging infectious diseases pose growing threats to our national security. Both natural disease outbreak and outbreaks due to a bioterrorist attack are a challenge to detect, taking days after the

  12. Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)

    Office of Environmental Management (EM)

    and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffc. But existing IDS, often not tailored to the control

  13. Oak Ridge Bio-surveillance Toolkit (ORBiT): Integrating Big-Data Analytics with Visual Analysis for Public Health Dynamics

    SciTech Connect (OSTI)

    Ramanathan, Arvind; Pullum, Laura L; Steed, Chad A; Chennubhotla, Chakra; Quinn, Shannon

    2013-01-01

    In this position paper, we describe the design and implementation of the Oak Ridge Bio-surveillance Toolkit (ORBiT): a collection of novel statistical and machine learning tools implemented for (1) integrating heterogeneous traditional (e.g. emergency room visits, prescription sales data, etc.) and non-traditional (social media such as Twitter and Instagram) data sources, (2) analyzing large-scale datasets and (3) presenting the results from the analytics as a visual interface for the end-user to interact and provide feedback. We present examples of how ORBiT can be used to summarize ex- tremely large-scale datasets effectively and how user interactions can translate into the data analytics process for bio-surveillance. We also present a strategy to estimate parameters relevant to dis- ease spread models from near real time data feeds and show how these estimates can be integrated with disease spread models for large-scale populations. We conclude with a perspective on how integrating data and visual analytics could lead to better forecasting and prediction of disease spread as well as improved awareness of disease susceptible regions.

  14. detonation detection

    National Nuclear Security Administration (NNSA)

    7%2A en US Air Force Launches Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:nnsa.energy.govmediaroompressreleasesafsatellite

  15. detonation detection

    National Nuclear Security Administration (NNSA)

    Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:www.nnsa.energy.govmediaroompressreleasesafsatellite

  16. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  17. Evaporation a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Observatoire Midi-Pyrnes, Laboratoire Gosciences Environnement Toulouse, 14, avenue Edouard Belin, 31400 TOULOUSE ; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup ?1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup ?1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wettingdrying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the development of more sulfate-resistant concrete and concrete structures.

  18. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under

    Office of Scientific and Technical Information (OSTI)

    geologic sequestration conditions (Journal Article) | SciTech Connect Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Authors: Zhang, Liwei ; Dzombak, David A ; Nakles, David V ; Hawthorne, Steven B ; Miller, David J ; Kutchko, Barbara G ; Lopano, Christina L ; Strazisar, Brian R

  19. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  20. WeaselBoard : zero-day exploit detection for programmable logic controllers.

    SciTech Connect (OSTI)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  1. Fingerprint detection

    DOE Patents [OSTI]

    Saunders, George C. (Rt. 1, Box 428B, Espanola, NM 87532)

    1992-01-01

    A method for detection and visualization of latent fingerprints is provided and includes contacting a substrate containing a latent print thereon with a colloidal metal composition for time sufficient to allow reaction of said colloidal metal composition with said latent print, and preserving or recording the observable print. Further, the method for detection and visualization of latent fingerprints can include contacting the metal composition-latent print reaction product with a secondary metal-containing solution for time sufficient to allow precipitation of said secondary metal thereby enhancing the visibility of the latent print, and preserving or recording the observable print.

  2. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  3. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  4. The U.S. Nuclear Detonation Detection Syst

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U.S. Nuclear Detonation Detection System (NDS), which uses satellite-borne sensors to watch for nuclear explosions, can spot a nuclear attack anywhere in the world. One of the NDS sensors is a "bhangmeter" (pronounced BANG-meter), developed by Edgerton, Germeshausen, and Grier, Inc. (now EG&G) in 1948 at the request of Los Alamos scientists. The bhangmeter's job is to detect a nuclear explosion's telltale double flash of light and send a signal to NDS ground stations manned by the

  5. Genomics-enabled sensor platform for rapid detection of viruses related to

    Office of Scientific and Technical Information (OSTI)

    disease outbreak. (Technical Report) | SciTech Connect SciTech Connect Search Results Technical Report: Genomics-enabled sensor platform for rapid detection of viruses related to disease outbreak. Citation Details In-Document Search Title: Genomics-enabled sensor platform for rapid detection of viruses related to disease outbreak. Bioweapons and emerging infectious diseases pose growing threats to our national security. Both natural disease outbreak and outbreaks due to a bioterrorist attack

  6. Detection device

    DOE Patents [OSTI]

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  7. Detection device

    DOE Patents [OSTI]

    Smith, Jay E.

    1984-01-01

    The present invention is directed to a detection device comprising: (1) an entrance chamber, (2) a central chamber, and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  8. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  9. Spectroscopic detection

    DOE Patents [OSTI]

    Woskov, Paul P. (Bedford, MA); Hadidi, Kamal (Cambridge, MA)

    2003-01-01

    In embodiments, spectroscopic monitor monitors modulated light signals to detect low levels of contaminants and other compounds in the presence of background interference. The monitor uses a spectrometer that includes a transmissive modulator capable of causing different frequency ranges to move onto and off of the detector. The different ranges can include those with the desired signal and those selected to subtract background contributions from those with the desired signal. Embodiments of the system are particularly useful for monitoring metal concentrations in combustion effluent.

  10. Evaluation of chiller modeling approaches and their usability for fault detection

    SciTech Connect (OSTI)

    Sreedharan, Priya

    2001-05-01

    Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Several factors must be considered in model evaluation, including accuracy, training data requirements, calibration effort, generality, and computational requirements. All modeling approaches fall somewhere between pure first-principles models, and empirical models. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression air conditioning units, which are commonly known as chillers. Three different models were studied: two are based on first-principles and the third is empirical in nature. The first-principles models are the Gordon and Ng Universal Chiller model (2nd generation), and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles. The DOE-2 chiller model as implemented in CoolTools{trademark} was selected for the empirical category. The models were compared in terms of their ability to reproduce the observed performance of an older chiller operating in a commercial building, and a newer chiller in a laboratory. The DOE-2 and Gordon-Ng models were calibrated by linear regression, while a direct-search method was used to calibrate the Toolkit model. The ''CoolTools'' package contains a library of calibrated DOE-2 curves for a variety of different chillers, and was used to calibrate the building chiller to the DOE-2 model. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as long as one of the previously identified models in the CoolTools library matches the performance of the chiller in question.

  11. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  12. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia,...

  13. BioenergizeME Virtual Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... students in designing their own. * POET-DSM: Project LIBERTY * Abengoa Biorefinery * ... IMAGE RESOURCES 10 DOEEE-1139 | published 92215 11 APPENDIX A GOAL: SOCIAL MEDIA ...

  14. Voluntary Initiative: Designing Incentives Toolkit

    Broader source: Energy.gov [DOE]

    Design incentives that motivate potential customers to act by lowering the risk, decreasing the cost, or offering additional benefits of home energy upgrades.

  15. Model Analysis ToolKit

    Energy Science and Technology Software Center (OSTI)

    2015-05-15

    MATK provides basic functionality to facilitate model analysis within the Python computational environment. Model analysis setup within MATK includes: - define parameters - define observations - define model (python function) - define samplesets (sets of parameter combinations) Currently supported functionality includes: - forward model runs - Latin-Hypercube sampling of parameters - multi-dimensional parameter studies - parallel execution of parameter samples - model calibration using internal Levenberg-Marquardt algorithm - model calibration using lmfit package - modelmore » calibration using levmar package - Markov Chain Monte Carlo using pymc package MATK facilitates model analysis using: - scipy - calibration (scipy.optimize) - rpy2 - Python interface to R« less

  16. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Company Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide...

  17. Advanced Network Toolkit for Assessments

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    control system network * Compiles and correlates large amounts of network data with minimal risk of system latency or disruption * Assists compliance with NERC CIP standards * ...

  18. Smoke detection

    DOE Patents [OSTI]

    Warmack, Robert J. Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-10-27

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  19. Smoke detection

    DOE Patents [OSTI]

    Warmack, Robert J Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-11-05

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  20. Radon detection

    DOE Patents [OSTI]

    MacArthur, Duncan W. (Los Alamos, NM); Allander, Krag S. (Ojo Caliente, NM); Bounds, John A. (Los Alamos, NM)

    1994-01-01

    A detector for atmospheric radon using a long range alpha detector as its sensing element. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding.

  1. Radon detection

    DOE Patents [OSTI]

    MacArthur, D.W.; Allander, K.S.; Bounds, J.A.

    1994-01-25

    A detector for atmospheric radon using a long range alpha detector as its sensing element is described. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding. 3 figures.

  2. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: Snail1 protects breast cancer cells from hypoxia. Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. Snail/?-catenin signaling is negatively controlled by the energy sensor AMPK. The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  3. Identification of the meiotic toolkit in diatoms and exploration of meiosis-specific SPO11 and RAD51 homologs in the sexual species Pseudo-nitzschia multistriata and Seminavis robusta

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Patil, Shrikant; Moeys, Sara; von Dassow, Peter; Huysman, Marie J. J.; Mapleson, Daniel; De Veylder, Lieven; Sanges, Remo; Vyverman, Wim; Montresor, Marina; Ferrante, Maria Immacolata

    2015-11-14

    Sexual reproduction is an obligate phase in the life cycle of most eukaryotes. Meiosis varies among organisms, which is reflected by the variability of the gene set associated to the process. Diatoms are unicellular organisms that belong to the stramenopile clade and have unique life cycles that can include a sexual phase. The exploration of five diatom genomes and one diatom transcriptome led to the identification of 42 genes potentially involved in meiosis. While these include the majority of known meiosis-related genes, several meiosis-specific genes, including DMC1, could not be identified. Furthermore, phylogenetic analyses supported gene identification and revealed ancestralmore » loss and recent expansion in the RAD51 family in diatoms. The two sexual species Pseudo-nitzschia multistriata and Seminavis robusta were used to explore the expression of meiosis-related genes: RAD21, SPO11-2, RAD51-A, RAD51-B and RAD51-C were upregulated during meiosis, whereas other paralogs in these families showed no differential expression patterns, suggesting that they may play a role during vegetative divisions. An almost identical toolkit is shared among Pseudo-nitzschia multiseries and Fragilariopsis cylindrus, as well as two species for which sex has not been observed, Phaeodactylum tricornutum and Thalassiosira pseudonana, suggesting that these two may retain a facultative sexual phase. Lastly, our results reveal the conserved meiotic toolkit in six diatom species and indicate that Stramenopiles share major modifications of canonical meiosis processes ancestral to eukaryotes, with important divergences in each Kingdom.« less

  4. AZALIA: an A to Z Assessment of the Likelihood of Insider Attack

    SciTech Connect (OSTI)

    Bishop, Matt; Gates, Carrie; Frincke, Deborah A.; Greitzer, Frank L.

    2009-05-12

    Recent surveys indicate that the ``financial impact and operating losses due to insider intrusions are increasing'' . Within the government, insider abuse by those with access to sensitive or classified material can be particularly damaging. Further, the detection of such abuse is becoming more difficult due to other influences, such as out-sourcing, social networking and mobile computing. This paper focuses on a key aspect of our enterprise-wide architecture: a risk assessment based on predictions of the likelihood that a specific user poses an increased risk of behaving in a manner that is inconsistent with the organizations stated goals and interests. We present a high-level architectural description for an enterprise-level insider threat product and we describe psychosocial factors and associated data needs to recognize possible insider threats.

  5. How to Detect Radiation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    How to Detect Radiation How to Survey Measurement Safety Around Radiation Sources Types of Radiation Exposure Managing Radiation Emergencies Procedure Demonstration Detection How to Detect Radiation Radiation cannot be detected by human senses. A variety of instruments are available for detecting and measuring radiation. Examples of radiation survey meters: photos of survey meters alphacounter1.JPG (28857 bytes) This probe is used for the detection of alpha radiation. The most common type of

  6. Using new edges for anomaly detection in computer networks

    DOE Patents [OSTI]

    Neil, Joshua Charles

    2015-05-19

    Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed. Baseline models of behavior among the edges in the network may be established based on the analysis of the historical data. A new edge that deviates from a respective baseline model by more than a predetermined threshold during a time window may be detected. The new edge may be flagged as potentially anomalous when the deviation from the respective baseline model is detected. Probabilities for both new and existing edges may be obtained for all edges in a path or other subgraph. The probabilities may then be combined to obtain a score for the path or other subgraph. A threshold may be obtained by calculating an empirical distribution of the scores under historical conditions.

  7. Portable modular detection system

    DOE Patents [OSTI]

    Brennan, James S. (Rodeo, CA); Singh, Anup (Danville, CA); Throckmorton, Daniel J. (Tracy, CA); Stamps, James F. (Livermore, CA)

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  8. Advancing Explosives Detection Capabilities: Vapor Detection

    SciTech Connect (OSTI)

    Atkinson, David

    2012-10-15

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  9. Advancing Explosives Detection Capabilities: Vapor Detection

    ScienceCinema (OSTI)

    Atkinson, David

    2014-07-24

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  10. Predicting and Detecting Emerging Cyberattack Patterns Using StreamWorks

    SciTech Connect (OSTI)

    Chin, George; Choudhury, Sutanay; Feo, John T.; Holder, Larry

    2014-06-30

    The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network. Such cyberattack graphs could provide cybersecurity analysts with powerful conceptual representations that are natural to express and analyze. We have been researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection. The advanced dynamic graph algorithms we are developing will be packaged into a streaming network analysis framework known as StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns. The scalable emerging subgraph pattern algorithms will match on both structural and semantic network properties.

  11. Revolution in Detection Affairs

    SciTech Connect (OSTI)

    Stern W.

    2013-11-02

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  12. Sandia Network Intrusion Detection Assessment Version 1.0

    Energy Science and Technology Software Center (OSTI)

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusionmore » detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a complete solution set has been assembled. Operators are organized in a tree-like hierarchy to allow complex logic to be specified, and can be nestd to an arbitrary depth.« less

  13. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  14. Interactive Activity Detection Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Activity Detection Tools Interactive Activity Detection Tools Tools for detecting specified activities in video data provide a key intelligence capability. High numbers of false alarms, however, reduce tool effectiveness and analyst patience. User feedback reduces false alarms * This project will reduce the number of false alarms generated by activity detection tools (including single vehicle start / stop, multi-vehicle meetings and coordinated driving patterns) by exploiting user feedback in a

  15. When Utility Bills Attack!

    Broader source: Energy.gov [DOE]

    As proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills.

  16. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: Decision-making, prioritization, and command and control Public health/medical services Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: Local representation in the Joint Field Office (JFO) JFO transition to the Long-Term Recovery Office Process for prioritization of needs Process for regional coordination Prioritization - process and federal/military intervention Allocation of limited resources Re-entry decision and consistency Importance of maintaining a healthy hospital system Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. Insurance coverage for both private businesses and individuals Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the programs efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  17. DETECTION OF PROPENE IN TITAN'S STRATOSPHERE

    SciTech Connect (OSTI)

    Nixon, C. A.; Flasar, F. M.; Jennings, D. E.; Bzard, B.; Vinatier, S.; Coustenis, A.; Teanby, N. A.; Sung, K.; Ansty, T. M.; Irwin, P. G. J.; Gorius, N.; Cottini, V.

    2013-10-10

    The Voyager 1 flyby of Titan in 1980 gave a first glimpse of the chemical complexity of Titan's atmosphere, detecting many new molecules with the infrared interferometer spectrometer (IRIS). These included propane (C{sub 3}H{sub 8}) and propyne (CH{sub 3}C{sub 2}H), while the intermediate-sized C{sub 3}H {sub x} hydrocarbon (C{sub 3}H{sub 6}) was curiously absent. Using spectra from the Composite Infrared Spectrometer on Cassini, we show the first positive detection of propene (C{sub 3}H{sub 6}) in Titan's stratosphere (5? significance), finally filling the three-decade gap in the chemical sequence. We retrieve a vertical abundance profile from 100-250 km, that varies slowly with altitude from 2.0 0.8 ppbv at 125 km, to 4.6 1.5 ppbv at 200 km. The abundance of C{sub 3}H{sub 6} is less than both C{sub 3}H{sub 8} and CH{sub 3}C{sub 2}H, and we remark on an emerging paradigm in Titan's hydrocarbon abundances whereby alkanes > alkynes > alkenes within the C{sub 2}H {sub x} and C{sub 3}H {sub x} chemical families in the lower stratosphere. More generally, there appears to be much greater ubiquity and relative abundance of triple-bonded species than double-bonded, likely due to the greater resistance of triple bonds to photolysis and chemical attack.

  18. Sulfide chemiluminescence detection

    DOE Patents [OSTI]

    Spurlin, Stanford R. (Ames, IA); Yeung, Edward S. (Ames, IA)

    1985-01-01

    A method of chemiluminescently determining a sulfide which is either hydrogen sulfide or methyl mercaptan by reacting the sulfide with chlorine dioxide at low pressure and under conditions which allow a longer reaction time in emission of a single photon for every two sulfide containing species, and thereafter, chemiluminescently detecting and determining the sulfide. The invention also relates not only to the detection method, but the novel chemical reaction and a specifically designed chemiluminescence detection cell for the reaction.

  19. Sulfide chemiluminescence detection

    DOE Patents [OSTI]

    Spurlin, S.R.; Yeung, E.S.

    1985-11-26

    A method is described for chemiluminescently determining a sulfide which is either hydrogen sulfide or methyl mercaptan by reacting the sulfide with chlorine dioxide at low pressure and under conditions which allow a longer reaction time in emission of a single photon for every two sulfide containing species, and thereafter, chemiluminescently detecting and determining the sulfide. The invention also relates not only to the detection method, but the novel chemical reaction and a specifically designed chemiluminescence detection cell for the reaction. 4 figs.

  20. Fast Neutron Detection Evaluation

    SciTech Connect (OSTI)

    McKigney, Edward A.; Stange, Sy

    2014-03-17

    These slides present a summary of previous work, conclusions, and anticipated schedule for the conclusion of our fast neutron detection evaluation.

  1. Neutron detection apparatus

    DOE Patents [OSTI]

    Kopp, Manfred K.; Valentine, Kenneth H.

    1983-01-01

    An atomic fission counting apparatus used for neutron detection is provided with spirally curved electrode plates uniformly spaced apart in a circular array and coated with fissile material.

  2. Lean blowoff detection sensor

    DOE Patents [OSTI]

    Thornton, Jimmy (Morgantown, WV); Straub, Douglas L. (Morgantown, WV); Chorpening, Benjamin T. (Morgantown, WV); Huckaby, David (Morgantown, WV)

    2007-04-03

    Apparatus and method for detecting incipient lean blowoff conditions in a lean premixed combustion nozzle of a gas turbine. A sensor near the flame detects the concentration of hydrocarbon ions and/or electrons produced by combustion and the concentration monitored as a function of time are used to indicate incipient lean blowoff conditions.

  3. GROUNDWATER/LEAK DETECTION

    Office of Legacy Management (LM)

    Attachment C Groundwater/Leak Detection and Leachate Monitoring Plan This page intentionally left blank U.S. Department of Energy Comprehensive Legacy Management and Institutional Controls Plan Doc. No. S03496-8.0-Final Attachment C-Groundwater/Leak Detection and Leachate Monitoring Plan January 2015 Page i Contents Abbreviations ................................................................................................................................. iii 1.0 Introduction

  4. Array for detecting microbes

    DOE Patents [OSTI]

    Andersen, Gary L.; DeSantis, Todd D.

    2014-07-08

    The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

  5. Leak detection aid

    DOE Patents [OSTI]

    Steeper, T.J.

    1989-12-26

    A leak detection apparatus and method for detecting leaks across an O-ring sealing a flanged surface to a mating surface is an improvement in a flanged surface comprising a shallow groove following O-ring in communication with an entrance and exit port intersecting the shallow groove for injecting and withdrawing, respectively, a leak detection fluid, such as helium. A small quantity of helium injected into the entrance port will flow to the shallow groove, past the O-ring and to the exit port. 2 figs.

  6. Composition for detecting uranyl

    DOE Patents [OSTI]

    Baylor, Lewis C. (North Augusta, SC); Stephens, Susan M. (Athens, GA)

    1995-01-01

    A composition for detecting the presence and concentration of a substance such as uranyl, comprising an organohalide covalently bonded to an indicator for said substance. The composition has at least one active OH site for forming a complex with the substance to be detected. The composition is made by reacting equimolar amounts of the indicator and the organohalide in a polar organic solvent. The absorbance spectrum of the composition-uranyl complex is shifted with respect to the absorbance spectrum of the indicator-uranyl complex, to provide better spectral resolution for detecting uranyl.

  7. Leak detection aid

    DOE Patents [OSTI]

    Steeper, Timothy J. (Graniteville, SC)

    1989-01-01

    A leak detection apparatus and method for detecting leaks across an O-ring sealing a flanged surface to a mating surface is an improvement in a flanged surface comprising a shallow groove following O-ring in communication with an entrance and exit port intersecting the shallow groove for injecting and withdrawing, respectively, a leak detection fluid, such as helium. A small quantity of helium injected into the entrance port will flow to the shallow groove, past the O-ring and to the exit port.

  8. Bolt failure detection

    DOE Patents [OSTI]

    Sutton, Jr., Harry G. (Pittsburgh, PA)

    1984-01-01

    Bolts of a liquid metal fast breeder reactor, each bolt provided with an internal chamber filled with a specific, unique radioactive tag gas. Detection of the tag gas is indicative of a crack in an identifiable bolt.

  9. Idaho Explosive Detection System

    ScienceCinema (OSTI)

    Klinger, Jeff

    2013-05-28

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  10. Detection of counterfeit currency

    DOE Patents [OSTI]

    Burns, Donald A. (Los Alamos, NM)

    1998-01-01

    A method of detecting counterfeit currency by contacting the currency to be tested with near infrared beams in the spectrum below 1250 namometers, measuring reflectance of the near infrared beams and comparing the reflectance values with those from genuine currency.

  11. Explosive Detection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-26

    To standardize and accelerate implementation of the Department of Energy (DOE) explosive detection program. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01.

  12. Photovoltaic System Fault Detection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Photovoltaic System Fault Detection and Diagnostics using Laterally Primed Adaptive Resonance Theory Neural Network C. Birk Jones, Joshua S. Stein, Sigifredo Gonzalez, and Bruce H. King Sandia National Laboratories, Albuquerque, NM, 87185, U.S.A Abstract-Cost effective integration of solar photovoltaic (PV) systems requires increased reliability. This can be achieved with a robust fault detection and diagnostic (FDD) tool that auto- matically discovers faults. This paper introduces the Laterally

  13. LEDSGP/DIA-Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Search for Tools Find resources to develop strategies for: Economic growth Reduced poverty Increased jobs Improved energy access Enhanced health Other sustainable developments...

  14. Land Use Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Evaluate public and private sector capacity (e.g., institutional, governance, financial) to support initiatives Assess biophysical and economic potential for these...

  15. Community Wind Toolkit | Open Energy Information

    Open Energy Info (EERE)

    American tribes, universities, cooperatives, or any other local entity seeking to invest in wind energy. Community wind projects may be a single turbine or multi-megawatt...

  16. Rapid Deployment Energy Efficiency (RDEE) Toolkit

    SciTech Connect (OSTI)

    none,

    2009-12-09

    Provides detailed program design and implementation guides to help entities choose successful efficiency programs with funds from the American Recovery and Reinvestment Act of 2009.

  17. Machine Learning Toolkit for Extreme Scale

    Energy Science and Technology Software Center (OSTI)

    2014-03-31

    Support Vector Machines (SVM) is a popular machine learning technique, which has been applied to a wide range of domains such as science, finance, and social networks for supervised learning. MaTEx undertakes the challenge of designing a scalable parallel SVM training algorithm for large scale systems, which includes commodity multi-core machines, tightly connected supercomputers and cloud computing systems. Several techniques are proposed for improved speed and memory space usage including adaptive and aggressive elimination ofmore » samples for faster convergence , and sparse format representation of data samples. Several heuristics for earliest possible to lazy elimination of non-contributing samples are considered in MaTEx. In many cases, where an early sample elimination might result in a false positive, low overhead mechanisms for reconstruction of key data structures are proposed. The proposed algorithm and heuristics are implemented and evaluated on various publicly available datasets« less

  18. Transportation Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    development and growth Is equitable Respects and preserves local cultural and natural landmarks Well-designed transport systems enable economic development and growth by:...

  19. Performance Based Service Acquisition Toolkit | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FAR 7.105 - Contents of Written Acquisition Plans FAR Subpart 16.505 - Ordering (Performance Based Task Orders) FAR Subpart 36.102 - Policy (PBC Preference) FAR Subpart 37.6 - ...

  20. Pervasive Collaboratorive Computing Environment Jabber Toolkit

    Energy Science and Technology Software Center (OSTI)

    2004-05-15

    PCCE Project background: Our experience in building distributed collaboratories has shown us that there is a growing need for simple, non-intrusive, and flexible ways to stay in touch and work together. Towards this goal we are developing a Pervasive Collaborative Computing Environment (PCCE) within which participants can rendezvous and interact with each other. The PCCE aims to support continuous or ad hoc collaboration, target daily tasks and base connectivity, be easy to use and installmore » across multiple platforms, leverage off of existing components when possible, use standards-based components, and leverage off of Grid services (e.g., security and directory services). A key concept for this work is "incremental trust", which allows the system's "trust" of a given user to change dynamically. PCCE Jabber client software: This leverages Jabber. an open Instant Messaging (IM) protocol and the related Internet Engineering Task Force (IETF) standards "XMPP" and "XMPP-IM" to allow collaborating parties to chat either one-on-one or in "chat rooms". Standard Jabber clients will work within this framework, but the software will also include extensions to a (multi-platform) GUI client (Gaim) for X.509-based security, search, and incremental trust. This software also includes Web interfaces for managing user registration to a Jabber server. PCCE Jabber server software: Extensions to the code, database, and configuration files for the dominant open-source Jabber server, "jabberd". Extensions for search, X.509 security, and incremental trust. Note that the jabberd software is not included as part of this software.« less

  1. Voluntary Initiative: Partnerships Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and their partners, including utilities, state and local governments, non-profit organizations, and for-profit companies, but no matter which sector delivers the program, ...

  2. Bioenergy Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    intended to provide a practical, common methodology for measuring and recording the consumption and supply of biomass energy. It mainly emphasizes traditional bioenergy use, but...

  3. LEDSGP/Transportation Toolkit | Open Energy Information

    Open Energy Info (EERE)

    the six key actions necessary to successfully implement a low emission development strategy for the transportation sector. Icon evaluate system.png Evaluate System LEDS icon...

  4. Wind Working Group Toolkit | Open Energy Information

    Open Energy Info (EERE)

    wind energy costs and impacts to neighbors and the environment. At the same time, the benefits of wind energy and diversity of possible applications have continued to increase....

  5. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Environmental Management (EM)

    & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Better Buildings Network View | March 2015 Spotlight on Austin, Texas: Best...

  6. Impact Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Modeling the Global Trade and Environmental Impacts of Biofuel Policies Modified Microgrid Concept for Rural Electrification in Africa NREL-How to Estimate the Economic...

  7. Category:Transportation Toolkits | Open Energy Information

    Open Energy Info (EERE)

    following 135 pages are in this category, out of 135 total. A A Report on Worldwide Hydrogen Bus Demonstrations, 2002-2007 A Review of HOV Lane Performance and Policy Options in...

  8. Market Analysis Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Antigua and Barbuda-Regional Implementation Plan for CARICOM's Climate Change Resilience Framework Bahamas-Regional Implementation Plan for CARICOM's Climate Change...

  9. Coordinated Low Emissions Assistance Network toolkit search

    Open Energy Info (EERE)

    Planning Are we missing something? Add a Tool software models, databases, training materials, publications Add a Program climate-related activites or strategies How to search the...

  10. Financing Initiatives Toolkit | Open Energy Information

    Open Energy Info (EERE)

    wind, and geothermal technologies, respectively. CREST was originally designed for the U.S. market but could be applied elsewhere if metric conversations are made (e.g., currency...

  11. Category:RAPID Toolkit | Open Energy Information

    Open Energy Info (EERE)

    and Permitting RAPIDBulkTransmission RAPIDBulkTransmissionAbout RAPIDBulkTransmissionAir Quality RAPIDBulkTransmissionAlaska RAPIDBulkTransmissionArizona RAPID...

  12. Wind Integration National Dataset (WIND) Toolkit

    Broader source: Energy.gov [DOE]

    For utility companies, grid operators and other stakeholders interested in wind energy integration, collecting large quantities of high quality data on wind energy resources is vitally important....

  13. Low Emission Development Strategies toolkit search

    Open Energy Info (EERE)

    search tools and programs in relation to relevant questions, sector, geography, LEDS methodology stage, analytical needs, and other search terms. The country cloud to the right...

  14. LEDS Toolkit and Framework | Open Energy Information

    Open Energy Info (EERE)

    User Interface: Website, Desktop Application Website: en.openei.orgappsLEDS Cost: Free UN Region: Central Asia, Eastern Asia, South-Eastern Asia, "Pacific" is not in the list...

  15. Workplace Charging Toolkit: Workshop Outreach Presentation Template |

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Educate workshop attendees and employers about the benefits of workplace charging and the Challenge by selecting slides from this sample presentation. File General Workshop Outreach Presentation Template File Clean Cities Branded Workshop Outreach Presentation Template More Documents & Publications Workplace Charging Presentation Workplace Charging Challenge Summit 2014: Session 1, Track A Workplace Charging Challenge Overview Factsheet

  16. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, P.M.

    1986-04-22

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions. 2 figs.

  17. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, Peter M.

    1986-01-01

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions.

  18. Tampering detection system using quantum-mechanical systems

    DOE Patents [OSTI]

    Humble, Travis S. (Knoxville, TN); Bennink, Ryan S. (Knoxville, TN); Grice, Warren P. (Oak Ridge, TN)

    2011-12-13

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  19. Error detection method

    DOE Patents [OSTI]

    Olson, Eric J.

    2013-06-11

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  20. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, Robert B. (Wheatridge, CO); Pruett, Jr., James C. (Lakewood, CO)

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  1. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  2. Composition for detecting uranyl

    DOE Patents [OSTI]

    Baylor, L.C.; Stephens, S.M.

    1994-01-01

    The present invention relates to an indicator composition for use in spectrophotometric detection of a substance in a solution, and a method for making the composition. Useful indicators are sensitive to the particular substance being measured, but are unaffected by the fluid and other chemical species that may be present in the fluid. Optical indicators are used to measure the uranium concentration of process solutions in facilities for extracting uranium from ores, production of nuclear fuels, and reprocessing of irradiated fuels. The composition comprises an organohalide covalently bonded to an indicator for the substance, in such a manner that the product is itself an indicator that provides increased spectral resolution for detecting the substance. The indicator is preferably arsenazo III and the organohalide is preferably cyanuric chloride. These form a composition that is ideally suited for detecting uranyl.

  3. Nucleic acid detection kits

    DOE Patents [OSTI]

    Hall, Jeff G.; Lyamichev, Victor I.; Mast, Andrea L.; Brow, Mary Ann; Kwiatkowski, Robert W.; Vavra, Stephanie H.

    2005-03-29

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof. The present invention further relates to methods and devices for the separation of nucleic acid molecules based on charge. The present invention also provides methods for the detection of non-target cleavage products via the formation of a complete and activated protein binding region. The invention further provides sensitive and specific methods for the detection of nucleic acid from various viruses in a sample.

  4. Relating to ion detection

    DOE Patents [OSTI]

    Orr, Christopher Henry (Calderbridge, GB); Luff, Craig Janson (Calderbridge, GB); Dockray, Thomas (Calderbridge, GB); Macarthur, Duncan Whittemore (Los Alamos, NM)

    2001-01-01

    The apparatus and method provide a technique for improving detection of alpha and/or beta emitting sources on items or in locations using indirect means. The emission forms generate ions in a medium surrounding the item or location and the medium is then moved to a detecting location where the ions are discharged to give a measure of the emission levels. To increase the level of ions generated and render the system particularly applicable for narrow pipes and other forms of conduits, the medium pressure is increased above atmospheric pressure. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

  5. Detection of solar events

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2013-08-27

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  6. Detection of neutrinos

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2014-02-04

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  7. Portable pathogen detection system

    DOE Patents [OSTI]

    Colston, Billy W.; Everett, Matthew; Milanovich, Fred P.; Brown, Steve B.; Vendateswaran, Kodumudi; Simon, Jonathan N.

    2005-06-14

    A portable pathogen detection system that accomplishes on-site multiplex detection of targets in biological samples. The system includes: microbead specific reagents, incubation/mixing chambers, a disposable microbead capture substrate, and an optical measurement and decoding arrangement. The basis of this system is a highly flexible Liquid Array that utilizes optically encoded microbeads as the templates for biological assays. Target biological samples are optically labeled and captured on the microbeads, which are in turn captured on an ordered array or disordered array disposable capture substrate and then optically read.

  8. Nitrogen dioxide detection

    DOE Patents [OSTI]

    Sinha, Dipen N. (Los Alamos, NM); Agnew, Stephen F. (Los Alamos, NM); Christensen, William H. (Buena Park, CA)

    1993-01-01

    Method and apparatus for detecting the presence of gaseous nitrogen dioxide and determining the amount of gas which is present. Though polystyrene is normally an insulator, it becomes electrically conductive in the presence of nitrogen dioxide. Conductance or resistance of a polystyrene sensing element is related to the concentration of nitrogen dioxide at the sensing element.

  9. Detection of counterfeit currency

    DOE Patents [OSTI]

    Burns, D.A.

    1998-05-26

    A method is disclosed of detecting counterfeit currency by contacting the currency to be tested with near infrared beams in the spectrum below 1,250 nanometers, measuring reflectance of the near infrared beams and comparing the reflectance values with those from genuine currency. 18 figs.

  10. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    SciTech Connect (OSTI)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysis of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.

  11. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    SciTech Connect (OSTI)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysis of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.

  12. Protein detection system

    DOE Patents [OSTI]

    Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  13. Chlorofluorocarbon leak detection technology

    SciTech Connect (OSTI)

    Munday, E.B.

    1990-12-01

    There are about 590 large coolant systems located at the Portsmouth Gaseous Diffusion Plant (PORTS) and the Paducah Gaseous Diffusion Plant (PGDP) leaking nearly 800,000 lb of R-114 refrigerant annually (1989 estimate). A program is now under way to reduce the leakage to 325,000 lb/year -- an average loss of 551 lb/year (0.063 lb/h) per coolant system, some of which are as large as 800 ft. This report investigates leak detection technologies that can be used to locate leaks in the coolant systems. Included are descriptions, minimum leak detection rate levels, advantages, disadvantages, and vendor information on the following technologies: bubbling solutions; colorimetric leak testing; dyes; halogen leak detectors (coronea discharge detectors; halide torch detectors, and heated anode detectors); laser imaging; mass spectroscopy; organic vapor analyzers; odorants; pressure decay methods; solid-state electrolytic-cell gas sensors; thermal conductivity leak detectors; and ultrasonic leak detectors.

  14. Cell Phone Detection Techniques

    SciTech Connect (OSTI)

    Pratt, Richard M.; Bunch, Kyle J.; Puzycki, David J.; Slaugh, Ryan W.; Good, Morris S.; McMakin, Douglas L.

    2007-10-01

    A team composed of Rick Pratt, Dave Puczyki, Kyle Bunch, Ryan Slaugh, Morris Good, and Doug McMakin teamed together to attempt to exploit cellular telephone features and detect if a person was carrying a cellular telephone into a Limited Area. The cell phones electromagnetic properties were measured, analyzed, and tested in over 10 different ways to determine if an exploitable signature exists. The method that appears to have the most potential for success without adding an external tag is to measure the RF spectrum, not in the cell phone band, but between 240 and 400MHz. Figures 1- 7 show the detected signal levels from cell phones from three different manufacturers.

  15. Biomolecular detection device

    DOE Patents [OSTI]

    Huo, Qisheng (Albuquerque, NM); Liu, Jun (Albuquerque, NM)

    2008-10-21

    A device for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode.

  16. Method for detecting biomolecules

    DOE Patents [OSTI]

    Huo, Qisheng (Albuquerque, NM); Liu, Jun (Albuquerque, NM)

    2008-08-12

    A method for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode

  17. Fraud Detection in Healthcare

    SciTech Connect (OSTI)

    Chandola, Varun; Schryver, Jack C; Sukumar, Sreenivas R

    2015-01-01

    We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.

  18. Nucleic Acid Detection Methods

    DOE Patents [OSTI]

    Smith, Cassandra L. (Boston, MA); Yaar, Ron (Brookline, MA); Szafranski, Przemyslaw (Boston, MA); Cantor, Charles R. (Boston, MA)

    1998-05-19

    The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3'-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated.

  19. Nucleic acid detection methods

    DOE Patents [OSTI]

    Smith, C.L.; Yaar, R.; Szafranski, P.; Cantor, C.R.

    1998-05-19

    The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3{prime}-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated. 18 figs.

  20. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  1. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  2. Revolution in nuclear detection affairs

    SciTech Connect (OSTI)

    Stern, Warren M.

    2014-05-09

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  3. Opaque cloud detection

    DOE Patents [OSTI]

    Roskovensky, John K. (Albuquerque, NM)

    2009-01-20

    A method of detecting clouds in a digital image comprising, for an area of the digital image, determining a reflectance value in at least three discrete electromagnetic spectrum bands, computing a first ratio of one reflectance value minus another reflectance value and the same two values added together, computing a second ratio of one reflectance value and another reflectance value, choosing one of the reflectance values, and concluding that an opaque cloud exists in the area if the results of each of the two computing steps and the choosing step fall within three corresponding predetermined ranges.

  4. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

    1983-01-01

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  5. Electrical leakage detection circuit

    DOE Patents [OSTI]

    Wild, Arthur

    2006-09-05

    A method is provided for detecting electrical leakage between a power supply and a frame of a vehicle or machine. The disclosed method includes coupling a first capacitor between a frame and a first terminal of a power supply for a predetermined period of time. The current flowing between the frame and the first capacitor is limited to a predetermined current limit. It is determined whether the voltage across the first capacitor exceeds a threshold voltage. A first output signal is provided when the voltage across the capacitor exceeds the threshold voltage.

  6. Nucleic acid detection compositions

    DOE Patents [OSTI]

    Prudent, James R. (Madison, WI); Hall, Jeff G. (Madison, WI); Lyamichev, Victor I. (Madison, WI); Brow, Mary Ann (Madison, WI); Dahlberg, James L. (Madison, WI)

    2008-08-05

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof.

  7. Nucleic acid detection assays

    DOE Patents [OSTI]

    Prudent, James R.; Hall, Jeff G.; Lyamichev, Victor I.; Brow, Mary Ann; Dahlberg, James E.

    2005-04-05

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof.

  8. A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs

    SciTech Connect (OSTI)

    Choudhury, Sutanay; Holder, Larry; Chin, George; Agarwal, Khushbu; Feo, John T.

    2015-02-02

    Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the world. Cyber defenders need to analyze massive-scale, high-resolution network flows to identify, categorize, and mitigate attacks involving net- works spanning institutional and national boundaries. Many of the cyber attacks can be described as subgraph patterns, with promi- nent examples being insider infiltrations (path queries), denial of service (parallel paths) and malicious spreads (tree queries). This motivates us to explore subgraph matching on streaming graphs in a continuous setting. The novelty of our work lies in using the subgraph distributional statistics collected from the streaming graph to determine the query processing strategy. We introduce a Lazy Search" algorithm where the search strategy is decided on a vertex-to-vertex basis depending on the likelihood of a match in the vertex neighborhood. We also propose a metric named Relative Selectivity" that is used to se- lect between different query processing strategies. Our experiments performed on real online news, network traffic stream and a syn- thetic social network benchmark demonstrate 10-100x speedups over selectivity agnostic approaches.

  9. Nucleic acid detection system and method for detecting influenza

    DOE Patents [OSTI]

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  10. Hand held explosives detection system

    DOE Patents [OSTI]

    Conrad, Frank J. (Albuquerque, NM)

    1992-01-01

    The present invention is directed to a sensitive hand-held explosives detection device capable of detecting the presence of extremely low quantities of high explosives molecules, and which is applicable to sampling vapors from personnel, baggage, cargo, etc., as part of an explosives detection system.

  11. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nations energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INLs research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate non-normal traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  12. Arc fault detection system

    DOE Patents [OSTI]

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  13. Malware detection and analysis

    DOE Patents [OSTI]

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  14. Digital quadrature phase detection

    DOE Patents [OSTI]

    Smith, James A. (Idaho Falls, ID); Johnson, John A. (Idaho Falls, ID)

    1992-01-01

    A system for detecting the phase of a frequency of phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2.pi. when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2.pi. when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention.

  15. Digital quadrature phase detection

    DOE Patents [OSTI]

    Smith, J.A.; Johnson, J.A.

    1992-05-26

    A system for detecting the phase of a frequency or phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2[pi] when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2[pi] when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention. 6 figs.

  16. Portable outgas detection apparatus

    DOE Patents [OSTI]

    Haney, Steven Julian; Malinowski, Michael E.

    2004-05-11

    A portable device for detecting surface outgas contaminants of an article includes: (i) a portable housing that has a chamber which is in communication with a port that is adapted to be sealably attached to a surface of the article; (ii) a mass spectrometer that is coupled to the chamber for analyzing gaseous materials in the chamber; and (iii) means for generating a vacuum within the chamber thereby drawing outgas contaminants from the surface of the article into the chamber for analysis by the mass spectrometer. By performing a mass spectrometric analysis of the surface of interest and comparing the data with mass spectrometric data ascertained with the device from a clean surface, the type and amount of outgas contaminants, if any, can be determined.

  17. Weld failure detection

    DOE Patents [OSTI]

    Pennell, William E. (Unity Township, Westmoreland County, PA); Sutton, Jr., Harry G. (Mt. Lebanon, PA)

    1981-01-01

    Method and apparatus for detecting failure in a welded connection, particrly applicable to not readily accessible welds such as those joining components within the reactor vessel of a nuclear reactor system. A preselected tag gas is sealed within a chamber which extends through selected portions of the base metal and weld deposit. In the event of a failure, such as development of a crack extending from the chamber to an outer surface, the tag gas is released. The environment about the welded area is directed to an analyzer which, in the event of presence of the tag gas, evidences the failure. A trigger gas can be included with the tag gas to actuate the analyzer.

  18. Arc fault detection system

    DOE Patents [OSTI]

    Jha, Kamal N. (Bethel Park, PA)

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  19. Detection of gas leakage

    DOE Patents [OSTI]

    Thornberg, Steven (Peralta, NM); Brown, Jason (Albuquerque, NM)

    2012-06-19

    A method of detecting leaks and measuring volumes as well as an apparatus, the Power-free Pump Module (PPM), that is a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement, where the invention is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr), perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  20. Detection of gas leakage

    DOE Patents [OSTI]

    Thornberg, Steven M; Brown, Jason

    2015-02-17

    A method of detecting leaks and measuring volumes as well as a device, the Power-free Pump Module (PPM), provides a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement. The PPM is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr) using a venturi pump, perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  1. Waveguide disturbance detection method

    DOE Patents [OSTI]

    Korneev, Valeri A. (Albany, CA); Nihei, Kurt T. (Oakland, CA); Myer, Larry R. (Benicia, CA)

    2000-01-01

    A method for detection of a disturbance in a waveguide comprising transmitting a wavefield having symmetric and antisymmetric components from a horizontally and/or vertically polarized source and/or pressure source disposed symmetrically with respect to the longitudinal central axis of the waveguide at one end of the waveguide, recording the horizontal and/or vertical component or a pressure of the wavefield with a vertical array of receivers disposed at the opposite end of the waveguide, separating the wavenumber transform of the wavefield into the symmetric and antisymmetric components, integrating the symmetric and antisymmetric components over a broad frequency range, and comparing the magnitude of the symmetric components and the antisymmetric components to an expected magnitude for the symmetric components and the antisymmetric components for a waveguide of uniform thickness and properties thereby determining whether or not a disturbance is present inside the waveguide.

  2. Target detection portal

    DOE Patents [OSTI]

    Linker, Kevin L. (Albuquerque, NM); Brusseau, Charles A. (Tijeras, NM)

    2002-01-01

    A portal apparatus for screening persons or objects for the presence of trace amounts of target substances such as explosives, narcotics, radioactive materials, and certain chemical materials. The portal apparatus can have a one-sided exhaust for an exhaust stream, an interior wall configuration with a concave-shape across a horizontal cross-section for each of two facing sides to result in improved airflow and reduced washout relative to a configuration with substantially flat parallel sides; air curtains to reduce washout; ionizing sprays to collect particles bound by static forces, as well as gas jet nozzles to dislodge particles bound by adhesion to the screened person or object. The portal apparatus can be included in a detection system with a preconcentrator and a detector.

  3. Intelligent Leak Detection System

    SciTech Connect (OSTI)

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or near surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or ?Smart Wells? along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift and noise in the pressure sensor and uncertainty in the reservoir model.

  4. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M; Laska, Jason A; Melin, Alexander M; Czejdo, Bogdan

    2013-01-01

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  5. Intelligent Leak Detection System

    Energy Science and Technology Software Center (OSTI)

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or nearmore » surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift and noise in the pressure sensor and uncertainty in the reservoir model.« less

  6. Frequency and patterns of abnormality detected by iodine-123 amine emission CT after cerebral infarction

    SciTech Connect (OSTI)

    Brott, T.G.; Gelfand, M.J.; Williams, C.C.; Spilker, J.A.; Hertzberg, V.S.

    1986-03-01

    Single photon emission computed tomography (SPECT) was performed in 31 patients with cerebral infarction and 13 who had had transient ischemic attacks, using iodine-123-labeled N,N,N'-trimethyl-N'-(2-hydroxyl-3-methyl-5-iodobenzyl)-1,3-propanediamin e (I-123-HIPDM) as the radiopharmaceutical. SPECT scans were compared with computed tomographic (CT) scans. SPECT was as sensitive as CT in detecting cerebral infarction (94% vs. 84%). The abnormalities were larger on the SPECT scans than on the CT scans in 19 cases, equal in seven, and smaller in five (SPECT abnormalities greater than or equal to CT abnormalities in 86% of cases). Fifteen of 30 patients with hemispheric infarction had decreased perfusion (decreased uptake of I-123-HIPDM) to the cerebellar hemisphere contralateral to the cerebral hemisphere involved by the infarction (crossed cerebellar diaschisis). Nine of these 15 patients had major motor deficits, while only one of the 15 without crossed cerebellar diaschisis had a major motor deficit.

  7. OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid

    SciTech Connect (OSTI)

    Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2015-01-01

    The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.

  8. Incipient fire detection system

    DOE Patents [OSTI]

    Brooks, Jr., William K. (Newport News, VA)

    1999-01-01

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  9. Spectroscopic Detection of Pathogens

    SciTech Connect (OSTI)

    ALAM,M. KATHLEEN; TIMLIN,JERILYN A.; MARTIN,LAURA E.; HJELLE,DRIAN; LYONS,RICK; GARRISON,KRISTIN

    2000-11-01

    The goal of this LDRD Research project was to provide a preliminary examination of the use of infrared spectroscopy as a tool to detect the changes in cell cultures upon activation by an infectious agent. Due to a late arrival of funding, only 5 months were available to transfer and setup equipment at UTTM,develop cell culture lines, test methods of in-situ activation and collect kinetic data from activated cells. Using attenuated total reflectance (ATR) as a sampling method, live cell cultures were examined prior to and after activation. Spectroscopic data were collected from cells immediately after activation in situ and, in many cases for five successive hours. Additional data were collected from cells activated within a test tube (pre-activated), in both transmission mode as well as in ATR mode. Changes in the infrared data were apparent in the transmission data collected from the pre-activated cells as well in some of the pre-activated ATR data. Changes in the in-situ activated spectral data were only occasionally present due to (1) the limited time cells were studied and (2) incomplete activation. Comparison of preliminary data to infrared bands reported in the literature suggests the primary changes seen are due an increase in ribonucleic acid (RNA) production. This work will be continued as part of a 3 year DARPA grant.

  10. Detecting bioterrorism: Is chemistry enough?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Detecting bioterrorism: Is chemistry enough? Detecting bioterrorism: Is chemistry enough? In an online webinar, Kristin Omberg will offer discussion on the possibilities and problems of bioaerosol detection systems and the chemistry of keeping the population safe. March 12, 2014 Kristin Omberg Kristin Omberg Contact Nancy Ambrosiano Communications Office (505) 667-0471 Email "The 2001 anthrax letters contained only a few grams of material--about two sugar cubes' worth. The federal

  11. Luminescent MOFs for Mycotoxin Detection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Luminescent MOFs for Mycotoxin Detection Luminescent MOFs for Mycotoxin Detection Print Thursday, 04 February 2016 16:26 Mycotoxins-toxic chemical products produced by fungi-contaminate 25% of global food crops, leading to the loss of 1 billion metric tons of food products annually. Although current mycotoxin detection methods are effective, they are also expensive and require complex sample preparation. Researchers from Rutgers University, Northern Illinois University, and the Advanced Light

  12. Method for detecting an element

    DOE Patents [OSTI]

    Blackwood, Larry G.; Reber, Edward L.; Rohde, Kenneth W.

    2007-02-06

    A method for detecting an element is disclosed and which includes the steps of providing a gamma-ray spectrum which depicts, at least in part, a test region having boundaries, and which has a small amount of the element to be detected; providing a calculation which detects the small amount of the element to be detected; and providing a moving window and performing the calculation within the moving window, and over a range of possible window boundaries within the test region to determine the location of the optimal test region within the gamma-ray spectrum.

  13. MPI Runtime Error Detection with MUST: Advances in Deadlock Detection

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hilbrich, Tobias; Protze, Joachim; Schulz, Martin; de Supinski, Bronis R.; Müller, Matthias S.

    2013-01-01

    The widely used Message Passing Interface (MPI) is complex and rich. As a result, application developers require automated tools to avoid and to detect MPI programming errors. We present the Marmot Umpire Scalable Tool (MUST) that detects such errors with significantly increased scalability. We present improvements to our graph-based deadlock detection approach for MPI, which cover future MPI extensions. Our enhancements also check complex MPI constructs that no previous graph-based detection approach handled correctly. Finally, we present optimizations for the processing of MPI operations that reduce runtime deadlock detection overheads. Existing approaches often require 𝒪( p ) analysis timemore » per MPI operation, for p processes. We empirically observe that our improvements lead to sub-linear or better analysis time per operation for a wide range of real world applications.« less

  14. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Korber. "Through this study we now better understand the biology that defines that resilience." Scientists get inside look at how AIDS virus grooms its assault team LOS ALAMOS,...

  15. Particle detection systems and methods

    DOE Patents [OSTI]

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  16. Development of a high-throughput microfluidic integrated microarray for the detection of chimeric bioweapons.

    SciTech Connect (OSTI)

    Sheppod, Timothy; Satterfield, Brent; Hukari, Kyle W.; West, Jason A. A.; Hux, Gary A.

    2006-10-01

    The advancement of DNA cloning has significantly augmented the potential threat of a focused bioweapon assault, such as a terrorist attack. With current DNA cloning techniques, toxin genes from the most dangerous (but environmentally labile) bacterial or viral organism can now be selected and inserted into robust organism to produce an infinite number of deadly chimeric bioweapons. In order to neutralize such a threat, accurate detection of the expressed toxin genes, rather than classification on strain or genealogical decent of these organisms, is critical. The development of a high-throughput microarray approach will enable the detection of unknowns chimeric bioweapons. The development of a high-throughput microarray approach will enable the detection of unknown bioweapons. We have developed a unique microfluidic approach to capture and concentrate these threat genes (mRNA's) upto a 30 fold concentration. These captured oligonucleotides can then be used to synthesize in situ oligonucleotide copies (cDNA probes) of the captured genes. An integrated microfluidic architecture will enable us to control flows of reagents, perform clean-up steps and finally elute nanoliter volumes of synthesized oligonucleotides probes. The integrated approach has enabled a process where chimeric or conventional bioweapons can rapidly be identified based on their toxic function, rather than being restricted to information that may not identify the critical nature of the threat.

  17. Method For Detecting Biological Agents

    DOE Patents [OSTI]

    Chen, Liaohai (Los Alamos, NM); McBranch, Duncan W. (Santa Fe, NM); Wang, Hsing-Lin (Los Alamos, NM); Whitten, David G. (Santa Fe, NM)

    2005-12-27

    A sensor is provided including a polymer capable of having an alterable measurable property from the group of luminescence and electrical conductivity, the polymer having an intermediate combination of a recognition element, a tethering element and a property-altering element bound thereto and capable of altering the measurable property, the intermediate combination adapted for subsequent separation from the polymer upon exposure to an agent having an affinity for binding to the recognition element whereupon the separation of the intermediate combination from the polymer results in a detectable change in the alterable measurable property, and, detecting said detectable change in the alterable measurable property.

  18. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K.; Grey, Alan E.

    1994-04-05

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  19. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K. (Idaho Falls, ID); Grey, Alan E. (Idaho Falls, ID)

    1994-01-01

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  20. Radio frequency detection assembly and method for detecting radio frequencies

    DOE Patents [OSTI]

    Cown, Steven H. (Rigby, ID); Derr, Kurt Warren (Idaho Falls, ID)

    2010-03-16

    A radio frequency detection assembly is described and which includes a radio frequency detector which detects a radio frequency emission produced by a radio frequency emitter from a given location which is remote relative to the radio frequency detector; a location assembly electrically coupled with the radio frequency detector and which is operable to estimate the location of the radio frequency emitter from the radio frequency emission which has been received; and a radio frequency transmitter electrically coupled with the radio frequency detector and the location assembly, and which transmits a radio frequency signal which reports the presence of the radio frequency emitter.

  1. GMTI radar minimum detectable velocity.

    SciTech Connect (OSTI)

    Richards, John Alfred

    2011-04-01

    Minimum detectable velocity (MDV) is a fundamental consideration for the design, implementation, and exploitation of ground moving-target indication (GMTI) radar imaging modes. All single-phase-center air-to-ground radars are characterized by an MDV, or a minimum radial velocity below which motion of a discrete nonstationary target is indistinguishable from the relative motion between the platform and the ground. Targets with radial velocities less than MDV are typically overwhelmed by endoclutter ground returns, and are thus not generally detectable. Targets with radial velocities greater than MDV typically produce distinct returns falling outside of the endoclutter ground returns, and are thus generally discernible using straightforward detection algorithms. This document provides a straightforward derivation of MDV for an air-to-ground single-phase-center GMTI radar operating in an arbitrary geometry.

  2. Discriminating ultrasonic proximity detection system

    DOE Patents [OSTI]

    Annala, Wayne C. (Durango, CO)

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  3. Foreign WMD Proliferation Detection | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    WMD Proliferation Detection Foreign WMD Proliferation Detection NNSA develops the tools, technologies, techniques, and expertise to address the most challenging problems...

  4. Detection of explosives in soils

    DOE Patents [OSTI]

    Chambers, William B.; Rodacy, Philip J.; Phelan, James M.; Woodfin, Ronald L.

    2002-01-01

    An apparatus and method for detecting explosive-indicating compounds in subsurface soil. The apparatus has a probe with an adsorbent material on some portion of its surface that can be placed into soil beneath the ground surface, where the adsorbent material can adsorb at least one explosive-indicating compound. The apparatus additional has the capability to desorb the explosive-indicating compound through heating or solvent extraction. A diagnostic instrument attached to the probe detects the desorbed explosive-indicating compound. In the method for detecting explosive-indicating compounds in soil, the sampling probe with an adsorbent material on at least some portion of a surface of the sampling probe is inserted into the soil to contact the adsorbent material with the soil. The explosive-indicating compounds are then desorbed and transferred as either a liquid or gas sample to a diagnostic tool for analysis. The resulting gas or liquid sample is analyzed using at least one diagnostic tool selected from the group consisting of an ion-mobility spectrometer, a gas chromatograph, a high performance liquid chromatograph, a capillary electrophoresis chromatograph, a mass spectrometer, a Fourier-transform infrared spectrometer and a Raman spectrometer to detect the presence of explosive-indicating compounds.

  5. Anomalous change detection in imagery

    DOE Patents [OSTI]

    Theiler, James P. (Los Alamos, NM); Perkins, Simon J. (Santa Fe, NM)

    2011-05-31

    A distribution-based anomaly detection platform is described that identifies a non-flat background that is specified in terms of the distribution of the data. A resampling approach is also disclosed employing scrambled resampling of the original data with one class specified by the data and the other by the explicit distribution, and solving using binary classification.

  6. GPU Accelerated Event Detection Algorithm

    Energy Science and Technology Software Center (OSTI)

    2011-05-25

    Smart grid external require new algorithmic approaches as well as parallel formulations. One of the critical components is the prediction of changes and detection of anomalies within the power grid. The state-of-the-art algorithms are not suited to handle the demands of streaming data analysis. (i) need for events detection algorithms that can scale with the size of data, (ii) need for algorithms that can not only handle multi dimensional nature of the data, but alsomore » model both spatial and temporal dependencies in the data, which, for the most part, are highly nonlinear, (iii) need for algorithms that can operate in an online fashion with streaming data. The GAEDA code is a new online anomaly detection techniques that take into account spatial, temporal, multi-dimensional aspects of the data set. The basic idea behind the proposed approach is to (a) to convert a multi-dimensional sequence into a univariate time series that captures the changes between successive windows extracted from the original sequence using singular value decomposition (SVD), and then (b) to apply known anomaly detection techniques for univariate time series. A key challenge for the proposed approach is to make the algorithm scalable to huge datasets by adopting techniques from perturbation theory, incremental SVD analysis. We used recent advances in tensor decomposition techniques which reduce computational complexity to monitor the change between successive windows and detect anomalies in the same manner as described above. Therefore we propose to develop the parallel solutions on many core systems such as GPUs, because these algorithms involve lot of numerical operations and are highly data-parallelizable.« less

  7. Imaging, object detection, and change detection with a polarized multistatic GPR array

    DOE Patents [OSTI]

    Beer, N. Reginald; Paglieroni, David W.

    2015-07-21

    A polarized detection system performs imaging, object detection, and change detection factoring in the orientation of an object relative to the orientation of transceivers. The polarized detection system may operate on one of several modes of operation based on whether the imaging, object detection, or change detection is performed separately for each transceiver orientation. In combined change mode, the polarized detection system performs imaging, object detection, and change detection separately for each transceiver orientation, and then combines changes across polarizations. In combined object mode, the polarized detection system performs imaging and object detection separately for each transceiver orientation, and then combines objects across polarizations and performs change detection on the result. In combined image mode, the polarized detection system performs imaging separately for each transceiver orientation, and then combines images across polarizations and performs object detection followed by change detection on the result.

  8. Noise canceling in-situ detection

    DOE Patents [OSTI]

    Walsh, David O.

    2014-08-26

    Technologies applicable to noise canceling in-situ NMR detection and imaging are disclosed. An example noise canceling in-situ NMR detection apparatus may comprise one or more of a static magnetic field generator, an alternating magnetic field generator, an in-situ NMR detection device, an auxiliary noise detection device, and a computer.

  9. Detection of Neutrons with Scintillation Counters

    DOE R&D Accomplishments [OSTI]

    Hofstadter, R.

    1948-11-01

    Detection of slow neutrons by: detection of single gamma rays following capture by cadmium or mercury; detection of more than one gamma ray by observing coincidences after capture; detection of heavy charged particles after capture in lithium or baron nuclei; possible use of anthracene for counting fast neutrons investigated briefly.

  10. Categorical Exclusion Determinations: NNSA-Proliferation Detection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Proliferation Detection Categorical Exclusion Determinations: NNSA-Proliferation Detection Categorical Exclusion Determinations issued by NNSA-Proliferation Detection. DOCUMENTS AVAILABLE FOR DOWNLOAD September 17, 2010 CX-004080: Categorical Exclusion Determination Fisk University Nonproliferation Grant CX(s) Applied: B3.6 Date: 09/17/2010 Location(s): Tennessee Office(s): NNSA-Proliferation Detection

  11. Method for detecting toxic gases

    DOE Patents [OSTI]

    Stetter, Joseph R. (Naperville, IL); Zaromb, Solomon (Hinsdale, IL); Findlay, Jr., Melvin W. (Bolingbrook, IL)

    1991-01-01

    A method capable of detecting low concentrations of a pollutant or other component in air or other gas, utilizing a combination of a heating filament having a catalytic surface of a noble metal for exposure to the gas and producing a derivative chemical product from the component, and an electrochemical sensor responsive to the derivative chemical product for providing a signal indicative of the product. At concentrations in the order of about 1-100 ppm of tetrachloroethylene, neither the heating filament nor the electrochemical sensor is individually capable of sensing the pollutant. In the combination, the heating filament converts the benzyl chloride to one or more derivative chemical products which may be detected by the electrochemical sensor.

  12. Method for detecting toxic gases

    DOE Patents [OSTI]

    Stetter, J.R.; Zaromb, S.; Findlay, M.W. Jr.

    1991-10-08

    A method is disclosed which is capable of detecting low concentrations of a pollutant or other component in air or other gas. This method utilizes a combination of a heating filament having a catalytic surface of a noble metal for exposure to the gas and producing a derivative chemical product from the component. An electrochemical sensor responds to the derivative chemical product for providing a signal indicative of the product. At concentrations in the order of about 1-100 ppm of tetrachloroethylene, neither the heating filament nor the electrochemical sensor is individually capable of sensing the pollutant. In the combination, the heating filament converts the benzyl chloride to one or more derivative chemical products which may be detected by the electrochemical sensor. 6 figures.

  13. Multiplex detection of agricultural pathogens

    DOE Patents [OSTI]

    Siezak, Thomas R.; Gardner, Shea; Torres, Clinton; Vitalis, Elizabeth; Lenhoff, Raymond J.

    2013-01-15

    Described are kits and methods useful for detection of agricultural pathogens in a sample. Genomic sequence information from agricultural pathogens was analyzed to identify signature sequences, e.g., polynucleotide sequences useful for confirming the presence or absence of a pathogen in a sample. Primer and probe sets were designed and optimized for use in a PCR based, multiplexed Luminex assay and/or an array assay to successfully identify the presence or absence of pathogens in a sample.

  14. Multiplex detection of agricultural pathogens

    DOE Patents [OSTI]

    McBride, Mary Teresa (Brentwood, CA); Slezak, Thomas Richard (Livermore, CA); Messenger, Sharon Lee (Kensington, CA)

    2010-09-14

    Described are kits and methods useful for detection of seven agricultural pathogens (BPSV; BHV; BVD; FMDV; BTV; SVD; and VESV) in a sample. Genomic sequence information from 7 agricultural pathogens was analyzed to identify signature sequences, e.g., polynucleotide sequences useful for confirming the presence or absence of a pathogen in a sample. Primer and probe sets were designed and optimized for use in a PCR based, multiplexed Luminex assay to successfully identify the presence or absence of pathogens in a sample.

  15. Detection of a concealed object

    DOE Patents [OSTI]

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  16. Tritium Detection Methods and Limitations

    Office of Environmental Management (EM)

    Detection Methods and Limitations Tritium Focus Group Meeting, April 2014 Tom Voss, Northern New Mexico DOE-HDBK-1105-2002 RADIOLOGICAL TRAINING FOR TRITIUM FACILITIES U.S. Department of Energy AREA TRNG Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-HDBK-1105-2002 Radiological Training for Tritium Facilities U.S. Department of Energy, Radiological Control Programs for Special Tritium Compounds, DOE-STD- draft, Washington, D.C.

  17. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  18. Detection of a concealed object

    DOE Patents [OSTI]

    Keller, Paul E. (Richland, WA); Hall, Thomas E. (Kennewick, WA); McMakin, Douglas L. (Richland, WA)

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  19. detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    detection | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  20. Compensated intruder-detection systems

    DOE Patents [OSTI]

    McNeilly, David R. (Maryville, TN); Miller, William R. (Andersonville, TN)

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  1. Infrared trace element detection system

    DOE Patents [OSTI]

    Bien, F.; Bernstein, L.S.; Matthew, M.W.

    1988-11-15

    An infrared trace element detection system includes an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined. 11 figs.

  2. Anomaly Detection in Dynamic Networks

    SciTech Connect (OSTI)

    Turcotte, Melissa

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and dont fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the communication counts. In a sequential analysis, anomalous behavior is then identified from outlying behavior with respect to the fitted predictive probability models. Seasonality is again incorporated into the model and is treated as a changepoint model on the transition probabilities of a discrete time Markov process. Second stage analytics are then developed which combine anomalous edges to identify anomalous substructures in the network.

  3. Alternative Neutron Detection Testing Summary

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stromswold, David C.; Woodring, Mitchell L.

    2010-04-08

    Radiation portal monitors used for interdiction of illicit materials at borders include highly sensitive neutron detection systems. The main reason for having neutron detection capability is to detect fission neutrons from plutonium. Most currently deployed radiation portal monitors (RPMs) use neutron detectors based upon 3He-filled gas proportional counters, which are the most common large area neutron detector. This type of neutron detector is used in the TSA and other RPMs installed in international locations and in the Ludlum and Science Applications International Corporation RPMs deployed primarily for domestic applications. There is a declining supply of 3He in the world and, thus, methods to reduce the use of this gas in RPMs with minimal changes to the current system designs and sensitivity to cargo-borne neutrons are being investigated. Four technologies have been identified as being currently commercially available, potential alternative neutron detectors to replace the use of 3He in RPMs. These technologies are: 1) Boron trifluoride-filled proportional counters, 2) Boron-lined proportional counters, 3) Lithium-loaded glass fibers, and 4) Coated wavelength-shifting plastic fibers. Reported here is a summary of the testing carried out at Pacific Northwest National Laboratory on these technologies to date, as well as measurements on 3He tubes at various pressures. Details on these measurements are available in the referenced reports. Sponsors of these tests include the Department of Energy (DOE), Department of Homeland Security (DHS), and the Department of Defense (DoD), as well as internal Pacific Northwest National Laboratory funds.

  4. Radiation Detection Computational Benchmark Scenarios

    SciTech Connect (OSTI)

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; McDonald, Ben S.

    2013-09-24

    Modeling forms an important component of radiation detection development, allowing for testing of new detector designs, evaluation of existing equipment against a wide variety of potential threat sources, and assessing operation performance of radiation detection systems. This can, however, result in large and complex scenarios which are time consuming to model. A variety of approaches to radiation transport modeling exist with complementary strengths and weaknesses for different problems. This variety of approaches, and the development of promising new tools (such as ORNL’s ADVANTG) which combine benefits of multiple approaches, illustrates the need for a means of evaluating or comparing different techniques for radiation detection problems. This report presents a set of 9 benchmark problems for comparing different types of radiation transport calculations, identifying appropriate tools for classes of problems, and testing and guiding the development of new methods. The benchmarks were drawn primarily from existing or previous calculations with a preference for scenarios which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22. From a technical perspective, the benchmarks were chosen to span a range of difficulty and to include gamma transport, neutron transport, or both and represent different important physical processes and a range of sensitivity to angular or energy fidelity. Following benchmark identification, existing information about geometry, measurements, and previous calculations were assembled. Monte Carlo results (MCNP decks) were reviewed or created and re-run in order to attain accurate computational times and to verify agreement with experimental data, when present. Benchmark information was then conveyed to ORNL in order to guide testing and development of hybrid calculations. The results of those ADVANTG calculations were then sent to PNNL for compilation. This is a report describing the details of the selected Benchmarks and results from various transport codes.

  5. Multiplex detection of respiratory pathogens

    DOE Patents [OSTI]

    McBride, Mary (Brentwood, CA); Slezak, Thomas (Livermore, CA); Birch, James M. (Albany, CA)

    2012-07-31

    Described are kits and methods useful for detection of respiratory pathogens (influenza A (including subtyping capability for H1, H3, H5 and H7 subtypes) influenza B, parainfluenza (type 2), respiratory syncytial virus, and adenovirus) in a sample. Genomic sequence information from the respiratory pathogens was analyzed to identify signature sequences, e.g., polynucleotide sequences useful for confirming the presence or absence of a pathogen in a sample. Primer and probe sets were designed and optimized for use in a PCR based, multiplexed Luminex assay to successfully identify the presence or absence of pathogens in a sample.

  6. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  7. SEARCH DETECT ANALYZE U S

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SEARCH DETECT ANALYZE U . S . D E P A R T M E N T O F E N E R G Y N A T I O N A L N U C L E A R S E C U R I T Y A D M I N I S T R A T I O N NEST NUCLEAR EMERGENCY SUPPORT TEAM (NEST) The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) has the world's leading scientists, engineers and technicians from over 50 years of managing the nation's nuclear weapons program. When the need arises, DOE is pre- pared to respond immediately to any type of radiological accident or

  8. Conducting Polymers for Neutron Detection

    SciTech Connect (OSTI)

    Kimblin, Clare; Miller, Kirk; Vogel, Bob; Quam, Bill; McHugh, Harry; Anthony, Glen; Mike, Grover

    2007-12-01

    Conjugated polymers have emerged as an attractive technology for large-area electronic applications. As organic semiconductors, they can be used to make large-area arrays of diodes or transistors using fabrication techniques developed for polymer coatings, such as spraying and screen-printing. We have demonstrated both neutron and alpha detection using diodes made from conjugated polymers and have done preliminary work to integrate a boron carbide layer into the conventional polymer device structure to capture thermal neutrons. The polymer devices appear to be insensitive to gamma rays, due to their small physical thickness and low atomic number.

  9. The Autonomous Pathogen Detection System

    SciTech Connect (OSTI)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  10. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, Roswitha S. (Knoxville, TN); Todd, Richard A. (Knoxville, TN)

    1987-01-01

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  11. Novel absorption detection techniques for capillary electrophoresis

    SciTech Connect (OSTI)

    Xue, Y.

    1994-07-27

    Capillary electrophoresis (CE) has emerged as one of the most versatile separation methods. However, efficient separation is not sufficient unless coupled to adequate detection. The narrow inner diameter (I.D.) of the capillary column raises a big challenge to detection methods. For UV-vis absorption detection, the concentration sensitivity is only at the {mu}M level. Most commercial CE instruments are equipped with incoherent UV-vis lamps. Low-brightness, instability and inefficient coupling of the light source with the capillary limit the further improvement of UV-vis absorption detection in CE. The goals of this research have been to show the utility of laser-based absorption detection. The approaches involve: on-column double-beam laser absorption detection and its application to the detection of small ions and proteins, and absorption detection with the bubble-shaped flow cell.

  12. Widget:FlashDetect | Open Energy Information

    Open Energy Info (EERE)

    FlashDetect Jump to: navigation, search This widget sets the wgFlashEnabled javascript variable as true and adds the class "flash" to the body tag if Flash is detected using...

  13. On the Detection of the Free Neutrino

    DOE R&D Accomplishments [OSTI]

    Reines, F.; Cowan, C. L., Jr.

    1953-08-06

    The experiment previously proposed [to Detect the Free Neutrino] has been initiated, with a Hanford pile as a neutrino source. It appears probable that neutrino detection has been accomplished, and confirmatory work is in progress. (K.S.)

  14. Acoustic enhancement for photo detecting devices

    DOE Patents [OSTI]

    Thundat, Thomas G; Senesac, Lawrence R; Van Neste, Charles W

    2013-02-19

    Provided are improvements to photo detecting devices and methods for enhancing the sensitivity of photo detecting devices. A photo detecting device generates an electronic signal in response to a received light pulse. An electro-mechanical acoustic resonator, electrically coupled to the photo detecting device, damps the electronic signal and increases the signal noise ratio (SNR) of the electronic signal. Increased photo detector standoff distances and sensitivities will result.

  15. Foreign WMD Proliferation Detection | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    WMD Proliferation Detection | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  16. Advancing the art of tuberculosis detection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advancing art of tuberculosis detection Advancing the art of tuberculosis detection New approach to finding a TB biomarker could provide earlier diagnosis. April 19, 2013 Los Alamos National Laboratory researcher Harshini Mukundan is exploring new ways to detect and diagnose tuberculosis. Los Alamos National Laboratory researcher Harshini Mukundan is exploring new ways to detect and diagnose tuberculosis. Contact Nancy Ambrosiano Communications Office (505) 667-0471 Email This observation has

  17. Energy Detectives (3 Activities) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Detectives (3 Activities) Energy Detectives (3 Activities) Below is information about the student activity/lesson plan from your search. Grades 5-8 Subject Energy Basics Summary Students explore the classroom as they look and feel for signs of energy. They record the ways they use energy throughout a typical day in an energy detective journal. There are three activities: Where is the energy? Exploring the energy around you. Energy detective journals. Curriculum Science, Visual Arts, Language

  18. Final Technical Report: PV Fault Detection Tool.

    SciTech Connect (OSTI)

    King, Bruce Hardison; Jones, Christian Birk

    2015-12-01

    The PV Fault Detection Tool project plans to demonstrate that the FDT can (a) detect catastrophic and degradation faults and (b) identify the type of fault. This will be accomplished by collecting fault signatures using different instruments and integrating this information to establish a logical controller for detecting, diagnosing and classifying each fault.

  19. Detection of electromagnetic radiation using micromechanical multiple

    Office of Scientific and Technical Information (OSTI)

    quantum wells structures (Patent) | SciTech Connect Patent: Detection of electromagnetic radiation using micromechanical multiple quantum wells structures Citation Details In-Document Search Title: Detection of electromagnetic radiation using micromechanical multiple quantum wells structures An apparatus and method for detecting electromagnetic radiation employs a deflectable micromechanical apparatus incorporating multiple quantum wells structures. When photons strike the quantum-well

  20. Asian Co-benefits Partnership (ACP) Toolkit | Open Energy Information

    Open Energy Info (EERE)

    and information to help mainstream climate and developmental co-benefits into decision-making processes in Asia." The Tookit "offers recent publication from ACP member...

  1. LEDSGP/DIA-Toolkit/Tools | Open Energy Information

    Open Energy Info (EERE)

    (LEDS) on country development goals. These resources focus on strategies to reduce poverty, improve health and local environment quality, improve energy and water access,...

  2. NOAA Webinar: The U.S. Climate Resilience Toolkit

    Broader source: Energy.gov [DOE]

    This series is co-sponsored by the NOAA Sectoral Applications Research Program (SARP), US National Integrated Drought Information System (NIDIS), Water Research Foundation, Water Environment...

  3. Greenhouse Gas Inventory Development Toolkit | Open Energy Information

    Open Energy Info (EERE)

    an Application of the EX-Ante Carbon-balance Tool (EX-ACT) Financial and Cost Assessment Model (FICAM) Forest Carbon Index Forest Carbon Portal Forest Monitoring for Action...

  4. File:RAPID Toolkit Flyer.pdf | Open Energy Information

    Open Energy Info (EERE)

    pdf, 2 pages) 2-pg flyer giving an overview of the GRR project File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  5. Project Screening and Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development...

  6. Sustainable Land-use Impact Assessment Toolkit | Open Energy...

    Open Energy Info (EERE)

    public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development...

  7. Grid-Connected Renewable Energy Generation Toolkit-Wind | Open...

    Open Energy Info (EERE)

    Agency for International Development Sector: Energy Focus Area: Wind Resource Type: Training materials Website: www.energytoolbox.orggcremod6index.shtml Grid-Connected...

  8. Grid-Connected Renewable Energy Generation Toolkit-Solar | Open...

    Open Energy Info (EERE)

    Agency for International Development Sector: Energy Focus Area: Solar Resource Type: Training materials Website: www.energytoolbox.orggcremod5index.shtml Grid-Connected...

  9. Grid-Connected Renewable Energy Generation Toolkit-Geothermal...

    Open Energy Info (EERE)

    for International Development Sector: Energy Focus Area: Geothermal Resource Type: Training materials Website: www.energytoolbox.orggcremod3index.shtml Grid-Connected...

  10. Grid-Connected Renewable Energy Generation Toolkit-Hydroelectric...

    Open Energy Info (EERE)

    United States Agency for International Development Sector: Energy Resource Type: Training materials Website: www.energytoolbox.orggcremod4index.shtml Grid-Connected...

  11. Policy and Program Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    of Diesel Buses to Compressed Natural Gas How to implement renewable energy and energy efficiency options Support for South African local government Hydrogen Analysis (H2A)...

  12. Energy System and Scenario Analysis Toolkit | Open Energy Information

    Open Energy Info (EERE)

    other technologies. Biomass Biomass Energy Data Book Buildings Buildings Energy Data Book Hydrogen Hydrogen Energy Data Book Marine and Hydrokinetic Technology Marine and...

  13. Technology Cost and Performance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    little attention at the policy level as an important component of a national strategy. Hydrogen U.S. National Hydrogen Energy Roadmap Solar Open PV Project Open PV provides a...

  14. THYME: Toolkit for Hybrid Modeling of Electric Power Systems

    Energy Science and Technology Software Center (OSTI)

    2011-01-01

    THYME is an object oriented library for building models of wide area control and communications in electric power systems. This software is designed as a module to be used with existing open source simulators for discrete event systems in general and communication systems in particular. THYME consists of a typical model for simulating electro-mechanical transients (e.g., as are used in dynamic stability studies), data handling objects to work with CDF and PTI formatted power flowmore » data, and sample models of discrete sensors and controllers.« less

  15. The structural simulation toolkit : a tool for bridging thearchitectu...

    Office of Scientific and Technical Information (OSTI)

    Abstract not provided. Authors: Murphy, Richard. ; Rodrigues, Arun F. ; Kogge, Peter 1 ; Underwood, Keith Douglas + Show Author Affiliations University of Notre Dame Publication ...

  16. LEDSGP/DIA-Toolkit/Factors | Open Energy Information

    Open Energy Info (EERE)

    expanded solar energy, the impact of switching from imported fossil fuels to solar power may improve public health through improved air quality. Environmental Air -...

  17. LEDSGP/DIA-Toolkit/How To | Open Energy Information

    Open Energy Info (EERE)

    may want to improve energy access of rural communities, decrease reliance on imported fossil fuels, or increase jobs. 3. What tools and methodologies are available for impact...

  18. Structural Simluation Toolkit (SST) V 2.0

    Energy Science and Technology Software Center (OSTI)

    2009-12-04

    The SST provides a parallel framework to perform system simulation of computer architectures to determine their performance and power consumption. Additionally, the SST contains basic models of a computer processor, and interconnect and can connect to an external memory simulator (DRAMSim II). The SST framework provides a simple interface by which other computer simulation models can be combined under a common parallel discrete event-based simulation environment. This allows design exploration of future architectures, analysis ofmore » how current computer programs will function on future architectures. The SST provides a parallel discrete event simulation framework, including partitioning and object distribution over MPI. It also provides a mechanism by which components can report their power consumption for analysis.« less

  19. Land-use Scenario Analysis Toolkit | Open Energy Information

    Open Energy Info (EERE)

    and Energy Global Change Assessment Model (GCAM) Dynamic-recursive model GCAM Model Pacific Northwest National Laboratory Resources by Type Tools Click Sort key.JPG to sort by...

  20. Clean Air-Cool Planet Community Toolkit | Open Energy Information

    Open Energy Info (EERE)

    conservation, renewable energy (the resource focuses on wind power, solar power, and methane recovery), green power, transportation, waste, and land-use programs. Each topic is...

  1. File:RAPID Toolkit Flyer.pdf | Open Energy Information

    Open Energy Info (EERE)

    2 pages) 2-pg flyer giving an overview of the GRR project File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  2. LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative...

    Open Energy Info (EERE)

    and Plan Prioritize alternative development scenarios based on factors such as economic, environmental, and social benefits & costs, technical & institutional capacity & barriers,...

  3. LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities...

    Open Energy Info (EERE)

    and Plan Prioritize alternative development scenarios based on factors such as economic, environmental, and social benefits & costs, technical & institutional capacity & barriers,...

  4. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    and Plan Prioritize alternative development scenarios based on factors such as economic, environmental, and social benefits & costs, technical & institutional capacity & barriers,...

  5. Template:RegulatoryToolkitTabs | Open Energy Information

    Open Energy Info (EERE)

    source History View New Pages Recent Changes All Special Pages Semantic SearchQuerying Get Involved Help Apps Datasets Community Login | Sign Up Search Template Edit History...

  6. Energy System and Scenario Analysis Toolkit | Open Energy Information

    Open Energy Info (EERE)

    for 215 countries. The statistics include crude oil production, oil consumption, natural gas production and consumption, electricity generation and consumption, primary energy,...

  7. NREL: Wind Research - NREL's WIND Toolkit Provides the Data Needed...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    by the numerical model. Barometric pressure, wind speed and direction (at 100 m above ground level), relative humidity, temperature, and air density data are available via an...

  8. LEDSGP/Transportation Toolkit/Strategies/Improve | Open Energy...

    Open Energy Info (EERE)

    petroleum fuels; alternative fuels (such as ethanol, biodiesel, natural gas, and propane; hydrogen fuel-cell systems; and electric rechargeable battery systems. System Level...

  9. LEDSGP/Transportation Toolkit/Strategies/Shift | Open Energy...

    Open Energy Info (EERE)

    petroleum fuels; alternative fuels (such as ethanol, biodiesel, natural gas, and propane; hydrogen fuel-cell systems; and electric rechargeable battery systems. System Level...

  10. LEDSGP/Transportation Toolkit/Strategies/Avoid | Open Energy...

    Open Energy Info (EERE)

    petroleum fuels; alternative fuels (such as ethanol, biodiesel, natural gas, and propane; hydrogen fuel-cell systems; and electric rechargeable battery systems. System Level...

  11. LEDSGP/Transportation Toolkit/Strategies | Open Energy Information

    Open Energy Info (EERE)

    petroleum fuels; alternative fuels (such as ethanol, biodiesel, natural gas, and propane; hydrogen fuel-cell systems; and electric rechargeable battery systems. System Level...

  12. Energy System and Scenario Analysis Toolkit | Open Energy Information

    Open Energy Info (EERE)

    energy statistics for 215 countries. The statistics include crude oil production, oil consumption, natural gas production and consumption, electricity generation and...

  13. USAID Toolkit for Increasing Energy Access | Open Energy Information

    Open Energy Info (EERE)

    Change (UNFCCC), UNEP, United Nations Foundation Sector: Energy Focus Area: Renewable Energy, Energy Efficiency, People and Policy Phase: Evaluate Options, Develop Goals, Prepare...

  14. Hands-on Energy Adaptation Toolkit (HEAT) | Open Energy Information

    Open Energy Info (EERE)

    Management Assistance Program of the World Bank Sector: Energy Focus Area: Renewable Energy Topics: Adaptation, Implementation, Pathways analysis Resource Type: Guidemanual...

  15. Property:TransportToolkit/Regions | Open Energy Information

    Open Energy Info (EERE)

    America + B Bike-Sharing:History, Impacts, Models of Provision, and Future + Global + Biodiesel Handling and Use Guide + Global +, Australia & North America + Bus Rapid Transit...

  16. Renewable Energy Technical Potential Toolkit | Open Energy Information

    Open Energy Info (EERE)

    as suitable for development and applies current technology energy conversion efficiency to the available resource in those areas. As renewable technologies improve...

  17. World Bank Renewable Energy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    of a Monitoring and Evaluation Plan Audit of Solar Home Systems Project Mid-term Review Panel for Solar Home Systems Project Socio-Economic Survey of the Photovoltaic Pilot...

  18. Renewable Energy Technical Potential Toolkit | Open Energy Information

    Open Energy Info (EERE)

    cell would only have one value for solar resource, which represents the annual average solar resource (GHI, for PV analysis) for the entire area covered by the grid cell....

  19. Guidelines and Toolkits for Urban Transport Development in Medium...

    Open Energy Info (EERE)

    from the LEDS Global Partnership. When to Use This Tool While building a low emission strategy for your country's transportation system, this tool is most useful during these...

  20. UNEP Toolkit for Clean Fleet Strategy Development | Open Energy...

    Open Energy Info (EERE)

    strategy for reducing the envrionmental impacts of your fleet. To develop your own fleet strategy you need to follow the steps below. Start with opening the Step by Step action...

  1. LEDSGP/Transportation Toolkit/Training | Open Energy Information

    Open Energy Info (EERE)

    and Programs - Dario Hidalgo, World Resources Institute-EMBARQ Videos and Presentations Alternative Fuels and Advanced Vehicles U.S. Clean Cities TV Clean Cities TV is the...

  2. Toolkit for Public-Private Partnerships in Roads and Highways...

    Open Energy Info (EERE)

    World Bank Sector: Energy Focus Area: Transportation Resource Type: Guidemanual User Interface: Website Website: www.ppiaf.orgppiafsitesppiaf.orgfilesdocuments...

  3. LEDSGP/Transportation Toolkit/Training | Open Energy Information

    Open Energy Info (EERE)

    petroleum consumption in transportation. Car Sharing Robin Chase on Zipcar and her next big idea Robin Chase founded Zipcar, the world's biggest car-sharing business. With...

  4. Toolkit for Integrated Impact Assessments version 1.0

    Energy Science and Technology Software Center (OSTI)

    2007-05-14

    TIIA is designed to perform ecological and human risk assessments for environmental contaminants in air, water, soil, and sediment. It uses a novel approach that applies to radionuclides and hazardous chemicals, based on a food web approach. Stochastic calculations (i.e., those that allow for propagation of uncertainty in a numerical fashion) are allowed.

  5. Design and performance of a scalable, parallel statistics toolkit.

    SciTech Connect (OSTI)

    Thompson, David C.; Bennett, Janine Camille; Pebay, Philippe Pierre

    2010-11-01

    Most statistical software packages implement a broad range of techniques but do so in an ad hoc fashion, leaving users who do not have a broad knowledge of statistics at a disadvantage since they may not understand all the implications of a given analysis or how to test the validity of results. These packages are also largely serial in nature, or target multicore architectures instead of distributed-memory systems, or provide only a small number of statistics in parallel. This paper surveys a collection of parallel implementations of statistics algorithm developed as part of a common framework over the last 3 years. The framework strategically groups modeling techniques with associated verification and validation techniques to make the underlying assumptions of the statistics more clear. Furthermore it employs a design pattern specifically targeted for distributed-memory parallelism, where architectural advances in large-scale high-performance computing have been focused. Moment-based statistics (which include descriptive, correlative, and multicorrelative statistics, principal component analysis (PCA), and k-means statistics) scale nearly linearly with the data set size and number of processes. Entropy-based statistics (which include order and contingency statistics) do not scale well when the data in question is continuous or quasi-diffuse but do scale well when the data is discrete and compact. We confirm and extend our earlier results by now establishing near-optimal scalability with up to 10,000 processes.

  6. Afghanistan-NREL Resource Maps and Toolkits | Open Energy Information

    Open Energy Info (EERE)

    partnered with Afghanistan to develop high-resolution wind and solar resource maps and data products for Afghanistan. The data were output in Geographic Information Systems (GIS)...

  7. Transport Activity Measurement Toolkit (TAMT) | Open Energy Informatio...

    Open Energy Info (EERE)

    Latin America and the Caribbean Region Sustainable Development Department Transport Cluster in conjunction with the World Bank's Environment-Climate Change (ENV-CC) Department...

  8. Industrial Ratepayer-Funded SEP Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISO 50001. An independent third party audits each facility to verify its achievements and qualify it at the Silver, Gold, or Platinum level based on energy performance improvement. ...

  9. Highly Asynchronous VisitOr Queue Graph Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-10-01

    HAVOQGT is a C++ framework that can be used to create highly parallel graph traversal algorithms. The framework stores the graph and algorithmic data structures on external memory that is typically mapped to high performance locally attached NAND FLASH arrays. The framework supports a vertex-centered visitor programming model. The frameworkd has been used to implement breadth first search, connected components, and single source shortest path.

  10. Category:LEDSGP Development Impacts Assessment Toolkits | Open...

    Open Energy Info (EERE)

    Model S SEAGA Intermediate Level Handbook SimCLIM Simple Interactive Models for better air quality (SIM-air) Simplified Approach for Estimating Impacts of Electricity Generation...

  11. LEDSGP/Transportation Toolkit/Strategies | Open Energy Information

    Open Energy Info (EERE)

    and dual-fuel vehicles); non-petroleum fuel vehicles (such as natural gas, hydrogen fuel cell, and battery electric vehicles); and vehicle component improvements...

  12. LEDSGP/Transportation Toolkit/Strategies/Shift | Open Energy...

    Open Energy Info (EERE)

    and dual-fuel vehicles); non-petroleum fuel vehicles (such as natural gas, hydrogen fuel cell, and battery electric vehicles); and vehicle component improvements...

  13. LEDSGP/Transportation Toolkit/Strategies/Avoid | Open Energy...

    Open Energy Info (EERE)

    and dual-fuel vehicles); non-petroleum fuel vehicles (such as natural gas, hydrogen fuel cell, and battery electric vehicles); and vehicle component improvements...

  14. LEDSGP/Transportation Toolkit/Strategies/Improve | Open Energy...

    Open Energy Info (EERE)

    and dual-fuel vehicles); non-petroleum fuel vehicles (such as natural gas, hydrogen fuel cell, and battery electric vehicles); and vehicle component improvements...

  15. Renewable Energy Technical Potential Toolkit | Open Energy Information

    Open Energy Info (EERE)

    energy access universal? International Energy Agency Technical report Poor People's Energy Outlook 2010 Practical Action Technical report Solar design T-square Brian White...

  16. LEDSGP/Transportation Toolkit/Key Actions/Assess Opportunities...

    Open Energy Info (EERE)

    framework are intended to guide decision makers rather than prescribe a specific methodology. Evaluate the System Assess the current transportation situation in your country or...

  17. LEDSGP/Transportation Toolkit/Key Actions | Open Energy Information

    Open Energy Info (EERE)

    framework are intended to guide decision makers rather than prescribe a specific methodology. Evaluate the System Assess the current transportation situation in your country or...

  18. LEDSGP/Transportation Toolkit/Key Actions/Develop Alternative...

    Open Energy Info (EERE)

    framework are intended to guide decision makers rather than prescribe a specific methodology. Evaluate the System Assess the current transportation situation in your country or...

  19. Information Toolkit for post-2012 climate policies | Open Energy...

    Open Energy Info (EERE)

    Organization: Energy Research Centre of the Netherlands Partner: Brinkman Climate Change Sector: Energy Topics: Co-benefits assessment, Policiesdeployment programs, Pathways...

  20. Model Analysis ToolKit (MATK), Version 0

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Version 0 MATK provides basic functionality to facilitate model analysis within the Python computational environment. June 19, 2015 software MATK provides basic functionality to...

  1. Category:RAPID Toolkit Library | Open Energy Information

    Open Energy Info (EERE)

    of Water Resources 2 C.C.R. 410 - Rules and Regulations for the Management and Control of Designated Ground Water 2 CCR 402-10 - Rules and Regulations for Geothermal Well...

  2. Sequential detection of web defects

    DOE Patents [OSTI]

    Eichel, Paul H.; Sleefe, Gerard E.; Stalker, K. Terry; Yee, Amy A.

    2001-01-01

    A system for detecting defects on a moving web having a sequential series of identical frames uses an imaging device to form a real-time camera image of a frame and a comparitor to comparing elements of the camera image with corresponding elements of an image of an exemplar frame. The comparitor provides an acceptable indication if the pair of elements are determined to be statistically identical; and a defective indication if the pair of elements are determined to be statistically not identical. If the pair of elements is neither acceptable nor defective, the comparitor recursively compares the element of said exemplar frame with corresponding elements of other frames on said web until one of the acceptable or defective indications occur.

  3. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  4. Oxygen detection using evanescent fields

    DOE Patents [OSTI]

    Duan, Yixiang (Los Alamos, NM); Cao, Weenqing (Los Alamos, NM)

    2007-08-28

    An apparatus and method for the detection of oxygen using optical fiber based evanescent light absorption. Methylene blue was immobilized using a sol-gel process on a portion of the exterior surface of an optical fiber for which the cladding has been removed, thereby forming an optical oxygen sensor. When light is directed through the optical fiber, transmitted light intensity varies as a result of changes in the absorption of evanescent light by the methylene blue in response to the oxygen concentration to which the sensor is exposed. The sensor was found to have a linear response to oxygen concentration on a semi-logarithmic scale within the oxygen concentration range between 0.6% and 20.9%, a response time and a recovery time of about 3 s, ant to exhibit good reversibility and repeatability. An increase in temperature from 21.degree. C. to 35.degree. C. does not affect the net absorption of the sensor.

  5. Vertical flow chemical detection portal

    DOE Patents [OSTI]

    Linker, K.L.; Hannum, D.W.; Conrad, F.J.

    1999-06-22

    A portal apparatus is described for screening objects or persons for the presence of trace amounts of chemical substances such as illicit drugs or explosives. The apparatus has a test space, in which a person may stand, defined by two generally upright sides spanned by a horizontal transom. One or more fans in the transom generate a downward air flow (uni-directional) within the test space. The air flows downwardly from a high pressure upper zone, past the object or person to be screened. Air moving past the object dislodges from the surface thereof both volatile and nonvolatile particles of the target substance. The particles are entrained into the air flow which continues flowing downward to a lower zone of reduced pressure, where the particle-bearing air stream is directed out of the test space and toward preconcentrator and detection components. The sides of the portal are specially configured to partially contain and maintain the air flow. 3 figs.

  6. Explosives detection system and method

    DOE Patents [OSTI]

    Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  7. Vertical flow chemical detection portal

    DOE Patents [OSTI]

    Linker, Kevin L. (Albuquerque, NM); Hannum, David W. (Albuquerque, NM); Conrad, Frank James (Russellville, SC)

    1999-01-01

    A portal apparatus for screening objects or persons for the presence of trace amounts of chemical substances such as illicit drugs or explosives. The apparatus has a test space, in which a person may stand, defined by two generally upright sides spanned by a horizontal transom. One or more fans in the transom generate a downward air flow (uni-directional) within the test space. The air flows downwardly from a high pressure upper zone, past the object or person to be screened. Air moving past the object dislodges from the surface thereof both volatile and nonvolatile particles of the target substance. The particles are entrained into the air flow which continues flowing downward to a lower zone of reduced pressure, where the particle-bearing air stream is directed out of the test space and toward preconcentrator and detection components. The sides of the portal are specially configured to partially contain and maintain the air flow.

  8. Spectral analysis method for detecting an element

    DOE Patents [OSTI]

    Blackwood, Larry G [Idaho Falls, ID; Edwards, Andrew J [Idaho Falls, ID; Jewell, James K [Idaho Falls, ID; Reber, Edward L [Idaho Falls, ID; Seabury, Edward H [Idaho Falls, ID

    2008-02-12

    A method for detecting an element is described and which includes the steps of providing a gamma-ray spectrum which has a region of interest which corresponds with a small amount of an element to be detected; providing nonparametric assumptions about a shape of the gamma-ray spectrum in the region of interest, and which would indicate the presence of the element to be detected; and applying a statistical test to the shape of the gamma-ray spectrum based upon the nonparametric assumptions to detect the small amount of the element to be detected.

  9. Cellular telephone-based radiation detection instrument

    DOE Patents [OSTI]

    Craig, William W. (Pittsburg, CA); Labov, Simon E. (Berkeley, CA)

    2011-06-14

    A network of radiation detection instruments, each having a small solid state radiation sensor module integrated into a cellular phone for providing radiation detection data and analysis directly to a user. The sensor module includes a solid-state crystal bonded to an ASIC readout providing a low cost, low power, light weight compact instrument to detect and measure radiation energies in the local ambient radiation field. In particular, the photon energy, time of event, and location of the detection instrument at the time of detection is recorded for real time transmission to a central data collection/analysis system. The collected data from the entire network of radiation detection instruments are combined by intelligent correlation/analysis algorithms which map the background radiation and detect, identify and track radiation anomalies in the region.

  10. Buried object detection in GPR images

    DOE Patents [OSTI]

    Paglieroni, David W; Chambers, David H; Bond, Steven W; Beer, W. Reginald

    2014-04-29

    A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

  11. Indirect detection of radiation sources through direct detection of radiolysis products

    DOE Patents [OSTI]

    Farmer, Joseph C. (Tracy, CA); Fischer, Larry E. (Los Gatos, CA); Felter, Thomas E. (Livermore, CA)

    2010-04-20

    A system for indirectly detecting a radiation source by directly detecting radiolytic products. The radiation source emits radiation and the radiation produces the radiolytic products. A fluid is positioned to receive the radiation from the radiation source. When the fluid is irradiated, radiolytic products are produced. By directly detecting the radiolytic products, the radiation source is detected.

  12. DN detection during SLSF tests

    SciTech Connect (OSTI)

    Braid, T.H.; Harper, H.A.; Wilson, R.E.; Baldwin, R.D.; Gilbert, D.M.; Baxter, D.E.; Gillins, R.L.; Jeffries, G.L.

    1982-01-01

    During two tests in the Sodium Loop Safety Facility (W2 and P4), two systems were operated to detect delayed neutrons from exposed fuel. One monitored directly the sodium in the in-pile loop with a transit delay from the flux region of approx.2 seconds; the other conducted a sample stream of sodium to external detectors with a transit delay which could be varied from approx.10 to approx. 40 seconds. Detectors of a wide range of sensitivity were operated in pulse and current mode; DN signals varying from <1 mm/sup 2/ recoil to many grams of molten fuel could be recorded reliably without saturation. During the W2 and P4 tests a continuous DN record was made. Massive fuel failure signals were observed during reactor transients in both tests, including events interpreted as fuel melting and exposure of large areas. The steady signal from the blockage in P4 was studied as a function of reactor power and sodium temperature.

  13. Spot test kit for explosives detection

    DOE Patents [OSTI]

    Pagoria, Philip F; Whipple, Richard E; Nunes, Peter J; Eckels, Joel Del; Reynolds, John G; Miles, Robin R; Chiarappa-Zucca, Marina L

    2014-03-11

    An explosion tester system comprising a body, a lateral flow membrane swab unit adapted to be removeably connected to the body, a first explosives detecting reagent, a first reagent holder and dispenser operatively connected to the body, the first reagent holder and dispenser containing the first explosives detecting reagent and positioned to deliver the first explosives detecting reagent to the lateral flow membrane swab unit when the lateral flow membrane swab unit is connected to the body, a second explosives detecting reagent, and a second reagent holder and dispenser operatively connected to the body, the second reagent holder and dispenser containing the second explosives detecting reagent and positioned to deliver the second explosives detecting reagent to the lateral flow membrane swab unit when the lateral flow membrane swab unit is connected to the body.

  14. Nuclear Detection and Sensor Testing Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Detection and ... Nuclear Detection and Sensor Testing Center As part of our increased global nuclear nonproliferation efforts, Y-12 commissioned the Nuclear Detection and Sensor...

  15. Nonlinear nanomechanical oscillators for ultrasensitive inertial detection

    Office of Scientific and Technical Information (OSTI)

    (Patent) | SciTech Connect Patent: Nonlinear nanomechanical oscillators for ultrasensitive inertial detection Citation Details In-Document Search Title: Nonlinear nanomechanical oscillators for ultrasensitive inertial detection A system for ultrasensitive mass and/or force detection of this invention includes a mechanical oscillator driven to oscillate in a nonlinear regime. The mechanical oscillator includes a piezoelectric base with at least one cantilever resonator etched into the

  16. Apparatus for use in sulfide chemiluminescence detection

    DOE Patents [OSTI]

    Spurlin, S.R.; Yeung, E.S.

    1987-01-06

    A method is described for chemiluminescently determining a sulfide which is either hydrogen sulfide or methyl mercaptan by reacting the sulfide with chlorine dioxide at low pressure and under conditions which allow a longer reaction time in emission of a single photon for every two sulfide containing species, and thereafter, chemiluminescently detecting and determining the sulfide. The invention also relates not only to the detection method, but the novel chemical reaction and a specifically designed chemiluminescence detection cell for the reaction. 4 figs.

  17. Chemistry for Measurement and Detection Science publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chemistry for Measurement and Detection Science » Chemistry for Measurement and Detection Science publications Chemistry for Measurement and Detection Science publications Research into alternative forms of energy, especially energy security, is one of the major national security imperatives of this century. Get Expertise Randy Drake Actinide Analytical Chemistry Email Kirk Rector Physical Chemistry & Applied Spectroscopy Email Josh Smith Chemistry Communications Email Los Alamos is one of

  18. Detection and prevention of mycoplasma hominis infection

    DOE Patents [OSTI]

    DelVecchio, Vito G. (Scranton, PA); Gallia, Gary L. (Philadelphia, PA); McCleskey, Ferne K. (San Antonio, TX)

    1997-01-21

    The present invention is directed to a rapid and sensitive method for detecting Mycoplasma hominis using M. hominis-specific probes, oligonucleotides or antibodies. In particular a target sequence can be amplified by in vitro nucleic acid amplification techniques, detected by nucleic acid hybridization using the subject probes and oligonucleotides or detected by immunoassay using M. hominis-specific antibodies. M. hominis-specific nucleic acids which do not recognize or hybridize to genomic nucleic acid of other Mycoplasma species are also provided.

  19. Apparatus for use in sulfide chemiluminescence detection

    DOE Patents [OSTI]

    Spurlin, Stanford R. (Ames, IA); Yeung, Edward S. (Ames, IA)

    1987-01-01

    A method of chemiluminescently determining a sulfide which is either hydrogen sulfide or methyl mercaptan by reacting the sulfide with chlorine dioxide at low pressure and under conditions which allow a longer reaction time in emission of a single photon for every two sulfide containing species, and thereafter, chemiluminescently detecting and determining the sulfide. The invention also relates not only to the detection method, but the novel chemical reaction and a specifically designed chemiluminescence detection cell for the reaction.

  20. Nuclear Detonation Detection | National Nuclear Security Administratio...

    National Nuclear Security Administration (NNSA)

    NNSA builds the nation's operational sensors that monitor the entire planet from space to detect and report surface, atmospheric, or space nuclear detonations; produces and updates...

  1. Linux Kernel Error Detection and Correction

    Energy Science and Technology Software Center (OSTI)

    2007-04-11

    EDAC-utils consists fo a library and set of utilities for retrieving statistics from the Linux Kernel Error Detection and Correction (EDAC) drivers.

  2. Transport Test Problems for Radiation Detection Scenarios

    SciTech Connect (OSTI)

    Shaver, Mark W.; Miller, Erin A.; Wittman, Richard S.; McDonald, Benjamin S.

    2012-09-30

    This is the final report and deliverable for the project. It is a list of the details of the test cases for radiation detection scenarios.

  3. Radionuclide detection devices and associated methods

    DOE Patents [OSTI]

    Mann, Nicholas R. (Rigby, ID); Lister, Tedd E. (Idaho Falls, ID); Tranter, Troy J. (Idaho Falls, ID)

    2011-03-08

    Radionuclide detection devices comprise a fluid cell comprising a flow channel for a fluid stream. A radionuclide collector is positioned within the flow channel and configured to concentrate one or more radionuclides from the fluid stream onto at least a portion of the radionuclide collector. A scintillator for generating scintillation pulses responsive to an occurrence of a decay event is positioned proximate at least a portion of the radionuclide collector and adjacent to a detection system for detecting the scintillation pulses. Methods of selectively detecting a radionuclide are also provided.

  4. Nuclear Detonation Detection | National Nuclear Security Administratio...

    National Nuclear Security Administration (NNSA)

    the entire planet from space to detect and report surface, atmospheric, or space nuclear detonations; produces and updates the regional geophysical datasets enabling...

  5. Intrusion Detecting Using Secure Signatures - Energy Innovation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Current systems use public notice, patches, or a description of how to detect the security vulnerability, that may grant computer crackers information on the dangerous...

  6. Leak detection on an ethylene pipeline

    SciTech Connect (OSTI)

    Hamande, A.; Condacse, V.; Modisette, J.

    1995-12-31

    A model-based leak detection system has been in operation on the Solvay et Cie ethylene pipeline from Antwerp to Jemeppe on Sambre since 1989. The leak detection system, which is the commercial product PLDS of Modisette Associations, Inc., was originally installed by the supplier. Since 1991, all system maintenance and configuration changes have been done by Solvay et Cie personnel. Many leak tests have been performed, and adjustments have been made in the configuration and the automatic tuning parameters. The leak detection system is currently able to detect leaks of 2 tonnes/hour in 11 minutes with accurate location. Larger leaks are detected in about 2 minutes. Leaks between 0.5 and 1 tonne per hour are detected after several hours. (The nominal mass flow in the pipeline is 15 tonnes/hour, with large fluctuations.) Leaks smaller than 0.5 tonnes per hour are not detected, with the alarm thresholds set at levels to avoid false alarms. The major inaccuracies of the leak detection system appear to be associated with the ethylene temperatures.

  7. Detection of Electrophilic and Nucleophilic Chemical Agents

    DOE Patents [OSTI]

    McElhanon, James R. (Manteca, CA); Shepodd, Timothy J. (Livermore, CA)

    2008-11-11

    A "real time" method for detecting electrophilic and nucleophilic species generally by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species.

  8. Detection of latent prints by Raman imaging

    DOE Patents [OSTI]

    Lewis, Linda Anne (Andersonville, TN); Connatser, Raynella Magdalene (Knoxville, TN); Lewis, Sr., Samuel Arthur (Andersonville, TN)

    2011-01-11

    The present invention relates to a method for detecting a print on a surface, the method comprising: (a) contacting the print with a Raman surface-enhancing agent to produce a Raman-enhanced print; and (b) detecting the Raman-enhanced print using a Raman spectroscopic method. The invention is particularly directed to the imaging of latent fingerprints.

  9. Bioluminescent bioreporter integrated circuit detection methods

    DOE Patents [OSTI]

    Simpson, Michael L.; Paulus, Michael J.; Sayler, Gary S.; Applegate, Bruce M.; Ripp, Steven A.

    2005-06-14

    Disclosed are monolithic bioelectronic devices comprising a bioreporter and an OASIC. These bioluminescent bioreporter integrated circuit are useful in detecting substances such as pollutants, explosives, and heavy-metals residing in inhospitable areas such as groundwater, industrial process vessels, and battlefields. Also disclosed are methods and apparatus for detection of particular analytes, including ammonia and estrogen compounds.

  10. Nondestructive Examination (NDE) Detection and Characterization of

    Energy Savers [EERE]

    Degradation Precursors | Department of Energy Nondestructive Examination (NDE) Detection and Characterization of Degradation Precursors Nondestructive Examination (NDE) Detection and Characterization of Degradation Precursors The U.S. Department of Energy's (DOE) Light Water Reactor Sustainability (LWRS) Program is developing the fundamental scientific basis to understand, predict, and measure changes in materials and systems, structure, and components (SSCs) as they age in environments

  11. Distribution System Audits, Leak Detection, and Repair: Kirtland Air Force Base Leak Detection and Repair Program

    SciTech Connect (OSTI)

    2009-01-14

    Water Best Management Practice #3 Fact Seet: Outlines how a leak detection and repair program helped Kirtland Air Force Base perform distribution system audits, leak detection, and repair to conserve water site-wide.

  12. Laser-based Sensors for Chemical Detection

    SciTech Connect (OSTI)

    Myers, Tanya L.; Phillips, Mark C.; Taubman, Matthew S.; Bernacki, Bruce E.; Schiffern, John T.; Cannon, Bret D.

    2010-05-10

    Stand-off detection of hazardous materials ensures that the responder is located at a safe distance from the suspected source. Remote detection and identification of hazardous materials can be accomplished using a highly sensitive and portable device, at significant distances downwind from the source or the threat. Optical sensing methods, in particular infrared absorption spectroscopy combined with quantum cascade lasers (QCLs), are highly suited for the detection of chemical substances since they enable rapid detection and are amenable for autonomous operation in a compact and rugged package. This talk will discuss the sensor systems developed at Pacific Northwest National Laboratory and will discuss the progress to reduce the size and power while maintaining sensitivity to enable stand-off detection of multiple chemicals.

  13. Sensor for detecting changes in magnetic fields

    DOE Patents [OSTI]

    Praeg, Walter F. (Palos Park, IL)

    1981-01-01

    A sensor for detecting changes in the magnetic field of the equilibrium-field coil of a Tokamak plasma device comprises a pair of bifilar wires disposed circumferentially, one inside and one outside the equilibrium-field coil. Each is shorted at one end. The difference between the voltages detected at the other ends of the bifilar wires provides a measure of changing flux in the equilibrium-field coil. This difference can be used to detect faults in the coil in time to take action to protect the coil.

  14. Method for remote detection of trace contaminants

    DOE Patents [OSTI]

    Simonson, Robert J.; Hance, Bradley G.

    2003-09-09

    A method for remote detection of trace contaminants in a target area comprises applying sensor particles that preconcentrate the trace contaminant to the target area and detecting the contaminant-sensitive fluorescence from the sensor particles. The sensor particles can have contaminant-sensitive and contaminant-insensitive fluorescent compounds to enable the determination of the amount of trace contaminant present in the target are by relative comparison of the emission of the fluorescent compounds by a local or remote fluorescence detector. The method can be used to remotely detect buried minefields.

  15. Automated macromolecular crystal detection system and method

    DOE Patents [OSTI]

    Christian, Allen T. (Tracy, CA); Segelke, Brent (San Ramon, CA); Rupp, Bernard (Livermore, CA); Toppani, Dominique (Fontainebleau, FR)

    2007-06-05

    An automated macromolecular method and system for detecting crystals in two-dimensional images, such as light microscopy images obtained from an array of crystallization screens. Edges are detected from the images by identifying local maxima of a phase congruency-based function associated with each image. The detected edges are segmented into discrete line segments, which are subsequently geometrically evaluated with respect to each other to identify any crystal-like qualities such as, for example, parallel lines, facing each other, similarity in length, and relative proximity. And from the evaluation a determination is made as to whether crystals are present in each image.

  16. Thermal wake/vessel detection technique

    DOE Patents [OSTI]

    Roskovensky, John K. (Albuquerque, NM); Nandy, Prabal (Albuquerque, NM); Post, Brian N (Albuquerque, NM)

    2012-01-10

    A computer-automated method for detecting a vessel in water based on an image of a portion of Earth includes generating a thermal anomaly mask. The thermal anomaly mask flags each pixel of the image initially deemed to be a wake pixel based on a comparison of a thermal value of each pixel against other thermal values of other pixels localized about each pixel. Contiguous pixels flagged by the thermal anomaly mask are grouped into pixel clusters. A shape of each of the pixel clusters is analyzed to determine whether each of the pixel clusters represents a possible vessel detection event. The possible vessel detection events are represented visually within the image.

  17. High sensitivity leak detection method and apparatus

    DOE Patents [OSTI]

    Myneni, Ganapatic R. (Grafton, VA)

    1994-01-01

    An improved leak detection method is provided that utilizes the cyclic adsorption and desorption of accumulated helium on a non-porous metallic surface. The method provides reliable leak detection at superfluid helium temperatures. The zero drift that is associated with residual gas analyzers in common leak detectors is virtually eliminated by utilizing a time integration technique. The sensitivity of the apparatus of this disclosure is capable of detecting leaks as small as 1.times.10.sup.-18 atm cc sec.sup.-1.

  18. Sensor for detecting changes in magnetic fields

    DOE Patents [OSTI]

    Praeg, W.F.

    1980-02-26

    A sensor is described for detecting changes in the magnetic field of the equilibrium-field coil of a Tokamak plasma device that comprises a pair of bifilar wires disposed circumferentially, one inside and one outside the equilibrium-field coil. Each is shorted at one end. The difference between the voltages detected at the other ends of the bifilar wires provides a measure of changing flux in the equilibrium-field coil. This difference can be used to detect faults in the coil in time to take action to protect the coil.

  19. Colorimetric detection of uranium in water

    DOE Patents [OSTI]

    DeVol, Timothy A.; Hixon, Amy E.; DiPrete, David P.

    2012-03-13

    Disclosed are methods, materials and systems that can be used to determine qualitatively or quantitatively the level of uranium contamination in water samples. Beneficially, disclosed systems are relatively simple and cost-effective. For example, disclosed systems can be utilized by consumers having little or no training in chemical analysis techniques. Methods generally include a concentration step and a complexation step. Uranium concentration can be carried out according to an extraction chromatographic process and complexation can chemically bind uranium with a detectable substance such that the formed substance is visually detectable. Methods can detect uranium contamination down to levels even below the MCL as established by the EPA.

  20. Detecting persons concealed in a vehicle

    DOE Patents [OSTI]

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.