National Library of Energy BETA

Sample records for attack detection toolkit

  1. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  2. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  3. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  4. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  5. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  6. A toolkit for detecting technical surprise.

    SciTech Connect (OSTI)

    Trahan, Michael Wayne; Foehse, Mark C.

    2010-10-01

    The detection of a scientific or technological surprise within a secretive country or institute is very difficult. The ability to detect such surprises would allow analysts to identify the capabilities that could be a military or economic threat to national security. Sandia's current approach utilizing ThreatView has been successful in revealing potential technological surprises. However, as data sets become larger, it becomes critical to use algorithms as filters along with the visualization environments. Our two-year LDRD had two primary goals. First, we developed a tool, a Self-Organizing Map (SOM), to extend ThreatView and improve our understanding of the issues involved in working with textual data sets. Second, we developed a toolkit for detecting indicators of technical surprise in textual data sets. Our toolkit has been successfully used to perform technology assessments for the Science & Technology Intelligence (S&TI) program.

  7. HVAC Fault Detection and Diagnosis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2004-12-31

    This toolkit supports component-level model-based fault detection methods in commercial building HVAC systems. The toolbox consists of five basic modules: a parameter estimator for model calibration, a preprocessor, an AHU model simulator, a steady-state detector, and a comparator. Each of these modules and the fuzzy logic rules for fault diagnosis are described in detail. The toolbox is written in C++ and also invokes the SPARK simulation program.

  8. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... National SCADA Test Bed Screenshot from NESSUS Vulnerability Scanner Technical Objectives ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  9. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  10. Geospatial Toolkit

    SciTech Connect (OSTI)

    2010-10-14

    The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource assessment. The non-resource, country-specific data for each toolkit comes from a variety of agencies within each country as well as from global datasets. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. The revised version of the Geospatial Toolkit has been released for all original toolkit countries/regions and each software package is made available on NREL's website,

  11. Geospatial Toolkit

    Energy Science and Technology Software Center (OSTI)

    2010-10-14

    The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource assessment. The non-resource, country-specific data for each toolkit comes from a variety of agencies within each country as well as from global datasets. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Themore » revised version of the Geospatial Toolkit has been released for all original toolkit countries/regions and each software package is made available on NREL's website,« less

  12. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  13. COR Toolkit

    Broader source: Energy.gov [DOE]

    The COR Toolkit cited in the attachments to Policy Flash 2012-25 and posted to/linked from various DOE Internet pages has been withdrawn until further notice.

  14. Financing Initiatives Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Potential Toolkit Building Energy Assessment Toolkit Power System Screening and Design Toolkit Land Use Assessment Toolkit Bioenergy Assessment Toolkit Transportation...

  15. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  16. Local Toolkit

    Energy Science and Technology Software Center (OSTI)

    2007-05-31

    The LOCAL Toolkit contains tools and libraries developed under the LLNL LOCAL LDRD project for managing and processing large unstructured data sets primrily from parallel numerical simulations, such as triangular, tetrahedral, and hexahedral meshes, point sets, and graphs. The tools have three main functionalities: cache-coherent, linear ordering of multidimensional data; lossy and lossless data compression optimized for different data types; and an out-of-core streaming I/O library with simple processing modules for unstructed data.

  17. Better Buildings Training Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.govbbrn 1 T he Better Buildings Residential Network Training Toolkit can be used by ...

  18. Agricultural Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agricultural-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors...

  19. Commercial Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Commercial-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors Technology...

  20. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  1. LEDSGP/tools/toolkits | Open Energy Information

    Open Energy Info (EERE)

    Knowledge Portals LEDS Benefits Back to top LEDS-Related Toolkits DIA Toolkit This Development Impacts Assessment Toolkit helps country, regional, and local policymakers...

  2. Better Buildings Training Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.gov/bbrn 1 T he Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value of providing training opportunities for contractors, staff, and volunteers. For example, according to a comprehensive evaluation of more than 140 energy efficiency programs across the country that participated in a $500 million grant program,

  3. Quarterly Cybersecurity Awareness Campaigns and Toolkits | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Quarterly Cybersecurity Awareness Campaigns and Toolkits Quarterly Cybersecurity Awareness Campaigns and Toolkits The OCIO coordinates quarterly cybersecurity awareness campaigns ...

  4. Structural Simulation Toolkit. Lunch & Learn

    SciTech Connect (OSTI)

    Moore, Branden J.; Voskuilen, Gwendolyn Renae; Rodrigues, Arun F.; Hammond, Simon David; Hemmert, Karl Scott

    2015-09-01

    This is a presentation outlining a lunch and learn lecture for the Structural Simulation Toolkit, supported by Sandia National Laboratories.

  5. The model coupling toolkit.

    SciTech Connect (OSTI)

    Larson, J. W.; Jacob, R. L.; Foster, I.; Guo, J.

    2001-04-13

    The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form a high-performance coupled modeling system? We present our solution to this problem--The Model Coupling Toolkit (MCT). We explain how our effort to construct the Next-Generation Coupler for NCAR Community Climate System Model motivated us to create this toolkit. We describe in detail the conceptual design of the MCT and explain its usage in constructing parallel coupled models. We present preliminary performance results for the toolkit's parallel data transfer facilities. Finally, we outline an agenda for future development of the MCT.

  6. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  7. Voluntary Initiative: Partnerships Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voluntary Initiative: Partnerships Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, non-profit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success. Definition Partnerships are relationships between two or more

  8. REEEP Toolkits | Open Energy Information

    Open Energy Info (EERE)

    Policiesdeployment programs, Resource assessment, Pathways analysis, Background analysis Resource Type: Dataset References: REEEP Toolkit 1 This article is a stub. You...

  9. A Toolkit for Microgrid Design

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    To aid in optimal design of microgrids, and help avoid potential problems with maintenance, safety, power quality, and stability, Sandia has developed the Microgrid Design Toolkit ...

  10. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Laboratory (NREL). It integrates resource data and geographic information systems (GIS) - for integrated resource assessment. The Geospatial Toolkit (GsT) is a map-based...

  11. Bioenergy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Bioenergy Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities DevelopBAU Stage 4:...

  12. NREL: International Activities - Geospatial Toolkits

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource ...

  13. Supporting Small Forest Enterprises: A Facilitator's Toolkit...

    Open Energy Info (EERE)

    Small Forest Enterprises: A Facilitator's Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Supporting Small Forest Enterprises: A Facilitator's Toolkit Agency...

  14. Building Energy Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  15. Impact Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  16. Solar Integration National Dataset Toolkit | Grid Modernization...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integration National Dataset Toolkit NREL is working on a Solar Integration National Dataset (SIND) Toolkit to enable researchers to perform U.S. regional solar generation ...

  17. Social Media Toolkit | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Social Media Toolkit This Better Buildings Residential Network toolkit can be used to help residential energy efficiency programs learn to engage potential customers through social ...

  18. Voluntary Initiative: Partnerships Toolkit | Department of Energy

    Office of Environmental Management (EM)

    Partnerships Toolkit Voluntary Initiative: Partnerships Toolkit Residential energy efficiency programs are delivered by many different types of organizations and their partners, ...

  19. Better Buildings Training Toolkit | Department of Energy

    Office of Environmental Management (EM)

    Better Buildings Training Toolkit The Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value ...

  20. Better Buildings Residential Network Social Media Toolkit

    Broader source: Energy.gov (indexed) [DOE]

    Social Media Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.govbbrn 1 T his Better Buildings Residential Network toolkit can be used to help ...

  1. Multiphysics Application Coupling Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-12-02

    This particular consortium implementation of the software integration infrastructure will, in large part, refactor portions of the Rocstar multiphysics infrastructure. Development of this infrastructure originated at the University of Illinois DOE ASCI Center for Simulation of Advanced Rockets (CSAR) to support the center's massively parallel multiphysics simulation application, Rocstar, and has continued at IllinoisRocstar, a small company formed near the end of the University-based program. IllinoisRocstar is now licensing these new developments as free, openmore » source, in hopes to help improve their own and others' access to infrastructure which can be readily utilized in developing coupled or composite software systems; with particular attention to more rapid production and utilization of multiphysics applications in the HPC environment. There are two major pieces to the consortium implementation, the Application Component Toolkit (ACT), and the Multiphysics Application Coupling Toolkit (MPACT). The current development focus is the ACT, which is (will be) the substrate for MPACT. The ACT itself is built up from the components described in the technical approach. In particular, the ACT has the following major components: 1.The Component Object Manager (COM): The COM package provides encapsulation of user applications, and their data. COM also provides the inter-component function call mechanism. 2.The System Integration Manager (SIM): The SIM package provides constructs and mechanisms for orchestrating composite systems of multiply integrated pieces.« less

  2. Better Buildings Training Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Toolkit Better Buildings Training Toolkit The Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value of providing training opportunities for contractors, staff, and volunteers. Training Toolkit (666.76 KB) More Documents & Publications Better Buildings Network View | March 2015 Better Buildings Residential Network Membership Form Better Buildings Network View | November 2015

  3. Mesh Quality Improvement Toolkit

    Energy Science and Technology Software Center (OSTI)

    2002-11-15

    MESQUITE is a linkable software library to be used by simulation and mesh generation tools to improve the quality of meshes. Mesh quality is improved by node movement and/or local topological modifications. Various aspects of mesh quality such as smoothness, element shape, size, and orientation are controlled by choosing the appropriate mesh qualtiy metric, and objective function tempate, and a numerical optimization solver to optimize the quality of meshes, MESQUITE uses the TSTT mesh interfacemore » specification to provide an interoperable toolkit that can be used by applications which adopt the standard. A flexible code design makes it easy for meshing researchers to add additional mesh quality metrics, templates, and solvers to develop new quality improvement algorithms by making use of the MESQUITE infrastructure.« less

  4. TOOLKIT FOR ADVANCED OPTIMIZATION

    Energy Science and Technology Software Center (OSTI)

    2000-10-13

    The TAO project focuses on the development of software for large scale optimization problems. TAO uses an object-oriented design to create a flexible toolkit with strong emphasis on the reuse of external tools where appropriate. Our design enables bi-directional connection to lower level linear algebra support (for example, parallel sparse matrix data structures) as well as higher level application frameworks. The Toolkist for Advanced Optimization (TAO) is aimed at teh solution of large-scale optimization problemsmore » on high-performance architectures. Our main goals are portability, performance, scalable parallelism, and an interface independent of the architecture. TAO is suitable for both single-processor and massively-parallel architectures. The current version of TAO has algorithms for unconstrained and bound-constrained optimization.« less

  5. Hydropower RAPID Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hydropower RAPID Toolkit Hydropower RAPID Toolkit Hydropower RAPID Toolkit Providing project permitting process information for hydropower developers. Navigating the complex system of federal and state regulations to secure project approvals can be one of the biggest hurdles hydropower developers face. The U.S. Department of Energy (DOE) Hydropower Regulatory and Permitting Information Desktop (RAPID) Toolkit offers a solution. The Hydropower RAPID Toolkit makes permitting information easily

  6. Application experiences with the Globus toolkit.

    SciTech Connect (OSTI)

    Brunett, S.

    1998-06-09

    The Globus grid toolkit is a collection of software components designed to support the development of applications for high-performance distributed computing environments, or ''computational grids'' [14]. The Globus toolkit is an implementation of a ''bag of services'' architecture, which provides application and tool developers not with a monolithic system but rather with a set of stand-alone services. Each Globus component provides a basic service, such as authentication, resource allocation, information, communication, fault detection, and remote data access. Different applications and tools can combine these services in different ways to construct ''grid-enabled'' systems. The Globus toolkit has been used to construct the Globus Ubiquitous Supercomputing Testbed, or GUSTO: a large-scale testbed spanning 20 sites and included over 4000 compute nodes for a total compute power of over 2 TFLOPS. Over the past six months, we and others have used this testbed to conduct a variety of application experiments, including multi-user collaborative environments (tele-immersion), computational steering, distributed supercomputing, and high throughput computing. The goal of this paper is to review what has been learned from these experiments regarding the effectiveness of the toolkit approach. To this end, we describe two of the application experiments in detail, noting what worked well and what worked less well. The two applications are a distributed supercomputing application, SF-Express, in which multiple supercomputers are harnessed to perform large distributed interactive simulations; and a tele-immersion application, CAVERNsoft, in which the focus is on connecting multiple people to a distributed simulated world.

  7. SEP Toolkit Overview | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit Overview SEP Toolkit Overview Overview.pdf (124.2 KB) More Documents & Publications Industrial SEP Ratepayer-funded Accelerator Factsheet SEP Overview Slides How Industrial Energy Efficiency Can Support State Climate and Energy Planning

  8. TEVA-SPOT Toolkit 1.2

    Energy Science and Technology Software Center (OSTI)

    2007-07-26

    The TEVA-SPOT Toolkit (SPOT) supports the design of contaminant warning systems (CWSs) that use real-time sensors to detect contaminants in municipal water distribution networks. Specifically, SPOT provides the capability to select the locations for installing sensors in order to maximize the utility and effectiveness of the CWS. SPOT models the sensor placement process as an optimization problem, and the user can specify a wide range of performance objectives for contaminant warning system design, including populationmore » health effects, time to detection, extent of contamination, volume consumed and number of failed detections. For example, a SPOT user can integrate expert knowledge during the design process by specigying required sensor placements or designating network locations as forbidden. Further, cost considerations can be integrated by limiting the design with user-specified installation costs at each location.« less

  9. Local Government Community Solar Toolkit

    Broader source: Energy.gov [DOE]

    Community solar gardens can be an excellent opportunity for cities, counties, and other local governments to get involved in solar energy and engage community members. This toolkit has been created by Clean Energy Resource Teams to help consumers learn more about community solar.

  10. Rapid Toolkit Stakeholder Trial Demonstration

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit offers one location for agencies, developers, and industry stakeholders to work together on state and federal hydropower regulatory processes by using a wiki environment to share permitting guidance, regulations, contacts, and other relevant information.

  11. The Configuration Space Toolkit (C-Space Toolkit or CSTK) Ver. 2.5 beta

    Energy Science and Technology Software Center (OSTI)

    2010-02-24

    The C-Space Toolkit provides a software library that makes it easier to program motion planning, simulation, robotics, and virtual reality codes using the Configuration Space abstraction. Key functionality (1) enables the user to special create representations of movable and stationary rigid geometric objects, and (2) perform fast distance, interference (clash) detection, collision detection, closest-feature pairs, and contact queries in terms of object configuration. Not only can queries be computed at any given point in configurationmore » space, but they can be done exactly over linear-translational path segments and approximately for rotational path segments. Interference detection and distance computations can be done with respect to the Minkowski sum of the original geometry and a piece of convex geometry. The Toolkit takes as raw model input (1) collections of convex polygons that form the boundaries of models and (2) convex polyhedra, cones, cylinders, and discs that are models and model components. Configurations are given in terms of homogeneous transforms. A simple OpenGL-based system for displaying and animating the geometric objects is included in the implementation. This version, 2.5 Beta, incorporates feature additions and enhancements, improvements in algorithms, improved robustness, bug fixes and cleaned-up source code, better compliance with standards and recent programming convention, changes to the build process for the software, support for more recent hardware and software platforms, and improvements to documentation and source-code comments.« less

  12. Parallel Power Grid Simulation Toolkit

    Energy Science and Technology Software Center (OSTI)

    2015-09-14

    ParGrid is a 'wrapper' that integrates a coupled Power Grid Simulation toolkit consisting of a library to manage the synchronization and communication of independent simulations. The included library code in ParGid, named FSKIT, is intended to support the coupling multiple continuous and discrete even parallel simulations. The code is designed using modern object oriented C++ methods utilizing C++11 and current Boost libraries to ensure compatibility with multiple operating systems and environments.

  13. Category:LEDS Toolkit | Open Energy Information

    Open Energy Info (EERE)

    meant to support the creation and implementation of a Low Emission Development Strategy. Pages in category "LEDS Toolkit" The following 14 pages are in this category, out of...

  14. Workplace Charging Toolkit: Workshop Speaker Instruction Letter...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Instruction Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template Inform speakers participating in the employer experience panel about their role ...

  15. WPN 10-3: Procurement Toolkit CD

    Office of Energy Efficiency and Renewable Energy (EERE)

    To issue the Procurement Toolkit CD to all Grantees, to share with their local agencies, for use in the Weatherization Assistance Program.

  16. Workplace Charging Toolkit: Workshop Outreach Presentation Template...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Outreach Presentation Template Workplace Charging Toolkit: Workshop Outreach Presentation Template Educate workshop attendees and employers about the benefits of workplace charging ...

  17. Sustainable Forest Finance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    "This Toolkit has been developed jointly by PricewaterhouseCoopers (PwC) and the World Business Council for Sustainable Development (WBCSD). It is a globally applicable resource...

  18. Simulation Toolkit Promises Better Wind Predictions, Increased...

    Office of Environmental Management (EM)

    higher-than-expected downtimes and maintenance costs all undermine project profitability. ... The toolkit is being implemented within the Weather Research and Forecasting (WRF) model, ...

  19. Workplace Charging Toolkit: Workshop Invitation Template | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Invitation Template Workplace Charging Toolkit: Workshop Invitation Template Engage possible workplace charging event attendees with this template invitation. File General Workshop ...

  20. Voluntary Initiative on Incentives: Toolkit Training Webinar

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Peer Exchange Call Series: Voluntary Initiative on Incentives: Toolkit Training Webinar, Call Slides and Discussion Summary, March 26, 2015.

  1. TransportToolkit Prototype | Open Energy Information

    Open Energy Info (EERE)

    AgencyCompany Organization: Nick Langle ComplexityEase of Use: Not Available Cost: Free Transport Toolkit Region(s): Asia, Europe, Africa & Middle East, Australia & North...

  2. Transportation Assessment Toolkit/Home | Open Energy Information

    Open Energy Info (EERE)

    Transport Bikes in Spain Toolkit for Low Emissions Development Strategies in Transport Red buses Toolkit for Low Emissions Development Strategies in Transport A Rationale and...

  3. Galvin Electricity Initiative Policy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Galvin Electricity Initiative Policy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Galvin Electricity Initiative Policy Toolkit AgencyCompany Organization:...

  4. Renewable Energy and Energy Efficiency Toolkit Website | Open...

    Open Energy Info (EERE)

    Toolkit Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy and Energy Efficiency Toolkit Website Focus Area: Renewable Energy Topics: Policy...

  5. LEDSGP/Transportation Toolkit/Tools | Open Energy Information

    Open Energy Info (EERE)

    Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Tools for Low Emission Development Strategies in Transportation...

  6. A targeted proteomics toolkit for high-throughput absolute quantificat...

    Office of Scientific and Technical Information (OSTI)

    targeted proteomics toolkit for high-throughput absolute quantification of Escherichia coli proteins Citation Details In-Document Search Title: A targeted proteomics toolkit for ...

  7. Technology Cost and Performance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  8. Policy and Program Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  9. Climate Change and Clean Energy Project (CEnergy) Toolkit | Open...

    Open Energy Info (EERE)

    Project (CEnergy) Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Change and Clean Energy Project (CEnergy) Toolkit AgencyCompany Organization:...

  10. LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information

    Open Energy Info (EERE)

    Contact Us < LEDSGP | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Contacts for the LEDS GP...

  11. Project Screening and Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  12. Python-ARM Radar Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-03-17

    The Python-ARM Radar Toolkit (Py-ART) is a collection of radar quality control and retrieval codes which all work on two unifying Python objects: the PyRadar and PyGrid objects. By building ingests to several popular radar formats and then abstracting the interface Py-ART greatly simplifies data processing over several other available utilities. In addition Py-ART makes use of Numpy arrays as its primary storage mechanism enabling use of existing and extensive community software tools.

  13. BioenergizeME Virtual Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    139 | published 9/22/15 BioenergizeME Infographic Challenge Toolkit B i o e n e r g i z e M E U . S . D E P A R T M ENT O F E N E R G Y O P E R A T I O N B i o e n e r g i z e M E U . S . D E P A R T M ENT O F E N E R G Y Developing future leaders who will determine the bioenergy landscape of tomorrow DOE/EE-1139 | published 9/22/15 TABLE OF CONTENTS 1 INTRODUCTION ................................................................................................... 2 Why Bioenergy? Why Now?

  14. BioenergizeME Infographic Challenge Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit BioenergizeME Infographic Challenge Toolkit Toolkit for the BioenergizeME Infographic Challenge. bioenergizeme_toolkit.pdf (1.89 MB) More Documents & Publications Webinar: BioenergizeME Office Hours Webinar: Guide to the 2016 BioenergizeME Infographic Challenge BioenergizeME Infographic Challenge Flyer Webinar: BioenergizeME Office Hours Webinar: Biomass Basics

  15. TECA: A Parallel Toolkit for Extreme Climate Analysis

    SciTech Connect (OSTI)

    Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

    2012-03-12

    We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

  16. Utilizing The US Climate Resilience Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE)

    The U.S. Climate Resilience Toolkit provides scientific tools, information, and expertise to help professionals manage their climate-related risks and opportunities, and improve their resilience to extreme events.

  17. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (OSTI)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  18. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  19. NYSERDA-Wind Energy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    NYSERDA-Wind Energy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: NYSERDA-Wind Energy Toolkit AgencyCompany Organization: New York State Energy Research and...

  20. The Wind Integration National Dataset (WIND) Toolkit (Presentation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind Integration National Dataset (WIND) Toolkit Webinar Caroline Draxl and Bri-Mathias Hodge July 14, 2015 NRELPR-5000-64691 2 Content * Motivation * Creation of the WIND Toolkit ...

  1. NOAA Webinar: The U.S. Climate Resilience Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE)

    Hosted by the National Oceanic and Atmospheric Administration (NOAA), this webinar will demonstrate the U.S. Climate Resilience Toolkit.

  2. SIERRA Toolkit v. 1.0

    Energy Science and Technology Software Center (OSTI)

    2010-02-24

    The SIERRA Toolkit is a collection of libraries to facilitate the development of parallel engineering analysis applications. These libraries supply basic core services that an engineering analysis application may need such as a parallel distributed and dynamic mesh database (for unstructured meshes), mechanics algorithm support (parallel infrastructure only), interfaces to parallel solvers, parallel mesh and data I/O, and various utilities (timers, diagnostic tools, etc.).The toolkit is intended to reduce the effort required to develop anmore » engineering analysis application by removing the need to develop core capabilities that most every application would require.« less

  3. Co-Optima Simulation Toolkit Team

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Simulation Toolkit Team June 9, 2016 2 Co-Optimization of Fuels and Engines (Co-Optima) - Simulation Toolkit Team This presentation does not contain any proprietary, confidential, or otherwise restricted information FT040 M. McNenly, 1 S. Som, 2 D. Carrington, 3 K. D. Edwards, 4 R. Grout, 5 J. Kodavasal, 2 G. Lacaze, 6 J. Oefelein, 6 P. Pal, 2 V. Ram, 2 N. Van Dam, 2 J. Waters, 3 and R. Whitesides 1 1. Lawrence Livermore National Laboratory 2. Argonne National Laboratory 3. Los Alamos National

  4. Portable Extensible Toolkit for Scientific Computation

    Energy Science and Technology Software Center (OSTI)

    1995-06-30

    PETSC2.0 is a software toolkit for portable, parallel (and serial) numerical solution of partial differential equations and minimization problems. It includes software for the solution of linear and nonlinear systems of equations. These codes are written in a data-structure-neutral manner to enable easy reuse and flexibility.

  5. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth's weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  6. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth`s weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  7. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  8. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  9. Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Instruction Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template Inform speakers participating in the employer experience panel about their role in the event. General Speaker Instruction Letter Template (707.41 KB) Clean Cities Branded Speaker Instruction Letter Template (707.23 KB) More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach

  10. LBNL: Architecture 2030 District Program and Small Commercial Toolkit |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit Lead Performer: Lawrence Berkeley National Laboratory - Berkeley, CA Partners: - Architecture 2030 - Santa Fe, NM - Cleveland 2030 District - Cleveland, OH - Green Building Alliance/Pittsburgh 2030 District - Pittsburgh, PA - Seattle 2030 District - Seattle, WA -

  11. Supply Chain Risk Management (SCRM) Awareness Toolkit | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Supply Chain Risk Management (SCRM) Awareness Toolkit Supply Chain Risk Management (SCRM) Awareness Toolkit The Office of the Chief Information Officer (OCIO) Supply Chain Risk Management (SCRM) Resource Center developed the SCRM Awareness Toolkit to introduce DOE employees to the basic terms and concepts of the technology supply chain and associated threats. For additional information on the DOE Enterprise SCRM Resource Center and program initiatives, please contact Sue Farrand at

  12. Online Toolkit Fosters Bioenergy Innovation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit Fosters Bioenergy Innovation Online Toolkit Fosters Bioenergy Innovation January 21, 2011 - 2:27pm Addthis Learn more about the Bioenergy Knowledge Discovery Framework, an online data sharing and mapping toolkit. Paul Bryan Biomass Program Manager, Office of Energy Efficiency & Renewable Energy What will the project do? The $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a facility that will nearly triple the amount of renewable

  13. ACHP - Section 106 Applicant Toolkit | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: ACHP - Section 106 Applicant ToolkitPermittingRegulatory GuidanceGuide...

  14. Grid-Connected Renewable Energy Generation Toolkit-Biomass |...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Grid-Connected Renewable Energy Generation Toolkit-Biomass AgencyCompany Organization: United States Agency for...

  15. Integrated: Geospatial Toolkit GIS data for Nicaragua from NREL...

    Open Energy Info (EERE)

    Nicaragua from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  16. Integrated: Geospatial Toolkit GIS data for Cuba from NREL -...

    Open Energy Info (EERE)

    Cuba from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  17. Geospatial Toolkit (GsT) Webinar | Open Energy Information

    Open Energy Info (EERE)

    wikiGsT Equivalent URI: cleanenergysolutions.orgcontentgeospatial-toolkit-gst Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance...

  18. Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  19. Integrated: Geospatial Toolkit GIS data for India from NREL ...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  20. ORISE: Radiological Terrorism Toolkit | How ORISE is Making a...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Education (ORISE) distributed more than 400 radiological terrorism toolkits filled with key resources, such as training guidelines, clinical directives, details about radioactive...

  1. LEDSGP/DIA-Toolkit/Uses | Open Energy Information

    Open Energy Info (EERE)

    (DIA) Toolkit offers a structured way to consider the impact of proposed low emission development strategies (LEDS) on other national or local priorities, and provides links to...

  2. YT: A Multi-Code Analysis Toolkit for Astrophysical Simulation...

    Office of Scientific and Technical Information (OSTI)

    Citation Details In-Document Search Title: YT: A Multi-Code Analysis Toolkit for ... Furthermore, we discuss the underlying algorithms yt uses for processing and visualizing ...

  3. Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)

    SciTech Connect (OSTI)

    Young, K.

    2014-04-01

    Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

  4. LEDSGP/DIA-Toolkit/Request Assistance | Open Energy Information

    Open Energy Info (EERE)

    Impacts Assessment Toolkit Home Tools Request Assistance Remote Expert Assistance on LEDS The Low Emission Development Strategies (LEDS) Global Partnership provides timely,...

  5. Workplace Charging Toolkit: Workshop Host Outreach Letter Template...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Host Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach Letter Template Approach employers in your community that already have workplace charging to serve ...

  6. ORISE: Pandemic Flu Toolkits | How ORISE is Making a Difference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workshops that have been presented to the Asia-Pacific Economic Cooperation (APEC) and other nations around the world. By developing training toolkits and providing...

  7. WRI-The Governance of Forests Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Publications Website: pdf.wri.orgworkingpapersgfitenureindicatorssep09.pdf Cost: Free WRI-The Governance of Forests Toolkit Screenshot References: WRI-The Governance of...

  8. Category:Wind Working Group Toolkit | Open Energy Information

    Open Energy Info (EERE)

    search This wiki-based Wind Working Group Toolkit provides links to information, methods, and resources. This wiki is a work in progress, and we welcome your contributions....

  9. Distributed Renewable Energy Finance and Policy Toolkit | Open...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Distributed Renewable Energy Finance and Policy Toolkit AgencyCompany Organization: Clean Energy States Alliance...

  10. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  11. Graph algorithms in the titan toolkit.

    SciTech Connect (OSTI)

    McLendon, William Clarence, III; Wylie, Brian Neil

    2009-10-01

    Graph algorithms are a key component in a wide variety of intelligence analysis activities. The Graph-Based Informatics for Non-Proliferation and Counter-Terrorism project addresses the critical need of making these graph algorithms accessible to Sandia analysts in a manner that is both intuitive and effective. Specifically we describe the design and implementation of an open source toolkit for doing graph analysis, informatics, and visualization that provides Sandia with novel analysis capability for non-proliferation and counter-terrorism.

  12. An Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B; Payne, Patricia W

    2012-01-01

    Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

  13. Parallel Climate Analysis Toolkit (ParCAT)

    SciTech Connect (OSTI)

    Smith, Brian Edward

    2013-06-30

    The parallel analysis toolkit (ParCAT) provides parallel statistical processing of large climate model simulation datasets. ParCAT provides parallel point-wise average calculations, frequency distributions, sum/differences of two datasets, and difference-of-average and average-of-difference for two datasets for arbitrary subsets of simulation time. ParCAT is a command-line utility that can be easily integrated in scripts or embedded in other application. ParCAT supports CMIP5 post-processed datasets as well as non-CMIP5 post-processed datasets. ParCAT reads and writes standard netCDF files.

  14. MCS Large Cluster Systems Software Toolkit

    Energy Science and Technology Software Center (OSTI)

    2002-11-01

    This package contains a number of systems utilities for managing a set of computers joined in a "cluster". The utilities assist a team of systems administrators in managing the cluster by automating routine tasks, centralizing information, and monitoring individual computers within the cluster. Included in the toolkit are scripts used to boot a computer from a floppy, a program to turn on and off the power to a system, and a system for using amore » database to organize cluster information.« less

  15. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  16. WAP Memorandum 015: Weatherization Financial Toolkit – 2 CFR 200 Regulations and Procurement Procedures

    Broader source: Energy.gov [DOE]

    This Memorandum serves to update and supersede the Financial Toolkit, previously issued in Weatherization Program Notice (WPN) 12-4, Weatherization Assistance Program Financial Management Training Toolkit dated December 9, 2011, and the Procurement Toolkit previously issued in WPN 10-3, Procurement Toolkit CD, dated October 30, 2009.

  17. Monitoring Extreme-scale Lustre Toolkit

    SciTech Connect (OSTI)

    Brim, Michael J; Lothian, Josh

    2015-01-01

    We discuss the design and ongoing development of the Monitoring Extreme-scale Lustre Toolkit (MELT), a unified Lustre performance monitoring and analysis infrastructure that provides continuous, low-overhead summary information on the health and performance of Lustre, as well as on-demand, in-depth problem diagnosis and root-cause analysis. The MELT infrastructure leverages a distributed overlay network to enable monitoring of center-wide Lustre filesystems where clients are located across many network domains. We preview interactive command-line utilities that help administrators and users to observe Lustre performance at various levels of resolution, from individual servers or clients to whole filesystems, including job-level reporting. Finally, we discuss our future plans for automating the root-cause analysis of common Lustre performance problems.

  18. Solar for Safety, Security, and Resilience Toolkit

    Broader source: Energy.gov [DOE]

    There is a growing interest in using renewable energy options like solar to improve community resiliency. During extreme weather events, solar can help prevent power outages by providing emergency energy to critical facilities and recovery efforts. Solar can provide electricity to remote or less accessible areas, and is flexible enough to be a mobile or temporary power source. In addition to resiliency planning, there are efforts to promote new safety education and guidelines for solar installation, especially related to fire prevention. Also, there is rising interest in how solar can influence homeland security. The Solar for Safety, Security, and Resilience Toolkit demonstrates the different ways of thinking about and incorporating solar energy into ongoing public safety, homeland security, and resiliency initiatives.

  19. Data Exploration Toolkit for serial diffraction experiments

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zeldin, Oliver B.; Brewster, Aaron S.; Hattne, Johan; Uervirojnangkoorn, Monarin; Lyubimov, Artem Y.; Zhou, Qiangjun; Zhao, Minglei; Weis, William I.; Sauter, Nicholas K.; Brunger, Axel T.

    2015-01-23

    Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many distinct crystals and/or different regions of the same crystal. Combined with other sources of XFEL shot-to-shot variation, this introduces significant heterogeneity into the diffraction data, complicating processing and interpretation. To enable researchers to get the most from their collected data, a toolkit is presented that provides insights into the quality of, and the variation present in, serial crystallography datamore » sets. These tools operate on the unmerged, partial intensity integration results from many individual crystals, and can be used on two levels: firstly to guide the experimental strategy during data collection, and secondly to help users make informed choices during data processing.« less

  20. Integrated: Geospatial Toolkit for Honduras from NREL - Datasets...

    Open Energy Info (EERE)

    and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

  1. Template:RegulatoryToolkitHeader | Open Energy Information

    Open Energy Info (EERE)

    Toolkit banner, typically across the top of the page, which features a unique blue color scheme and simple menu. Parameters none Usage It should be called in the following...

  2. Simulation Toolkit Promises Better Wind Predictions, Increased Farm

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Production | Department of Energy Simulation Toolkit Promises Better Wind Predictions, Increased Farm Production Simulation Toolkit Promises Better Wind Predictions, Increased Farm Production May 11, 2016 - 6:16pm Addthis Wind farm production frequently falls short of expectations. Poor forecasts of low-altitude winds, suboptimal wind plant design and operation, and higher-than-expected downtimes and maintenance costs all undermine project profitability. Each of these issues results from

  3. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  4. UQ Toolkit v 2.0

    Energy Science and Technology Software Center (OSTI)

    2013-10-03

    The Uncertainty Quantification (UQ) Toolkit is a software library for the characterizaton and propagation of uncertainties in computational models. For the characterization of uncertainties, Bayesian inference tools are provided to infer uncertain model parameters, as well as Bayesian compressive sensing methods for discovering sparse representations of high-dimensional input-output response surfaces, and also Karhunen-Loève expansions for representing stochastic processes. Uncertain parameters are treated as random variables and represented with Polynomial Chaos expansions (PCEs). The library implementsmore » several spectral basis function types (e.g. Hermite basis functions in terms of Gaussian random variables or Legendre basis functions in terms of uniform random variables) that can be used to represent random variables with PCEs. For propagation of uncertainty, tools are provided to propagate PCEs that describe the input uncertainty through the computational model using either intrusive methods (Galerkin projection of equations onto basis functions) or non-intrusive methods (perform deterministic operation at sampled values of the random values and project the obtained results onto basis functions).« less

  5. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect (OSTI)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  6. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  7. XOP 2.1 - a new version of the x-ray optics software toolkit...

    Office of Scientific and Technical Information (OSTI)

    XOP 2.1 - a new version of the x-ray optics software toolkit. Citation Details In-Document Search Title: XOP 2.1 - a new version of the x-ray optics software toolkit. No abstract ...

  8. Validation of Power Output for the WIND Toolkit

    SciTech Connect (OSTI)

    King, J.; Clifton, A.; Hodge, B. M.

    2014-09-01

    Renewable energy integration studies require wind data sets of high quality with realistic representations of the variability, ramping characteristics, and forecast performance for current wind power plants. The Wind Integration National Data Set (WIND) Toolkit is meant to be an update for and expansion of the original data sets created for the weather years from 2004 through 2006 during the Western Wind and Solar Integration Study and the Eastern Wind Integration Study. The WIND Toolkit expands these data sets to include the entire continental United States, increasing the total number of sites represented, and it includes the weather years from 2007 through 2012. In addition, the WIND Toolkit has a finer resolution for both the temporal and geographic dimensions. Three separate data sets will be created: a meteorological data set, a wind power data set, and a forecast data set. This report describes the validation of the wind power data set.

  9. DATE:

    Office of Environmental Management (EM)

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  10. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Toolkit for Installing Solar on K-12 Schools

    Broader source: Energy.gov [DOE]

    Following the release of The Solar Foundation's Brighter Future: A Study on Solar in U.S. Schools under the Solar Outreach Partnership, the organization has been working to help more K-12 public schools go solar through its technical assistance program. As part of this effort, they developed the Toolkit for Installing Solar on K-12 Schools to compile new and existing resources, designed to provide public school officials with a starting point for pursuing their own solar projects. Hands-on guidance in putting the ideas contained within this toolkit into action is available through the SolarOPs Technical Assistance program.

  12. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  13. Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B.

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability to be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is used to

  14. Incident Management Preparedness and Coordination Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability tomore » be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is

  15. Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    NREL developed the Geospatial Toolkit (GsT), a map-based software application that integrates resource data and geographic information systems (GIS) for integrated resource assessment. A variety of agencies within countries, along with global datasets, provided country-specific data. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Toolkits are available for 21 countries and each one can be downloaded separately. The source code for the toolkit is also available. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

  16. Capturing and Using Knowledge about the Use of Visualization Toolkits

    SciTech Connect (OSTI)

    Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

    2012-11-02

    When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

  17. Cubit Mesh Generation Toolkit V11.1

    Energy Science and Technology Software Center (OSTI)

    2009-03-25

    CUBIT prepares models to be used in computer-based simulation of real-world events. CUBIT is a full-featured software toolkit for robust generation of two- and three-dimensional finite element meshes (grids) and geometry preparation. Its main goal is to reduce the time to generate meshes, particularly large hex meshes of complicated, interlocking assemblies.

  18. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  19. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  20. Guide to Using the WIND Toolkit Validation Code

    SciTech Connect (OSTI)

    Lieberman-Cribbin, W.; Draxl, C.; Clifton, A.

    2014-12-01

    In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to provide information on wind speed, wind direction, temperature, surface air pressure, and air density on more than 126,000 locations across the United States from 2007 to 2013. The numerical weather prediction model output, gridded at 2-km and at a 5-minute resolution, was further converted to detail the wind power production time series of existing and potential wind facility sites. For users of the dataset it is important that the information presented in the WIND Toolkit is accurate and that errors are known, as then corrective steps can be taken. Therefore, we provide validation code written in R that will be made public to provide users with tools to validate data of their own locations. Validation is based on statistical analyses of wind speed, using error metrics such as bias, root-mean-square error, centered root-mean-square error, mean absolute error, and percent error. Plots of diurnal cycles, annual cycles, wind roses, histograms of wind speed, and quantile-quantile plots are created to visualize how well observational data compares to model data. Ideally, validation will confirm beneficial locations to utilize wind energy and encourage regional wind integration studies using the WIND Toolkit.

  1. LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline ...

    Open Energy Info (EERE)

    a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Key Actions for Low-Emission Development in Transportation...

  2. RAPID Toolkit: Facilitating Utility-Scale Renewable Energy Development; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    2015-04-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit provides information about permits and regulations that affect renewable energy and bulk transmission projects.

  3. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  4. The Wind Integration National Dataset (WIND) toolkit (Presentation)

    SciTech Connect (OSTI)

    Caroline Draxl: NREL

    2014-01-01

    Regional wind integration studies require detailed wind power output data at many locations to perform simulations of how the power system will operate under high penetration scenarios. The wind datasets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as being time synchronized with available load profiles.As described in this presentation, the WIND Toolkit fulfills these requirements by providing a state-of-the-art national (US) wind resource, power production and forecast dataset.

  5. Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit combines the former Geothermal Regulatory Roadmap, National Environmental Policy Act (NEPA) Database, and other resources into a Web-based tool that gives the regulatory and utility-scale geothermal developer communities rapid and easy access to permitting information. RAPID currently comprises five tools - Permitting Atlas, Regulatory Roadmap, Resource Library, NEPA Database, and Best Practices. A beta release of an additional tool, the Permitting Wizard, is scheduled for late 2014. Because of the huge amount of information involved, RAPID was developed in a wiki platform to allow industry and regulatory agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users. In 2014, the content was expanded to include regulatory requirements for utility-scale solar and bulk transmission development projects. Going forward, development of the RAPID Toolkit will focus on expanding the capabilities of current tools, developing additional tools, including additional technologies, and continuing to increase stakeholder involvement.

  6. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cyber Security Audit and Attack Detection Toolkit project developed two commercial solutions-Bandolier and Portaledge. The Bandolier Audit Files enable energy sector asset ...

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. Overview and Meteorological Validation of the Wind Integration National Dataset toolkit

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Clifton, A.; McCaa, J.

    2015-04-13

    The Wind Integration National Dataset (WIND) Toolkit described in this report fulfills these requirements, and constitutes a state-of-the-art national wind resource data set covering the contiguous United States from 2007 to 2013 for use in a variety of next-generation wind integration analyses and wind power planning. The toolkit is a wind resource data set, wind forecast data set, and wind power production and forecast data set derived from the Weather Research and Forecasting (WRF) numerical weather prediction model. WIND Toolkit data are available online for over 116,000 land-based and 10,000 offshore sites representing existing and potential wind facilities.

  9. MeSh ToolKit v1.2

    Energy Science and Technology Software Center (OSTI)

    2004-05-15

    MSTK or Mesh Toolkit is a mesh framework that allows users to represent, manipulate and query unstructured 3D arbitrary topology meshes in a general manner without the need to code their own data structures. MSTK is a flexible framework in that is allows (or will eventually allow) a wide variety of underlying representations for the mesh while maintaining a common interface. It will allow users to choose from different mesh representations either at initialization ormore » during the program execution so that the optimal data structures are used for the particular algorithm. The interaction of users and applications with MSTK is through a functional interface that acts as through the mesh always contains vertices, edges, faces and regions and maintains connectivity between all these entities.« less

  10. PHISICS TOOLKIT: MULTI-REACTOR TRANSMUTATION ANALYSIS UTILITY - MRTAU

    SciTech Connect (OSTI)

    Andrea Alfonsi; Cristian Rabiti; Aaron S. Epiney; Yaqi Wang; Joshua Cogliati

    2012-04-01

    The principal idea of this paper is to present the new capabilities available in the PHISICS toolkit, connected with the implementation of the depletion code MRTAU, a generic depletion/ decay/burn-up code developed at the Idaho National Laboratory. It is programmed in a modular structure and modern FORTRAN 95/2003. The code tracks the time evolution of the isotopic concentration of a given material accounting for nuclear reaction happening in presence of neutron flux and also due to natural decay. MRTAU has two different methods to perform the depletion calculation, in order to let the user choose the best one respect his needs. Both the methodologies and some significant results are reported in this paper.

  11. Energy Department Announces Publication of Better Buildings Energy Data Accelerator Resources Toolkit

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy today announced the publication of a high-impact, informational resources toolkit through its Better Buildings Energy Data Accelerator developed in partnership with 18...

  12. Challenges and Opportunities in Using Automatic Differentiation with Object-Oriented Toolkits for Scientific Computing

    SciTech Connect (OSTI)

    Hovland, P; Lee, S; McInnes, L; Norris, B; Smith, B

    2001-04-17

    The increased use of object-oriented toolkits in large-scale scientific simulation presents new opportunities and challenges for the use of automatic (or algorithmic) differentiation (AD) techniques, especially in the context of optimization. Because object-oriented toolkits use well-defined interfaces and data structures, there is potential for simplifying the AD process. Furthermore, derivative computation can be improved by exploiting high-level information about numerical and computational abstractions. However, challenges to the successful use of AD with these toolkits also exist. Among the greatest challenges is balancing the desire to limit the scope of the AD process with the desire to minimize the work required of a user. They discuss their experiences in integrating AD with the PETSc, PVODE, and TAO toolkits and the plans for future research and development in this area.

  13. Wind Integration National Dataset (WIND) Toolkit; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    Draxl, Caroline; Hodge, Bri-Mathias

    2015-07-14

    A webinar about the Wind Integration National Dataset (WIND) Toolkit was presented by Bri-Mathias Hodge and Caroline Draxl on July 14, 2015. It was hosted by the Southern Alliance for Clean Energy. The toolkit is a grid integration data set that contains meteorological and power data at a 5-minute resolution across the continental United States for 7 years and hourly power forecasts.

  14. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:www.nnsa.energy.govmediaroompressreleasesncstateconsortium

  15. The NetLogger Toolkit V2.0

    Energy Science and Technology Software Center (OSTI)

    2003-03-28

    The NetLogger Toolkit is designed to monitor, under actual operating conditions, the behavior of all the elements of the application-to-application communication path in order to determine exactly where time is spent within a complex system Using NetLogger, distnbuted application components are modified to produce timestamped logs of "interesting" events at all the critical points of the distributed system Events from each component are correlated, which allov^ one to characterize the performance of all aspects ofmore » the system and network in detail. The NetLogger Toolkit itself consists of four components an API and library of functions to simplify the generation of application-level event logs, a set of tools for collecting and sorting log files, an event archive system, and a tool for visualization and analysis of the log files In order to instrument an application to produce event logs, the application developer inserts calls to the NetLogger API at all the critical points in the code, then links the application with the NetLogger library All the tools in the NetLogger Toolkit share a common log format, and assume the existence of accurate and synchronized system clocks NetLogger messages can be logged using an easy-to-read text based format based on the lETF-proposed ULM format, or a binary format that can still be used through the same API but that is several times faster and smaller, with performance comparable or better than binary message formats such as MPI, XDR, SDDF-Binary, and PBIO. The NetLogger binary format is both highly efficient and self-describing, thus optimized for the dynamic message construction and parsing of application instrumentation. NetLogger includes an "activation" API that allows NetLogger logging to be turned on, off, or modified by changing an external file This IS useful for activating logging in daemons/services (e g GndFTP server). The NetLogger reliability API provides the ability to specify backup logging locations and

  16. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:nnsa.energy.govmediaroompressreleasesncstateconsortium

  17. Detect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    coherent Raman scattering Standoff detection of physical and chemical signatures from manufacturing and concealed deployment Standoff high-selectivity spectroscopy of ...

  18. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  19. Microgrid Design Toolkit (MDT) Technical Documentation and Component Summaries

    SciTech Connect (OSTI)

    Arguello, Bryan; Gearhart, Jared Lee; Jones, Katherine A.; Eddy, John P.

    2015-09-01

    The Microgrid Design Toolkit (MDT) is a decision support software tool for microgrid designers to use during the microgrid design process. The models that support the two main capabilities in MDT are described. The first capability, the Microgrid Sizing Capability (MSC), is used to determine the size and composition of a new microgrid in the early stages of the design process. MSC is a mixed-integer linear program that is focused on developing a microgrid that is economically viable when connected to the grid. The second capability is focused on refining a microgrid design for operation in islanded mode. This second capability relies on two models: the Technology Management Optimization (TMO) model and Performance Reliability Model (PRM). TMO uses a genetic algorithm to create and refine a collection of candidate microgrid designs. It uses PRM, a simulation based reliability model, to assess the performance of these designs. TMO produces a collection of microgrid designs that perform well with respect to one or more performance metrics.

  20. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  1. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  2. Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study

    SciTech Connect (OSTI)

    Wang, Na

    2013-03-13

    This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

  3. Toolkit Model for SN-03 Final Proposal (ratecases/sn03)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model SN CRAC ToolKit Model Variable, Flat SN CRAC, 80% TPP (TK187SN-03FS3BPA-PropVariableFlatSNN24-Jun-03.xls, 3.1 MB) Data Input Files (required to run the above...

  4. Phase 1 Development Report for the SESSA Toolkit.

    SciTech Connect (OSTI)

    Knowlton, Robert G.; Melton, Brad J; Anderson, Robert J.

    2014-09-01

    operation of th e SESSA tool kit in order to give the user enough information to start using the tool kit . SESSA is currently a prototype system and this documentation covers the initial release of the tool kit . Funding for SESSA was provided by the Department of Defense (D oD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL) . ACKNOWLEDGEMENTS The authors wish to acknowledge the funding support for the development of the Site Exploitation System for Situational Awareness (SESSA) toolkit from the Department of Defense (DoD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL). Special thanks to Mr. Garold Warner, of DFSC, who served as the Project Manager. Individuals that worked on the design, functional attributes, algorithm development, system arc hitecture, and software programming include: Robert Knowlton, Brad Melton, Robert Anderson, and Wendy Amai.

  5. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  6. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  7. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  8. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  9. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  10. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  11. Co-Optimization of Fuels and Engines (Co-Optima) --Simulation Toolkit Team

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Co-Optimization of Fuels and Engines (Co-Optima) - Simulation Toolkit Team This presentation does not contain any proprietary, confidential, or otherwise restricted information #$%&%" '("')*+,-./ ! "0("012/ 3 "!"#$%&&'()*+(, - #"."#!"#/01%&02, 3# 4"#5&+6*, 7# 8"#.+0%9%2%:, ;# 5"#<%=%>?, @# 8"# A?B?:?'(, @ #C"#C%:, ; #D"#4%E, ; #F"#D%(#!%E, ; #8"#G%*?&2, - #%(0#4"#GH'*?2'0?2 I#

  12. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  13. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  14. Modeling of a Flooding Induced Station Blackout for a Pressurized Water Reactor Using the RISMC Toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven R; Smith, Curtis L; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua J; Kinoshita, Robert A

    2011-07-01

    In the Risk Informed Safety Margin Characterization (RISMC) approach we want to understand not just the frequency of an event like core damage, but how close we are (or are not) to key safety-related events and how might we increase our safety margins. The RISMC Pathway uses the probabilistic margin approach to quantify impacts to reliability and safety by coupling both probabilistic (via stochastic simulation) and mechanistic (via physics models) approaches. This coupling takes place through the interchange of physical parameters and operational or accident scenarios. In this paper we apply the RISMC approach to evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., system activation) and to perform statistical analyses (e.g., run multiple RELAP-7 simulations where sequencing/timing of events have been changed according to a set of stochastic distributions). By using the RISMC toolkit, we can evaluate how power uprate affects the system recovery measures needed to avoid core damage after the PWR lost all available AC power by a tsunami induced flooding. The simulation of the actual flooding is performed by using a smooth particle hydrodynamics code: NEUTRINO.

  15. A toolkit for integrated deterministic and probabilistic assessment for hydrogen infrastructure.

    SciTech Connect (OSTI)

    Groth, Katrina; Tchouvelev, Andrei V.

    2014-03-01

    There has been increasing interest in using Quantitative Risk Assessment [QRA] to help improve the safety of hydrogen infrastructure and applications. Hydrogen infrastructure for transportation (e.g. fueling fuel cell vehicles) or stationary (e.g. back-up power) applications is a relatively new area for application of QRA vs. traditional industrial production and use, and as a result there are few tools designed to enable QRA for this emerging sector. There are few existing QRA tools containing models that have been developed and validated for use in small-scale hydrogen applications. However, in the past several years, there has been significant progress in developing and validating deterministic physical and engineering models for hydrogen dispersion, ignition, and flame behavior. In parallel, there has been progress in developing defensible probabilistic models for the occurrence of events such as hydrogen release and ignition. While models and data are available, using this information is difficult due to a lack of readily available tools for integrating deterministic and probabilistic components into a single analysis framework. This paper discusses the first steps in building an integrated toolkit for performing QRA on hydrogen transportation technologies and suggests directions for extending the toolkit.

  16. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  17. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  18. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  19. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code called NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.

  20. Data Exploration Toolkit for serial diffraction experiments

    SciTech Connect (OSTI)

    Zeldin, Oliver B.; Brewster, Aaron S.; Hattne, Johan; Uervirojnangkoorn, Monarin; Lyubimov, Artem Y.; Zhou, Qiangjun; Zhao, Minglei; Weis, William I.; Sauter, Nicholas K.; Brunger, Axel T.

    2015-01-23

    Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many distinct crystals and/or different regions of the same crystal. Combined with other sources of XFEL shot-to-shot variation, this introduces significant heterogeneity into the diffraction data, complicating processing and interpretation. To enable researchers to get the most from their collected data, a toolkit is presented that provides insights into the quality of, and the variation present in, serial crystallography data sets. These tools operate on the unmerged, partial intensity integration results from many individual crystals, and can be used on two levels: firstly to guide the experimental strategy during data collection, and secondly to help users make informed choices during data processing.

  1. Advancements in Wind Integration Study Data Modeling: The Wind Integration National Dataset (WIND) Toolkit; Preprint

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Orwig, K.; Jones, W.; Searight, K.; Getman, D.; Harrold, S.; McCaa, J.; Cline, J.; Clark, C.

    2013-10-01

    Regional wind integration studies in the United States require detailed wind power output data at many locations to perform simulations of how the power system will operate under high-penetration scenarios. The wind data sets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as be time synchronized with available load profiles. The Wind Integration National Dataset (WIND) Toolkit described in this paper fulfills these requirements. A wind resource dataset, wind power production time series, and simulated forecasts from a numerical weather prediction model run on a nationwide 2-km grid at 5-min resolution will be made publicly available for more than 110,000 onshore and offshore wind power production sites.

  2. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code calledmore » NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.« less

  3. Multi-Physics Demonstration Problem with the SHARP Reactor Simulation Toolkit

    SciTech Connect (OSTI)

    Merzari, E.; Shemon, E. R.; Yu, Y. Q.; Thomas, J. W.; Obabko, A.; Jain, Rajeev; Mahadevan, Vijay; Tautges, Timothy; Solberg, Jerome; Ferencz, Robert Mark; Whitesides, R.

    2015-12-21

    This report describes to employ SHARP to perform a first-of-a-kind analysis of the core radial expansion phenomenon in an SFR. This effort required significant advances in the framework Multi-Physics Demonstration Problem with the SHARP Reactor Simulation Toolkit used to drive the coupled simulations, manipulate the mesh in response to the deformation of the geometry, and generate the necessary modified mesh files. Furthermore, the model geometry is fairly complex, and consistent mesh generation for the three physics modules required significant effort. Fully-integrated simulations of a 7-assembly mini-core test problem have been performed, and the results are presented here. Physics models of a full-core model of the Advanced Burner Test Reactor have also been developed for each of the three physics modules. Standalone results of each of the three physics modules for the ABTR are presented here, which provides a demonstration of the feasibility of the fully-integrated simulation.

  4. Fact Sheet: Detection and Analysis of Threats to the Energy Sector...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly ... DATES will create an anonymous global threat database, ...

  5. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  6. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral triggers to help focus the analysts attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  7. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  8. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  9. A versatile toolkit for high throughput functional genomics with Trichoderma reesei

    SciTech Connect (OSTI)

    Schuster, Andre; Bruno, Kenneth S.; Collett, James R.; Baker, Scott E.; Seiboth, Bernhard; Kubicek, Christian P.; Schmoll, Monika

    2012-01-02

    The ascomycete fungus, Trichoderma reesei (anamorph of Hypocrea jecorina), represents a biotechnological workhorse and is currently one of the most proficient cellulase producers. While strain improvement was traditionally accomplished by random mutagenesis, a detailed understanding of cellulase regulation can only be gained using recombinant technologies. RESULTS: Aiming at high efficiency and high throughput methods, we present here a construction kit for gene knock out in T. reesei. We provide a primer database for gene deletion using the pyr4, amdS and hph selection markers. For high throughput generation of gene knock outs, we constructed vectors using yeast mediated recombination and then transformed a T. reesei strain deficient in non-homologous end joining (NHEJ) by spore electroporation. This NHEJ-defect was subsequently removed by crossing of mutants with a sexually competent strain derived from the parental strain, QM9414.CONCLUSIONS:Using this strategy and the materials provided, high throughput gene deletion in T. reesei becomes feasible. Moreover, with the application of sexual development, the NHEJ-defect can be removed efficiently and without the need for additional selection markers. The same advantages apply for the construction of multiple mutants by crossing of strains with different gene deletions, which is now possible with considerably less hands-on time and minimal screening effort compared to a transformation approach. Consequently this toolkit can considerably boost research towards efficient exploitation of the resources of T. reesei for cellulase expression and hence second generation biofuel production.

  10. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  11. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  12. The GEANT4 toolkit for microdosimetry calculations: Application to microbeam radiation therapy (MRT)

    SciTech Connect (OSTI)

    Spiga, J.; Siegbahn, E. A.; Braeuer-Krisch, E.; Randaccio, P.; Bravin, A.

    2007-11-15

    Theoretical dose distributions for microbeam radiation therapy (MRT) are computed in this paper using the GEANT4 Monte Carlo (MC) simulation toolkit. MRT is an innovative experimental radiotherapy technique carried out using an array of parallel microbeams of synchrotron-wiggler-generated x rays. Although the biological mechanisms underlying the effects of microbeams are still largely unknown, the effectiveness of MRT can be traced back to the natural ability of normal tissues to rapidly repair small damages to the vasculature, and on the lack of a similar healing process in tumoral tissues. Contrary to conventional therapy, in which each beam is at least several millimeters wide, the narrowness of the microbeams allows a rapid regeneration of the blood vessels along the beams' trajectories. For this reason the calculation of the 'valley' dose is of crucial importance and the correct use of MC codes for such purposes must be understood. GEANT4 offers, in addition to the standard libraries, a specialized package specifically designed to deal with electromagnetic interactions of particles with matter for energies down to 250 eV. This package implements two different approaches for electron and photon transport, one based on evaluated data libraries, the other adopting analytical models. These features are exploited to cross-check theoretical computations for MRT. The lateral and depth dose profiles are studied for the irradiation of a 20 cm diameter, 20 cm long cylindrical phantom, with cylindrical sources of different size and energy. Microbeam arrays are simulated with the aid of superposition algorithms, and the ratios of peak-to-valley doses are computed for typical cases used in preclinical assays. Dose profiles obtained using the GEANT4 evaluated data libraries and analytical models are compared with simulation results previously obtained using the PENELOPE code. The results show that dose profiles computed with GEANT4's analytical model are almost

  13. Improved Sampling Algorithms in the Risk-Informed Safety Margin Characterization Toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Smith, Curtis Lee; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua Joseph

    2015-09-01

    The RISMC approach is developing advanced set of methodologies and algorithms in order to perform Probabilistic Risk Analyses (PRAs). In contrast to classical PRA methods, which are based on Event-Tree and Fault-Tree methods, the RISMC approach largely employs system simulator codes applied to stochastic analysis tools. The basic idea is to randomly perturb (by employing sampling algorithms) timing and sequencing of events and internal parameters of the system codes (i.e., uncertain parameters) in order to estimate stochastic parameters such as core damage probability. This approach applied to complex systems such as nuclear power plants requires to perform a series of computationally expensive simulation runs given a large set of uncertain parameters. These types of analysis are affected by two issues. Firstly, the space of the possible solutions (a.k.a., the issue space or the response surface) can be sampled only very sparsely, and this precludes the ability to fully analyze the impact of uncertainties on the system dynamics. Secondly, large amounts of data are generated and tools to generate knowledge from such data sets are not yet available. This report focuses on the first issue and in particular employs novel methods that optimize the information generated by the sampling process by sampling unexplored and risk-significant regions of the issue space: adaptive (smart) sampling algorithms. They infer system response from surrogate models constructed from existing samples and predict the most relevant location of the next sample. It is therefore possible to understand features of the issue space with a small number of carefully selected samples. In this report, we will present how it is possible to perform adaptive sampling using the RISMC toolkit and highlight the advantages compared to more classical sampling approaches such Monte-Carlo. We will employ RAVEN to perform such statistical analyses using both analytical cases but also another RISMC code: RELAP-7.

  14. The Nuclear Energy Advanced Modeling and Simulation Safeguards and Separations Reprocessing Plant Toolkit

    SciTech Connect (OSTI)

    McCaskey, Alex; Billings, Jay Jay; de Almeida, Valmor F

    2011-08-01

    This report details the progress made in the development of the Reprocessing Plant Toolkit (RPTk) for the DOE Nuclear Energy Advanced Modeling and Simulation (NEAMS) program. RPTk is an ongoing development effort intended to provide users with an extensible, integrated, and scalable software framework for the modeling and simulation of spent nuclear fuel reprocessing plants by enabling the insertion and coupling of user-developed physicochemical modules of variable fidelity. The NEAMS Safeguards and Separations IPSC (SafeSeps) and the Enabling Computational Technologies (ECT) supporting program element have partnered to release an initial version of the RPTk with a focus on software usability and utility. RPTk implements a data flow architecture that is the source of the system's extensibility and scalability. Data flows through physicochemical modules sequentially, with each module importing data, evolving it, and exporting the updated data to the next downstream module. This is accomplished through various architectural abstractions designed to give RPTk true plug-and-play capabilities. A simple application of this architecture, as well as RPTk data flow and evolution, is demonstrated in Section 6 with an application consisting of two coupled physicochemical modules. The remaining sections describe this ongoing work in full, from system vision and design inception to full implementation. Section 3 describes the relevant software development processes used by the RPTk development team. These processes allow the team to manage system complexity and ensure stakeholder satisfaction. This section also details the work done on the RPTk ``black box'' and ``white box'' models, with a special focus on the separation of concerns between the RPTk user interface and application runtime. Section 4 and 5 discuss that application runtime component in more detail, and describe the dependencies, behavior, and rigorous testing of its constituent components.

  15. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  16. ORBiT: Oak Ridge Bio-surveillance Toolkit for Public Health Dynamics

    SciTech Connect (OSTI)

    Ramanathan, Arvind; Pullum, Laura L; Hobson, Tanner C; Steed, Chad A; Chennubhotla, Chakra; Quinn, Shannon

    2015-01-01

    With novel emerging infectious diseases being reported across different parts of the world, there is a need to build effective bio-surveillance systems that can track, monitor and report such events in a timely manner. Apart from monitoring for emerging disease outbreaks, it is also important to identify susceptible geographic regions and populations where these diseases may have a significant impact. The digitization of health related information through electronic health records (EHR) and electronic healthcare claim reimbursements (eHCR) and the continued growth of self-reported health information through social media provides both tremendous opportunities and challenges in developing novel public health surveillance tools. In this paper, we present an overview of Oak Ridge Bio-surveillance Toolkit (ORBiT), which we have developed specifically to address data analytic challenges in the realm of public health surveillance. In particular, ORBiT provides an extensible environment to pull together diverse, large-scale datasets and analyze them to identify spatial and temporal patterns for various bio-surveillance related tasks. We demonstrate the utility of ORBiT in automatically extracting a small number of spatial and temporal patterns during the 2009-2010 pandemic H1N1 flu season using eHCR data. These patterns provide quantitative insights into the dynamics of how the pandemic flu spread across different parts of the country. We discovered that the eHCR data exhibits multi-scale patterns from which we could identify a small number of states in the United States (US) that act as bridge regions contributing to one or more specific influenza spread patterns. Similar to previous studies, the patterns show that the south-eastern regions of the US were widely affected by the H1N1 flu pandemic. Several of these south-eastern states act as bridge regions, which connect the north-east and central US in terms of flu occurrences. These quantitative insights show how the e

  17. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  18. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  19. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  20. Paint for detection of corrosion and warning of chemical and radiological attack

    DOE Patents [OSTI]

    Farmer, Joseph C.

    2010-08-24

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  1. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  2. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of ...

  3. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  4. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  5. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  6. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  7. Discovering multi-scale co-occurrence patterns of asthma and influenza with the Oak Ridge bio-surveillance toolkit

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ramanathan, Arvind; Pullum, Laura L.; Hobson, Tanner C.; Stahl, Christopher G.; Steed, Chad A.; Valkova, Silvia; Quinn, Shannon; Chennubhotla, Chakra

    2015-08-03

    Here, we describe a data-driven unsupervised machine learning approach to extract geo-temporal co-occurrence patterns of asthma and the flu from large-scale electronic healthcare reimbursement claims (eHRC) datasets. Specifically, we examine the eHRC data from 2009 to 2010 pandemic H1N1 influenza season and analyze whether different geographic regions within the United States (US) showed an increase in co-occurrence patterns of the flu and asthma. Our analyses reveal that the temporal patterns extracted from the eHRC data show a distinct lag time between the peak incidence of the asthma and the flu. While the increased occurrence of asthma contributed to increased flumore » incidence during the pandemic, this co-occurrence is predominant for female patients. The geo-temporal patterns reveal that the co-occurrence of the flu and asthma are typically concentrated within the south-east US. Further, in agreement with previous studies, large urban areas (such as New York, Miami, and Los Angeles) exhibit co-occurrence patterns that suggest a peak incidence of asthma and flu significantly early in the spring and winter seasons. Together, our data-analytic approach, integrated within the Oak Ridge Bio-surveillance Toolkit platform, demonstrates how eHRC data can provide novel insights into co-occurring disease patterns.« less

  8. Using Discrete Event Simulation for Programming Model Exploration at Extreme-Scale: Macroscale Components for the Structural Simulation Toolkit (SST).

    SciTech Connect (OSTI)

    Wilke, Jeremiah J; Kenny, Joseph P.

    2015-02-01

    Discrete event simulation provides a powerful mechanism for designing and testing new extreme- scale programming models for high-performance computing. Rather than debug, run, and wait for results on an actual system, design can first iterate through a simulator. This is particularly useful when test beds cannot be used, i.e. to explore hardware or scales that do not yet exist or are inaccessible. Here we detail the macroscale components of the structural simulation toolkit (SST). Instead of depending on trace replay or state machines, the simulator is architected to execute real code on real software stacks. Our particular user-space threading framework allows massive scales to be simulated even on small clusters. The link between the discrete event core and the threading framework allows interesting performance metrics like call graphs to be collected from a simulated run. Performance analysis via simulation can thus become an important phase in extreme-scale programming model and runtime system design via the SST macroscale components.

  9. Cazymes Analysis Toolkit (CAT): Webservice for searching and analyzing carbohydrateactive enzymes in a newly sequenced organism using CAZy database

    SciTech Connect (OSTI)

    Karpinets, Tatiana V; Park, Byung; Syed, Mustafa H; Uberbacher, Edward C; Leuze, Michael Rex

    2010-01-01

    The Carbohydrate-Active Enzyme (CAZy) database provides a rich set of manually annotated enzymes that degrade, modify, or create glycosidic bonds. Despite rich and invaluable information stored in the database, software tools utilizing this information for annotation of newly sequenced genomes by CAZy families are limited. We have employed two annotation approaches to fill the gap between manually curated high-quality protein sequences collected in the CAZy database and the growing number of other protein sequences produced by genome or metagenome sequencing projects. The first approach is based on a similarity search against the entire non-redundant sequences of the CAZy database. The second approach performs annotation using links or correspondences between the CAZy families and protein family domains. The links were discovered using the association rule learning algorithm applied to sequences from the CAZy database. The approaches complement each other and in combination achieved high specificity and sensitivity when cross-evaluated with the manually curated genomes of Clostridium thermocellum ATCC 27405 and Saccharophagus degradans 2-40. The capability of the proposed framework to predict the function of unknown protein domains (DUF) and of hypothetical proteins in the genome of Neurospora crassa is demonstrated. The framework is implemented as a Web service, the CAZymes Analysis Toolkit (CAT), and is available at http://cricket.ornl.gov/cgi-bin/cat.cgi.

  10. Design and Fabrication of Cherenkov Counters for the Detection of SNM

    SciTech Connect (OSTI)

    Erickson, Anna S.; Lanza, Richard; Galaitsis, Anthony; Hynes, Michael; Blackburn, Brandon; Bernstein, Adam

    2011-12-13

    The need for large-size detectors for long-range active interrogation (AI) detection of SNM has generated interest in water-based detector technologies. Water Cherenkov Detectors (WCD) were selected for this research because of their transportability, scalability, and an inherent energy threshold. The detector design and analysis was completed using the Geant4 toolkit. It was demonstrated both computationally and experimentally that it is possible to use WCD to detect and characterize gamma rays. Absolute efficiency of the detector (with no energy cuts applied) was determined to be around 30% for a {sup 60}Co source.

  11. Bro Intrusion Detection System

    Energy Science and Technology Software Center (OSTI)

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  12. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  13. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  14. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  15. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  16. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  17. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  18. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  19. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  20. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  1. MCS Systems Administration Toolkit

    Energy Science and Technology Software Center (OSTI)

    2001-09-30

    This package contains a number of systems administration utilities to assist a team of system administrators in managing a computer environment by automating routine tasks and centralizing information. Included are utilities to help install software on a network of computers and programs to make an image of a disk drive, to manage and distribute configuration files for a number of systems, and to run self-testss on systems, as well as an example of using amore » database to manage host information and various utilities.« less

  2. Portable Application Code Toolkit

    Energy Science and Technology Software Center (OSTI)

    2009-01-01

    PACT is a set of tools to help software developers create applications that will run on any platform and data that can be written/read on any platform.

  3. Binary Optics Toolkit

    Energy Science and Technology Software Center (OSTI)

    1996-04-02

    This software is a set of tools for the design and analysis of binary optics. It consists of a series of stand-alone programs written in C and some scripts written in an application-specific language interpreted by a CAD program called DW2000. This software can be used to optimize the design and placement of a complex lens array from input to output and produce contours, mask designs, and data exported for diffractive optic analysis.

  4. Pizza.py Toolkit

    Energy Science and Technology Software Center (OSTI)

    2006-01-01

    Pizza.py is a loosely integrated collection of tools, many of which provide support for the LAMMPS molecular dynamics and ChemCell cell modeling packages. There are tools to create input files. convert between file formats, process log and dump files, create plots, and visualize and animate simulation snapshots. Software packages that are wrapped by Pizza.py. so they can invoked from within Python, include GnuPlot, MatLab, Raster3d. and RasMol. Pizza.py is written in Python and runs onmore » any platform that supports Python. Pizza.py enhances the standard Python interpreter in a few simple ways. Its tools are Python modules which can be invoked interactively, from scripts, or from GUIs when appropriate. Some of the tools require additional Python packages to be installed as part of the users Python. Others are wrappers on software packages (as listed above) which must be available on the users system. It is easy to modify or extend Pizza.py with new functionality or new tools, which need not have anything to do with LAMMPS or ChemCell.« less

  5. NREL Fleet Analysis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2006-12-31

    The software analyzes large time-dependent data sets from fleets of vehicles and their fueling infrastructure to characterize performance metrics including efficiency, durability, fueling rates and usage patterns.

  6. Solar Site Survey Toolkit

    Broader source: Energy.gov [DOE]

    After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

  7. Molecular model generator toolkit

    SciTech Connect (OSTI)

    Schneider, R.D.

    1994-07-01

    This report is a user manual for an ASCII file of Fortran source code which must be compiled before use. The software will assist in creating plastic models of molecules whose specifications are described in the Brookhaven Protein Databank. Other data files can be used if they are in the same format as the files in the databank. The output file is a program for a 3-D Systems Stereolithography Apparatus and the program is run on a SGI Indigo workstation.

  8. Livermore Metagenomics Analysis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-10-01

    LMAT is designed to take as input a collection of raw metagenomic sequencer reads, and search each read against a reference genome database and assign a taxonomic label and confidence value to each read and report a summary of the predicted taxonomic contents of the metagenomic sample.

  9. Residential Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Events Expand News & Events Skip navigation links Residential Residential Lighting Energy Star Appliances Consumer Electronics Heat Pump Water Heaters Electric Storage Water...

  10. AISL Development Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-13

    AISLDT is a library of utility functions supporting other AISL software. Code provides various utility functions for Common Lisp, including an object-oriented database, distributed objects, logic query engine, web content management, chart drawing, packet sniffing, text processing, and various data structures.

  11. ppt-toolkit.com

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Spend by State - Fiscal Year 2014 Color Key: More than 1 million 300,000 to 1 million 100,000 to 300,000 5,000 to 100,000 Less than 5,000...

  12. Voluntary Initiative: Partnerships Toolkit

    Broader source: Energy.gov [DOE]

    Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, nonprofit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success.

  13. Sequential Detection of Fission Processes for Harbor Defense

    SciTech Connect (OSTI)

    Candy, J V; Walston, S E; Chambers, D H

    2015-02-12

    With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their γ-ray emissions has been attacked vigorously with some interesting and feasible results; however, the fission process of SNM has not received as much attention due to its inherent complexity and required predictive nature. In this paper, on-line, sequential Bayesian detection and estimation (parameter) techniques to rapidly and reliably detect unknown fissioning sources with high statistical confidence are developed.

  14. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  15. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  16. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  17. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  18. Detection Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chemistry for Measurement and Detection Science Chemistry for Measurement and Detection Science Project Description Chemistry used in measurement and detection science plays a crucial role in the Laboratory's Science of Signatures scientific thrust. Measurement and detection science areas that require chemistry include nuclear and radiological, materials, biological, energy, climate, and space. Los Alamos scientists integrate chemical-science capabilities to ensure that the Laboratory can

  19. detonation detection

    National Nuclear Security Administration (NNSA)

    7%2A en US Air Force Launches Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:nnsa.energy.govmediaroompressreleasesafsatellite

  20. detonation detection

    National Nuclear Security Administration (NNSA)

    Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:www.nnsa.energy.govmediaroompressreleasesafsatellite

  1. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  2. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  3. Decoy-state quantum key distribution using homodyne detection

    SciTech Connect (OSTI)

    Shams Mousavi, S. H.; Gallion, P.

    2009-07-15

    In this paper, we propose to use the decoy-state technique to improve the security of the quantum key distribution (QKD) systems based on homodyne detection against the photon number splitting attack. The decoy-state technique is a powerful tool that can significantly boost the secure transmission range of the QKD systems. However, it has not yet been applied to the systems that use homodyne detection. After adapting this theory to the systems based on homodyne detection, we quantify the secure performance and transmission range of the resulting system.

  4. Comparison of chiller models for use in model-based fault detection

    SciTech Connect (OSTI)

    Sreedharan, Priya; Haves, Philip

    2001-06-07

    Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Factors that are considered in evaluating a model include accuracy, training data requirements, calibration effort, generality, and computational requirements. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression chillers. Three different models were studied: the Gordon and Ng Universal Chiller model (2nd generation) and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles, and the DOE-2 chiller model, as implemented in CoolTools{trademark}, which is empirical. The models were compared in terms of their ability to reproduce the observed performance of an older, centrifugal chiller operating in a commercial office building and a newer centrifugal chiller in a laboratory. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as long as one of the previously identified models in the CoolTools library matches the performance of the chiller in question.

  5. Oak Ridge Bio-surveillance Toolkit (ORBiT): Integrating Big-Data Analytics with Visual Analysis for Public Health Dynamics

    SciTech Connect (OSTI)

    Ramanathan, Arvind; Pullum, Laura L; Steed, Chad A; Chennubhotla, Chakra; Quinn, Shannon

    2013-01-01

    In this position paper, we describe the design and implementation of the Oak Ridge Bio-surveillance Toolkit (ORBiT): a collection of novel statistical and machine learning tools implemented for (1) integrating heterogeneous traditional (e.g. emergency room visits, prescription sales data, etc.) and non-traditional (social media such as Twitter and Instagram) data sources, (2) analyzing large-scale datasets and (3) presenting the results from the analytics as a visual interface for the end-user to interact and provide feedback. We present examples of how ORBiT can be used to summarize ex- tremely large-scale datasets effectively and how user interactions can translate into the data analytics process for bio-surveillance. We also present a strategy to estimate parameters relevant to dis- ease spread models from near real time data feeds and show how these estimates can be integrated with disease spread models for large-scale populations. We conclude with a perspective on how integrating data and visual analytics could lead to better forecasting and prediction of disease spread as well as improved awareness of disease susceptible regions.

  6. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  7. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite

  8. Methodology for determining the intent of a limited nuclear attack. Master's thesis

    SciTech Connect (OSTI)

    Bivins, R.L.

    1987-05-01

    The purpose of this study was to develop a methodology for determining the intent of a limited nuclear attack. An investigation of possible methodologies for determining intent lead to research in Bayesian analysis. It was thought that the answer to intent could be found by taking prior beliefs of the decision maker and then using the Bayes Theorem to update those beliefs with ground-bases radar information obtained over time. Unfortunately, the use of Bayesian analysis as proposed here did not prove to be robust when the radar information is inaccurate. The reason for the inability of the proposed methodology to perform under the inaccurate radar parameters is that ignores too many of the complicating issues in determining intent.

  9. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  10. SU-E-T-519: Emission of Secondary Particles From a PMMA Phantom During Proton Irradiation: A Simulation Study with the Geant4 Monte Carlo Toolkit

    SciTech Connect (OSTI)

    Lau, A; Chen, Y; Ahmad, S

    2014-06-01

    Purpose: Proton therapy exhibits several advantages over photon therapy due to depth-dose distributions from proton interactions within the target material. However, uncertainties associated with protons beam range in the patient limit the advantage of proton therapy applications. To quantify beam range, positron-emitting nuclei (PEN) and prompt gamma (PG) techniques have been developed. These techniques use de-excitation photons to describe the location of the beam in the patient. To develop a detector system for implementing the PG technique for range verification applications in proton therapy, we studied the yields, energy and angular distributions of the secondary particles emitted from a PMMA phantom. Methods: Proton pencil beams of various energies incident onto a PMMA phantom with dimensions of 5 x 5 x 50 cm3 were used for simulation with the Geant4 toolkit using the standard electromagnetic packages as well as the packages based on the binary-cascade nuclear model. The emitted secondary particles are analyzed . Results: For 160 MeV incident protons, the yields of secondary neutrons and photons per 100 incident protons were ~6 and ~15 respectively. Secondary photon energy spectrum showed several energy peaks in the range between 0 and 10 MeV. The energy peaks located between 4 and 6 MeV were attributed to originate from direct proton interactions with 12C (~ 4.4 MeV) and 16O (~ 6 MeV), respectively. Most of the escaping secondary neutrons were found to have energies between 10 and 100 MeV. Isotropic emissions were found for lower energy neutrons (<10 MeV) and photons for all energies, while higher energy neutrons were emitted predominantly in the forward direction. The yields of emitted photons and neutrons increased with the increase of incident proton energies. Conclusions: A detector system is currently being developed incorporating the yields, energy and angular distributions of secondary particles from proton interactions obtained from this study.