National Library of Energy BETA

Sample records for attack detection toolkit

  1. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  2. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  3. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  4. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  5. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  6. A toolkit for detecting technical surprise.

    SciTech Connect (OSTI)

    Trahan, Michael Wayne; Foehse, Mark C.

    2010-10-01

    The detection of a scientific or technological surprise within a secretive country or institute is very difficult. The ability to detect such surprises would allow analysts to identify the capabilities that could be a military or economic threat to national security. Sandia's current approach utilizing ThreatView has been successful in revealing potential technological surprises. However, as data sets become larger, it becomes critical to use algorithms as filters along with the visualization environments. Our two-year LDRD had two primary goals. First, we developed a tool, a Self-Organizing Map (SOM), to extend ThreatView and improve our understanding of the issues involved in working with textual data sets. Second, we developed a toolkit for detecting indicators of technical surprise in textual data sets. Our toolkit has been successfully used to perform technology assessments for the Science & Technology Intelligence (S&TI) program.

  7. HVAC Fault Detection and Diagnosis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2004-12-31

    This toolkit supports component-level model-based fault detection methods in commercial building HVAC systems. The toolbox consists of five basic modules: a parameter estimator for model calibration, a preprocessor, an AHU model simulator, a steady-state detector, and a comparator. Each of these modules and the fuzzy logic rules for fault diagnosis are described in detail. The toolbox is written in C++ and also invokes the SPARK simulation program.

  8. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... National SCADA Test Bed Screenshot from NESSUS Vulnerability Scanner Technical Objectives ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  9. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  10. Geospatial Toolkit

    SciTech Connect (OSTI)

    2010-10-14

    The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource assessment. The non-resource, country-specific data for each toolkit comes from a variety of agencies within each country as well as from global datasets. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. The revised version of the Geospatial Toolkit has been released for all original toolkit countries/regions and each software package is made available on NREL's website,

  11. Geospatial Toolkit

    Energy Science and Technology Software Center (OSTI)

    2010-10-14

    The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource assessment. The non-resource, country-specific data for each toolkit comes from a variety of agencies within each country as well as from global datasets. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Themore » revised version of the Geospatial Toolkit has been released for all original toolkit countries/regions and each software package is made available on NREL's website,« less

  12. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  13. COR Toolkit

    Broader source: Energy.gov [DOE]

    The COR Toolkit cited in the attachments to Policy Flash 2012-25 and posted to/linked from various DOE Internet pages has been withdrawn until further notice.

  14. Financing Initiatives Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Potential Toolkit Building Energy Assessment Toolkit Power System Screening and Design Toolkit Land Use Assessment Toolkit Bioenergy Assessment Toolkit Transportation...

  15. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  16. Local Toolkit

    Energy Science and Technology Software Center (OSTI)

    2007-05-31

    The LOCAL Toolkit contains tools and libraries developed under the LLNL LOCAL LDRD project for managing and processing large unstructured data sets primrily from parallel numerical simulations, such as triangular, tetrahedral, and hexahedral meshes, point sets, and graphs. The tools have three main functionalities: cache-coherent, linear ordering of multidimensional data; lossy and lossless data compression optimized for different data types; and an out-of-core streaming I/O library with simple processing modules for unstructed data.

  17. Better Buildings Training Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.govbbrn 1 T he Better Buildings Residential Network Training Toolkit can be used by ...

  18. Agricultural Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agricultural-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors...

  19. Commercial Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Commercial-Marketing-Toolkit Sign In About | Careers | Contact | Investors | bpa.gov Search Policy & Reporting Expand Policy & Reporting EE Sectors Expand EE Sectors Technology...

  20. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  1. LEDSGP/tools/toolkits | Open Energy Information

    Open Energy Info (EERE)

    Knowledge Portals LEDS Benefits Back to top LEDS-Related Toolkits DIA Toolkit This Development Impacts Assessment Toolkit helps country, regional, and local policymakers...

  2. Better Buildings Training Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.gov/bbrn 1 T he Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value of providing training opportunities for contractors, staff, and volunteers. For example, according to a comprehensive evaluation of more than 140 energy efficiency programs across the country that participated in a $500 million grant program,

  3. Quarterly Cybersecurity Awareness Campaigns and Toolkits | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Quarterly Cybersecurity Awareness Campaigns and Toolkits Quarterly Cybersecurity Awareness Campaigns and Toolkits The OCIO coordinates quarterly cybersecurity awareness campaigns ...

  4. The model coupling toolkit.

    SciTech Connect (OSTI)

    Larson, J. W.; Jacob, R. L.; Foster, I.; Guo, J.

    2001-04-13

    The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form a high-performance coupled modeling system? We present our solution to this problem--The Model Coupling Toolkit (MCT). We explain how our effort to construct the Next-Generation Coupler for NCAR Community Climate System Model motivated us to create this toolkit. We describe in detail the conceptual design of the MCT and explain its usage in constructing parallel coupled models. We present preliminary performance results for the toolkit's parallel data transfer facilities. Finally, we outline an agenda for future development of the MCT.

  5. Structural Simulation Toolkit. Lunch & Learn

    SciTech Connect (OSTI)

    Moore, Branden J.; Voskuilen, Gwendolyn Renae; Rodrigues, Arun F.; Hammond, Simon David; Hemmert, Karl Scott

    2015-09-01

    This is a presentation outlining a lunch and learn lecture for the Structural Simulation Toolkit, supported by Sandia National Laboratories.

  6. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  7. Voluntary Initiative: Partnerships Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voluntary Initiative: Partnerships Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, non-profit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success. Definition Partnerships are relationships between two or more

  8. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Laboratory (NREL). It integrates resource data and geographic information systems (GIS) - for integrated resource assessment. The Geospatial Toolkit (GsT) is a map-based...

  9. Bioenergy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Bioenergy Toolkit Jump to: navigation, search Stage 3 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities DevelopBAU Stage 4:...

  10. NREL: International Activities - Geospatial Toolkits

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Geospatial Toolkit is an NREL-developed map-based software application that integrates resource data and other geographic information systems (GIS) data for integrated resource ...

  11. A Toolkit for Microgrid Design

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    To aid in optimal design of microgrids, and help avoid potential problems with maintenance, safety, power quality, and stability, Sandia has developed the Microgrid Design Toolkit ...

  12. REEEP Toolkits | Open Energy Information

    Open Energy Info (EERE)

    Policiesdeployment programs, Resource assessment, Pathways analysis, Background analysis Resource Type: Dataset References: REEEP Toolkit 1 This article is a stub. You...

  13. Supporting Small Forest Enterprises: A Facilitator's Toolkit...

    Open Energy Info (EERE)

    Small Forest Enterprises: A Facilitator's Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Supporting Small Forest Enterprises: A Facilitator's Toolkit Agency...

  14. Building Energy Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  15. Impact Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  16. Social Media Toolkit | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Social Media Toolkit This Better Buildings Residential Network toolkit can be used to help residential energy efficiency programs learn to engage potential customers through social ...

  17. Voluntary Initiative: Partnerships Toolkit | Department of Energy

    Office of Environmental Management (EM)

    Partnerships Toolkit Voluntary Initiative: Partnerships Toolkit Residential energy efficiency programs are delivered by many different types of organizations and their partners, ...

  18. Better Buildings Training Toolkit | Department of Energy

    Office of Environmental Management (EM)

    Better Buildings Training Toolkit The Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value ...

  19. Better Buildings Residential Network Social Media Toolkit

    Broader source: Energy.gov (indexed) [DOE]

    Social Media Toolkit BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.govbbrn 1 T his Better Buildings Residential Network toolkit can be used to help ...

  20. Solar Integration National Dataset Toolkit | Grid Modernization...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integration National Dataset Toolkit NREL is working on a Solar Integration National Dataset (SIND) Toolkit to enable researchers to perform U.S. regional solar generation ...

  1. Multiphysics Application Coupling Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-12-02

    This particular consortium implementation of the software integration infrastructure will, in large part, refactor portions of the Rocstar multiphysics infrastructure. Development of this infrastructure originated at the University of Illinois DOE ASCI Center for Simulation of Advanced Rockets (CSAR) to support the center's massively parallel multiphysics simulation application, Rocstar, and has continued at IllinoisRocstar, a small company formed near the end of the University-based program. IllinoisRocstar is now licensing these new developments as free, openmore » source, in hopes to help improve their own and others' access to infrastructure which can be readily utilized in developing coupled or composite software systems; with particular attention to more rapid production and utilization of multiphysics applications in the HPC environment. There are two major pieces to the consortium implementation, the Application Component Toolkit (ACT), and the Multiphysics Application Coupling Toolkit (MPACT). The current development focus is the ACT, which is (will be) the substrate for MPACT. The ACT itself is built up from the components described in the technical approach. In particular, the ACT has the following major components: 1.The Component Object Manager (COM): The COM package provides encapsulation of user applications, and their data. COM also provides the inter-component function call mechanism. 2.The System Integration Manager (SIM): The SIM package provides constructs and mechanisms for orchestrating composite systems of multiply integrated pieces.« less

  2. Better Buildings Training Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Toolkit Better Buildings Training Toolkit The Better Buildings Residential Network Training Toolkit can be used by residential energy efficiency programs interested in realizing the value of providing training opportunities for contractors, staff, and volunteers. Training Toolkit (666.76 KB) More Documents & Publications Better Buildings Network View | March 2015 Better Buildings Residential Network Membership Form Better Buildings Network View | November 2015

  3. Mesh Quality Improvement Toolkit

    Energy Science and Technology Software Center (OSTI)

    2002-11-15

    MESQUITE is a linkable software library to be used by simulation and mesh generation tools to improve the quality of meshes. Mesh quality is improved by node movement and/or local topological modifications. Various aspects of mesh quality such as smoothness, element shape, size, and orientation are controlled by choosing the appropriate mesh qualtiy metric, and objective function tempate, and a numerical optimization solver to optimize the quality of meshes, MESQUITE uses the TSTT mesh interfacemore » specification to provide an interoperable toolkit that can be used by applications which adopt the standard. A flexible code design makes it easy for meshing researchers to add additional mesh quality metrics, templates, and solvers to develop new quality improvement algorithms by making use of the MESQUITE infrastructure.« less

  4. TOOLKIT FOR ADVANCED OPTIMIZATION

    Energy Science and Technology Software Center (OSTI)

    2000-10-13

    The TAO project focuses on the development of software for large scale optimization problems. TAO uses an object-oriented design to create a flexible toolkit with strong emphasis on the reuse of external tools where appropriate. Our design enables bi-directional connection to lower level linear algebra support (for example, parallel sparse matrix data structures) as well as higher level application frameworks. The Toolkist for Advanced Optimization (TAO) is aimed at teh solution of large-scale optimization problemsmore » on high-performance architectures. Our main goals are portability, performance, scalable parallelism, and an interface independent of the architecture. TAO is suitable for both single-processor and massively-parallel architectures. The current version of TAO has algorithms for unconstrained and bound-constrained optimization.« less

  5. Hydropower RAPID Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Hydropower RAPID Toolkit Hydropower RAPID Toolkit Hydropower RAPID Toolkit Providing project permitting process information for hydropower developers. Navigating the complex system of federal and state regulations to secure project approvals can be one of the biggest hurdles hydropower developers face. The U.S. Department of Energy (DOE) Hydropower Regulatory and Permitting Information Desktop (RAPID) Toolkit offers a solution. The Hydropower RAPID Toolkit makes permitting information easily

  6. Application experiences with the Globus toolkit.

    SciTech Connect (OSTI)

    Brunett, S.

    1998-06-09

    The Globus grid toolkit is a collection of software components designed to support the development of applications for high-performance distributed computing environments, or ''computational grids'' [14]. The Globus toolkit is an implementation of a ''bag of services'' architecture, which provides application and tool developers not with a monolithic system but rather with a set of stand-alone services. Each Globus component provides a basic service, such as authentication, resource allocation, information, communication, fault detection, and remote data access. Different applications and tools can combine these services in different ways to construct ''grid-enabled'' systems. The Globus toolkit has been used to construct the Globus Ubiquitous Supercomputing Testbed, or GUSTO: a large-scale testbed spanning 20 sites and included over 4000 compute nodes for a total compute power of over 2 TFLOPS. Over the past six months, we and others have used this testbed to conduct a variety of application experiments, including multi-user collaborative environments (tele-immersion), computational steering, distributed supercomputing, and high throughput computing. The goal of this paper is to review what has been learned from these experiments regarding the effectiveness of the toolkit approach. To this end, we describe two of the application experiments in detail, noting what worked well and what worked less well. The two applications are a distributed supercomputing application, SF-Express, in which multiple supercomputers are harnessed to perform large distributed interactive simulations; and a tele-immersion application, CAVERNsoft, in which the focus is on connecting multiple people to a distributed simulated world.

  7. SEP Toolkit Overview | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit Overview SEP Toolkit Overview Overview.pdf (124.2 KB) More Documents & Publications Industrial SEP Ratepayer-funded Accelerator Factsheet SEP Overview Slides How Industrial Energy Efficiency Can Support State Climate and Energy Planning

  8. TEVA-SPOT Toolkit 1.2

    Energy Science and Technology Software Center (OSTI)

    2007-07-26

    The TEVA-SPOT Toolkit (SPOT) supports the design of contaminant warning systems (CWSs) that use real-time sensors to detect contaminants in municipal water distribution networks. Specifically, SPOT provides the capability to select the locations for installing sensors in order to maximize the utility and effectiveness of the CWS. SPOT models the sensor placement process as an optimization problem, and the user can specify a wide range of performance objectives for contaminant warning system design, including populationmore » health effects, time to detection, extent of contamination, volume consumed and number of failed detections. For example, a SPOT user can integrate expert knowledge during the design process by specigying required sensor placements or designating network locations as forbidden. Further, cost considerations can be integrated by limiting the design with user-specified installation costs at each location.« less

  9. Rapid Toolkit Stakeholder Trial Demonstration

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit offers one location for agencies, developers, and industry stakeholders to work together on state and federal hydropower regulatory processes by using a wiki environment to share permitting guidance, regulations, contacts, and other relevant information.

  10. Local Government Community Solar Toolkit

    Broader source: Energy.gov [DOE]

    Community solar gardens can be an excellent opportunity for cities, counties, and other local governments to get involved in solar energy and engage community members. This toolkit has been created by Clean Energy Resource Teams to help consumers learn more about community solar.

  11. Parallel Power Grid Simulation Toolkit

    Energy Science and Technology Software Center (OSTI)

    2015-09-14

    ParGrid is a 'wrapper' that integrates a coupled Power Grid Simulation toolkit consisting of a library to manage the synchronization and communication of independent simulations. The included library code in ParGid, named FSKIT, is intended to support the coupling multiple continuous and discrete even parallel simulations. The code is designed using modern object oriented C++ methods utilizing C++11 and current Boost libraries to ensure compatibility with multiple operating systems and environments.

  12. The Configuration Space Toolkit (C-Space Toolkit or CSTK) Ver. 2.5 beta

    Energy Science and Technology Software Center (OSTI)

    2010-02-24

    The C-Space Toolkit provides a software library that makes it easier to program motion planning, simulation, robotics, and virtual reality codes using the Configuration Space abstraction. Key functionality (1) enables the user to special create representations of movable and stationary rigid geometric objects, and (2) perform fast distance, interference (clash) detection, collision detection, closest-feature pairs, and contact queries in terms of object configuration. Not only can queries be computed at any given point in configurationmore » space, but they can be done exactly over linear-translational path segments and approximately for rotational path segments. Interference detection and distance computations can be done with respect to the Minkowski sum of the original geometry and a piece of convex geometry. The Toolkit takes as raw model input (1) collections of convex polygons that form the boundaries of models and (2) convex polyhedra, cones, cylinders, and discs that are models and model components. Configurations are given in terms of homogeneous transforms. A simple OpenGL-based system for displaying and animating the geometric objects is included in the implementation. This version, 2.5 Beta, incorporates feature additions and enhancements, improvements in algorithms, improved robustness, bug fixes and cleaned-up source code, better compliance with standards and recent programming convention, changes to the build process for the software, support for more recent hardware and software platforms, and improvements to documentation and source-code comments.« less

  13. WPN 10-3: Procurement Toolkit CD

    Office of Energy Efficiency and Renewable Energy (EERE)

    To issue the Procurement Toolkit CD to all Grantees, to share with their local agencies, for use in the Weatherization Assistance Program.

  14. Workplace Charging Toolkit: Workshop Outreach Presentation Template...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Outreach Presentation Template Workplace Charging Toolkit: Workshop Outreach Presentation Template Educate workshop attendees and employers about the benefits of workplace charging ...

  15. Sustainable Forest Finance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    "This Toolkit has been developed jointly by PricewaterhouseCoopers (PwC) and the World Business Council for Sustainable Development (WBCSD). It is a globally applicable resource...

  16. Category:LEDS Toolkit | Open Energy Information

    Open Energy Info (EERE)

    meant to support the creation and implementation of a Low Emission Development Strategy. Pages in category "LEDS Toolkit" The following 14 pages are in this category, out of...

  17. Workplace Charging Toolkit: Workshop Speaker Instruction Letter...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Instruction Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template Inform speakers participating in the employer experience panel about their role ...

  18. Voluntary Initiative on Incentives: Toolkit Training Webinar

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Peer Exchange Call Series: Voluntary Initiative on Incentives: Toolkit Training Webinar, Call Slides and Discussion Summary, March 26, 2015.

  19. TransportToolkit Prototype | Open Energy Information

    Open Energy Info (EERE)

    AgencyCompany Organization: Nick Langle ComplexityEase of Use: Not Available Cost: Free Transport Toolkit Region(s): Asia, Europe, Africa & Middle East, Australia & North...

  20. Simulation Toolkit Promises Better Wind Predictions, Increased...

    Office of Environmental Management (EM)

    higher-than-expected downtimes and maintenance costs all undermine project profitability. ... The toolkit is being implemented within the Weather Research and Forecasting (WRF) model, ...

  1. Workplace Charging Toolkit: Workshop Invitation Template | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Invitation Template Workplace Charging Toolkit: Workshop Invitation Template Engage possible workplace charging event attendees with this template invitation. File General Workshop ...

  2. LEDSGP/Transportation Toolkit/Tools | Open Energy Information

    Open Energy Info (EERE)

    Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Tools for Low Emission Development Strategies in Transportation...

  3. A targeted proteomics toolkit for high-throughput absolute quantificat...

    Office of Scientific and Technical Information (OSTI)

    targeted proteomics toolkit for high-throughput absolute quantification of Escherichia coli proteins Citation Details In-Document Search Title: A targeted proteomics toolkit for ...

  4. Technology Cost and Performance Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  5. Policy and Program Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  6. Transportation Assessment Toolkit/Home | Open Energy Information

    Open Energy Info (EERE)

    Transport Bikes in Spain Toolkit for Low Emissions Development Strategies in Transport Red buses Toolkit for Low Emissions Development Strategies in Transport A Rationale and...

  7. Galvin Electricity Initiative Policy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Galvin Electricity Initiative Policy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Galvin Electricity Initiative Policy Toolkit AgencyCompany Organization:...

  8. Renewable Energy and Energy Efficiency Toolkit Website | Open...

    Open Energy Info (EERE)

    Toolkit Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Renewable Energy and Energy Efficiency Toolkit Website Focus Area: Renewable Energy Topics: Policy...

  9. LEDSGP/Transportation Toolkit/Contact Us | Open Energy Information

    Open Energy Info (EERE)

    Contact Us < LEDSGP | Transportation Toolkit Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Contacts for the LEDS GP...

  10. Climate Change and Clean Energy Project (CEnergy) Toolkit | Open...

    Open Energy Info (EERE)

    Project (CEnergy) Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Climate Change and Clean Energy Project (CEnergy) Toolkit AgencyCompany Organization:...

  11. Project Screening and Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Opportunities 3b.1. Assess technical potential for sector technologies Renewable Energy Technical Potential Toolkit Building Energy Assessment Toolkit Power System Screening...

  12. Python-ARM Radar Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-03-17

    The Python-ARM Radar Toolkit (Py-ART) is a collection of radar quality control and retrieval codes which all work on two unifying Python objects: the PyRadar and PyGrid objects. By building ingests to several popular radar formats and then abstracting the interface Py-ART greatly simplifies data processing over several other available utilities. In addition Py-ART makes use of Numpy arrays as its primary storage mechanism enabling use of existing and extensive community software tools.

  13. BioenergizeME Virtual Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    139 | published 9/22/15 BioenergizeME Infographic Challenge Toolkit B i o e n e r g i z e M E U . S . D E P A R T M ENT O F E N E R G Y O P E R A T I O N B i o e n e r g i z e M E U . S . D E P A R T M ENT O F E N E R G Y Developing future leaders who will determine the bioenergy landscape of tomorrow DOE/EE-1139 | published 9/22/15 TABLE OF CONTENTS 1 INTRODUCTION ................................................................................................... 2 Why Bioenergy? Why Now?

  14. BioenergizeME Infographic Challenge Toolkit | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit BioenergizeME Infographic Challenge Toolkit Toolkit for the BioenergizeME Infographic Challenge. bioenergizeme_toolkit.pdf (1.89 MB) More Documents & Publications Webinar: BioenergizeME Office Hours Webinar: Guide to the 2016 BioenergizeME Infographic Challenge BioenergizeME Infographic Challenge Flyer Webinar: BioenergizeME Office Hours Webinar: Biomass Basics

  15. TECA: A Parallel Toolkit for Extreme Climate Analysis

    SciTech Connect (OSTI)

    Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

    2012-03-12

    We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

  16. Utilizing The US Climate Resilience Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE)

    The U.S. Climate Resilience Toolkit provides scientific tools, information, and expertise to help professionals manage their climate-related risks and opportunities, and improve their resilience to extreme events.

  17. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (OSTI)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  18. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  19. NYSERDA-Wind Energy Toolkit | Open Energy Information

    Open Energy Info (EERE)

    NYSERDA-Wind Energy Toolkit Jump to: navigation, search Tool Summary LAUNCH TOOL Name: NYSERDA-Wind Energy Toolkit AgencyCompany Organization: New York State Energy Research and...

  20. The Wind Integration National Dataset (WIND) Toolkit (Presentation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wind Integration National Dataset (WIND) Toolkit Webinar Caroline Draxl and Bri-Mathias Hodge July 14, 2015 NRELPR-5000-64691 2 Content * Motivation * Creation of the WIND Toolkit ...

  1. NOAA Webinar: The U.S. Climate Resilience Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE)

    Hosted by the National Oceanic and Atmospheric Administration (NOAA), this webinar will demonstrate the U.S. Climate Resilience Toolkit.

  2. SIERRA Toolkit v. 1.0

    Energy Science and Technology Software Center (OSTI)

    2010-02-24

    The SIERRA Toolkit is a collection of libraries to facilitate the development of parallel engineering analysis applications. These libraries supply basic core services that an engineering analysis application may need such as a parallel distributed and dynamic mesh database (for unstructured meshes), mechanics algorithm support (parallel infrastructure only), interfaces to parallel solvers, parallel mesh and data I/O, and various utilities (timers, diagnostic tools, etc.).The toolkit is intended to reduce the effort required to develop anmore » engineering analysis application by removing the need to develop core capabilities that most every application would require.« less

  3. Co-Optima Simulation Toolkit Team

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Simulation Toolkit Team June 9, 2016 2 Co-Optimization of Fuels and Engines (Co-Optima) - Simulation Toolkit Team This presentation does not contain any proprietary, confidential, or otherwise restricted information FT040 M. McNenly, 1 S. Som, 2 D. Carrington, 3 K. D. Edwards, 4 R. Grout, 5 J. Kodavasal, 2 G. Lacaze, 6 J. Oefelein, 6 P. Pal, 2 V. Ram, 2 N. Van Dam, 2 J. Waters, 3 and R. Whitesides 1 1. Lawrence Livermore National Laboratory 2. Argonne National Laboratory 3. Los Alamos National

  4. Portable Extensible Toolkit for Scientific Computation

    Energy Science and Technology Software Center (OSTI)

    1995-06-30

    PETSC2.0 is a software toolkit for portable, parallel (and serial) numerical solution of partial differential equations and minimization problems. It includes software for the solution of linear and nonlinear systems of equations. These codes are written in a data-structure-neutral manner to enable easy reuse and flexibility.

  5. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth's weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  6. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth`s weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  7. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  8. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  9. LBNL: Architecture 2030 District Program and Small Commercial Toolkit |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit LBNL: Architecture 2030 District Program and Small Commercial Toolkit Lead Performer: Lawrence Berkeley National Laboratory - Berkeley, CA Partners: - Architecture 2030 - Santa Fe, NM - Cleveland 2030 District - Cleveland, OH - Green Building Alliance/Pittsburgh 2030 District - Pittsburgh, PA - Seattle 2030 District - Seattle, WA -

  10. Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Instruction Letter Template Workplace Charging Toolkit: Workshop Speaker Instruction Letter Template Inform speakers participating in the employer experience panel about their role in the event. General Speaker Instruction Letter Template (707.41 KB) Clean Cities Branded Speaker Instruction Letter Template (707.23 KB) More Documents & Publications Workplace Charging Toolkit: Workshop Speaker Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach

  11. Online Toolkit Fosters Bioenergy Innovation | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Toolkit Fosters Bioenergy Innovation Online Toolkit Fosters Bioenergy Innovation January 21, 2011 - 2:27pm Addthis Learn more about the Bioenergy Knowledge Discovery Framework, an online data sharing and mapping toolkit. Paul Bryan Biomass Program Manager, Office of Energy Efficiency & Renewable Energy What will the project do? The $241 million loan guarantee for Diamond Green Diesel, funding which will support the construction of a facility that will nearly triple the amount of renewable

  12. Supply Chain Risk Management (SCRM) Awareness Toolkit | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Supply Chain Risk Management (SCRM) Awareness Toolkit Supply Chain Risk Management (SCRM) Awareness Toolkit The Office of the Chief Information Officer (OCIO) Supply Chain Risk Management (SCRM) Resource Center developed the SCRM Awareness Toolkit to introduce DOE employees to the basic terms and concepts of the technology supply chain and associated threats. For additional information on the DOE Enterprise SCRM Resource Center and program initiatives, please contact Sue Farrand at

  13. Geospatial Toolkit (GsT) Webinar | Open Energy Information

    Open Energy Info (EERE)

    wikiGsT Equivalent URI: cleanenergysolutions.orgcontentgeospatial-toolkit-gst Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance...

  14. Integrated: Geospatial Toolkit GIS data for Oaxaca from NREL...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  15. Integrated: Geospatial Toolkit GIS data for India from NREL ...

    Open Energy Info (EERE)

    show good potential for renewable energy projects. The toolkit displays renewable energy data along with information about the geography, location of population centers,...

  16. ORISE: Radiological Terrorism Toolkit | How ORISE is Making a...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Education (ORISE) distributed more than 400 radiological terrorism toolkits filled with key resources, such as training guidelines, clinical directives, details about radioactive...

  17. LEDSGP/DIA-Toolkit/Uses | Open Energy Information

    Open Energy Info (EERE)

    (DIA) Toolkit offers a structured way to consider the impact of proposed low emission development strategies (LEDS) on other national or local priorities, and provides links to...

  18. YT: A Multi-Code Analysis Toolkit for Astrophysical Simulation...

    Office of Scientific and Technical Information (OSTI)

    Citation Details In-Document Search Title: YT: A Multi-Code Analysis Toolkit for ... Furthermore, we discuss the underlying algorithms yt uses for processing and visualizing ...

  19. Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)

    SciTech Connect (OSTI)

    Young, K.

    2014-04-01

    Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

  20. LEDSGP/DIA-Toolkit/Request Assistance | Open Energy Information

    Open Energy Info (EERE)

    Impacts Assessment Toolkit Home Tools Request Assistance Remote Expert Assistance on LEDS The Low Emission Development Strategies (LEDS) Global Partnership provides timely,...

  1. ACHP - Section 106 Applicant Toolkit | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: ACHP - Section 106 Applicant ToolkitPermittingRegulatory GuidanceGuide...

  2. Grid-Connected Renewable Energy Generation Toolkit-Biomass |...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Grid-Connected Renewable Energy Generation Toolkit-Biomass AgencyCompany Organization: United States Agency for...

  3. Integrated: Geospatial Toolkit GIS data for Nicaragua from NREL...

    Open Energy Info (EERE)

    Nicaragua from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  4. Integrated: Geospatial Toolkit GIS data for Cuba from NREL -...

    Open Energy Info (EERE)

    Cuba from NREL (Abstract): Geographic Information Systems (GIS) data intended for use in the Geospatial toolkit or with any GIS software. (Purpose): The Solar and Wind Energy...

  5. WRI-The Governance of Forests Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Publications Website: pdf.wri.orgworkingpapersgfitenureindicatorssep09.pdf Cost: Free WRI-The Governance of Forests Toolkit Screenshot References: WRI-The Governance of...

  6. Category:Wind Working Group Toolkit | Open Energy Information

    Open Energy Info (EERE)

    search This wiki-based Wind Working Group Toolkit provides links to information, methods, and resources. This wiki is a work in progress, and we welcome your contributions....

  7. ORISE: Pandemic Flu Toolkits | How ORISE is Making a Difference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workshops that have been presented to the Asia-Pacific Economic Cooperation (APEC) and other nations around the world. By developing training toolkits and providing...

  8. Workplace Charging Toolkit: Workshop Host Outreach Letter Template...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Host Outreach Letter Template Workplace Charging Toolkit: Workshop Host Outreach Letter Template Approach employers in your community that already have workplace charging to serve ...

  9. Distributed Renewable Energy Finance and Policy Toolkit | Open...

    Open Energy Info (EERE)

    Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Distributed Renewable Energy Finance and Policy Toolkit AgencyCompany Organization: Clean Energy States Alliance...

  10. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  11. Graph algorithms in the titan toolkit.

    SciTech Connect (OSTI)

    McLendon, William Clarence, III; Wylie, Brian Neil

    2009-10-01

    Graph algorithms are a key component in a wide variety of intelligence analysis activities. The Graph-Based Informatics for Non-Proliferation and Counter-Terrorism project addresses the critical need of making these graph algorithms accessible to Sandia analysts in a manner that is both intuitive and effective. Specifically we describe the design and implementation of an open source toolkit for doing graph analysis, informatics, and visualization that provides Sandia with novel analysis capability for non-proliferation and counter-terrorism.

  12. An Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B; Payne, Patricia W

    2012-01-01

    Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

  13. Parallel Climate Analysis Toolkit (ParCAT)

    SciTech Connect (OSTI)

    Smith, Brian Edward

    2013-06-30

    The parallel analysis toolkit (ParCAT) provides parallel statistical processing of large climate model simulation datasets. ParCAT provides parallel point-wise average calculations, frequency distributions, sum/differences of two datasets, and difference-of-average and average-of-difference for two datasets for arbitrary subsets of simulation time. ParCAT is a command-line utility that can be easily integrated in scripts or embedded in other application. ParCAT supports CMIP5 post-processed datasets as well as non-CMIP5 post-processed datasets. ParCAT reads and writes standard netCDF files.

  14. MCS Large Cluster Systems Software Toolkit

    Energy Science and Technology Software Center (OSTI)

    2002-11-01

    This package contains a number of systems utilities for managing a set of computers joined in a "cluster". The utilities assist a team of systems administrators in managing the cluster by automating routine tasks, centralizing information, and monitoring individual computers within the cluster. Included in the toolkit are scripts used to boot a computer from a floppy, a program to turn on and off the power to a system, and a system for using amore » database to organize cluster information.« less

  15. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  16. WAP Memorandum 015: Weatherization Financial Toolkit – 2 CFR 200 Regulations and Procurement Procedures

    Broader source: Energy.gov [DOE]

    This Memorandum serves to update and supersede the Financial Toolkit, previously issued in Weatherization Program Notice (WPN) 12-4, Weatherization Assistance Program Financial Management Training Toolkit dated December 9, 2011, and the Procurement Toolkit previously issued in WPN 10-3, Procurement Toolkit CD, dated October 30, 2009.

  17. Monitoring Extreme-scale Lustre Toolkit

    SciTech Connect (OSTI)

    Brim, Michael J; Lothian, Josh

    2015-01-01

    We discuss the design and ongoing development of the Monitoring Extreme-scale Lustre Toolkit (MELT), a unified Lustre performance monitoring and analysis infrastructure that provides continuous, low-overhead summary information on the health and performance of Lustre, as well as on-demand, in-depth problem diagnosis and root-cause analysis. The MELT infrastructure leverages a distributed overlay network to enable monitoring of center-wide Lustre filesystems where clients are located across many network domains. We preview interactive command-line utilities that help administrators and users to observe Lustre performance at various levels of resolution, from individual servers or clients to whole filesystems, including job-level reporting. Finally, we discuss our future plans for automating the root-cause analysis of common Lustre performance problems.

  18. Solar for Safety, Security, and Resilience Toolkit

    Broader source: Energy.gov [DOE]

    There is a growing interest in using renewable energy options like solar to improve community resiliency. During extreme weather events, solar can help prevent power outages by providing emergency energy to critical facilities and recovery efforts. Solar can provide electricity to remote or less accessible areas, and is flexible enough to be a mobile or temporary power source. In addition to resiliency planning, there are efforts to promote new safety education and guidelines for solar installation, especially related to fire prevention. Also, there is rising interest in how solar can influence homeland security. The Solar for Safety, Security, and Resilience Toolkit demonstrates the different ways of thinking about and incorporating solar energy into ongoing public safety, homeland security, and resiliency initiatives.

  19. Data Exploration Toolkit for serial diffraction experiments

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zeldin, Oliver B.; Brewster, Aaron S.; Hattne, Johan; Uervirojnangkoorn, Monarin; Lyubimov, Artem Y.; Zhou, Qiangjun; Zhao, Minglei; Weis, William I.; Sauter, Nicholas K.; Brunger, Axel T.

    2015-01-23

    Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many distinct crystals and/or different regions of the same crystal. Combined with other sources of XFEL shot-to-shot variation, this introduces significant heterogeneity into the diffraction data, complicating processing and interpretation. To enable researchers to get the most from their collected data, a toolkit is presented that provides insights into the quality of, and the variation present in, serial crystallography datamore » sets. These tools operate on the unmerged, partial intensity integration results from many individual crystals, and can be used on two levels: firstly to guide the experimental strategy during data collection, and secondly to help users make informed choices during data processing.« less

  20. Integrated: Geospatial Toolkit for Honduras from NREL - Datasets...

    Open Energy Info (EERE)

    and easy to use geographic toolkit that allows non-GIS users to relate the renewable energy resource (solar and wind) data to other geographic data, such as land use, protected...

  1. Template:RegulatoryToolkitHeader | Open Energy Information

    Open Energy Info (EERE)

    Toolkit banner, typically across the top of the page, which features a unique blue color scheme and simple menu. Parameters none Usage It should be called in the following...

  2. Simulation Toolkit Promises Better Wind Predictions, Increased Farm

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Production | Department of Energy Simulation Toolkit Promises Better Wind Predictions, Increased Farm Production Simulation Toolkit Promises Better Wind Predictions, Increased Farm Production May 11, 2016 - 6:16pm Addthis Wind farm production frequently falls short of expectations. Poor forecasts of low-altitude winds, suboptimal wind plant design and operation, and higher-than-expected downtimes and maintenance costs all undermine project profitability. Each of these issues results from

  3. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  4. UQ Toolkit v 2.0

    Energy Science and Technology Software Center (OSTI)

    2013-10-03

    The Uncertainty Quantification (UQ) Toolkit is a software library for the characterizaton and propagation of uncertainties in computational models. For the characterization of uncertainties, Bayesian inference tools are provided to infer uncertain model parameters, as well as Bayesian compressive sensing methods for discovering sparse representations of high-dimensional input-output response surfaces, and also Karhunen-Loève expansions for representing stochastic processes. Uncertain parameters are treated as random variables and represented with Polynomial Chaos expansions (PCEs). The library implementsmore » several spectral basis function types (e.g. Hermite basis functions in terms of Gaussian random variables or Legendre basis functions in terms of uniform random variables) that can be used to represent random variables with PCEs. For propagation of uncertainty, tools are provided to propagate PCEs that describe the input uncertainty through the computational model using either intrusive methods (Galerkin projection of equations onto basis functions) or non-intrusive methods (perform deterministic operation at sampled values of the random values and project the obtained results onto basis functions).« less

  5. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect (OSTI)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  6. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  7. XOP 2.1 - a new version of the x-ray optics software toolkit...

    Office of Scientific and Technical Information (OSTI)

    XOP 2.1 - a new version of the x-ray optics software toolkit. Citation Details In-Document Search Title: XOP 2.1 - a new version of the x-ray optics software toolkit. No abstract ...

  8. Validation of Power Output for the WIND Toolkit

    SciTech Connect (OSTI)

    King, J.; Clifton, A.; Hodge, B. M.

    2014-09-01

    Renewable energy integration studies require wind data sets of high quality with realistic representations of the variability, ramping characteristics, and forecast performance for current wind power plants. The Wind Integration National Data Set (WIND) Toolkit is meant to be an update for and expansion of the original data sets created for the weather years from 2004 through 2006 during the Western Wind and Solar Integration Study and the Eastern Wind Integration Study. The WIND Toolkit expands these data sets to include the entire continental United States, increasing the total number of sites represented, and it includes the weather years from 2007 through 2012. In addition, the WIND Toolkit has a finer resolution for both the temporal and geographic dimensions. Three separate data sets will be created: a meteorological data set, a wind power data set, and a forecast data set. This report describes the validation of the wind power data set.

  9. DATE:

    Office of Environmental Management (EM)

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  10. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Toolkit for Installing Solar on K-12 Schools

    Broader source: Energy.gov [DOE]

    Following the release of The Solar Foundation's Brighter Future: A Study on Solar in U.S. Schools under the Solar Outreach Partnership, the organization has been working to help more K-12 public schools go solar through its technical assistance program. As part of this effort, they developed the Toolkit for Installing Solar on K-12 Schools to compile new and existing resources, designed to provide public school officials with a starting point for pursuing their own solar projects. Hands-on guidance in putting the ideas contained within this toolkit into action is available through the SolarOPs Technical Assistance program.

  12. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License Py

  13. Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B.

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability to be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is used to

  14. Incident Management Preparedness and Coordination Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability tomore » be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is

  15. Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    NREL developed the Geospatial Toolkit (GsT), a map-based software application that integrates resource data and geographic information systems (GIS) for integrated resource assessment. A variety of agencies within countries, along with global datasets, provided country-specific data. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Toolkits are available for 21 countries and each one can be downloaded separately. The source code for the toolkit is also available. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

  16. Capturing and Using Knowledge about the Use of Visualization Toolkits

    SciTech Connect (OSTI)

    Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

    2012-11-02

    When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

  17. Cubit Mesh Generation Toolkit V11.1

    Energy Science and Technology Software Center (OSTI)

    2009-03-25

    CUBIT prepares models to be used in computer-based simulation of real-world events. CUBIT is a full-featured software toolkit for robust generation of two- and three-dimensional finite element meshes (grids) and geometry preparation. Its main goal is to reduce the time to generate meshes, particularly large hex meshes of complicated, interlocking assemblies.

  18. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  19. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  20. Guide to Using the WIND Toolkit Validation Code

    SciTech Connect (OSTI)

    Lieberman-Cribbin, W.; Draxl, C.; Clifton, A.

    2014-12-01

    In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to provide information on wind speed, wind direction, temperature, surface air pressure, and air density on more than 126,000 locations across the United States from 2007 to 2013. The numerical weather prediction model output, gridded at 2-km and at a 5-minute resolution, was further converted to detail the wind power production time series of existing and potential wind facility sites. For users of the dataset it is important that the information presented in the WIND Toolkit is accurate and that errors are known, as then corrective steps can be taken. Therefore, we provide validation code written in R that will be made public to provide users with tools to validate data of their own locations. Validation is based on statistical analyses of wind speed, using error metrics such as bias, root-mean-square error, centered root-mean-square error, mean absolute error, and percent error. Plots of diurnal cycles, annual cycles, wind roses, histograms of wind speed, and quantile-quantile plots are created to visualize how well observational data compares to model data. Ideally, validation will confirm beneficial locations to utilize wind energy and encourage regional wind integration studies using the WIND Toolkit.

  1. RAPID Toolkit: Facilitating Utility-Scale Renewable Energy Development; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    2015-04-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit provides information about permits and regulations that affect renewable energy and bulk transmission projects.

  2. LEDSGP/Transportation Toolkit/Key Actions/Create a Baseline ...

    Open Energy Info (EERE)

    a Baseline) Jump to: navigation, search LEDSGP Logo.png Transportation Toolkit Home Tools Training Request Assistance Key Actions for Low-Emission Development in Transportation...

  3. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  4. The Wind Integration National Dataset (WIND) toolkit (Presentation)

    SciTech Connect (OSTI)

    Caroline Draxl: NREL

    2014-01-01

    Regional wind integration studies require detailed wind power output data at many locations to perform simulations of how the power system will operate under high penetration scenarios. The wind datasets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as being time synchronized with available load profiles.As described in this presentation, the WIND Toolkit fulfills these requirements by providing a state-of-the-art national (US) wind resource, power production and forecast dataset.

  5. Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit combines the former Geothermal Regulatory Roadmap, National Environmental Policy Act (NEPA) Database, and other resources into a Web-based tool that gives the regulatory and utility-scale geothermal developer communities rapid and easy access to permitting information. RAPID currently comprises five tools - Permitting Atlas, Regulatory Roadmap, Resource Library, NEPA Database, and Best Practices. A beta release of an additional tool, the Permitting Wizard, is scheduled for late 2014. Because of the huge amount of information involved, RAPID was developed in a wiki platform to allow industry and regulatory agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users. In 2014, the content was expanded to include regulatory requirements for utility-scale solar and bulk transmission development projects. Going forward, development of the RAPID Toolkit will focus on expanding the capabilities of current tools, developing additional tools, including additional technologies, and continuing to increase stakeholder involvement.

  6. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cyber Security Audit and Attack Detection Toolkit project developed two commercial solutions-Bandolier and Portaledge. The Bandolier Audit Files enable energy sector asset ...

  7. Overview and Meteorological Validation of the Wind Integration National Dataset toolkit

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Clifton, A.; McCaa, J.

    2015-04-13

    The Wind Integration National Dataset (WIND) Toolkit described in this report fulfills these requirements, and constitutes a state-of-the-art national wind resource data set covering the contiguous United States from 2007 to 2013 for use in a variety of next-generation wind integration analyses and wind power planning. The toolkit is a wind resource data set, wind forecast data set, and wind power production and forecast data set derived from the Weather Research and Forecasting (WRF) numerical weather prediction model. WIND Toolkit data are available online for over 116,000 land-based and 10,000 offshore sites representing existing and potential wind facilities.

  8. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  9. PHISICS TOOLKIT: MULTI-REACTOR TRANSMUTATION ANALYSIS UTILITY - MRTAU

    SciTech Connect (OSTI)

    Andrea Alfonsi; Cristian Rabiti; Aaron S. Epiney; Yaqi Wang; Joshua Cogliati

    2012-04-01

    The principal idea of this paper is to present the new capabilities available in the PHISICS toolkit, connected with the implementation of the depletion code MRTAU, a generic depletion/ decay/burn-up code developed at the Idaho National Laboratory. It is programmed in a modular structure and modern FORTRAN 95/2003. The code tracks the time evolution of the isotopic concentration of a given material accounting for nuclear reaction happening in presence of neutron flux and also due to natural decay. MRTAU has two different methods to perform the depletion calculation, in order to let the user choose the best one respect his needs. Both the methodologies and some significant results are reported in this paper.

  10. MeSh ToolKit v1.2

    Energy Science and Technology Software Center (OSTI)

    2004-05-15

    MSTK or Mesh Toolkit is a mesh framework that allows users to represent, manipulate and query unstructured 3D arbitrary topology meshes in a general manner without the need to code their own data structures. MSTK is a flexible framework in that is allows (or will eventually allow) a wide variety of underlying representations for the mesh while maintaining a common interface. It will allow users to choose from different mesh representations either at initialization ormore » during the program execution so that the optimal data structures are used for the particular algorithm. The interaction of users and applications with MSTK is through a functional interface that acts as through the mesh always contains vertices, edges, faces and regions and maintains connectivity between all these entities.« less

  11. Energy Department Announces Publication of Better Buildings Energy Data Accelerator Resources Toolkit

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy today announced the publication of a high-impact, informational resources toolkit through its Better Buildings Energy Data Accelerator developed in partnership with 18...

  12. Challenges and Opportunities in Using Automatic Differentiation with Object-Oriented Toolkits for Scientific Computing

    SciTech Connect (OSTI)

    Hovland, P; Lee, S; McInnes, L; Norris, B; Smith, B

    2001-04-17

    The increased use of object-oriented toolkits in large-scale scientific simulation presents new opportunities and challenges for the use of automatic (or algorithmic) differentiation (AD) techniques, especially in the context of optimization. Because object-oriented toolkits use well-defined interfaces and data structures, there is potential for simplifying the AD process. Furthermore, derivative computation can be improved by exploiting high-level information about numerical and computational abstractions. However, challenges to the successful use of AD with these toolkits also exist. Among the greatest challenges is balancing the desire to limit the scope of the AD process with the desire to minimize the work required of a user. They discuss their experiences in integrating AD with the PETSc, PVODE, and TAO toolkits and the plans for future research and development in this area.

  13. Wind Integration National Dataset (WIND) Toolkit; NREL (National Renewable Energy Laboratory)

    SciTech Connect (OSTI)

    Draxl, Caroline; Hodge, Bri-Mathias

    2015-07-14

    A webinar about the Wind Integration National Dataset (WIND) Toolkit was presented by Bri-Mathias Hodge and Caroline Draxl on July 14, 2015. It was hosted by the Southern Alliance for Clean Energy. The toolkit is a grid integration data set that contains meteorological and power data at a 5-minute resolution across the continental United States for 7 years and hourly power forecasts.

  14. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:www.nnsa.energy.govmediaroompressreleasesncstateconsortium

  15. The NetLogger Toolkit V2.0

    Energy Science and Technology Software Center (OSTI)

    2003-03-28

    The NetLogger Toolkit is designed to monitor, under actual operating conditions, the behavior of all the elements of the application-to-application communication path in order to determine exactly where time is spent within a complex system Using NetLogger, distnbuted application components are modified to produce timestamped logs of "interesting" events at all the critical points of the distributed system Events from each component are correlated, which allov^ one to characterize the performance of all aspects ofmore » the system and network in detail. The NetLogger Toolkit itself consists of four components an API and library of functions to simplify the generation of application-level event logs, a set of tools for collecting and sorting log files, an event archive system, and a tool for visualization and analysis of the log files In order to instrument an application to produce event logs, the application developer inserts calls to the NetLogger API at all the critical points in the code, then links the application with the NetLogger library All the tools in the NetLogger Toolkit share a common log format, and assume the existence of accurate and synchronized system clocks NetLogger messages can be logged using an easy-to-read text based format based on the lETF-proposed ULM format, or a binary format that can still be used through the same API but that is several times faster and smaller, with performance comparable or better than binary message formats such as MPI, XDR, SDDF-Binary, and PBIO. The NetLogger binary format is both highly efficient and self-describing, thus optimized for the dynamic message construction and parsing of application instrumentation. NetLogger includes an "activation" API that allows NetLogger logging to be turned on, off, or modified by changing an external file This IS useful for activating logging in daemons/services (e g GndFTP server). The NetLogger reliability API provides the ability to specify backup logging locations and

  16. Detect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    coherent Raman scattering Standoff detection of physical and chemical signatures from manufacturing and concealed deployment Standoff high-selectivity spectroscopy of ...

  17. detection

    National Nuclear Security Administration (NNSA)

    of 25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation http:nnsa.energy.govmediaroompressreleasesncstateconsortium

  18. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  19. Microgrid Design Toolkit (MDT) Technical Documentation and Component Summaries

    SciTech Connect (OSTI)

    Arguello, Bryan; Gearhart, Jared Lee; Jones, Katherine A.; Eddy, John P.

    2015-09-01

    The Microgrid Design Toolkit (MDT) is a decision support software tool for microgrid designers to use during the microgrid design process. The models that support the two main capabilities in MDT are described. The first capability, the Microgrid Sizing Capability (MSC), is used to determine the size and composition of a new microgrid in the early stages of the design process. MSC is a mixed-integer linear program that is focused on developing a microgrid that is economically viable when connected to the grid. The second capability is focused on refining a microgrid design for operation in islanded mode. This second capability relies on two models: the Technology Management Optimization (TMO) model and Performance Reliability Model (PRM). TMO uses a genetic algorithm to create and refine a collection of candidate microgrid designs. It uses PRM, a simulation based reliability model, to assess the performance of these designs. TMO produces a collection of microgrid designs that perform well with respect to one or more performance metrics.

  20. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  1. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  2. Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study

    SciTech Connect (OSTI)

    Wang, Na

    2013-03-13

    This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

  3. Toolkit Model for SN-03 Final Proposal (ratecases/sn03)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Model SN CRAC ToolKit Model Variable, Flat SN CRAC, 80% TPP (TK187SN-03FS3BPA-PropVariableFlatSNN24-Jun-03.xls, 3.1 MB) Data Input Files (required to run the above...

  4. Phase 1 Development Report for the SESSA Toolkit.

    SciTech Connect (OSTI)

    Knowlton, Robert G.; Melton, Brad J; Anderson, Robert J.

    2014-09-01

    operation of th e SESSA tool kit in order to give the user enough information to start using the tool kit . SESSA is currently a prototype system and this documentation covers the initial release of the tool kit . Funding for SESSA was provided by the Department of Defense (D oD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL) . ACKNOWLEDGEMENTS The authors wish to acknowledge the funding support for the development of the Site Exploitation System for Situational Awareness (SESSA) toolkit from the Department of Defense (DoD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL). Special thanks to Mr. Garold Warner, of DFSC, who served as the Project Manager. Individuals that worked on the design, functional attributes, algorithm development, system arc hitecture, and software programming include: Robert Knowlton, Brad Melton, Robert Anderson, and Wendy Amai.

  5. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  6. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  7. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  8. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  9. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  10. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  11. Co-Optimization of Fuels and Engines (Co-Optima) --Simulation Toolkit Team

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Co-Optimization of Fuels and Engines (Co-Optima) - Simulation Toolkit Team This presentation does not contain any proprietary, confidential, or otherwise restricted information #$%&%" '("')*+,-./ ! "0("012/ 3 "!"#$%&&'()*+(, - #"."#!"#/01%&02, 3# 4"#5&+6*, 7# 8"#.+0%9%2%:, ;# 5"#<%=%>?, @# 8"# A?B?:?'(, @ #C"#C%:, ; #D"#4%E, ; #F"#D%(#!%E, ; #8"#G%*?&2, - #%(0#4"#GH'*?2'0?2 I#

  12. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  13. Modeling of a Flooding Induced Station Blackout for a Pressurized Water Reactor Using the RISMC Toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven R; Smith, Curtis L; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua J; Kinoshita, Robert A

    2011-07-01

    In the Risk Informed Safety Margin Characterization (RISMC) approach we want to understand not just the frequency of an event like core damage, but how close we are (or are not) to key safety-related events and how might we increase our safety margins. The RISMC Pathway uses the probabilistic margin approach to quantify impacts to reliability and safety by coupling both probabilistic (via stochastic simulation) and mechanistic (via physics models) approaches. This coupling takes place through the interchange of physical parameters and operational or accident scenarios. In this paper we apply the RISMC approach to evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., system activation) and to perform statistical analyses (e.g., run multiple RELAP-7 simulations where sequencing/timing of events have been changed according to a set of stochastic distributions). By using the RISMC toolkit, we can evaluate how power uprate affects the system recovery measures needed to avoid core damage after the PWR lost all available AC power by a tsunami induced flooding. The simulation of the actual flooding is performed by using a smooth particle hydrodynamics code: NEUTRINO.

  14. A toolkit for integrated deterministic and probabilistic assessment for hydrogen infrastructure.

    SciTech Connect (OSTI)

    Groth, Katrina; Tchouvelev, Andrei V.

    2014-03-01

    There has been increasing interest in using Quantitative Risk Assessment [QRA] to help improve the safety of hydrogen infrastructure and applications. Hydrogen infrastructure for transportation (e.g. fueling fuel cell vehicles) or stationary (e.g. back-up power) applications is a relatively new area for application of QRA vs. traditional industrial production and use, and as a result there are few tools designed to enable QRA for this emerging sector. There are few existing QRA tools containing models that have been developed and validated for use in small-scale hydrogen applications. However, in the past several years, there has been significant progress in developing and validating deterministic physical and engineering models for hydrogen dispersion, ignition, and flame behavior. In parallel, there has been progress in developing defensible probabilistic models for the occurrence of events such as hydrogen release and ignition. While models and data are available, using this information is difficult due to a lack of readily available tools for integrating deterministic and probabilistic components into a single analysis framework. This paper discusses the first steps in building an integrated toolkit for performing QRA on hydrogen transportation technologies and suggests directions for extending the toolkit.

  15. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  16. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  17. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  18. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  19. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code calledmore » NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.« less

  20. Multi-Physics Demonstration Problem with the SHARP Reactor Simulation Toolkit

    SciTech Connect (OSTI)

    Merzari, E.; Shemon, E. R.; Yu, Y. Q.; Thomas, J. W.; Obabko, A.; Jain, Rajeev; Mahadevan, Vijay; Tautges, Timothy; Solberg, Jerome; Ferencz, Robert Mark; Whitesides, R.

    2015-12-21

    This report describes to employ SHARP to perform a first-of-a-kind analysis of the core radial expansion phenomenon in an SFR. This effort required significant advances in the framework Multi-Physics Demonstration Problem with the SHARP Reactor Simulation Toolkit used to drive the coupled simulations, manipulate the mesh in response to the deformation of the geometry, and generate the necessary modified mesh files. Furthermore, the model geometry is fairly complex, and consistent mesh generation for the three physics modules required significant effort. Fully-integrated simulations of a 7-assembly mini-core test problem have been performed, and the results are presented here. Physics models of a full-core model of the Advanced Burner Test Reactor have also been developed for each of the three physics modules. Standalone results of each of the three physics modules for the ABTR are presented here, which provides a demonstration of the feasibility of the fully-integrated simulation.

  1. Data Exploration Toolkit for serial diffraction experiments

    SciTech Connect (OSTI)

    Zeldin, Oliver B.; Brewster, Aaron S.; Hattne, Johan; Uervirojnangkoorn, Monarin; Lyubimov, Artem Y.; Zhou, Qiangjun; Zhao, Minglei; Weis, William I.; Sauter, Nicholas K.; Brunger, Axel T.

    2015-01-23

    Ultrafast diffraction at X-ray free-electron lasers (XFELs) has the potential to yield new insights into important biological systems that produce radiation-sensitive crystals. An unavoidable feature of the 'diffraction before destruction' nature of these experiments is that images are obtained from many distinct crystals and/or different regions of the same crystal. Combined with other sources of XFEL shot-to-shot variation, this introduces significant heterogeneity into the diffraction data, complicating processing and interpretation. To enable researchers to get the most from their collected data, a toolkit is presented that provides insights into the quality of, and the variation present in, serial crystallography data sets. These tools operate on the unmerged, partial intensity integration results from many individual crystals, and can be used on two levels: firstly to guide the experimental strategy during data collection, and secondly to help users make informed choices during data processing.

  2. A flooding induced station blackout analysis for a pressurized water reactor using the RISMC toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Prescott, Steven; Smith, Curtis; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua; Kinoshita, Robert

    2015-05-17

    In this paper we evaluate the impact of a power uprate on a pressurized water reactor (PWR) for a tsunami-induced flooding test case. This analysis is performed using the RISMC toolkit: the RELAP-7 and RAVEN codes. RELAP-7 is the new generation of system analysis codes that is responsible for simulating the thermal-hydraulic dynamics of PWR and boiling water reactor systems. RAVEN has two capabilities: to act as a controller of the RELAP-7 simulation (e.g., component/system activation) and to perform statistical analyses. In our case, the simulation of the flooding is performed by using an advanced smooth particle hydrodynamics code called NEUTRINO. The obtained results allow the user to investigate and quantify the impact of timing and sequencing of events on system safety. The impact of power uprate is determined in terms of both core damage probability and safety margins.

  3. Advancements in Wind Integration Study Data Modeling: The Wind Integration National Dataset (WIND) Toolkit; Preprint

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Orwig, K.; Jones, W.; Searight, K.; Getman, D.; Harrold, S.; McCaa, J.; Cline, J.; Clark, C.

    2013-10-01

    Regional wind integration studies in the United States require detailed wind power output data at many locations to perform simulations of how the power system will operate under high-penetration scenarios. The wind data sets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as be time synchronized with available load profiles. The Wind Integration National Dataset (WIND) Toolkit described in this paper fulfills these requirements. A wind resource dataset, wind power production time series, and simulated forecasts from a numerical weather prediction model run on a nationwide 2-km grid at 5-min resolution will be made publicly available for more than 110,000 onshore and offshore wind power production sites.

  4. Fact Sheet: Detection and Analysis of Threats to the Energy Sector...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly ... DATES will create an anonymous global threat database, ...

  5. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  6. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral triggers to help focus the analysts attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  7. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  8. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  9. A versatile toolkit for high throughput functional genomics with Trichoderma reesei

    SciTech Connect (OSTI)

    Schuster, Andre; Bruno, Kenneth S.; Collett, James R.; Baker, Scott E.; Seiboth, Bernhard; Kubicek, Christian P.; Schmoll, Monika

    2012-01-02

    The ascomycete fungus, Trichoderma reesei (anamorph of Hypocrea jecorina), represents a biotechnological workhorse and is currently one of the most proficient cellulase producers. While strain improvement was traditionally accomplished by random mutagenesis, a detailed understanding of cellulase regulation can only be gained using recombinant technologies. RESULTS: Aiming at high efficiency and high throughput methods, we present here a construction kit for gene knock out in T. reesei. We provide a primer database for gene deletion using the pyr4, amdS and hph selection markers. For high throughput generation of gene knock outs, we constructed vectors using yeast mediated recombination and then transformed a T. reesei strain deficient in non-homologous end joining (NHEJ) by spore electroporation. This NHEJ-defect was subsequently removed by crossing of mutants with a sexually competent strain derived from the parental strain, QM9414.CONCLUSIONS:Using this strategy and the materials provided, high throughput gene deletion in T. reesei becomes feasible. Moreover, with the application of sexual development, the NHEJ-defect can be removed efficiently and without the need for additional selection markers. The same advantages apply for the construction of multiple mutants by crossing of strains with different gene deletions, which is now possible with considerably less hands-on time and minimal screening effort compared to a transformation approach. Consequently this toolkit can considerably boost research towards efficient exploitation of the resources of T. reesei for cellulase expression and hence second generation biofuel production.

  10. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  11. The Nuclear Energy Advanced Modeling and Simulation Safeguards and Separations Reprocessing Plant Toolkit

    SciTech Connect (OSTI)

    McCaskey, Alex; Billings, Jay Jay; de Almeida, Valmor F

    2011-08-01

    This report details the progress made in the development of the Reprocessing Plant Toolkit (RPTk) for the DOE Nuclear Energy Advanced Modeling and Simulation (NEAMS) program. RPTk is an ongoing development effort intended to provide users with an extensible, integrated, and scalable software framework for the modeling and simulation of spent nuclear fuel reprocessing plants by enabling the insertion and coupling of user-developed physicochemical modules of variable fidelity. The NEAMS Safeguards and Separations IPSC (SafeSeps) and the Enabling Computational Technologies (ECT) supporting program element have partnered to release an initial version of the RPTk with a focus on software usability and utility. RPTk implements a data flow architecture that is the source of the system's extensibility and scalability. Data flows through physicochemical modules sequentially, with each module importing data, evolving it, and exporting the updated data to the next downstream module. This is accomplished through various architectural abstractions designed to give RPTk true plug-and-play capabilities. A simple application of this architecture, as well as RPTk data flow and evolution, is demonstrated in Section 6 with an application consisting of two coupled physicochemical modules. The remaining sections describe this ongoing work in full, from system vision and design inception to full implementation. Section 3 describes the relevant software development processes used by the RPTk development team. These processes allow the team to manage system complexity and ensure stakeholder satisfaction. This section also details the work done on the RPTk ``black box'' and ``white box'' models, with a special focus on the separation of concerns between the RPTk user interface and application runtime. Section 4 and 5 discuss that application runtime component in more detail, and describe the dependencies, behavior, and rigorous testing of its constituent components.

  12. The GEANT4 toolkit for microdosimetry calculations: Application to microbeam radiation therapy (MRT)

    SciTech Connect (OSTI)

    Spiga, J.; Siegbahn, E. A.; Braeuer-Krisch, E.; Randaccio, P.; Bravin, A.

    2007-11-15

    Theoretical dose distributions for microbeam radiation therapy (MRT) are computed in this paper using the GEANT4 Monte Carlo (MC) simulation toolkit. MRT is an innovative experimental radiotherapy technique carried out using an array of parallel microbeams of synchrotron-wiggler-generated x rays. Although the biological mechanisms underlying the effects of microbeams are still largely unknown, the effectiveness of MRT can be traced back to the natural ability of normal tissues to rapidly repair small damages to the vasculature, and on the lack of a similar healing process in tumoral tissues. Contrary to conventional therapy, in which each beam is at least several millimeters wide, the narrowness of the microbeams allows a rapid regeneration of the blood vessels along the beams' trajectories. For this reason the calculation of the 'valley' dose is of crucial importance and the correct use of MC codes for such purposes must be understood. GEANT4 offers, in addition to the standard libraries, a specialized package specifically designed to deal with electromagnetic interactions of particles with matter for energies down to 250 eV. This package implements two different approaches for electron and photon transport, one based on evaluated data libraries, the other adopting analytical models. These features are exploited to cross-check theoretical computations for MRT. The lateral and depth dose profiles are studied for the irradiation of a 20 cm diameter, 20 cm long cylindrical phantom, with cylindrical sources of different size and energy. Microbeam arrays are simulated with the aid of superposition algorithms, and the ratios of peak-to-valley doses are computed for typical cases used in preclinical assays. Dose profiles obtained using the GEANT4 evaluated data libraries and analytical models are compared with simulation results previously obtained using the PENELOPE code. The results show that dose profiles computed with GEANT4's analytical model are almost

  13. Improved Sampling Algorithms in the Risk-Informed Safety Margin Characterization Toolkit

    SciTech Connect (OSTI)

    Mandelli, Diego; Smith, Curtis Lee; Alfonsi, Andrea; Rabiti, Cristian; Cogliati, Joshua Joseph

    2015-09-01

    The RISMC approach is developing advanced set of methodologies and algorithms in order to perform Probabilistic Risk Analyses (PRAs). In contrast to classical PRA methods, which are based on Event-Tree and Fault-Tree methods, the RISMC approach largely employs system simulator codes applied to stochastic analysis tools. The basic idea is to randomly perturb (by employing sampling algorithms) timing and sequencing of events and internal parameters of the system codes (i.e., uncertain parameters) in order to estimate stochastic parameters such as core damage probability. This approach applied to complex systems such as nuclear power plants requires to perform a series of computationally expensive simulation runs given a large set of uncertain parameters. These types of analysis are affected by two issues. Firstly, the space of the possible solutions (a.k.a., the issue space or the response surface) can be sampled only very sparsely, and this precludes the ability to fully analyze the impact of uncertainties on the system dynamics. Secondly, large amounts of data are generated and tools to generate knowledge from such data sets are not yet available. This report focuses on the first issue and in particular employs novel methods that optimize the information generated by the sampling process by sampling unexplored and risk-significant regions of the issue space: adaptive (smart) sampling algorithms. They infer system response from surrogate models constructed from existing samples and predict the most relevant location of the next sample. It is therefore possible to understand features of the issue space with a small number of carefully selected samples. In this report, we will present how it is possible to perform adaptive sampling using the RISMC toolkit and highlight the advantages compared to more classical sampling approaches such Monte-Carlo. We will employ RAVEN to perform such statistical analyses using both analytical cases but also another RISMC code: RELAP-7.

  14. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  15. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  16. ORBiT: Oak Ridge Bio-surveillance Toolkit for Public Health Dynamics

    SciTech Connect (OSTI)

    Ramanathan, Arvind; Pullum, Laura L; Hobson, Tanner C; Steed, Chad A; Chennubhotla, Chakra; Quinn, Shannon

    2015-01-01

    With novel emerging infectious diseases being reported across different parts of the world, there is a need to build effective bio-surveillance systems that can track, monitor and report such events in a timely manner. Apart from monitoring for emerging disease outbreaks, it is also important to identify susceptible geographic regions and populations where these diseases may have a significant impact. The digitization of health related information through electronic health records (EHR) and electronic healthcare claim reimbursements (eHCR) and the continued growth of self-reported health information through social media provides both tremendous opportunities and challenges in developing novel public health surveillance tools. In this paper, we present an overview of Oak Ridge Bio-surveillance Toolkit (ORBiT), which we have developed specifically to address data analytic challenges in the realm of public health surveillance. In particular, ORBiT provides an extensible environment to pull together diverse, large-scale datasets and analyze them to identify spatial and temporal patterns for various bio-surveillance related tasks. We demonstrate the utility of ORBiT in automatically extracting a small number of spatial and temporal patterns during the 2009-2010 pandemic H1N1 flu season using eHCR data. These patterns provide quantitative insights into the dynamics of how the pandemic flu spread across different parts of the country. We discovered that the eHCR data exhibits multi-scale patterns from which we could identify a small number of states in the United States (US) that act as bridge regions contributing to one or more specific influenza spread patterns. Similar to previous studies, the patterns show that the south-eastern regions of the US were widely affected by the H1N1 flu pandemic. Several of these south-eastern states act as bridge regions, which connect the north-east and central US in terms of flu occurrences. These quantitative insights show how the e

  17. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  18. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  19. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  20. Paint for detection of corrosion and warning of chemical and radiological attack

    DOE Patents [OSTI]

    Farmer, Joseph C.

    2010-08-24

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  1. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  2. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of ...

  3. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  4. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  5. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  6. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  7. Cazymes Analysis Toolkit (CAT): Webservice for searching and analyzing carbohydrateactive enzymes in a newly sequenced organism using CAZy database

    SciTech Connect (OSTI)

    Karpinets, Tatiana V; Park, Byung; Syed, Mustafa H; Uberbacher, Edward C; Leuze, Michael Rex

    2010-01-01

    The Carbohydrate-Active Enzyme (CAZy) database provides a rich set of manually annotated enzymes that degrade, modify, or create glycosidic bonds. Despite rich and invaluable information stored in the database, software tools utilizing this information for annotation of newly sequenced genomes by CAZy families are limited. We have employed two annotation approaches to fill the gap between manually curated high-quality protein sequences collected in the CAZy database and the growing number of other protein sequences produced by genome or metagenome sequencing projects. The first approach is based on a similarity search against the entire non-redundant sequences of the CAZy database. The second approach performs annotation using links or correspondences between the CAZy families and protein family domains. The links were discovered using the association rule learning algorithm applied to sequences from the CAZy database. The approaches complement each other and in combination achieved high specificity and sensitivity when cross-evaluated with the manually curated genomes of Clostridium thermocellum ATCC 27405 and Saccharophagus degradans 2-40. The capability of the proposed framework to predict the function of unknown protein domains (DUF) and of hypothetical proteins in the genome of Neurospora crassa is demonstrated. The framework is implemented as a Web service, the CAZymes Analysis Toolkit (CAT), and is available at http://cricket.ornl.gov/cgi-bin/cat.cgi.

  8. Discovering multi-scale co-occurrence patterns of asthma and influenza with the Oak Ridge bio-surveillance toolkit

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ramanathan, Arvind; Pullum, Laura L.; Hobson, Tanner C.; Stahl, Christopher G.; Steed, Chad A.; Valkova, Silvia; Quinn, Shannon; Chennubhotla, Chakra

    2015-08-03

    Here, we describe a data-driven unsupervised machine learning approach to extract geo-temporal co-occurrence patterns of asthma and the flu from large-scale electronic healthcare reimbursement claims (eHRC) datasets. Specifically, we examine the eHRC data from 2009 to 2010 pandemic H1N1 influenza season and analyze whether different geographic regions within the United States (US) showed an increase in co-occurrence patterns of the flu and asthma. Our analyses reveal that the temporal patterns extracted from the eHRC data show a distinct lag time between the peak incidence of the asthma and the flu. While the increased occurrence of asthma contributed to increased flumore » incidence during the pandemic, this co-occurrence is predominant for female patients. The geo-temporal patterns reveal that the co-occurrence of the flu and asthma are typically concentrated within the south-east US. Further, in agreement with previous studies, large urban areas (such as New York, Miami, and Los Angeles) exhibit co-occurrence patterns that suggest a peak incidence of asthma and flu significantly early in the spring and winter seasons. Together, our data-analytic approach, integrated within the Oak Ridge Bio-surveillance Toolkit platform, demonstrates how eHRC data can provide novel insights into co-occurring disease patterns.« less

  9. Using Discrete Event Simulation for Programming Model Exploration at Extreme-Scale: Macroscale Components for the Structural Simulation Toolkit (SST).

    SciTech Connect (OSTI)

    Wilke, Jeremiah J; Kenny, Joseph P.

    2015-02-01

    Discrete event simulation provides a powerful mechanism for designing and testing new extreme- scale programming models for high-performance computing. Rather than debug, run, and wait for results on an actual system, design can first iterate through a simulator. This is particularly useful when test beds cannot be used, i.e. to explore hardware or scales that do not yet exist or are inaccessible. Here we detail the macroscale components of the structural simulation toolkit (SST). Instead of depending on trace replay or state machines, the simulator is architected to execute real code on real software stacks. Our particular user-space threading framework allows massive scales to be simulated even on small clusters. The link between the discrete event core and the threading framework allows interesting performance metrics like call graphs to be collected from a simulated run. Performance analysis via simulation can thus become an important phase in extreme-scale programming model and runtime system design via the SST macroscale components.

  10. Design and Fabrication of Cherenkov Counters for the Detection of SNM

    SciTech Connect (OSTI)

    Erickson, Anna S.; Lanza, Richard; Galaitsis, Anthony; Hynes, Michael; Blackburn, Brandon; Bernstein, Adam

    2011-12-13

    The need for large-size detectors for long-range active interrogation (AI) detection of SNM has generated interest in water-based detector technologies. Water Cherenkov Detectors (WCD) were selected for this research because of their transportability, scalability, and an inherent energy threshold. The detector design and analysis was completed using the Geant4 toolkit. It was demonstrated both computationally and experimentally that it is possible to use WCD to detect and characterize gamma rays. Absolute efficiency of the detector (with no energy cuts applied) was determined to be around 30% for a {sup 60}Co source.

  11. Bro Intrusion Detection System

    Energy Science and Technology Software Center (OSTI)

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  12. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  13. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  14. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  15. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  16. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  17. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  18. Solar Site Survey Toolkit

    Broader source: Energy.gov [DOE]

    After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

  19. Pizza.py Toolkit

    Energy Science and Technology Software Center (OSTI)

    2006-01-01

    Pizza.py is a loosely integrated collection of tools, many of which provide support for the LAMMPS molecular dynamics and ChemCell cell modeling packages. There are tools to create input files. convert between file formats, process log and dump files, create plots, and visualize and animate simulation snapshots. Software packages that are wrapped by Pizza.py. so they can invoked from within Python, include GnuPlot, MatLab, Raster3d. and RasMol. Pizza.py is written in Python and runs onmore » any platform that supports Python. Pizza.py enhances the standard Python interpreter in a few simple ways. Its tools are Python modules which can be invoked interactively, from scripts, or from GUIs when appropriate. Some of the tools require additional Python packages to be installed as part of the users Python. Others are wrappers on software packages (as listed above) which must be available on the users system. It is easy to modify or extend Pizza.py with new functionality or new tools, which need not have anything to do with LAMMPS or ChemCell.« less

  20. NREL Fleet Analysis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2006-12-31

    The software analyzes large time-dependent data sets from fleets of vehicles and their fueling infrastructure to characterize performance metrics including efficiency, durability, fueling rates and usage patterns.

  1. AISL Development Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-13

    AISLDT is a library of utility functions supporting other AISL software. Code provides various utility functions for Common Lisp, including an object-oriented database, distributed objects, logic query engine, web content management, chart drawing, packet sniffing, text processing, and various data structures.

  2. ppt-toolkit.com

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Spend by State - Fiscal Year 2014 Color Key: More than 1 million 300,000 to 1 million 100,000 to 300,000 5,000 to 100,000 Less than 5,000...

  3. Portable Application Code Toolkit

    Energy Science and Technology Software Center (OSTI)

    2009-01-01

    PACT is a set of tools to help software developers create applications that will run on any platform and data that can be written/read on any platform.

  4. Binary Optics Toolkit

    Energy Science and Technology Software Center (OSTI)

    1996-04-02

    This software is a set of tools for the design and analysis of binary optics. It consists of a series of stand-alone programs written in C and some scripts written in an application-specific language interpreted by a CAD program called DW2000. This software can be used to optimize the design and placement of a complex lens array from input to output and produce contours, mask designs, and data exported for diffractive optic analysis.

  5. MCS Systems Administration Toolkit

    Energy Science and Technology Software Center (OSTI)

    2001-09-30

    This package contains a number of systems administration utilities to assist a team of system administrators in managing a computer environment by automating routine tasks and centralizing information. Included are utilities to help install software on a network of computers and programs to make an image of a disk drive, to manage and distribute configuration files for a number of systems, and to run self-testss on systems, as well as an example of using amore » database to manage host information and various utilities.« less

  6. Residential Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Events Expand News & Events Skip navigation links Residential Residential Lighting Energy Star Appliances Consumer Electronics Heat Pump Water Heaters Electric Storage Water...

  7. Molecular model generator toolkit

    SciTech Connect (OSTI)

    Schneider, R.D.

    1994-07-01

    This report is a user manual for an ASCII file of Fortran source code which must be compiled before use. The software will assist in creating plastic models of molecules whose specifications are described in the Brookhaven Protein Databank. Other data files can be used if they are in the same format as the files in the databank. The output file is a program for a 3-D Systems Stereolithography Apparatus and the program is run on a SGI Indigo workstation.

  8. Livermore Metagenomics Analysis Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-10-01

    LMAT is designed to take as input a collection of raw metagenomic sequencer reads, and search each read against a reference genome database and assign a taxonomic label and confidence value to each read and report a summary of the predicted taxonomic contents of the metagenomic sample.

  9. Voluntary Initiative: Partnerships Toolkit

    Broader source: Energy.gov [DOE]

    Residential energy efficiency programs are delivered by many different types of organizations and their partners, including utilities, state and local governments, nonprofit organizations, and for-profit companies, but no matter which sector delivers the program, the need to work in partnership with different entities can make or break program success.

  10. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  11. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  12. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  13. Sequential Detection of Fission Processes for Harbor Defense

    SciTech Connect (OSTI)

    Candy, J V; Walston, S E; Chambers, D H

    2015-02-12

    With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their γ-ray emissions has been attacked vigorously with some interesting and feasible results; however, the fission process of SNM has not received as much attention due to its inherent complexity and required predictive nature. In this paper, on-line, sequential Bayesian detection and estimation (parameter) techniques to rapidly and reliably detect unknown fissioning sources with high statistical confidence are developed.

  14. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  15. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  16. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  17. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  18. Detection Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Chemistry for Measurement and Detection Science Chemistry for Measurement and Detection Science Project Description Chemistry used in measurement and detection science plays a crucial role in the Laboratory's Science of Signatures scientific thrust. Measurement and detection science areas that require chemistry include nuclear and radiological, materials, biological, energy, climate, and space. Los Alamos scientists integrate chemical-science capabilities to ensure that the Laboratory can

  19. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  20. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  1. detonation detection

    National Nuclear Security Administration (NNSA)

    7%2A en US Air Force Launches Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:nnsa.energy.govmediaroompressreleasesafsatellite

  2. detonation detection

    National Nuclear Security Administration (NNSA)

    Satellite Carrying NNSA-provided Nuclear Detonation Detection Sensors http:www.nnsa.energy.govmediaroompressreleasesafsatellite

  3. Decoy-state quantum key distribution using homodyne detection

    SciTech Connect (OSTI)

    Shams Mousavi, S. H.; Gallion, P.

    2009-07-15

    In this paper, we propose to use the decoy-state technique to improve the security of the quantum key distribution (QKD) systems based on homodyne detection against the photon number splitting attack. The decoy-state technique is a powerful tool that can significantly boost the secure transmission range of the QKD systems. However, it has not yet been applied to the systems that use homodyne detection. After adapting this theory to the systems based on homodyne detection, we quantify the secure performance and transmission range of the resulting system.

  4. Comparison of chiller models for use in model-based fault detection

    SciTech Connect (OSTI)

    Sreedharan, Priya; Haves, Philip

    2001-06-07

    Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Factors that are considered in evaluating a model include accuracy, training data requirements, calibration effort, generality, and computational requirements. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression chillers. Three different models were studied: the Gordon and Ng Universal Chiller model (2nd generation) and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles, and the DOE-2 chiller model, as implemented in CoolTools{trademark}, which is empirical. The models were compared in terms of their ability to reproduce the observed performance of an older, centrifugal chiller operating in a commercial office building and a newer centrifugal chiller in a laboratory. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as long as one of the previously identified models in the CoolTools library matches the performance of the chiller in question.

  5. Oak Ridge Bio-surveillance Toolkit (ORBiT): Integrating Big-Data Analytics with Visual Analysis for Public Health Dynamics

    SciTech Connect (OSTI)

    Ramanathan, Arvind; Pullum, Laura L; Steed, Chad A; Chennubhotla, Chakra; Quinn, Shannon

    2013-01-01

    In this position paper, we describe the design and implementation of the Oak Ridge Bio-surveillance Toolkit (ORBiT): a collection of novel statistical and machine learning tools implemented for (1) integrating heterogeneous traditional (e.g. emergency room visits, prescription sales data, etc.) and non-traditional (social media such as Twitter and Instagram) data sources, (2) analyzing large-scale datasets and (3) presenting the results from the analytics as a visual interface for the end-user to interact and provide feedback. We present examples of how ORBiT can be used to summarize ex- tremely large-scale datasets effectively and how user interactions can translate into the data analytics process for bio-surveillance. We also present a strategy to estimate parameters relevant to dis- ease spread models from near real time data feeds and show how these estimates can be integrated with disease spread models for large-scale populations. We conclude with a perspective on how integrating data and visual analytics could lead to better forecasting and prediction of disease spread as well as improved awareness of disease susceptible regions.

  6. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  7. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite

  8. Methodology for determining the intent of a limited nuclear attack. Master's thesis

    SciTech Connect (OSTI)

    Bivins, R.L.

    1987-05-01

    The purpose of this study was to develop a methodology for determining the intent of a limited nuclear attack. An investigation of possible methodologies for determining intent lead to research in Bayesian analysis. It was thought that the answer to intent could be found by taking prior beliefs of the decision maker and then using the Bayes Theorem to update those beliefs with ground-bases radar information obtained over time. Unfortunately, the use of Bayesian analysis as proposed here did not prove to be robust when the radar information is inaccurate. The reason for the inability of the proposed methodology to perform under the inaccurate radar parameters is that ignores too many of the complicating issues in determining intent.

  9. SU-E-T-519: Emission of Secondary Particles From a PMMA Phantom During Proton Irradiation: A Simulation Study with the Geant4 Monte Carlo Toolkit

    SciTech Connect (OSTI)

    Lau, A; Chen, Y; Ahmad, S

    2014-06-01

    Purpose: Proton therapy exhibits several advantages over photon therapy due to depth-dose distributions from proton interactions within the target material. However, uncertainties associated with protons beam range in the patient limit the advantage of proton therapy applications. To quantify beam range, positron-emitting nuclei (PEN) and prompt gamma (PG) techniques have been developed. These techniques use de-excitation photons to describe the location of the beam in the patient. To develop a detector system for implementing the PG technique for range verification applications in proton therapy, we studied the yields, energy and angular distributions of the secondary particles emitted from a PMMA phantom. Methods: Proton pencil beams of various energies incident onto a PMMA phantom with dimensions of 5 x 5 x 50 cm3 were used for simulation with the Geant4 toolkit using the standard electromagnetic packages as well as the packages based on the binary-cascade nuclear model. The emitted secondary particles are analyzed . Results: For 160 MeV incident protons, the yields of secondary neutrons and photons per 100 incident protons were ~6 and ~15 respectively. Secondary photon energy spectrum showed several energy peaks in the range between 0 and 10 MeV. The energy peaks located between 4 and 6 MeV were attributed to originate from direct proton interactions with 12C (~ 4.4 MeV) and 16O (~ 6 MeV), respectively. Most of the escaping secondary neutrons were found to have energies between 10 and 100 MeV. Isotropic emissions were found for lower energy neutrons (<10 MeV) and photons for all energies, while higher energy neutrons were emitted predominantly in the forward direction. The yields of emitted photons and neutrons increased with the increase of incident proton energies. Conclusions: A detector system is currently being developed incorporating the yields, energy and angular distributions of secondary particles from proton interactions obtained from this study.

  10. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  11. Detecting anthrax in the palm of your hand: applications of a smartphone microscope

    SciTech Connect (OSTI)

    Erikson, Rebecca L.; Hutchison, Janine R.

    2015-11-14

    Bacillus anthracis is a bacterial pathogen that causes the disease anthrax. In 2001, B. anthracis was used in a bioterrorism attack in the United States that resulted in 22 individuals becoming infected, 5 of whom died as a result of this attack. A great deal of attention has been dedicated to responding to bioterrorism events to reduce the potential loss of lives. One such area of research has focused on the development of new technologies to detect and respond to the intentional release of bacterial pathogens such as B. anthracis.

  12. WeaselBoard : zero-day exploit detection for programmable logic controllers.

    SciTech Connect (OSTI)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  13. Fingerprint detection

    DOE Patents [OSTI]

    Saunders, George C. (Rt. 1, Box 428B, Espanola, NM 87532)

    1992-01-01

    A method for detection and visualization of latent fingerprints is provided and includes contacting a substrate containing a latent print thereon with a colloidal metal composition for time sufficient to allow reaction of said colloidal metal composition with said latent print, and preserving or recording the observable print. Further, the method for detection and visualization of latent fingerprints can include contacting the metal composition-latent print reaction product with a secondary metal-containing solution for time sufficient to allow precipitation of said secondary metal thereby enhancing the visibility of the latent print, and preserving or recording the observable print.

  14. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008

  15. Detection Apparatus

    DOE Patents [OSTI]

    Anderson, H.L.

    1950-12-05

    This invention concerns a sensitive apparatus for detecting and counting neutrons, particularly neutrons liberated in an alpha, neutron reaction. The apparatus includes an improved ionization chamber structure together with an improved combination alpha-particle source and holder for the material under test.

  16. Detection device

    DOE Patents [OSTI]

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  17. Detection device

    DOE Patents [OSTI]

    Smith, Jay E.

    1984-01-01

    The present invention is directed to a detection device comprising: (1) an entrance chamber, (2) a central chamber, and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  18. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  19. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  20. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  1. Regioselectivity of radical attacks on substituted olefins. Application of the SCD model

    SciTech Connect (OSTI)

    Shaik, S.S. ); Canadell, E. )

    1990-02-14

    The SCD model is used to derive regiochemical trends in radical addition to olefins. Regiochemistry is discussed by appeal to two fundamental properties of the radical and the olefin. The first factor is the relative spin density in the {sup 3}{pi}{pi}* state of the olefin. Thus, radical attack is directed toward the olefinic carbon which possesses the highest spin density. The second factor is the relative bond strengths of the radical to the olefinic carbons. This factor directs the regiochemistry toward the olefinic terminus which forms the strongest bond with the radical. When the two effects join up, regioselectivity will be large, e.g., for CH{sub 2}=CHX (X = NR{sub 2}, CR, Cl, CN, Ph). When the two effects oppose one another, regioselectivity will be smaller, and regioselectivity crossovers are expected, e.g., for CF{sub 2}=CHF. The normal regiochemistry is shown to coincide with the spin density rule which makes identical predictions to the HOMO rule.

  2. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other

  3. Spectroscopic detection

    DOE Patents [OSTI]

    Woskov, Paul P.; Hadidi, Kamal

    2003-01-01

    In embodiments, spectroscopic monitor monitors modulated light signals to detect low levels of contaminants and other compounds in the presence of background interference. The monitor uses a spectrometer that includes a transmissive modulator capable of causing different frequency ranges to move onto and off of the detector. The different ranges can include those with the desired signal and those selected to subtract background contributions from those with the desired signal. Embodiments of the system are particularly useful for monitoring metal concentrations in combustion effluent.

  4. Smoke detection

    DOE Patents [OSTI]

    Warmack, Robert J Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-11-05

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  5. Smoke detection

    SciTech Connect (OSTI)

    Warmack, Robert J. Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-10-27

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  6. Radon detection

    DOE Patents [OSTI]

    MacArthur, D.W.; Allander, K.S.; Bounds, J.A.

    1994-01-25

    A detector for atmospheric radon using a long range alpha detector as its sensing element is described. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding. 3 figures.

  7. Radon detection

    DOE Patents [OSTI]

    MacArthur, Duncan W.; Allander, Krag S.; Bounds, John A.

    1994-01-01

    A detector for atmospheric radon using a long range alpha detector as its sensing element. An electrostatic filter removes ions from ambient air, while allowing radon atoms to pass into a decay cavity. Here, radon atoms are allowed to decay, creating air ions. These air ions are drawn by a fan through a second electrostatic filter which can be activated or deactivated, and into the long range alpha detector. With the second electrostatic filter activated, no air ions are allowed to pass, and the signal output from the long range alpha detector consists of only the electronic background. With the second electrostatic filter deactivated, air ions and cosmic rays will be detected. The cosmic ray contribution can be minimized by shielding.

  8. Advanced Network Toolkit for Assessments

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Access the software at http:antfarm.rubyforge.org. National SCADA Test Bed Sandia is a ... DOE National SCADA Test Bed (NSTB) NSTB is a multi-laboratory resource that partners with ...

  9. Model Analysis ToolKit

    Energy Science and Technology Software Center (OSTI)

    2015-05-15

    MATK provides basic functionality to facilitate model analysis within the Python computational environment. Model analysis setup within MATK includes: - define parameters - define observations - define model (python function) - define samplesets (sets of parameter combinations) Currently supported functionality includes: - forward model runs - Latin-Hypercube sampling of parameters - multi-dimensional parameter studies - parallel execution of parameter samples - model calibration using internal Levenberg-Marquardt algorithm - model calibration using lmfit package - modelmore » calibration using levmar package - Markov Chain Monte Carlo using pymc package MATK facilitates model analysis using: - scipy - calibration (scipy.optimize) - rpy2 - Python interface to R« less

  10. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Company Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Solar, Wind Phase: Determine Baseline Topics: Resource assessment Resource Type: Guide...

  11. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Ghana, Guatemala, Honduras, India, Nepal, Nicaragua, Oaxaca, Pakistan, Sri Lanka, Turkey Cost: Free Southern Asia, Southern Asia, Southern Asia, South America, Eastern Asia,...

  12. Performance Based Service Acquisition Toolkit

    Broader source: Energy.gov [DOE]

    Performance-based Service Acquisition (PBA) means an acquisition structured around the results to be achieved as opposed to the manner by which the work is to be performed.

  13. Workplace Charging Toolkit: Example Events

    Broader source: Energy.gov [DOE]

    This section provides links to previous successful workplace charging events. These link directly to the organization’s website and contain event agendas and presentation materials.

  14. Voluntary Initiative: Designing Incentives Toolkit

    Broader source: Energy.gov [DOE]

    Design incentives that motivate potential customers to act by lowering the risk, decreasing the cost, or offering additional benefits of home energy upgrades.

  15. Evaluation of chiller modeling approaches and their usability for fault detection

    SciTech Connect (OSTI)

    Sreedharan, Priya

    2001-05-01

    Selecting the model is an important and essential step in model based fault detection and diagnosis (FDD). Several factors must be considered in model evaluation, including accuracy, training data requirements, calibration effort, generality, and computational requirements. All modeling approaches fall somewhere between pure first-principles models, and empirical models. The objective of this study was to evaluate different modeling approaches for their applicability to model based FDD of vapor compression air conditioning units, which are commonly known as chillers. Three different models were studied: two are based on first-principles and the third is empirical in nature. The first-principles models are the Gordon and Ng Universal Chiller model (2nd generation), and a modified version of the ASHRAE Primary Toolkit model, which are both based on first principles. The DOE-2 chiller model as implemented in CoolTools{trademark} was selected for the empirical category. The models were compared in terms of their ability to reproduce the observed performance of an older chiller operating in a commercial building, and a newer chiller in a laboratory. The DOE-2 and Gordon-Ng models were calibrated by linear regression, while a direct-search method was used to calibrate the Toolkit model. The ''CoolTools'' package contains a library of calibrated DOE-2 curves for a variety of different chillers, and was used to calibrate the building chiller to the DOE-2 model. All three models displayed similar levels of accuracy. Of the first principles models, the Gordon-Ng model has the advantage of being linear in the parameters, which allows more robust parameter estimation methods to be used and facilitates estimation of the uncertainty in the parameter values. The ASHRAE Toolkit Model may have advantages when refrigerant temperature measurements are also available. The DOE-2 model can be expected to have advantages when very limited data are available to calibrate the model, as

  16. Intergranular attack of alloy 600: Simulation and remedial action tests: Final report

    SciTech Connect (OSTI)

    Daret, J.; Feron, D.

    1989-02-01

    The intergranular attack (IGA) that affects alloy 600 tubes in the tube sheet crevices of PWR steam generators is hard to simulate in laboratory studies. For this study, a special apparatus was designed with a range of representative materials, mechanical conditions and geometry. The design also took account of sludge piles, thermal fluxes and water chemistry. During a first series of seven model boiler tests, chemical parameters and test procedures were adjusted to finally obtain a field prototypical degradation of tubing over a significant length within the tube sheet crevice for the case of caustic pollution. IGA was not produced for the river water in-leakage case. A second series of model boiler tests also showed the possibility of producing a representative IGA by initially filling the tube sheet crevices with concentrated caustic solutions. A third series of five model boiler tests aimed at studying in the effectiveness of remedial actions on either virgin of IGA affected tubing. Tube sheet crevice flushing operations using the natural circulation procedure showed a poor efficiency for moving concentrated contaminants, but they succeeded in forcing chemicals additives (acetic acid or boric acid) within the non-occluded portions of crevices. This off-line treatment resulted in a reduction in the progression rate of the pre-existing IGA by a factor of 2 to 3. Simulation of this treatment on virgin material showed that this result was obtained because acetate or borate shifted the cation-to-anion equivalent ratio to well under one. However this off-line treatment could not prevent the occurrence of intergranular stress corrosion cracking (IGSCC) near the top of crevices, since caustic continued to hideout under full power operation. The best remedial action consisted of a combination of off-line and on-line boric acid treatment. IGSCC was prevented both on virgin and IGA affected tubes. 3 figs., 3 tabs.

  17. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  18. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  19. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the

  20. Identification of the meiotic toolkit in diatoms and exploration of meiosis-specific SPO11 and RAD51 homologs in the sexual species Pseudo-nitzschia multistriata and Seminavis robusta

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Patil, Shrikant; Moeys, Sara; von Dassow, Peter; Huysman, Marie J. J.; Mapleson, Daniel; De Veylder, Lieven; Sanges, Remo; Vyverman, Wim; Montresor, Marina; Ferrante, Maria Immacolata

    2015-11-14

    Sexual reproduction is an obligate phase in the life cycle of most eukaryotes. Meiosis varies among organisms, which is reflected by the variability of the gene set associated to the process. Diatoms are unicellular organisms that belong to the stramenopile clade and have unique life cycles that can include a sexual phase. The exploration of five diatom genomes and one diatom transcriptome led to the identification of 42 genes potentially involved in meiosis. While these include the majority of known meiosis-related genes, several meiosis-specific genes, including DMC1, could not be identified. Furthermore, phylogenetic analyses supported gene identification and revealed ancestralmore » loss and recent expansion in the RAD51 family in diatoms. The two sexual species Pseudo-nitzschia multistriata and Seminavis robusta were used to explore the expression of meiosis-related genes: RAD21, SPO11-2, RAD51-A, RAD51-B and RAD51-C were upregulated during meiosis, whereas other paralogs in these families showed no differential expression patterns, suggesting that they may play a role during vegetative divisions. An almost identical toolkit is shared among Pseudo-nitzschia multiseries and Fragilariopsis cylindrus, as well as two species for which sex has not been observed, Phaeodactylum tricornutum and Thalassiosira pseudonana, suggesting that these two may retain a facultative sexual phase. Lastly, our results reveal the conserved meiotic toolkit in six diatom species and indicate that Stramenopiles share major modifications of canonical meiosis processes ancestral to eukaryotes, with important divergences in each Kingdom.« less

  1. Domestic Nuclear Detection Office's Approach to Detect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Domestic Nuclear Detection Office's Approach to Detect Concealed Threats Joel Rynes, PhD Department of Homeland Security (DHS) Domestic Nuclear Detection Office (DNDO) August 5, 2015 4:00 p.m. The Transformational and Applied Research (TAR) Directorate within the Domestic Nuclear Detection Office (DNDO) of the Department of Homeland Security (DHS) has the mission to develop break-through technologies that will have a dramatic impact on capabilities to detect nuclear and radiological threats

  2. Fuel washout detection system

    DOE Patents [OSTI]

    Colburn, Richard P.

    1985-01-01

    A system for detecting grossly failed reactor fuel by detection of particulate matter as accumulated on a filter.

  3. AZALIA: an A to Z Assessment of the Likelihood of Insider Attack

    SciTech Connect (OSTI)

    Bishop, Matt; Gates, Carrie; Frincke, Deborah A.; Greitzer, Frank L.

    2009-05-12

    Recent surveys indicate that the ``financial impact and operating losses due to insider intrusions are increasing'' . Within the government, insider abuse by those with access to sensitive or classified material can be particularly damaging. Further, the detection of such abuse is becoming more difficult due to other influences, such as out-sourcing, social networking and mobile computing. This paper focuses on a key aspect of our enterprise-wide architecture: a risk assessment based on predictions of the likelihood that a specific user poses an increased risk of behaving in a manner that is inconsistent with the organizations stated goals and interests. We present a high-level architectural description for an enterprise-level insider threat product and we describe psychosocial factors and associated data needs to recognize possible insider threats.

  4. How to Detect Radiation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    How to Detect Radiation How to Survey Measurement Safety Around Radiation Sources Types of Radiation Exposure Managing Radiation Emergencies Procedure Demonstration Detection How to Detect Radiation Radiation cannot be detected by human senses. A variety of instruments are available for detecting and measuring radiation. Examples of radiation survey meters: photos of survey meters alphacounter1.JPG (28857 bytes) This probe is used for the detection of alpha radiation. The most common type of

  5. Cybersecurity Intrusion Detection and Security Monitoring for...

    Energy Savers [EERE]

    ... (R&D) program, which aims to enhance the reliability and resilience of the nation's energy infrastructure by reducing the risk of energy disruptions due to cyber attacks. ...

  6. Using new edges for anomaly detection in computer networks

    DOE Patents [OSTI]

    Neil, Joshua Charles

    2015-05-19

    Creation of new edges in a network may be used as an indication of a potential attack on the network. Historical data of a frequency with which nodes in a network create and receive new edges may be analyzed. Baseline models of behavior among the edges in the network may be established based on the analysis of the historical data. A new edge that deviates from a respective baseline model by more than a predetermined threshold during a time window may be detected. The new edge may be flagged as potentially anomalous when the deviation from the respective baseline model is detected. Probabilities for both new and existing edges may be obtained for all edges in a path or other subgraph. The probabilities may then be combined to obtain a score for the path or other subgraph. A threshold may be obtained by calculating an empirical distribution of the scores under historical conditions.

  7. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  8. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  9. Portable modular detection system

    DOE Patents [OSTI]

    Brennan, James S. (Rodeo, CA); Singh, Anup (Danville, CA); Throckmorton, Daniel J. (Tracy, CA); Stamps, James F. (Livermore, CA)

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  10. Advancing Explosives Detection Capabilities: Vapor Detection

    SciTech Connect (OSTI)

    Atkinson, David

    2012-10-15

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  11. Advancing Explosives Detection Capabilities: Vapor Detection

    ScienceCinema (OSTI)

    Atkinson, David

    2014-07-24

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  12. Predicting and Detecting Emerging Cyberattack Patterns Using StreamWorks

    SciTech Connect (OSTI)

    Chin, George; Choudhury, Sutanay; Feo, John T.; Holder, Larry

    2014-06-30

    The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network. Such cyberattack graphs could provide cybersecurity analysts with powerful conceptual representations that are natural to express and analyze. We have been researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection. The advanced dynamic graph algorithms we are developing will be packaged into a streaming network analysis framework known as StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns. The scalable emerging subgraph pattern algorithms will match on both structural and semantic network properties.

  13. Revolution in Detection Affairs

    SciTech Connect (OSTI)

    Stern W.

    2013-11-02

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  14. Sandia Network Intrusion Detection Assessment Version 1.0

    Energy Science and Technology Software Center (OSTI)

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusionmore » detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a

  15. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  16. Interactive Activity Detection Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Activity Detection Tools Interactive Activity Detection Tools Tools for detecting specified activities in video data provide a key intelligence capability. High numbers of false alarms, however, reduce tool effectiveness and analyst patience. User feedback reduces false alarms * This project will reduce the number of false alarms generated by activity detection tools (including single vehicle start / stop, multi-vehicle meetings and coordinated driving patterns) by exploiting user feedback in a

  17. Vision-based threat detection in dynamic environments.

    SciTech Connect (OSTI)

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  18. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  19. DETECTION OF PROPENE IN TITAN'S STRATOSPHERE

    SciTech Connect (OSTI)

    Nixon, C. A.; Flasar, F. M.; Jennings, D. E.; Bézard, B.; Vinatier, S.; Coustenis, A.; Teanby, N. A.; Sung, K.; Ansty, T. M.; Irwin, P. G. J.; Gorius, N.; Cottini, V.

    2013-10-10

    The Voyager 1 flyby of Titan in 1980 gave a first glimpse of the chemical complexity of Titan's atmosphere, detecting many new molecules with the infrared interferometer spectrometer (IRIS). These included propane (C{sub 3}H{sub 8}) and propyne (CH{sub 3}C{sub 2}H), while the intermediate-sized C{sub 3}H {sub x} hydrocarbon (C{sub 3}H{sub 6}) was curiously absent. Using spectra from the Composite Infrared Spectrometer on Cassini, we show the first positive detection of propene (C{sub 3}H{sub 6}) in Titan's stratosphere (5σ significance), finally filling the three-decade gap in the chemical sequence. We retrieve a vertical abundance profile from 100-250 km, that varies slowly with altitude from 2.0 ± 0.8 ppbv at 125 km, to 4.6 ± 1.5 ppbv at 200 km. The abundance of C{sub 3}H{sub 6} is less than both C{sub 3}H{sub 8} and CH{sub 3}C{sub 2}H, and we remark on an emerging paradigm in Titan's hydrocarbon abundances whereby alkanes > alkynes > alkenes within the C{sub 2}H {sub x} and C{sub 3}H {sub x} chemical families in the lower stratosphere. More generally, there appears to be much greater ubiquity and relative abundance of triple-bonded species than double-bonded, likely due to the greater resistance of triple bonds to photolysis and chemical attack.

  20. Invited Article: Single-shot THz detection techniques optimized for multidimensional THz spectroscopy

    SciTech Connect (OSTI)

    Teo, Stephanie M.; Ofori-Okai, Benjamin K.; Werley, Christopher A.; Nelson, Keith A.

    2015-05-15

    Multidimensional spectroscopy at visible and infrared frequencies has opened a window into the transfer of energy and quantum coherences at ultrafast time scales. For these measurements to be performed in a manageable amount of time, one spectral axis is typically recorded in a single laser shot. An analogous rapid-scanning capability for THz measurements will unlock the multidimensional toolkit in this frequency range. Here, we first review the merits of existing single-shot THz schemes and discuss their potential in multidimensional THz spectroscopy. We then introduce improved experimental designs and noise suppression techniques for the two most promising methods: frequency-to-time encoding with linear spectral interferometry and angle-to-time encoding with dual echelons. Both methods, each using electro-optic detection in the linear regime, were able to reproduce the THz temporal waveform acquired with a traditional scanning delay line. Although spectral interferometry had mediocre performance in terms of signal-to-noise, the dual echelon method was easily implemented and achieved the same level of signal-to-noise as the scanning delay line in only 4.5% of the laser pulses otherwise required (or 22 times faster). This reduction in acquisition time will compress day-long scans to hours and hence provides a practical technique for multidimensional THz measurements.

  1. When Utility Bills Attack!

    Broader source: Energy.gov [DOE]

    As proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills.

  2. Sulfide chemiluminescence detection

    DOE Patents [OSTI]

    Spurlin, Stanford R. (Ames, IA); Yeung, Edward S. (Ames, IA)

    1985-01-01

    A method of chemiluminescently determining a sulfide which is either hydrogen sulfide or methyl mercaptan by reacting the sulfide with chlorine dioxide at low pressure and under conditions which allow a longer reaction time in emission of a single photon for every two sulfide containing species, and thereafter, chemiluminescently detecting and determining the sulfide. The invention also relates not only to the detection method, but the novel chemical reaction and a specifically designed chemiluminescence detection cell for the reaction.

  3. Sulfide chemiluminescence detection

    DOE Patents [OSTI]

    Spurlin, S.R.; Yeung, E.S.

    1985-11-26

    A method is described for chemiluminescently determining a sulfide which is either hydrogen sulfide or methyl mercaptan by reacting the sulfide with chlorine dioxide at low pressure and under conditions which allow a longer reaction time in emission of a single photon for every two sulfide containing species, and thereafter, chemiluminescently detecting and determining the sulfide. The invention also relates not only to the detection method, but the novel chemical reaction and a specifically designed chemiluminescence detection cell for the reaction. 4 figs.

  4. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  5. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident

  6. Fast Neutron Detection Evaluation

    SciTech Connect (OSTI)

    McKigney, Edward A.; Stange, Sy

    2014-03-17

    These slides present a summary of previous work, conclusions, and anticipated schedule for the conclusion of our fast neutron detection evaluation.

  7. Neutron detection apparatus

    DOE Patents [OSTI]

    Kopp, Manfred K.; Valentine, Kenneth H.

    1983-01-01

    An atomic fission counting apparatus used for neutron detection is provided with spirally curved electrode plates uniformly spaced apart in a circular array and coated with fissile material.

  8. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  9. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect (OSTI)

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  10. Array for detecting microbes

    DOE Patents [OSTI]

    Andersen, Gary L.; DeSantis, Todd D.

    2014-07-08

    The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

  11. Lean blowoff detection sensor

    DOE Patents [OSTI]

    Thornton, Jimmy; Straub, Douglas L.; Chorpening, Benjamin T.; Huckaby, David

    2007-04-03

    Apparatus and method for detecting incipient lean blowoff conditions in a lean premixed combustion nozzle of a gas turbine. A sensor near the flame detects the concentration of hydrocarbon ions and/or electrons produced by combustion and the concentration monitored as a function of time are used to indicate incipient lean blowoff conditions.

  12. Composition for detecting uranyl

    DOE Patents [OSTI]

    Baylor, Lewis C.; Stephens, Susan M.

    1995-01-01

    A composition for detecting the presence and concentration of a substance such as uranyl, comprising an organohalide covalently bonded to an indicator for said substance. The composition has at least one active OH site for forming a complex with the substance to be detected. The composition is made by reacting equimolar amounts of the indicator and the organohalide in a polar organic solvent. The absorbance spectrum of the composition-uranyl complex is shifted with respect to the absorbance spectrum of the indicator-uranyl complex, to provide better spectral resolution for detecting uranyl.

  13. Leak detection aid

    DOE Patents [OSTI]

    Steeper, T.J.

    1989-12-26

    A leak detection apparatus and method for detecting leaks across an O-ring sealing a flanged surface to a mating surface is an improvement in a flanged surface comprising a shallow groove following O-ring in communication with an entrance and exit port intersecting the shallow groove for injecting and withdrawing, respectively, a leak detection fluid, such as helium. A small quantity of helium injected into the entrance port will flow to the shallow groove, past the O-ring and to the exit port. 2 figs.

  14. Leak detection aid

    DOE Patents [OSTI]

    Steeper, Timothy J.

    1989-01-01

    A leak detection apparatus and method for detecting leaks across an O-ring sealing a flanged surface to a mating surface is an improvement in a flanged surface comprising a shallow groove following O-ring in communication with an entrance and exit port intersecting the shallow groove for injecting and withdrawing, respectively, a leak detection fluid, such as helium. A small quantity of helium injected into the entrance port will flow to the shallow groove, past the O-ring and to the exit port.

  15. Explosive Detection Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-26

    To standardize and accelerate implementation of the Department of Energy (DOE) explosive detection program. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01.

  16. Bolt failure detection

    SciTech Connect (OSTI)

    Sutton, Jr., Harry G.

    1984-01-01

    Bolts of a liquid metal fast breeder reactor, each bolt provided with an internal chamber filled with a specific, unique radioactive tag gas. Detection of the tag gas is indicative of a crack in an identifiable bolt.

  17. Detection of counterfeit currency

    DOE Patents [OSTI]

    Burns, Donald A.

    1998-01-01

    A method of detecting counterfeit currency by contacting the currency to be tested with near infrared beams in the spectrum below 1250 namometers, measuring reflectance of the near infrared beams and comparing the reflectance values with those from genuine currency.

  18. Idaho Explosive Detection System

    SciTech Connect (OSTI)

    Klinger, Jeff

    2011-01-01

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  19. Energy Detectives (3 Activities)

    Broader source: Energy.gov [DOE]

    Students explore the classroom as they look and feel for signs of energy. They record the ways they use energy throughout a typical day in an energy detective journal.

  20. Idaho Explosive Detection System

    ScienceCinema (OSTI)

    Klinger, Jeff

    2013-05-28

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  1. Lichens detect past fallout

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lichens detect past fallout Lichens detect past fallout The team conducted this investigation to define the background concentrations of actinide isotopes present in the environment. November 8, 2015 Usnea lichens are common in New Mexico. Usnea lichens are common in New Mexico. Communications Office (505) 667-7000 Studies of this type could be used in environmental monitoring programs associated with modern nuclear activities Los Alamos researchers and a collaborator at the University of

  2. Photovoltaic System Fault Detection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Photovoltaic System Fault Detection and Diagnostics using Laterally Primed Adaptive Resonance Theory Neural Network C. Birk Jones, Joshua S. Stein, Sigifredo Gonzalez, and Bruce H. King Sandia National Laboratories, Albuquerque, NM, 87185, U.S.A Abstract-Cost effective integration of solar photovoltaic (PV) systems requires increased reliability. This can be achieved with a robust fault detection and diagnostic (FDD) tool that auto- matically discovers faults. This paper introduces the Laterally

  3. Quarterly Cybersecurity Awareness Campaigns and Toolkits

    Broader source: Energy.gov [DOE]

    The OCIO coordinates a variety of internal cybersecurity awareness campaigns to provide DOE employees with timely information on current cyber threats, recommended mitigations, and sound practices. The OCIO also develops and distributes cyber awareness information and resources to enhance employees' general knowledge of cybersecurity practices, policies, and terms.

  4. Impact Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Modeling the Global Trade and Environmental Impacts of Biofuel Policies Modified Microgrid Concept for Rural Electrification in Africa NREL-How to Estimate the Economic...

  5. Wind Working Group Toolkit | Open Energy Information

    Open Energy Info (EERE)

    wind energy costs and impacts to neighbors and the environment. At the same time, the benefits of wind energy and diversity of possible applications have continued to increase....

  6. Market Analysis Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Antigua and Barbuda-Regional Implementation Plan for CARICOM's Climate Change Resilience Framework Bahamas-Regional Implementation Plan for CARICOM's Climate Change...

  7. 2030 District Program and Small Commercial Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Strategies Whole Building Retrofit Tool Open Energy Information System Energy Management Package HVAC: Rooftop Units HVAC: Heat Pumps HVAC: Boilers HVAC: Air Cooled Elec. ...

  8. Workplace Charging Toolkit: Workshop Speaker Outreach Letter...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Invite employers in your community that already have charging to speak on an employer experience panel. File General Speaker Outreach Letter Template File Clean Cities Branded ...

  9. Workplace Charging Toolkit: Workshop Outreach Presentation Template

    Broader source: Energy.gov [DOE]

    Educate workshop attendees and employers about the benefits of workplace charging and the Challenge by selecting slides from this sample presentation.

  10. Machine Learning Toolkit for Extreme Scale

    Energy Science and Technology Software Center (OSTI)

    2014-03-31

    Support Vector Machines (SVM) is a popular machine learning technique, which has been applied to a wide range of domains such as science, finance, and social networks for supervised learning. MaTEx undertakes the challenge of designing a scalable parallel SVM training algorithm for large scale systems, which includes commodity multi-core machines, tightly connected supercomputers and cloud computing systems. Several techniques are proposed for improved speed and memory space usage including adaptive and aggressive elimination ofmore » samples for faster convergence , and sparse format representation of data samples. Several heuristics for earliest possible to lazy elimination of non-contributing samples are considered in MaTEx. In many cases, where an early sample elimination might result in a false positive, low overhead mechanisms for reconstruction of key data structures are proposed. The proposed algorithm and heuristics are implemented and evaluated on various publicly available datasets« less

  11. Community Wind Toolkit | Open Energy Information

    Open Energy Info (EERE)

    American tribes, universities, cooperatives, or any other local entity seeking to invest in wind energy. Community wind projects may be a single turbine or multi-megawatt...

  12. LEDSGP/Transportation Toolkit | Open Energy Information

    Open Energy Info (EERE)

    the six key actions necessary to successfully implement a low emission development strategy for the transportation sector. Icon evaluate system.png Evaluate System LEDS icon...

  13. Category:RAPID Toolkit | Open Energy Information

    Open Energy Info (EERE)

    and Permitting RAPIDBulkTransmission RAPIDBulkTransmissionAbout RAPIDBulkTransmissionAir Quality RAPIDBulkTransmissionAlaska RAPIDBulkTransmissionArizona RAPID...

  14. Transportation Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    development and growth Is equitable Respects and preserves local cultural and natural landmarks Well-designed transport systems enable economic development and growth by:...

  15. Pervasive Collaboratorive Computing Environment Jabber Toolkit

    Energy Science and Technology Software Center (OSTI)

    2004-05-15

    PCCE Project background: Our experience in building distributed collaboratories has shown us that there is a growing need for simple, non-intrusive, and flexible ways to stay in touch and work together. Towards this goal we are developing a Pervasive Collaborative Computing Environment (PCCE) within which participants can rendezvous and interact with each other. The PCCE aims to support continuous or ad hoc collaboration, target daily tasks and base connectivity, be easy to use and installmore » across multiple platforms, leverage off of existing components when possible, use standards-based components, and leverage off of Grid services (e.g., security and directory services). A key concept for this work is "incremental trust", which allows the system's "trust" of a given user to change dynamically. PCCE Jabber client software: This leverages Jabber. an open Instant Messaging (IM) protocol and the related Internet Engineering Task Force (IETF) standards "XMPP" and "XMPP-IM" to allow collaborating parties to chat either one-on-one or in "chat rooms". Standard Jabber clients will work within this framework, but the software will also include extensions to a (multi-platform) GUI client (Gaim) for X.509-based security, search, and incremental trust. This software also includes Web interfaces for managing user registration to a Jabber server. PCCE Jabber server software: Extensions to the code, database, and configuration files for the dominant open-source Jabber server, "jabberd". Extensions for search, X.509 security, and incremental trust. Note that the jabberd software is not included as part of this software.« less

  16. Designing Incentives Toolkit Better Buildings Residential Network

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    When aligned with program goals, incentives can be a very useful tool in achieving home energy upgrades. Definition Incentives provide motivation to potential customers to take a ...

  17. Coordinated Low Emissions Assistance Network toolkit search

    Open Energy Info (EERE)

    Planning Are we missing something? Add a Tool software models, databases, training materials, publications Add a Program climate-related activites or strategies How to search the...

  18. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Best Offer Ever Produces 564 Upgrades in ...

  19. Toolkit Professor Brian Odom Northwestern University

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Toolbox and Expertise Toolbox and Expertise Superior Energy Performance logo Proven tools, expert guidance, training, and other resources are available that you can use to improve energy management at your facility. The free DOE eGuide provides step-by-step guidance to standup or enhance your energy management system (EnMS). Hire experts to fill gaps or train in-house staff. Contact your utility and consider becoming a Better Plant Partner to gain additional assistance. Tools Hire an Expert

  20. LEDSGP/DIA-Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Search for Tools Find resources to develop strategies for: Economic growth Reduced poverty Increased jobs Improved energy access Enhanced health Other sustainable developments...

  1. Financing Initiatives Toolkit | Open Energy Information

    Open Energy Info (EERE)

    wind, and geothermal technologies, respectively. CREST was originally designed for the U.S. market but could be applied elsewhere if metric conversations are made (e.g., currency...

  2. Land Use Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Evaluate public and private sector capacity (e.g., institutional, governance, financial) to support initiatives Assess biophysical and economic potential for these...

  3. Workplace Charging Toolkit: Workshop Best Practices

    Broader source: Energy.gov [DOE]

    These best practices for planning, organizing, and executing a successful and educational workplace charging event have been developed based on lessons learned from more than 20 employer workplace...

  4. LEDS Toolkit and Framework | Open Energy Information

    Open Energy Info (EERE)

    User Interface: Website, Desktop Application Website: en.openei.orgappsLEDS Cost: Free UN Region: Central Asia, Eastern Asia, South-Eastern Asia, "Pacific" is not in the list...

  5. Workplace Charging Toolkit: Press Release Template

    Broader source: Energy.gov [DOE]

    Raise the profile of employers in the community who are offering workplace charging and encourage the adoption of workplace charging among other employers through this press release template.

  6. Data Exploration Toolkit for serial diffraction experiments ...

    Office of Scientific and Technical Information (OSTI)

    Sponsoring Org: USDOE Office of Science (SC), Basic Energy Sciences (BES) (SC-22) Country of Publication: United States Language: English Subject: 36 MATERIALS SCIENCE Data ...

  7. Category:Transportation Toolkits | Open Energy Information

    Open Energy Info (EERE)

    following 135 pages are in this category, out of 135 total. A A Report on Worldwide Hydrogen Bus Demonstrations, 2002-2007 A Review of HOV Lane Performance and Policy Options in...

  8. Performance Based Service Acquisition Toolkit | Department of...

    Office of Environmental Management (EM)

    ... Contract Management: Guidance Needed for Using Performance Based Service Contracting (pdf) Where in Federal Contracting? Best Practices & Samples NASA best practices examples Air ...

  9. 2030 District Program and Small Commercial Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... for this audience than in large commercial. The framing of EE assessments in the context of the business model of a small commercial owneradvocate can be useful as a first step. ...

  10. Low Emission Development Strategies toolkit search

    Open Energy Info (EERE)

    search tools and programs in relation to relevant questions, sector, geography, LEDS methodology stage, analytical needs, and other search terms. The country cloud to the right...

  11. Rapid Deployment Energy Efficiency (RDEE) Toolkit

    SciTech Connect (OSTI)

    none,

    2009-12-09

    Provides detailed program design and implementation guides to help entities choose successful efficiency programs with funds from the American Recovery and Reinvestment Act of 2009.

  12. Workplace Charging Toolkit: Workshop Agenda Template

    Broader source: Energy.gov [DOE]

    Develop a streamlined workshop with this half-day agenda focused on introductory-level PEV education and firsthand employer workplace charging experience.

  13. Download Sandia's Microgrid Design Toolkit (MDT)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Permalink International Conference on Integration of Renewable and Distributed Energy Resources (IRED): Coming October 2016 Sandia Labs Presents Grid Integration Research at IEEE ...

  14. Bioenergy Assessment Toolkit | Open Energy Information

    Open Energy Info (EERE)

    intended to provide a practical, common methodology for measuring and recording the consumption and supply of biomass energy. It mainly emphasizes traditional bioenergy use, but...

  15. Workplace Charging Toolkit: Outreach Letter Template

    Broader source: Energy.gov [DOE]

    Reach out to employers in your community who may be interested in offering workplace charging with this template.

  16. Wind Integration National Dataset (WIND) Toolkit

    Broader source: Energy.gov [DOE]

    For utility companies, grid operators and other stakeholders interested in wind energy integration, collecting large quantities of high quality data on wind energy resources is vitally important....

  17. Workplace Charging Toolkit: Workshop Outreach Templates

    Broader source: Energy.gov [DOE]

    These templates have been developed based on lessons learned from more than 20 employer workplace charging events held across the U.S. between 2013 and 2015.

  18. Mechanisms of intergranular attack and stress corrosion cracking of Alloy 600 by high-temperature caustic solutions containing impurities: Final report

    SciTech Connect (OSTI)

    Van Rooyen, D.; Bandy, R.

    1987-07-01

    The mechanisms of intergranular attack (IGA) and intergranular stress corrosion cracking (SCC) of Alloy 600 are investigated in high temperature sodium hydroxide environments contaminated with impurities such as carbonate, sulfate, silicate, magnetite, and chromic oxide. Results show that caustic alone can cause both IGA and SCC. The effects of electrochemical potential, stress, time, temperature and the metallurgical state of Alloy 600 on the IGA and SCC are discussed. It appears that both IGA and SCC are manifestations of a general intergranular failure process. In the presence of adverse potential, stress, strain rate and temperature, the slower IGA process is generally replaced by the faster SCC process.

  19. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, Peter M.

    1986-01-01

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions.

  20. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, P.M.

    1986-04-22

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions. 2 figs.

  1. Tampering detection system using quantum-mechanical systems

    DOE Patents [OSTI]

    Humble, Travis S.; Bennink, Ryan S.; Grice, Warren P.

    2011-12-13

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  2. Composition for detecting uranyl

    DOE Patents [OSTI]

    Baylor, L.C.; Stephens, S.M.

    1994-01-01

    The present invention relates to an indicator composition for use in spectrophotometric detection of a substance in a solution, and a method for making the composition. Useful indicators are sensitive to the particular substance being measured, but are unaffected by the fluid and other chemical species that may be present in the fluid. Optical indicators are used to measure the uranium concentration of process solutions in facilities for extracting uranium from ores, production of nuclear fuels, and reprocessing of irradiated fuels. The composition comprises an organohalide covalently bonded to an indicator for the substance, in such a manner that the product is itself an indicator that provides increased spectral resolution for detecting the substance. The indicator is preferably arsenazo III and the organohalide is preferably cyanuric chloride. These form a composition that is ideally suited for detecting uranyl.

  3. Error detection method

    DOE Patents [OSTI]

    Olson, Eric J.

    2013-06-11

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  4. Void detecting device

    DOE Patents [OSTI]

    Nakamoto, Koichiro; Ohyama, Nobumi; Adachi, Kiyoshi; Kuwahara, Hajime

    1979-01-01

    A detector to be inserted into a flowing conductive fluid, e.g. sodium coolant in a nuclear reactor, comprising at least one exciting coil to receive an a-c signal applied thereto and two detecting coils located in the proximity of the exciting coil. The difference and/or the sum of the output signals of the detecting coils is computed to produce a flow velocity signal and/or a temperature-responsive signal for the fluid. Such flow velocity signal or temperature signal is rectified synchronously by a signal the phase of which is shifted substantially .+-. 90.degree. with respect to the flow velocity signal or temperature signal, thereby enabling the device to detect voids in the flowing fluid without adverse effects from flow velocity variations or flow disturbances occurring in the fluid.

  5. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, Robert B.; Pruett, Jr., James C.

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  6. Solar system fault detection

    DOE Patents [OSTI]

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  7. Nucleic acid detection kits

    DOE Patents [OSTI]

    Hall, Jeff G.; Lyamichev, Victor I.; Mast, Andrea L.; Brow, Mary Ann; Kwiatkowski, Robert W.; Vavra, Stephanie H.

    2005-03-29

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof. The present invention further relates to methods and devices for the separation of nucleic acid molecules based on charge. The present invention also provides methods for the detection of non-target cleavage products via the formation of a complete and activated protein binding region. The invention further provides sensitive and specific methods for the detection of nucleic acid from various viruses in a sample.

  8. Radiation detection system

    DOE Patents [OSTI]

    Nelson, Melvin A.; Davies, Terence J.; Morton, III, John R.

    1976-01-01

    A radiation detection system which utilizes the generation of Cerenkov light in and the transmission of that light longitudinally through fiber optic wave guides in order to transmit intelligence relating to the radiation to a remote location. The wave guides are aligned with respect to charged particle radiation so that the Cerenkov light, which is generated at an angle to the radiation, is accepted by the fiber for transmission therethrough. The Cerenkov radiation is detected, recorded, and analyzed at the other end of the fiber.

  9. Detection of neutrinos

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2016-05-10

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  10. Relating to ion detection

    DOE Patents [OSTI]

    Orr, Christopher Henry; Luff, Craig Janson; Dockray, Thomas; Macarthur, Duncan Whittemore

    2001-01-01

    The apparatus and method provide a technique for improving detection of alpha and/or beta emitting sources on items or in locations using indirect means. The emission forms generate ions in a medium surrounding the item or location and the medium is then moved to a detecting location where the ions are discharged to give a measure of the emission levels. To increase the level of ions generated and render the system particularly applicable for narrow pipes and other forms of conduits, the medium pressure is increased above atmospheric pressure. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

  11. Portable pathogen detection system

    DOE Patents [OSTI]

    Colston, Billy W.; Everett, Matthew; Milanovich, Fred P.; Brown, Steve B.; Vendateswaran, Kodumudi; Simon, Jonathan N.

    2005-06-14

    A portable pathogen detection system that accomplishes on-site multiplex detection of targets in biological samples. The system includes: microbead specific reagents, incubation/mixing chambers, a disposable microbead capture substrate, and an optical measurement and decoding arrangement. The basis of this system is a highly flexible Liquid Array that utilizes optically encoded microbeads as the templates for biological assays. Target biological samples are optically labeled and captured on the microbeads, which are in turn captured on an ordered array or disordered array disposable capture substrate and then optically read.

  12. Detection of solar events

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2013-08-27

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  13. Detection of neutrinos

    DOE Patents [OSTI]

    Fischbach, Ephraim; Jenkins, Jere

    2014-02-04

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  14. Detecting bioterrorism: Is chemistry enough?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Detecting bioterrorism: Is chemistry enough? Detecting bioterrorism: Is chemistry enough? In an online webinar, Kristin Omberg will offer discussion on the possibilities and ...

  15. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick; Hauschild, Veronique; Hall, Dr. Linda; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  16. Nitrogen dioxide detection

    DOE Patents [OSTI]

    Sinha, Dipen N.; Agnew, Stephen F.; Christensen, William H.

    1993-01-01

    Method and apparatus for detecting the presence of gaseous nitrogen dioxide and determining the amount of gas which is present. Though polystyrene is normally an insulator, it becomes electrically conductive in the presence of nitrogen dioxide. Conductance or resistance of a polystyrene sensing element is related to the concentration of nitrogen dioxide at the sensing element.

  17. Radiation detection system

    DOE Patents [OSTI]

    Franks, Larry A.; Lutz, Stephen S.; Lyons, Peter B.

    1981-01-01

    A radiation detection system including a radiation-to-light converter and fiber optic wave guides to transmit the light to a remote location for processing. The system utilizes fluors particularly developed for use with optical fibers emitting at wavelengths greater than about 500 nm and having decay times less than about 10 ns.

  18. DETECTION OR WARNING SYSTEM

    DOE Patents [OSTI]

    Tillman, J.E.

    1953-10-20

    This patent application describes a sensitive detection or protective system capable of giving an alarm or warning upon the entrance or intrusion of any body into a defined area or zone protected by a radiation field of suitable direction or extent.

  19. Detection of counterfeit currency

    DOE Patents [OSTI]

    Burns, D.A.

    1998-05-26

    A method is disclosed of detecting counterfeit currency by contacting the currency to be tested with near infrared beams in the spectrum below 1,250 nanometers, measuring reflectance of the near infrared beams and comparing the reflectance values with those from genuine currency. 18 figs.

  20. Liquid detection circuit

    DOE Patents [OSTI]

    Regan, Thomas O.

    1987-01-01

    Herein is a circuit which is capable of detecting the presence of liquids, especially cryogenic liquids, and whose sensor will not overheat in a vacuum. The circuit parameters, however, can be adjusted to work with any liquid over a wide range of temperatures.

  1. Identification of the meiotic toolkit in diatoms and exploration of meiosis-specific SPO11 and RAD51 homologs in the sexual species Pseudo-nitzschia multistriata and Seminavis robusta

    SciTech Connect (OSTI)

    Patil, Shrikant; Moeys, Sara; von Dassow, Peter; Huysman, Marie J. J.; Mapleson, Daniel; De Veylder, Lieven; Sanges, Remo; Vyverman, Wim; Montresor, Marina; Ferrante, Maria Immacolata

    2015-11-14

    Sexual reproduction is an obligate phase in the life cycle of most eukaryotes. Meiosis varies among organisms, which is reflected by the variability of the gene set associated to the process. Diatoms are unicellular organisms that belong to the stramenopile clade and have unique life cycles that can include a sexual phase. The exploration of five diatom genomes and one diatom transcriptome led to the identification of 42 genes potentially involved in meiosis. While these include the majority of known meiosis-related genes, several meiosis-specific genes, including DMC1, could not be identified. Furthermore, phylogenetic analyses supported gene identification and revealed ancestral loss and recent expansion in the RAD51 family in diatoms. The two sexual species Pseudo-nitzschia multistriata and Seminavis robusta were used to explore the expression of meiosis-related genes: RAD21, SPO11-2, RAD51-A, RAD51-B and RAD51-C were upregulated during meiosis, whereas other paralogs in these families showed no differential expression patterns, suggesting that they may play a role during vegetative divisions. An almost identical toolkit is shared among Pseudo-nitzschia multiseries and Fragilariopsis cylindrus, as well as two species for which sex has not been observed, Phaeodactylum tricornutum and Thalassiosira pseudonana, suggesting that these two may retain a facultative sexual phase. Lastly, our results reveal the conserved meiotic toolkit in six diatom species and indicate that Stramenopiles share major modifications of canonical meiosis processes ancestral to eukaryotes, with important divergences in each Kingdom.

  2. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    SciTech Connect (OSTI)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysis of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.

  3. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    SciTech Connect (OSTI)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysis of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.

  4. Chlorofluorocarbon leak detection technology

    SciTech Connect (OSTI)

    Munday, E.B.

    1990-12-01

    There are about 590 large coolant systems located at the Portsmouth Gaseous Diffusion Plant (PORTS) and the Paducah Gaseous Diffusion Plant (PGDP) leaking nearly 800,000 lb of R-114 refrigerant annually (1989 estimate). A program is now under way to reduce the leakage to 325,000 lb/year -- an average loss of 551 lb/year (0.063 lb/h) per coolant system, some of which are as large as 800 ft. This report investigates leak detection technologies that can be used to locate leaks in the coolant systems. Included are descriptions, minimum leak detection rate levels, advantages, disadvantages, and vendor information on the following technologies: bubbling solutions; colorimetric leak testing; dyes; halogen leak detectors (coronea discharge detectors; halide torch detectors, and heated anode detectors); laser imaging; mass spectroscopy; organic vapor analyzers; odorants; pressure decay methods; solid-state electrolytic-cell gas sensors; thermal conductivity leak detectors; and ultrasonic leak detectors.

  5. Solar neutrino detection

    SciTech Connect (OSTI)

    Miramonti, Lino

    2009-04-30

    More than 40 years ago, neutrinos where conceived as a way to test the validity of the solar models which tell us that stars are powered by nuclear fusion reactions. The first measurement of the neutrino flux, in 1968 in the Homestake mine in South Dakota, detected only one third of the expected value, originating what has been known as the Solar Neutrino Problem. Different experiments were built in order to understand the origin of this discrepancy. Now we know that neutrinos undergo oscillation phenomenon changing their nature traveling from the core of the Sun to our detectors. In the work the 40 year long saga of the neutrino detection is presented; from the first proposals to test the solar models to last real time measurements of the low energy part of the neutrino spectrum.

  6. Cell Phone Detection Techniques

    SciTech Connect (OSTI)

    Pratt, Richard M.; Bunch, Kyle J.; Puzycki, David J.; Slaugh, Ryan W.; Good, Morris S.; McMakin, Douglas L.

    2007-10-01

    A team composed of Rick Pratt, Dave Puczyki, Kyle Bunch, Ryan Slaugh, Morris Good, and Doug McMakin teamed together to attempt to exploit cellular telephone features and detect if a person was carrying a cellular telephone into a Limited Area. The cell phones electromagnetic properties were measured, analyzed, and tested in over 10 different ways to determine if an exploitable signature exists. The method that appears to have the most potential for success without adding an external tag is to measure the RF spectrum, not in the cell phone band, but between 240 and 400MHz. Figures 1- 7 show the detected signal levels from cell phones from three different manufacturers.

  7. Protein detection system

    DOE Patents [OSTI]

    Fruetel, Julie A.; Fiechtner, Gregory J.; Kliner, Dahv A. V.; McIlroy, Andrew

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  8. Interim explosives detection alternatives

    SciTech Connect (OSTI)

    Syler, R.P. )

    1991-01-01

    There is a general concern with insiders smuggling bomb quantities of explosives into sensitive facilities such as nuclear facilities. At this time, there is no single explosives detection device that is suitable for monitoring personnel and their packages for explosives in an operational facility environment. However, there are techniques combining available commercial technologies with procedures and threat analysis that can significantly increase the insiders risk and reduce the population of adversaries. This paper describes the available applicable explosives detection technologies and discusses the techniques that could be implemented on an interim basis. It is important that these techniques be considered, so that some interim level of security against the explosives threat can be established until more sophisticated equipment that is under development becomes available.

  9. Fraud Detection in Healthcare

    SciTech Connect (OSTI)

    Chandola, Varun; Schryver, Jack C; Sukumar, Sreenivas R

    2015-01-01

    We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.

  10. Biomolecular detection device

    DOE Patents [OSTI]

    Huo, Qisheng; Liu, Jun

    2008-10-21

    A device for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode.

  11. Aspects of leak detection

    SciTech Connect (OSTI)

    Chivers, T.C.

    1997-04-01

    A requirement of a Leak before Break safety case is that the leakage from the through wall crack be detected prior to any growth leading to unacceptable failure. This paper sets out to review some recent developments in this field. It does not set out to be a comprehensive guide to all of the methods available. The discussion concentrates on acoustic emission and how the techniques can be qualified and deployed on operational plant.

  12. Method for detecting biomolecules

    DOE Patents [OSTI]

    Huo, Qisheng; Liu, Jun

    2008-08-12

    A method for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode

  13. Nucleic Acid Detection Methods

    DOE Patents [OSTI]

    Smith, Cassandra L.; Yaar, Ron; Szafranski, Przemyslaw; Cantor, Charles R.

    1998-05-19

    The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3'-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated.

  14. Nucleic acid detection methods

    DOE Patents [OSTI]

    Smith, C.L.; Yaar, R.; Szafranski, P.; Cantor, C.R.

    1998-05-19

    The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3{prime}-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated. 18 figs.

  15. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  16. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  17. Revolution in nuclear detection affairs

    SciTech Connect (OSTI)

    Stern, Warren M.

    2014-05-09

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  18. Nucleic acid detection assays

    DOE Patents [OSTI]

    Prudent, James R.; Hall, Jeff G.; Lyamichev, Victor I.; Brow, Mary Ann; Dahlberg, James E.

    2005-04-05

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof.

  19. Nucleic acid detection compositions

    DOE Patents [OSTI]

    Prudent, James R.; Hall, Jeff G.; Lyamichev, Victor I.; Brow, Mary Ann; Dahlberg, James L.

    2008-08-05

    The present invention relates to means for the detection and characterization of nucleic acid sequences, as well as variations in nucleic acid sequences. The present invention also relates to methods for forming a nucleic acid cleavage structure on a target sequence and cleaving the nucleic acid cleavage structure in a site-specific manner. The structure-specific nuclease activity of a variety of enzymes is used to cleave the target-dependent cleavage structure, thereby indicating the presence of specific nucleic acid sequences or specific variations thereof.

  20. Flaw detection and evaluation

    DOE Patents [OSTI]

    Wilks, Robert S.; Sturges, Jr., Robert H.

    1983-01-01

    The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

  1. Opaque cloud detection

    DOE Patents [OSTI]

    Roskovensky, John K.

    2009-01-20

    A method of detecting clouds in a digital image comprising, for an area of the digital image, determining a reflectance value in at least three discrete electromagnetic spectrum bands, computing a first ratio of one reflectance value minus another reflectance value and the same two values added together, computing a second ratio of one reflectance value and another reflectance value, choosing one of the reflectance values, and concluding that an opaque cloud exists in the area if the results of each of the two computing steps and the choosing step fall within three corresponding predetermined ranges.

  2. Electrical leakage detection circuit

    DOE Patents [OSTI]

    Wild, Arthur

    2006-09-05

    A method is provided for detecting electrical leakage between a power supply and a frame of a vehicle or machine. The disclosed method includes coupling a first capacitor between a frame and a first terminal of a power supply for a predetermined period of time. The current flowing between the frame and the first capacitor is limited to a predetermined current limit. It is determined whether the voltage across the first capacitor exceeds a threshold voltage. A first output signal is provided when the voltage across the capacitor exceeds the threshold voltage.

  3. A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs

    SciTech Connect (OSTI)

    Choudhury, Sutanay; Holder, Larry; Chin, George; Agarwal, Khushbu; Feo, John T.

    2015-02-02

    Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the world. Cyber defenders need to analyze massive-scale, high-resolution network flows to identify, categorize, and mitigate attacks involving net- works spanning institutional and national boundaries. Many of the cyber attacks can be described as subgraph patterns, with promi- nent examples being insider infiltrations (path queries), denial of service (parallel paths) and malicious spreads (tree queries). This motivates us to explore subgraph matching on streaming graphs in a continuous setting. The novelty of our work lies in using the subgraph distributional statistics collected from the streaming graph to determine the query processing strategy. We introduce a Lazy Search" algorithm where the search strategy is decided on a vertex-to-vertex basis depending on the likelihood of a match in the vertex neighborhood. We also propose a metric named Relative Selectivity" that is used to se- lect between different query processing strategies. Our experiments performed on real online news, network traffic stream and a syn- thetic social network benchmark demonstrate 10-100x speedups over selectivity agnostic approaches.

  4. Dynamic Fault Detection Chassis

    SciTech Connect (OSTI)

    Mize, Jeffery J

    2007-01-01

    Abstract The high frequency switching megawatt-class High Voltage Converter Modulator (HVCM) developed by Los Alamos National Laboratory for the Oak Ridge National Laboratory's Spallation Neutron Source (SNS) is now in operation. One of the major problems with the modulator systems is shoot-thru conditions that can occur in a IGBTs H-bridge topology resulting in large fault currents and device failure in a few microseconds. The Dynamic Fault Detection Chassis (DFDC) is a fault monitoring system; it monitors transformer flux saturation using a window comparator and dV/dt events on the cathode voltage caused by any abnormality such as capacitor breakdown, transformer primary turns shorts, or dielectric breakdown between the transformer primary and secondary. If faults are detected, the DFDC will inhibit the IGBT gate drives and shut the system down, significantly reducing the possibility of a shoot-thru condition or other equipment damaging events. In this paper, we will present system integration considerations, performance characteristics of the DFDC, and discuss its ability to significantly reduce costly down time for the entire facility.

  5. Nucleic acid detection system and method for detecting influenza

    DOE Patents [OSTI]

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  6. Hand held explosives detection system

    DOE Patents [OSTI]

    Conrad, Frank J.

    1992-01-01

    The present invention is directed to a sensitive hand-held explosives detection device capable of detecting the presence of extremely low quantities of high explosives molecules, and which is applicable to sampling vapors from personnel, baggage, cargo, etc., as part of an explosives detection system.

  7. RADIATION WAVE DETECTION

    DOE Patents [OSTI]

    Wouters, L.F.

    1960-08-30

    Radiation waves can be detected by simultaneously measuring radiation- wave intensities at a plurality of space-distributed points and producing therefrom a plot of the wave intensity as a function of time. To this end. a detector system is provided which includes a plurality of nuclear radiation intensity detectors spaced at equal radial increments of distance from a source of nuclear radiation. Means are provided to simultaneously sensitize the detectors at the instant a wave of radiation traverses their positions. the detectors producing electrical pulses indicative of wave intensity. The system further includes means for delaying the pulses from the detectors by amounts proportional to the distance of the detectors from the source to provide an indication of radiation-wave intensity as a function of time.

  8. Malware detection and analysis

    DOE Patents [OSTI]

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  9. Waveguide disturbance detection method

    DOE Patents [OSTI]

    Korneev, Valeri A.; Nihei, Kurt T.; Myer, Larry R.

    2000-01-01

    A method for detection of a disturbance in a waveguide comprising transmitting a wavefield having symmetric and antisymmetric components from a horizontally and/or vertically polarized source and/or pressure source disposed symmetrically with respect to the longitudinal central axis of the waveguide at one end of the waveguide, recording the horizontal and/or vertical component or a pressure of the wavefield with a vertical array of receivers disposed at the opposite end of the waveguide, separating the wavenumber transform of the wavefield into the symmetric and antisymmetric components, integrating the symmetric and antisymmetric components over a broad frequency range, and comparing the magnitude of the symmetric components and the antisymmetric components to an expected magnitude for the symmetric components and the antisymmetric components for a waveguide of uniform thickness and properties thereby determining whether or not a disturbance is present inside the waveguide.

  10. Arc fault detection system

    DOE Patents [OSTI]

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  11. Detection of gas leakage

    DOE Patents [OSTI]

    Thornberg, Steven; Brown, Jason

    2012-06-19

    A method of detecting leaks and measuring volumes as well as an apparatus, the Power-free Pump Module (PPM), that is a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement, where the invention is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr), perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  12. Target detection portal

    DOE Patents [OSTI]

    Linker, Kevin L.; Brusseau, Charles A.

    2002-01-01

    A portal apparatus for screening persons or objects for the presence of trace amounts of target substances such as explosives, narcotics, radioactive materials, and certain chemical materials. The portal apparatus can have a one-sided exhaust for an exhaust stream, an interior wall configuration with a concave-shape across a horizontal cross-section for each of two facing sides to result in improved airflow and reduced washout relative to a configuration with substantially flat parallel sides; air curtains to reduce washout; ionizing sprays to collect particles bound by static forces, as well as gas jet nozzles to dislodge particles bound by adhesion to the screened person or object. The portal apparatus can be included in a detection system with a preconcentrator and a detector.

  13. Portable outgas detection apparatus

    DOE Patents [OSTI]

    Haney, Steven Julian; Malinowski, Michael E.

    2004-05-11

    A portable device for detecting surface outgas contaminants of an article includes: (i) a portable housing that has a chamber which is in communication with a port that is adapted to be sealably attached to a surface of the article; (ii) a mass spectrometer that is coupled to the chamber for analyzing gaseous materials in the chamber; and (iii) means for generating a vacuum within the chamber thereby drawing outgas contaminants from the surface of the article into the chamber for analysis by the mass spectrometer. By performing a mass spectrometric analysis of the surface of interest and comparing the data with mass spectrometric data ascertained with the device from a clean surface, the type and amount of outgas contaminants, if any, can be determined.

  14. Detection of gas leakage

    SciTech Connect (OSTI)

    Thornberg, Steven M; Brown, Jason

    2015-02-17

    A method of detecting leaks and measuring volumes as well as a device, the Power-free Pump Module (PPM), provides a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement. The PPM is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr) using a venturi pump, perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  15. Arc fault detection system

    DOE Patents [OSTI]

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  16. Digital quadrature phase detection

    DOE Patents [OSTI]

    Smith, James A.; Johnson, John A.

    1992-01-01

    A system for detecting the phase of a frequency of phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2.pi. when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2.pi. when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention.

  17. Detection of anomalous events

    DOE Patents [OSTI]

    Ferragut, Erik M.; Laska, Jason A.; Bridges, Robert A.

    2016-06-07

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The system can include a plurality of anomaly detectors that together implement an algorithm to identify low-probability events and detect atypical traffic patterns. The anomaly detector provides for comparability of disparate sources of data (e.g., network flow data and firewall logs.) Additionally, the anomaly detector allows for regulatability, meaning that the algorithm can be user configurable to adjust a number of false alerts. The anomaly detector can be used for a variety of probability density functions, including normal Gaussian distributions, irregular distributions, as well as functions associated with continuous or discrete variables.

  18. Weld failure detection

    DOE Patents [OSTI]

    Pennell, William E.; Sutton, Jr., Harry G.

    1981-01-01

    Method and apparatus for detecting failure in a welded connection, particrly applicable to not readily accessible welds such as those joining components within the reactor vessel of a nuclear reactor system. A preselected tag gas is sealed within a chamber which extends through selected portions of the base metal and weld deposit. In the event of a failure, such as development of a crack extending from the chamber to an outer surface, the tag gas is released. The environment about the welded area is directed to an analyzer which, in the event of presence of the tag gas, evidences the failure. A trigger gas can be included with the tag gas to actuate the analyzer.

  19. Digital quadrature phase detection

    DOE Patents [OSTI]

    Smith, J.A.; Johnson, J.A.

    1992-05-26

    A system for detecting the phase of a frequency or phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2[pi] when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2[pi] when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention. 6 figs.

  20. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  1. Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems

    SciTech Connect (OSTI)

    Ferragut, Erik M; Laska, Jason A; Melin, Alexander M; Czejdo, Bogdan

    2013-01-01

    The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

  2. Genomics-enabled sensor platform for rapid detection of viruses related to disease outbreak.

    SciTech Connect (OSTI)

    Brozik, Susan Marie; Manginell, Ronald Paul; Moorman, Matthew Wallace; Xiao, Xiaoyin; Edwards, Thayne L.; Anderson, John Moses; Pfeifer, Kent Bryant; Branch, Darren W.; Wheeler, David Roger; Polsky, Ronen; Lopez, DeAnna M.; Ebel, Gregory D.; Prasad, Abhishek N.; Brozik, James A.; Rudolph, Angela R.; Wong, Lillian P.

    2013-09-01

    Bioweapons and emerging infectious diseases pose growing threats to our national security. Both natural disease outbreak and outbreaks due to a bioterrorist attack are a challenge to detect, taking days after the outbreak to identify since most outbreaks are only recognized through reportable diseases by health departments and reports of unusual diseases by clinicians. In recent decades, arthropod-borne viruses (arboviruses) have emerged as some of the most significant threats to human health. They emerge, often unexpectedly, from cryptic transmission foci causing localized outbreaks that can rapidly spread to multiple continents due to increased human travel and trade. Currently, diagnosis of acute infections requires amplification of viral nucleic acids, which can be costly, highly specific, technically challenging and time consuming. No diagnostic devices suitable for use at the bedside or in an outbreak setting currently exist. The original goals of this project were to 1) develop two highly sensitive and specific diagnostic assays for detecting RNA from a wide range of arboviruses; one based on an electrochemical approach and the other a fluorescent based assay and 2) develop prototype microfluidic diagnostic platforms for preclinical and field testing that utilize the assays developed in goal 1. We generated and characterized suitable primers for West Nile Virus RNA detection. Both optical and electrochemical transduction technologies were developed for DNA-RNA hybridization detection and were implemented in microfluidic diagnostic sensing platforms that were developed in this project.

  3. Intelligent Leak Detection System

    Energy Science and Technology Software Center (OSTI)

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or nearmore » surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift

  4. Intelligent Leak Detection System

    SciTech Connect (OSTI)

    Mohaghegh, Shahab D.

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or near surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift and noise

  5. Frequency and patterns of abnormality detected by iodine-123 amine emission CT after cerebral infarction

    SciTech Connect (OSTI)

    Brott, T.G.; Gelfand, M.J.; Williams, C.C.; Spilker, J.A.; Hertzberg, V.S.

    1986-03-01

    Single photon emission computed tomography (SPECT) was performed in 31 patients with cerebral infarction and 13 who had had transient ischemic attacks, using iodine-123-labeled N,N,N'-trimethyl-N'-(2-hydroxyl-3-methyl-5-iodobenzyl)-1,3-propanediamin e (I-123-HIPDM) as the radiopharmaceutical. SPECT scans were compared with computed tomographic (CT) scans. SPECT was as sensitive as CT in detecting cerebral infarction (94% vs. 84%). The abnormalities were larger on the SPECT scans than on the CT scans in 19 cases, equal in seven, and smaller in five (SPECT abnormalities greater than or equal to CT abnormalities in 86% of cases). Fifteen of 30 patients with hemispheric infarction had decreased perfusion (decreased uptake of I-123-HIPDM) to the cerebellar hemisphere contralateral to the cerebral hemisphere involved by the infarction (crossed cerebellar diaschisis). Nine of these 15 patients had major motor deficits, while only one of the 15 without crossed cerebellar diaschisis had a major motor deficit.

  6. OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid

    SciTech Connect (OSTI)

    Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2015-01-01

    The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.

  7. Spectroscopic Detection of Pathogens

    SciTech Connect (OSTI)

    ALAM,M. KATHLEEN; TIMLIN,JERILYN A.; MARTIN,LAURA E.; HJELLE,DRIAN; LYONS,RICK; GARRISON,KRISTIN

    2000-11-01

    The goal of this LDRD Research project was to provide a preliminary examination of the use of infrared spectroscopy as a tool to detect the changes in cell cultures upon activation by an infectious agent. Due to a late arrival of funding, only 5 months were available to transfer and setup equipment at UTTM,develop cell culture lines, test methods of in-situ activation and collect kinetic data from activated cells. Using attenuated total reflectance (ATR) as a sampling method, live cell cultures were examined prior to and after activation. Spectroscopic data were collected from cells immediately after activation in situ and, in many cases for five successive hours. Additional data were collected from cells activated within a test tube (pre-activated), in both transmission mode as well as in ATR mode. Changes in the infrared data were apparent in the transmission data collected from the pre-activated cells as well in some of the pre-activated ATR data. Changes in the in-situ activated spectral data were only occasionally present due to (1) the limited time cells were studied and (2) incomplete activation. Comparison of preliminary data to infrared bands reported in the literature suggests the primary changes seen are due an increase in ribonucleic acid (RNA) production. This work will be continued as part of a 3 year DARPA grant.

  8. Detection of pump degradation

    SciTech Connect (OSTI)

    Casada, D.

    1995-04-01

    There are a variety of stressors that can affect the operation of centrifugal pumps. Although these general stressors are active in essentially all centrifugal pumps, the stressor level and the extent of wear and degradation can vary greatly. Parameters that affect the extent of stressor activity are manifold. In order to assure the long-term operational readiness of a pump, it is important to both understand the nature and magnitude of the specific degradation mechanisms and to monitor the performance of the pump. The most commonly applied method of monitoring the condition of not only pumps, but rotating machinery in general, is vibration analysis. Periodic or continuous special vibration analysis is a cornerstone of most pump monitoring programs. In the nuclear industry, non-spectral vibration monitoring of safety-related pumps is performed in accordance with the ASME code. Pump head and flow rate are also monitored, per code requirements. Although vibration analysis has dominated the condition monitoring field for many years, there are other measures that have been historically used to help understand pump condition; advances in historically applied technologies and developing technologies offer improved monitoring capabilities. The capabilities of several technologies (including vibration analysis, dynamic pressure analysis, and motor power analysis) to detect the presence and magnitude of both stressors and resultant degradation are discussed.

  9. Incipient fire detection system

    DOE Patents [OSTI]

    Brooks, Jr., William K.

    1999-01-01

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  10. detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    detection Researcher from NNSA lab helps develop new system for instant explosive detection Chemicals used in explosives give off signatures that can be read by spectroscopic systems. One practical application for this technology would be for use at airport screening stations. A spectroscopic detection system would be able to tell the difference between explosive chemicals and shampoo by... Sniffing out danger from above NNSA's efforts to prevent, counter, and respond to the dangers of nuclear

  11. Method for detecting an element

    DOE Patents [OSTI]

    Blackwood, Larry G.; Reber, Edward L.; Rohde, Kenneth W.

    2007-02-06

    A method for detecting an element is disclosed and which includes the steps of providing a gamma-ray spectrum which depicts, at least in part, a test region having boundaries, and which has a small amount of the element to be detected; providing a calculation which detects the small amount of the element to be detected; and providing a moving window and performing the calculation within the moving window, and over a range of possible window boundaries within the test region to determine the location of the optimal test region within the gamma-ray spectrum.

  12. MPI Runtime Error Detection with MUST: Advances in Deadlock Detection

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hilbrich, Tobias; Protze, Joachim; Schulz, Martin; de Supinski, Bronis R.; Müller, Matthias S.

    2013-01-01

    The widely used Message Passing Interface (MPI) is complex and rich. As a result, application developers require automated tools to avoid and to detect MPI programming errors. We present the Marmot Umpire Scalable Tool (MUST) that detects such errors with significantly increased scalability. We present improvements to our graph-based deadlock detection approach for MPI, which cover future MPI extensions. Our enhancements also check complex MPI constructs that no previous graph-based detection approach handled correctly. Finally, we present optimizations for the processing of MPI operations that reduce runtime deadlock detection overheads. Existing approaches often require 𝒪( p ) analysis timemore » per MPI operation, for p processes. We empirically observe that our improvements lead to sub-linear or better analysis time per operation for a wide range of real world applications.« less

  13. Particle detection systems and methods

    DOE Patents [OSTI]

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  14. Development of a high-throughput microfluidic integrated microarray for the detection of chimeric bioweapons.

    SciTech Connect (OSTI)

    Sheppod, Timothy; Satterfield, Brent; Hukari, Kyle W.; West, Jason A. A.; Hux, Gary A.

    2006-10-01

    The advancement of DNA cloning has significantly augmented the potential threat of a focused bioweapon assault, such as a terrorist attack. With current DNA cloning techniques, toxin genes from the most dangerous (but environmentally labile) bacterial or viral organism can now be selected and inserted into robust organism to produce an infinite number of deadly chimeric bioweapons. In order to neutralize such a threat, accurate detection of the expressed toxin genes, rather than classification on strain or genealogical decent of these organisms, is critical. The development of a high-throughput microarray approach will enable the detection of unknowns chimeric bioweapons. The development of a high-throughput microarray approach will enable the detection of unknown bioweapons. We have developed a unique microfluidic approach to capture and concentrate these threat genes (mRNA's) upto a 30 fold concentration. These captured oligonucleotides can then be used to synthesize in situ oligonucleotide copies (cDNA probes) of the captured genes. An integrated microfluidic architecture will enable us to control flows of reagents, perform clean-up steps and finally elute nanoliter volumes of synthesized oligonucleotides probes. The integrated approach has enabled a process where chimeric or conventional bioweapons can rapidly be identified based on their toxic function, rather than being restricted to information that may not identify the critical nature of the threat.

  15. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and provide new insights into the basic biology of viralhost dynamics of infection. ... "Through this study we now better understand the biology that defines that resilience." ...

  16. Method For Detecting Biological Agents

    DOE Patents [OSTI]

    Chen, Liaohai; McBranch, Duncan W.; Wang, Hsing-Lin; Whitten, David G.

    2005-12-27

    A sensor is provided including a polymer capable of having an alterable measurable property from the group of luminescence and electrical conductivity, the polymer having an intermediate combination of a recognition element, a tethering element and a property-altering element bound thereto and capable of altering the measurable property, the intermediate combination adapted for subsequent separation from the polymer upon exposure to an agent having an affinity for binding to the recognition element whereupon the separation of the intermediate combination from the polymer results in a detectable change in the alterable measurable property, and, detecting said detectable change in the alterable measurable property.

  17. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K.; Grey, Alan E.

    1994-04-05

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  18. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K.; Grey, Alan E.

    1994-01-01

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  19. Proliferation Detection | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Research and Development Proliferation Detection The Office of Proliferation Detection (PD) develops capabilities to detect special nuclear materials and weapons production and movement, as well as for transparent nuclear reductions and monitoring. The PD efforts are aligned along three functional areas: Nuclear Weaponization and Material Production Detection: Supports the development of technology to target the detection and characterization of foreign weapons program activities, including

  20. Radio frequency detection assembly and method for detecting radio frequencies

    DOE Patents [OSTI]

    Cown, Steven H.; Derr, Kurt Warren

    2010-03-16

    A radio frequency detection assembly is described and which includes a radio frequency detector which detects a radio frequency emission produced by a radio frequency emitter from a given location which is remote relative to the radio frequency detector; a location assembly electrically coupled with the radio frequency detector and which is operable to estimate the location of the radio frequency emitter from the radio frequency emission which has been received; and a radio frequency transmitter electrically coupled with the radio frequency detector and the location assembly, and which transmits a radio frequency signal which reports the presence of the radio frequency emitter.

  1. Synthesis and subsequent rearrangement of chloro(pentafluorophenyl)-1,5-cyclooctadienepalladium(II), an illustrative example of endo attack to a coordinated double bond

    SciTech Connect (OSTI)

    Albeniz, A.C.; Espinet, P. ); Jeannin, Y.; Philoche-Levisalles, M. ); Mann, B.E. )

    1990-08-29

    Pd(C{sub 6}F{sub 5})Cl(1,5-cyclooctadiene) has been prepared in high yield and characterized crystallographically: monoclinic space group P2{sub 1}/c, a = 8.313 (1) {angstrom}, b = 7.7800 (6) {angstrom}, c = 22.292 (4) {angstrom}, {beta} = 95.77 (1){degree} (Z = 4), final R of 0.024 for 2,080 independent reflections. The x-ray structure reveals a high trans influence of the C{sub 6}F{sub 5} groups that weakens the opposite palladium-olefin bond. This complex rearranges slowly in solution by intramolecular double bond insertion into the Pd-C{sub 6}F{sub 5} bond to give an allyl complex Pd{sub 2}({mu}-Cl){sub 2}(6-C{sub 6}F{sub 5}-1-3-{eta}{sup 3}-C{sub 8}H{sub 12}){sub 2} and {sigma},{pi}-complex Pd{sub 2}({mu}-Cl){sub 2}(8-C{sub 6}F{sub 5}-1:4-5-{eta}{sup 3}-C{sub 8}H{sub 12}){sub 2}. A derivative of the latter, Pd(8-C{sub 6}F{sub 5}-1:4-5-{eta}{sup 3}-C{sub 8}H{sub 12})(F6-acac), has been characterized crystallographically: triclinic space group P{anti 1}, a = 10.360 (3) {angstrom}, b = 11.051 (2) {angstrom}, c = 11.084 (4) {angstrom}, {alpha} = 73.70 (2){degree}, {beta} = 61.41 (2){degree}, {gamma} = 66.08 (2){degree}, final R of 0.036 for 3,341 independent reflections. The rearrangement of Pd(C{sub 6}F{sub 5})Cl(1,5-COD) is catalyzed by its products and slowed down in coordinating solvents. Both products are the result of an endo attack of C{sub 6}F{sub 5} to COD and are formed competitively from a common intermediate.

  2. GMTI radar minimum detectable velocity.

    SciTech Connect (OSTI)

    Richards, John Alfred

    2011-04-01

    Minimum detectable velocity (MDV) is a fundamental consideration for the design, implementation, and exploitation of ground moving-target indication (GMTI) radar imaging modes. All single-phase-center air-to-ground radars are characterized by an MDV, or a minimum radial velocity below which motion of a discrete nonstationary target is indistinguishable from the relative motion between the platform and the ground. Targets with radial velocities less than MDV are typically overwhelmed by endoclutter ground returns, and are thus not generally detectable. Targets with radial velocities greater than MDV typically produce distinct returns falling outside of the endoclutter ground returns, and are thus generally discernible using straightforward detection algorithms. This document provides a straightforward derivation of MDV for an air-to-ground single-phase-center GMTI radar operating in an arbitrary geometry.

  3. Discriminating ultrasonic proximity detection system

    DOE Patents [OSTI]

    Annala, Wayne C.

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  4. Optically detected magnetic resonance imaging

    SciTech Connect (OSTI)

    Blank, Aharon; Shapiro, Guy; Fischer, Ran; London, Paz; Gershoni, David

    2015-01-19

    Optically detected magnetic resonance provides ultrasensitive means to detect and image a small number of electron and nuclear spins, down to the single spin level with nanoscale resolution. Despite the significant recent progress in this field, it has never been combined with the power of pulsed magnetic resonance imaging techniques. Here, we demonstrate how these two methodologies can be integrated using short pulsed magnetic field gradients to spatially encode the sample. This result in what we denote as an 'optically detected magnetic resonance imaging' technique. It offers the advantage that the image is acquired in parallel from all parts of the sample, with well-defined three-dimensional point-spread function, and without any loss of spectroscopic information. In addition, this approach may be used in the future for parallel but yet spatially selective efficient addressing and manipulation of the spins in the sample. Such capabilities are of fundamental importance in the field of quantum spin-based devices and sensors.

  5. Point pattern match-based change detection in a constellation of previously detected objects

    DOE Patents [OSTI]

    Paglieroni, David W.

    2016-06-07

    A method and system is provided that applies attribute- and topology-based change detection to objects that were detected on previous scans of a medium. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, detection strength, size, elongation, orientation, etc. The locations define a three-dimensional network topology forming a constellation of previously detected objects. The change detection system stores attributes of the previously detected objects in a constellation database. The change detection system detects changes by comparing the attributes and topological consistency of newly detected objects encountered during a new scan of the medium to previously detected objects in the constellation database. The change detection system may receive the attributes of the newly detected objects as the objects are detected by an object detection system in real time.

  6. Fluorescent Nanoparticles for Radiation DetectionFluorescent...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Find More Like This Return to Search Fluorescent Nanoparticles for Radiation DetectionFluorescent Nanoparticles for Radiation Detection Oak Ridge National Laboratory Contact ORNL ...

  7. Detection of electromagnetic radiation using micromechanical...

    Office of Scientific and Technical Information (OSTI)

    Patent: Detection of electromagnetic radiation using micromechanical multiple quantum wells structures Citation Details In-Document Search Title: Detection of electromagnetic ...

  8. Using Commercial Electronics in Nuclear Detection (Conference...

    Office of Scientific and Technical Information (OSTI)

    Conference: Using Commercial Electronics in Nuclear Detection Citation Details In-Document Search Title: Using Commercial Electronics in Nuclear Detection Authors: Quinn, Heather ...

  9. Using Commercial Electronics in Nuclear Detection (Conference...

    Office of Scientific and Technical Information (OSTI)

    Using Commercial Electronics in Nuclear Detection Citation Details In-Document Search Title: Using Commercial Electronics in Nuclear Detection You are accessing a document from ...

  10. Detection of explosives in soils

    DOE Patents [OSTI]

    Chambers, William B.; Rodacy, Philip J.; Phelan, James M.; Woodfin, Ronald L.

    2002-01-01

    An apparatus and method for detecting explosive-indicating compounds in subsurface soil. The apparatus has a probe with an adsorbent material on some portion of its surface that can be placed into soil beneath the ground surface, where the adsorbent material can adsorb at least one explosive-indicating compound. The apparatus additional has the capability to desorb the explosive-indicating compound through heating or solvent extraction. A diagnostic instrument attached to the probe detects the desorbed explosive-indicating compound. In the method for detecting explosive-indicating compounds in soil, the sampling probe with an adsorbent material on at least some portion of a surface of the sampling probe is inserted into the soil to contact the adsorbent material with the soil. The explosive-indicating compounds are then desorbed and transferred as either a liquid or gas sample to a diagnostic tool for analysis. The resulting gas or liquid sample is analyzed using at least one diagnostic tool selected from the group consisting of an ion-mobility spectrometer, a gas chromatograph, a high performance liquid chromatograph, a capillary electrophoresis chromatograph, a mass spectrometer, a Fourier-transform infrared spectrometer and a Raman spectrometer to detect the presence of explosive-indicating compounds.

  11. Anomalous change detection in imagery

    DOE Patents [OSTI]

    Theiler, James P.; Perkins, Simon J.

    2011-05-31

    A distribution-based anomaly detection platform is described that identifies a non-flat background that is specified in terms of the distribution of the data. A resampling approach is also disclosed employing scrambled resampling of the original data with one class specified by the data and the other by the explicit distribution, and solving using binary classification.

  12. GPU Accelerated Event Detection Algorithm

    Energy Science and Technology Software Center (OSTI)

    2011-05-25

    Smart grid external require new algorithmic approaches as well as parallel formulations. One of the critical components is the prediction of changes and detection of anomalies within the power grid. The state-of-the-art algorithms are not suited to handle the demands of streaming data analysis. (i) need for events detection algorithms that can scale with the size of data, (ii) need for algorithms that can not only handle multi dimensional nature of the data, but alsomore » model both spatial and temporal dependencies in the data, which, for the most part, are highly nonlinear, (iii) need for algorithms that can operate in an online fashion with streaming data. The GAEDA code is a new online anomaly detection techniques that take into account spatial, temporal, multi-dimensional aspects of the data set. The basic idea behind the proposed approach is to (a) to convert a multi-dimensional sequence into a univariate time series that captures the changes between successive windows extracted from the original sequence using singular value decomposition (SVD), and then (b) to apply known anomaly detection techniques for univariate time series. A key challenge for the proposed approach is to make the algorithm scalable to huge datasets by adopting techniques from perturbation theory, incremental SVD analysis. We used recent advances in tensor decomposition techniques which reduce computational complexity to monitor the change between successive windows and detect anomalies in the same manner as described above. Therefore we propose to develop the parallel solutions on many core systems such as GPUs, because these algorithms involve lot of numerical operations and are highly data-parallelizable.« less

  13. Imaging, object detection, and change detection with a polarized multistatic GPR array

    DOE Patents [OSTI]

    Beer, N. Reginald; Paglieroni, David W.

    2015-07-21

    A polarized detection system performs imaging, object detection, and change detection factoring in the orientation of an object relative to the orientation of transceivers. The polarized detection system may operate on one of several modes of operation based on whether the imaging, object detection, or change detection is performed separately for each transceiver orientation. In combined change mode, the polarized detection system performs imaging, object detection, and change detection separately for each transceiver orientation, and then combines changes across polarizations. In combined object mode, the polarized detection system performs imaging and object detection separately for each transceiver orientation, and then combines objects across polarizations and performs change detection on the result. In combined image mode, the polarized detection system performs imaging separately for each transceiver orientation, and then combines images across polarizations and performs object detection followed by change detection on the result.

  14. SU-E-T-186: Feasibility Study of Glass Cherenkov Detector for Prompt Gamma Detection in Proton Therapy

    SciTech Connect (OSTI)

    Lau, A; Chen, Y; Ahmad, S

    2014-06-01

    Purpose: To simulate a Cherenkov glass detector system utilizing prompt gamma (PG) technique to quantify range uncertainties in proton radiation therapy. Methods: A simulation of high energy photons typically produced in proton interactions with materials incident onto a block of Cherenkov glass was performed with the Geant4 toolkit. The standard electromagnetic package was used along with several decay modules (G4Decay, G4DecayPhysics, and G4RadioactiveDecayPhysics) and the optical photon components (G4OpticalPhysics). Our setup included a pencil beam consisting of a hundred thousand 6 MeV photons (approximately the deexcitation energy released from 16O) incident onto a 2.5 ⊗ 2.5 ⊗ 1.5 cm3 of a Cherenkov glass (7.2 g of In2O3 + 90 g cladding, density of 2.82 g/cm3, Zeff = 33.7, index of refraction 1.56). The energy deposited from incident 6 MeV photons as well as secondary electrons and resulting optical photons were recorded. Results: The energy deposited by 6 MeV photons in glass material showed several peaks that included the photoelectric, the single and double escape peaks. About 11% of incident photons interacted with glass material to deposit energy. Most of the photons collected were in the region of double escape peak (approximately 4.98 MeV). The secondary electron spectrum produced from incident photons showed a high energy peak located near 6 MeV and a sharp peak located ∼120 keV with a continuous distribution between these two points. The resulting Cherenkov photons produced showed a continuous energy distribution between 2 and 5 eV with a slight increase in yield beginning about 3 eV. The amount of Cherenkov photons produced per interacting incident 6 MeV photon was ∼240.7. Conclusion: This study suggests the viability of utilizing the Cherenkov glass material as a possible prompt gamma photon detection device. Future work will include optimization of the detector system to maximize photon detection efficiency.

  15. Attribute and topology based change detection in a constellation of previously detected objects

    DOE Patents [OSTI]

    Paglieroni, David W.; Beer, Reginald N.

    2016-01-19

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  16. Categorical Exclusion Determinations: NNSA-Proliferation Detection |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Proliferation Detection Categorical Exclusion Determinations: NNSA-Proliferation Detection Categorical Exclusion Determinations issued by NNSA-Proliferation Detection. DOCUMENTS AVAILABLE FOR DOWNLOAD September 17, 2010 CX-004080: Categorical Exclusion Determination Fisk University Nonproliferation Grant CX(s) Applied: B3.6 Date: 09/17/2010 Location(s): Tennessee Office(s): NNSA-Proliferation Detection

  17. Detection of Neutrons with Scintillation Counters

    DOE R&D Accomplishments [OSTI]

    Hofstadter, R.

    1948-11-01

    Detection of slow neutrons by: detection of single gamma rays following capture by cadmium or mercury; detection of more than one gamma ray by observing coincidences after capture; detection of heavy charged particles after capture in lithium or baron nuclei; possible use of anthracene for counting fast neutrons investigated briefly.

  18. Noise canceling in-situ detection

    DOE Patents [OSTI]

    Walsh, David O.

    2014-08-26

    Technologies applicable to noise canceling in-situ NMR detection and imaging are disclosed. An example noise canceling in-situ NMR detection apparatus may comprise one or more of a static magnetic field generator, an alternating magnetic field generator, an in-situ NMR detection device, an auxiliary noise detection device, and a computer.

  19. Method for detecting toxic gases

    DOE Patents [OSTI]

    Stetter, Joseph R.; Zaromb, Solomon; Findlay, Jr., Melvin W.

    1991-01-01

    A method capable of detecting low concentrations of a pollutant or other component in air or other gas, utilizing a combination of a heating filament having a catalytic surface of a noble metal for exposure to the gas and producing a derivative chemical product from the component, and an electrochemical sensor responsive to the derivative chemical product for providing a signal indicative of the product. At concentrations in the order of about 1-100 ppm of tetrachloroethylene, neither the heating filament nor the electrochemical sensor is individually capable of sensing the pollutant. In the combination, the heating filament converts the benzyl chloride to one or more derivative chemical products which may be detected by the electrochemical sensor.

  20. Method for detecting toxic gases

    DOE Patents [OSTI]

    Stetter, J.R.; Zaromb, S.; Findlay, M.W. Jr.

    1991-10-08

    A method is disclosed which is capable of detecting low concentrations of a pollutant or other component in air or other gas. This method utilizes a combination of a heating filament having a catalytic surface of a noble metal for exposure to the gas and producing a derivative chemical product from the component. An electrochemical sensor responds to the derivative chemical product for providing a signal indicative of the product. At concentrations in the order of about 1-100 ppm of tetrachloroethylene, neither the heating filament nor the electrochemical sensor is individually capable of sensing the pollutant. In the combination, the heating filament converts the benzyl chloride to one or more derivative chemical products which may be detected by the electrochemical sensor. 6 figures.

  1. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  2. Detection of a concealed object

    DOE Patents [OSTI]

    Keller, Paul E. (Richland, WA); Hall, Thomas E. (Kennewick, WA); McMakin, Douglas L. (Richland, WA)

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  3. Tritium Detection Methods and Limitations

    Office of Environmental Management (EM)

    Detection Methods and Limitations Tritium Focus Group Meeting, April 2014 Tom Voss, Northern New Mexico DOE-HDBK-1105-2002 RADIOLOGICAL TRAINING FOR TRITIUM FACILITIES U.S. Department of Energy AREA TRNG Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-HDBK-1105-2002 Radiological Training for Tritium Facilities U.S. Department of Energy, Radiological Control Programs for Special Tritium Compounds, DOE-STD- draft, Washington, D.C.

  4. Multiplex detection of agricultural pathogens

    SciTech Connect (OSTI)

    Siezak, Thomas R.; Gardner, Shea; Torres, Clinton; Vitalis, Elizabeth; Lenhoff, Raymond J.

    2013-01-15

    Described are kits and methods useful for detection of agricultural pathogens in a sample. Genomic sequence information from agricultural pathogens was analyzed to identify signature sequences, e.g., polynucleotide sequences useful for confirming the presence or absence of a pathogen in a sample. Primer and probe sets were designed and optimized for use in a PCR based, multiplexed Luminex assay and/or an array assay to successfully identify the presence or absence of pathogens in a sample.

  5. Multiplex detection of agricultural pathogens

    DOE Patents [OSTI]

    McBride, Mary Teresa; Slezak, Thomas Richard; Messenger, Sharon Lee

    2010-09-14

    Described are kits and methods useful for detection of seven agricultural pathogens (BPSV; BHV; BVD; FMDV; BTV; SVD; and VESV) in a sample. Genomic sequence information from 7 agricultural pathogens was analyzed to identify signature sequences, e.g., polynucleotide sequences useful for confirming the presence or absence of a pathogen in a sample. Primer and probe sets were designed and optimized for use in a PCR based, multiplexed Luminex assay to successfully identify the presence or absence of pathogens in a sample.

  6. Detection of a concealed object

    DOE Patents [OSTI]

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  7. Compensated intruder-detection systems

    DOE Patents [OSTI]

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  8. Infrared trace element detection system

    DOE Patents [OSTI]

    Bien, F.; Bernstein, L.S.; Matthew, M.W.

    1988-11-15

    An infrared trace element detection system includes an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined. 11 figs.

  9. Anomaly Detection in Dynamic Networks

    SciTech Connect (OSTI)

    Turcotte, Melissa

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the

  10. Alternative Neutron Detection Testing Summary

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stromswold, David C.; Woodring, Mitchell L.

    2010-04-08

    Radiation portal monitors used for interdiction of illicit materials at borders include highly sensitive neutron detection systems. The main reason for having neutron detection capability is to detect fission neutrons from plutonium. Most currently deployed radiation portal monitors (RPMs) use neutron detectors based upon 3He-filled gas proportional counters, which are the most common large area neutron detector. This type of neutron detector is used in the TSA and other RPMs installed in international locations and in the Ludlum and Science Applications International Corporation RPMs deployed primarily for domestic applications. There is a declining supply of 3He in the world and, thus, methods to reduce the use of this gas in RPMs with minimal changes to the current system designs and sensitivity to cargo-borne neutrons are being investigated. Four technologies have been identified as being currently commercially available, potential alternative neutron detectors to replace the use of 3He in RPMs. These technologies are: 1) Boron trifluoride-filled proportional counters, 2) Boron-lined proportional counters, 3) Lithium-loaded glass fibers, and 4) Coated wavelength-shifting plastic fibers. Reported here is a summary of the testing carried out at Pacific Northwest National Laboratory on these technologies to date, as well as measurements on 3He tubes at various pressures. Details on these measurements are available in the referenced reports. Sponsors of these tests include the Department of Energy (DOE), Department of Homeland Security (DHS), and the Department of Defense (DoD), as well as internal Pacific Northwest National Laboratory funds.

  11. Radiation Detection Computational Benchmark Scenarios

    SciTech Connect (OSTI)

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; McDonald, Ben S.

    2013-09-24

    Modeling forms an important component of radiation detection development, allowing for testing of new detector designs, evaluation of existing equipment against a wide variety of potential threat sources, and assessing operation performance of radiation detection systems. This can, however, result in large and complex scenarios which are time consuming to model. A variety of approaches to radiation transport modeling exist with complementary strengths and weaknesses for different problems. This variety of approaches, and the development of promising new tools (such as ORNL’s ADVANTG) which combine benefits of multiple approaches, illustrates the need for a means of evaluating or comparing different techniques for radiation detection problems. This report presents a set of 9 benchmark problems for comparing different types of radiation transport calculations, identifying appropriate tools for classes of problems, and testing and guiding the development of new methods. The benchmarks were drawn primarily from existing or previous calculations with a preference for scenarios which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22. From a technical perspective, the benchmarks were chosen to span a range of difficulty and to include gamma transport, neutron transport, or both and represent different important physical processes and a range of sensitivity to angular or energy fidelity. Following benchmark identification, existing information about geometry, measurements, and previous calculations were assembled. Monte Carlo results (MCNP decks) were reviewed or created and re-run in order to attain accurate computational times and to verify agreement with experimental data, when present. Benchmark information was then conveyed to ORNL in order to guide testing and development of hybrid calculations. The results of those ADVANTG calculations were then sent to PNNL for

  12. Fire suppression and detection equipment

    SciTech Connect (OSTI)

    E.E. Bates

    2006-01-15

    Inspection and testing guidelines go beyond the 'Code of Federal Regulation'. Title 30 of the US Code of Federal Regulations (30 CFR) contains requirements and references to national standards for inspection, testing and maintenance of fire suppression and detection equipment for mine operators. However, federal requirements have not kept pace with national standards and best practices. The article lists National Fire Protection (NFPA) standards that are referenced by the US Mine Safety and Health Administration (MSHA) in 30 CFR. It then discusses other NFPA Standards excluded from 30 CFR and explains the NFPA standard development process. 2 refs., 3 tabs., 5 photos.

  13. The Autonomous Pathogen Detection System

    SciTech Connect (OSTI)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  14. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, Roswitha S. (Knoxville, TN); Todd, Richard A. (Knoxville, TN)

    1987-01-01

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  15. Multiplex detection of respiratory pathogens

    DOE Patents [OSTI]

    McBride, Mary; Slezak, Thomas; Birch, James M.

    2012-07-31

    Described are kits and methods useful for detection of respiratory pathogens (influenza A (including subtyping capability for H1, H3, H5 and H7 subtypes) influenza B, parainfluenza (type 2), respiratory syncytial virus, and adenovirus) in a sample. Genomic sequence information from the respiratory pathogens was analyzed to identify signature sequences, e.g., polynucleotide sequences useful for confirming the presence or absence of a pathogen in a sample. Primer and probe sets were designed and optimized for use in a PCR based, multiplexed Luminex assay to successfully identify the presence or absence of pathogens in a sample.

  16. Pulsed helium ionization detection system

    DOE Patents [OSTI]

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  17. Conducting Polymers for Neutron Detection

    SciTech Connect (OSTI)

    Kimblin, Clare; Miller, Kirk; Vogel, Bob; Quam, Bill; McHugh, Harry; Anthony, Glen; Mike, Grover

    2007-12-01

    Conjugated polymers have emerged as an attractive technology for large-area electronic applications. As organic semiconductors, they can be used to make large-area arrays of diodes or transistors using fabrication techniques developed for polymer coatings, such as spraying and screen-printing. We have demonstrated both neutron and alpha detection using diodes made from conjugated polymers and have done preliminary work to integrate a boron carbide layer into the conventional polymer device structure to capture thermal neutrons. The polymer devices appear to be insensitive to gamma rays, due to their small physical thickness and low atomic number.

  18. Neutron Detection via Bubble Chambers

    SciTech Connect (OSTI)

    Jordan, David V.; Ely, James H.; Peurrung, Anthony J.; Bond, Leonard J.; Collar, J. I.; Flake, Matthew; Knopf, Michael A.; Pitts, W. K.; Shaver, Mark W.; Sonnenschein, Andrew; Smart, John E.; Todd, Lindsay C.

    2005-10-06

    The results of a Pacific Northwest National Laboratory (PNNL) exploratory research project investigating the feasibility of fast neutron detection using a suitably prepared and operated, pressure-cycled bubble chamber are described. The research was conducted along two parallel paths. Experiments with a slow pressure-release Halon chamber at the Enrico Fermi Institute at the University of Chicago showed clear bubble nucleation sensitivity to an AmBe neutron source and insensitivity to the 662 keV gammas from a 137Cs source. Bubble formation was documented via high-speed (1000 frames/sec) photography, and the acoustic signature of bubble formation was detected using a piezo-electric transducer element mounted on the base of the chamber. The chamber’s neutron sensitivity as a function of working fluid temperature was mapped out. The second research path consisted of the design, fabrication, and testing of a fast pressure-release Freon-134a chamber at PNNL. The project concluded with successful demonstrations of the PNNL chamber’s AmBe neutron source sensitivity and 137Cs gamma insensitivity. The source response tests of the PNNL chamber were documented with high-speed photography.

  19. Novel absorption detection techniques for capillary electrophoresis

    SciTech Connect (OSTI)

    Xue, Y.

    1994-07-27

    Capillary electrophoresis (CE) has emerged as one of the most versatile separation methods. However, efficient separation is not sufficient unless coupled to adequate detection. The narrow inner diameter (I.D.) of the capillary column raises a big challenge to detection methods. For UV-vis absorption detection, the concentration sensitivity is only at the {mu}M level. Most commercial CE instruments are equipped with incoherent UV-vis lamps. Low-brightness, instability and inefficient coupling of the light source with the capillary limit the further improvement of UV-vis absorption detection in CE. The goals of this research have been to show the utility of laser-based absorption detection. The approaches involve: on-column double-beam laser absorption detection and its application to the detection of small ions and proteins, and absorption detection with the bubble-shaped flow cell.

  20. On the Detection of the Free Neutrino

    DOE R&D Accomplishments [OSTI]

    Reines, F.; Cowan, C. L., Jr.

    1953-08-06

    The experiment previously proposed [to Detect the Free Neutrino] has been initiated, with a Hanford pile as a neutrino source. It appears probable that neutrino detection has been accomplished, and confirmatory work is in progress. (K.S.)

  1. Widget:FlashDetect | Open Energy Information

    Open Energy Info (EERE)

    FlashDetect Jump to: navigation, search This widget sets the wgFlashEnabled javascript variable as true and adds the class "flash" to the body tag if Flash is detected using...

  2. Nuclear Detonation Detection | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Research and Development Nuclear Detonation Detection The Office of Nuclear Detonation Detection (NDD) develops and provide continuous, global capabilities to detect foreign nuclear weapon detonations, including for test ban treaty monitoring needs and military requirements. These efforts are aligned along three functional areas: Space-based Detection of Nuclear Detonations: Develops and builds space sensors for the nation's operational nuclear test treaty monitoring and Integrated

  3. Proliferation Detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Proliferation Detection | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the ...

  4. Acoustic enhancement for photo detecting devices

    SciTech Connect (OSTI)

    Thundat, Thomas G; Senesac, Lawrence R; Van Neste, Charles W

    2013-02-19

    Provided are improvements to photo detecting devices and methods for enhancing the sensitivity of photo detecting devices. A photo detecting device generates an electronic signal in response to a received light pulse. An electro-mechanical acoustic resonator, electrically coupled to the photo detecting device, damps the electronic signal and increases the signal noise ratio (SNR) of the electronic signal. Increased photo detector standoff distances and sensitivities will result.

  5. Foreign WMD Proliferation Detection | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    WMD Proliferation Detection | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  6. Final Technical Report: PV Fault Detection Tool.

    SciTech Connect (OSTI)

    King, Bruce Hardison; Jones, Christian Birk

    2015-12-01

    The PV Fault Detection Tool project plans to demonstrate that the FDT can (a) detect catastrophic and degradation faults and (b) identify the type of fault. This will be accomplished by collecting fault signatures using different instruments and integrating this information to establish a logical controller for detecting, diagnosing and classifying each fault.

  7. Intrusion detection using secure signatures

    SciTech Connect (OSTI)

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  8. Oxygen detection using evanescent fields

    DOE Patents [OSTI]

    Duan, Yixiang; Cao, Weenqing

    2007-08-28

    An apparatus and method for the detection of oxygen using optical fiber based evanescent light absorption. Methylene blue was immobilized using a sol-gel process on a portion of the exterior surface of an optical fiber for which the cladding has been removed, thereby forming an optical oxygen sensor. When light is directed through the optical fiber, transmitted light intensity varies as a result of changes in the absorption of evanescent light by the methylene blue in response to the oxygen concentration to which the sensor is exposed. The sensor was found to have a linear response to oxygen concentration on a semi-logarithmic scale within the oxygen concentration range between 0.6% and 20.9%, a response time and a recovery time of about 3 s, ant to exhibit good reversibility and repeatability. An increase in temperature from 21.degree. C. to 35.degree. C. does not affect the net absorption of the sensor.

  9. Vertical flow chemical detection portal

    DOE Patents [OSTI]

    Linker, Kevin L.; Hannum, David W.; Conrad, Frank James

    1999-01-01

    A portal apparatus for screening objects or persons for the presence of trace amounts of chemical substances such as illicit drugs or explosives. The apparatus has a test space, in which a person may stand, defined by two generally upright sides spanned by a horizontal transom. One or more fans in the transom generate a downward air flow (uni-directional) within the test space. The air flows downwardly from a high pressure upper zone, past the object or person to be screened. Air moving past the object dislodges from the surface thereof both volatile and nonvolatile particles of the target substance. The particles are entrained into the air flow which continues flowing downward to a lower zone of reduced pressure, where the particle-bearing air stream is directed out of the test space and toward preconcentrator and detection components. The sides of the portal are specially configured to partially contain and maintain the air flow.

  10. Explosives detection system and method

    DOE Patents [OSTI]

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  11. Ionization detection system for aerosols

    DOE Patents [OSTI]

    Jacobs, Martin E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber.

  12. Vertical flow chemical detection portal

    DOE Patents [OSTI]

    Linker, K.L.; Hannum, D.W.; Conrad, F.J.

    1999-06-22

    A portal apparatus is described for screening objects or persons for the presence of trace amounts of chemical substances such as illicit drugs or explosives. The apparatus has a test space, in which a person may stand, defined by two generally upright sides spanned by a horizontal transom. One or more fans in the transom generate a downward air flow (uni-directional) within the test space. The air flows downwardly from a high pressure upper zone, past the object or person to be screened. Air moving past the object dislodges from the surface thereof both volatile and nonvolatile particles of the target substance. The particles are entrained into the air flow which continues flowing downward to a lower zone of reduced pressure, where the particle-bearing air stream is directed out of the test space and toward preconcentrator and detection components. The sides of the portal are specially configured to partially contain and maintain the air flow. 3 figs.

  13. Detecting torsion from massive electrodynamics

    SciTech Connect (OSTI)

    Garcia de Andrade, L.C.; Lopes, M. )

    1993-11-01

    A new method of detecting torsion in the case of massive electrodynamics is proposed. The method is based on the study of spectral lines of hydrogen-like atoms placed in a torsion field, where the interaction energy between the torsion vector field Q and an electric dipole is given by [epsilon] [approximately] p [center dot] Q. All the methods designed so far have been based on spinning test particles interacting with magnetic fields in which the energy splitting is given by [epsilon] [approximately] S [center dot] B on a Stern-Gerlach type experiment. The authors arrive at an energy splitting of order of [epsilon] [approximately] 10[sup [minus]21]erg[approximately]10[sup [minus]9]eV, which is within the frequency band of radio waves. 15 refs.

  14. Sequential detection of web defects

    DOE Patents [OSTI]

    Eichel, Paul H.; Sleefe, Gerard E.; Stalker, K. Terry; Yee, Amy A.

    2001-01-01

    A system for detecting defects on a moving web having a sequential series of identical frames uses an imaging device to form a real-time camera image of a frame and a comparitor to comparing elements of the camera image with corresponding elements of an image of an exemplar frame. The comparitor provides an acceptable indication if the pair of elements are determined to be statistically identical; and a defective indication if the pair of elements are determined to be statistically not identical. If the pair of elements is neither acceptable nor defective, the comparitor recursively compares the element of said exemplar frame with corresponding elements of other frames on said web until one of the acceptable or defective indications occur.

  15. Spectral analysis method for detecting an element

    DOE Patents [OSTI]

    Blackwood, Larry G [Idaho Falls, ID; Edwards, Andrew J [Idaho Falls, ID; Jewell, James K [Idaho Falls, ID; Reber, Edward L [Idaho Falls, ID; Seabury, Edward H [Idaho Falls, ID

    2008-02-12

    A method for detecting an element is described and which includes the steps of providing a gamma-ray spectrum which has a region of interest which corresponds with a small amount of an element to be detected; providing nonparametric assumptions about a shape of the gamma-ray spectrum in the region of interest, and which would indicate the presence of the element to be detected; and applying a statistical test to the shape of the gamma-ray spectrum based upon the nonparametric assumptions to detect the small amount of the element to be detected.

  16. Industrial Ratepayer-Funded SEP Toolkit | Department of Energy

    Energy Savers [EERE]

    Data Dashboard Indianapolis Data Dashboard The data dashboard for Indianapolis, a partner in the Better Buildings Neighborhood Program. Indianapolis Data Dashboard (301.3 KB) More Documents & Publications Austin Energy Data Dashboard Massachusetts -- SEP Data Dashboard Phoenix, Arizona Data Dashboard

    Indianapolis Offers a Lesson on Driving Demand Indianapolis Offers a Lesson on Driving Demand The flier for EcoHouse, with the headline 'Save energy, save money, improve your home' and the

  17. USAID Toolkit for Increasing Energy Access | Open Energy Information

    Open Energy Info (EERE)

    Change (UNFCCC), UNEP, United Nations Foundation Sector: Energy Focus Area: Renewable Energy, Energy Efficiency, People and Policy Phase: Evaluate Options, Develop Goals, Prepare...

  18. Hands-on Energy Adaptation Toolkit (HEAT) | Open Energy Information

    Open Energy Info (EERE)

    Management Assistance Program of the World Bank Sector: Energy Focus Area: Renewable Energy Topics: Adaptation, Implementation, Pathways analysis Resource Type: Guidemanual...

  19. Renewable Energy Technical Potential Toolkit | Open Energy Information

    Open Energy Info (EERE)

    as suitable for development and applies current technology energy conversion efficiency to the available resource in those areas. As renewable technologies improve...

  20. THYME: Toolkit for Hybrid Modeling of Electric Power Systems

    Energy Science and Technology Software Center (OSTI)

    2011-01-01

    THYME is an object oriented library for building models of wide area control and communications in electric power systems. This software is designed as a module to be used with existing open source simulators for discrete event systems in general and communication systems in particular. THYME consists of a typical model for simulating electro-mechanical transients (e.g., as are used in dynamic stability studies), data handling objects to work with CDF and PTI formatted power flowmore » data, and sample models of discrete sensors and controllers.« less