National Library of Energy BETA

Sample records for buffer overflow vulnerability

  1. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  2. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  3. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability U-207: Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability...

  4. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  5. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  6. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities

  7. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability...

  8. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability PLATFORM: Versions 7.1.1 through 7.1.2.5, 8.0, and 8.0.0.1. ABSTRACT: A vulnerability was reported in IBM...

  9. Detecting buffer overflows using testcase synthesis and code instrumentation

    E-Print Network [OSTI]

    Zhivich, Michael A

    2005-01-01

    The research presented in this thesis aims to improve existing approaches to dynamic buffer overflow detection by developing a system that utilizes code instrumentation and adaptive test case synthesis to find buffer ...

  10. Using Program Transformation to Secure C Programs Against Buffer Overflows Christopher Dahn, Spiros Mancoridis

    E-Print Network [OSTI]

    Mancoridis, Spiros

    Using Program Transformation to Secure C Programs Against Buffer Overflows Christopher Dahn, Spiros Christopher.Stephen.Dahn, Spiros.Mancoridis¡ @drexel.edu Abstract Buffer overflows are the most common source

  11. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...

    Broader source: Energy.gov (indexed) [DOE]

    Pidgin Multiple Vulnerabilities T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities...

  12. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  13. BUFFER OVERFLOW ASYMPTOTICS FOR A BUFFER HANDLING MANY TRAFFIC SOURCES

    E-Print Network [OSTI]

    Weber, Richard

    that cells are lost when the buffer is full, and the maximization insu to the ideas of ATM (asynchronous transfer mode), data is packaged into cells of fixed size which are Received, and they are bursty, in the sense that the rate at which cells are produced by a source is not constant

  14. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  15. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Broader source: Energy.gov (indexed) [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based...

  16. A Taxonomy of Buffer Overflows for Evaluating Static and Dynamic Software Testing Tools*

    E-Print Network [OSTI]

    A Taxonomy of Buffer Overflows for Evaluating Static and Dynamic Software Testing Tools* Kendra Phone: 7819812711 Email: LIPPMANN@LL.MIT.EDU ABSTRACT A taxonomy that uses 22 attributes detection tools. Attributes in the taxonomy include the buffer location (e.g. stack, heap, data

  17. V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have

  18. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartment ofDepartment

  19. T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

  20. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerability | Department

  1. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemoteofDepartment of

  2. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland| Department of| Department

  3. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1: Oracle SolarisDepartment of

  4. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartment ofEnergy

  5. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergy

  6. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  7. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems

    E-Print Network [OSTI]

    Sekar, R.

    such as those due to worms, these protection mechanisms lead to re- peated restarts of the victim application- ploit the same vulnerability. An important benefit of self-healing is that it avoids system resources]. Although these techniques can de- tect attacks before vital system resources (such as files

  8. 1) Buffer overflows 2) Baggy bounds checking

    E-Print Network [OSTI]

    permissions on those (ACL, Unix) · MAC: Mandatory Access Control · Objects are tagged (public, secret, top-secret) · Users are cleared to certain tags · Actions controlled by policies (secret -> public) #12;Capabilities

  9. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  10. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment of Energy

  11. Burst Buffer

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury Science Museum6 Shares of U.S.6 201022Buffer Burst Buffer

  12. Molecular Foundry Workshop draws overflow crowd to Berkeley Lab

    E-Print Network [OSTI]

    Robinson, Art

    2002-01-01

    Lab), Director of the Moleular Foundry, introduces workshopMolecular Foundry Workshop Draws Overflow Crowd to Berkeleyfor the new Molecular Foundry during a two-day workshop at

  13. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    OIL & GAS FIELD OUTLINES FROM BUFFERED WELLS The VBA Code below builds oil & gas field boundary outlines (polygons) from buffered wells (points). Input well points layer must be a...

  14. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Broader source: Energy.gov (indexed) [DOE]

    a memory corruption error and execute arbitrary code on the target system. IMPACT: Access control error SOLUTION: vendor recommends upgrading to version 16.0.3.51 Addthis...

  15. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric System Municipalization

  16. V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScriptingDepartmentAttacks

  17. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland 2012SystemSecurityScripting(IDS)

  18. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at the Pu2:Servers

  19. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at

  20. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department of

  1. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommands on|6:

  2. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar through the YearsUsers

  3. Overflows and upper ocean interactions : a mechanism for the Azores current

    E-Print Network [OSTI]

    Kida, Shinichiro

    2006-01-01

    The oceanic response to overflows is explored using a two-layer isopycnal model. Overflows are a major source of the dense water of the global deep ocean, originating from only a few marginal seas. They enter the open ocean ...

  4. COMBINED SEWER OVERFLOW INVENTORY FOR THE FRASER RIVER BASIN AND BURRARD INLET

    E-Print Network [OSTI]

    #12;I \\ COMBINED SEWER OVERFLOW INVENTORY FOR THE FRASER RIVER BASIN AND BURRARD INLET DOE FRAP ......................................... COMBINED SEWER OVERFLOWS IN STUDY AmEA ............... INVENTORY OF AVAILABLE CSO DATA and non- point effluent sources. Combined sewer overflow discharges represent point sources of pollution

  5. Water column structure and statistics of Denmark Strait Overflow Water cyclones

    E-Print Network [OSTI]

    Pickart, Robert S.

    Water column structure and statistics of Denmark Strait Overflow Water cyclones Wilken-Jon von November 2013 Keywords: Denmark Strait overflow water cyclone East Greenland boundary current system East the characteristics and dynamics of Denmark Strait Overflow Water (DSOW) cyclones. On average, a cyclone passes

  6. How Do API Changes Trigger Stack Overflow Discussions? A Study on the Android SDK

    E-Print Network [OSTI]

    Poshyvanyk, Denys

    How Do API Changes Trigger Stack Overflow Discussions? A Study on the Android SDK Mario LinaresOverflow highlights an increasing interest of software developers in mobile programming. For the Android platform, 213,836 questions were tagged with Android-related labels in StackOverflow between July 2008 and August 2012

  7. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Savingof Energy 5: Apple

  8. Author's personal copy Sensitivity of the Atlantic Ocean circulation to a hydraulic overflow

    E-Print Network [OSTI]

    Levermann, Anders

    Author's personal copy Sensitivity of the Atlantic Ocean circulation to a hydraulic overflow the explicit representation of the overflows using a parameterisation by hydraulic constraints and compare circulation (AMOC) (Redler and Böning, 1997; Kuhlbrodt et al., 2007). The potential energy stored in the dense

  9. Atmospheric pressure plasma jets beyond ground electrode as charge overflow in a dielectric barrier discharge setup

    E-Print Network [OSTI]

    Zexian, Cao

    Atmospheric pressure plasma jets beyond ground electrode as charge overflow in a dielectric barrier voltage and the width of ground electrode, atmospheric pressure plasma jets extending beyond the ground, 013308 2009 . Here, we show that, by using narrower ground electrodes, such an overflow jet can

  10. Riparian Buffers for Wildlife Benefits of Riparian Buffers

    E-Print Network [OSTI]

    Boyer, Elizabeth W.

    , develop- ment, and recreation. Losing these buffers has negatively affected wildlife habitat and water the information you will need to create an effective riparian buffer for wildlife while pro- tecting water quality for wildlife; but they also improve water quality for humans. In general, the wider and more diversely planted

  11. Laboratory Investigation of Entrainment and Mixing in Oceanic Overflows

    E-Print Network [OSTI]

    Philippe, Odier; Ecke, Robert E

    2013-01-01

    We present experimental measurements of a wall-bounded gravity current, motivated by characterizing natural gravity currents such as oceanic overflows. We use particle image velocimetry and planar laser-induced fluorescence to simultaneously measure the velocity and density fields as they evolve downstream of the initial injection from a turbulent channel flow onto a plane inclined at 10$^\\circ$ with respect to horizontal. The turbulence level of the input flow is controlled by injecting velocity fluctuations upstream of the output nozzle. The initial Reynolds number based on Taylor microscale of the flow, R$_\\lambda$, is varied between 40 and 120, and the effects of the initial turbulence level are assessed. The bulk Richardson number $Ri$ for the flow is about 0.3 whereas the gradient Richardson number $Ri_g$ varies between 0.04 and 0.25, indicating that shear dominates the stabilizing effect of stratification. Kelvin-Helmholtz instability results in vigorous vertical transport of mass and momentum. We pres...

  12. Electrodialysis operation with buffer solution

    DOE Patents [OSTI]

    Hryn, John N. (Naperville, IL); Daniels, Edward J. (Orland Park, IL); Krumdick, Greg K. (Crete, IL)

    2009-12-15

    A new method for improving the efficiency of electrodialysis (ED) cells and stacks, in particular those used in chemical synthesis. The process entails adding a buffer solution to the stack for subsequent depletion in the stack during electrolysis. The buffer solution is regenerated continuously after depletion. This buffer process serves to control the hydrogen ion or hydroxide ion concentration so as to protect the active sites of electrodialysis membranes. The process enables electrodialysis processing options for products that are sensitive to pH changes.

  13. Enhanced Bipolar Stacked Switched Capacitor Energy Buffers

    E-Print Network [OSTI]

    Perreault, Dave

    inverters, electric vehicle chargers and off- line LED drivers) need energy storage to provide buffering

  14. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  15. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  16. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  17. Distributed Flow Control using Embedded Sensor-Actuator Networks for the Reduction of Combined Sewer Overflow (CSO) Events

    E-Print Network [OSTI]

    Lemmon, Michael

    Sewer Overflow (CSO) Events Pu Wan, Michael D. Lemmon Abstract-- This paper studies the distributed the frequency of combined sewer overflow (CSO) events in city sewer systems. This is an important environmental microprocessor controlled sensors and actuators directly into the sewer network. These embedded processors

  18. Securing software : an evaluation of static source code analyzers

    E-Print Network [OSTI]

    Zitser, Misha, 1979-

    2003-01-01

    This thesis evaluated five static analysis tools--Polyspace C Verifier, ARCHER, BOON, Splint, and UNO--using 14 code examples that illustrated actual buffer overflow vulnerabilities found in various versions of Sendmail, ...

  19. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  20. Response of the Greenland-Scotland overflow to changing deep water supply from the Arctic Mediterranean

    E-Print Network [OSTI]

    Response of the Greenland-Scotland overflow to changing deep water supply from the Arctic to changes in the available volume of deep and intermediate waters in the Nordic Seas. Hydraulic control sensitive to changes in the deep water supply than that of the Faeroe-Bank Channel, but no sudden breakdown

  1. Neogene overflow of Northern Component Water at the Greenland-Scotland Ridge

    E-Print Network [OSTI]

    Samworth, Richard

    EQ, UK [1] In the North Atlantic Ocean, flow of North Atlantic Deep Water (NADW), and of its ancient the three major deep water masses (i.e., Northern Component Water, Southern Ocean Water, and Pacific OceanNeogene overflow of Northern Component Water at the Greenland-Scotland Ridge H. R. Poore Department

  2. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  3. Stacked Switched Capacitor Energy Buffer Architecture

    E-Print Network [OSTI]

    Perreault, Dave

    in Fig. 1. Applications for such buffering include power supplies, solar photovoltaic inverters, electric), to absorb and supply the energy, Eb, indicated by the shaded area in (b). Since the peak buffered energy

  4. Stacked switched capacitor energy buffer architecture

    E-Print Network [OSTI]

    Chen, Minjie, S.M. Massachusetts Institute of Technology

    2012-01-01

    Electrolytic capacitors are often used for energy buffering applications, including buffering between single-phase ac and dc. While these capacitors have high energy density compared to film and ceramic capacitors, their ...

  5. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  6. Burst Buffer Early User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury Science Museum6 Shares of U.S.6 201022Buffer Burst

  7. Removal of nutrients from combined sewer overflows and lake water in a vertical-flow constructed wetland system

    E-Print Network [OSTI]

    Brix, Hans

    and human activities in the catch- ment of the lakes, the water quality is often poor and reduces. Combined sewer overflows occur during rain events when large amounts of rainwater are added to the normal

  8. Buffered Electrochemical Polishing of Niobium

    SciTech Connect (OSTI)

    Gianluigi Ciovati, Hui Tian, Sean Corcoran

    2011-03-01

    The standard preparation of superconducting radio-frequency (SRF) cavities made of pure niobium include the removal of a 'damaged' surface layer, by buffered chemical polishing (BCP) or electropolishing (EP), after the cavities are formed. The performance of the cavities is characterized by a sharp degradation of the quality factor when the surface magnetic field exceeds about 90 mT, a phenomenon referred to as 'Q-drop'. In cavities made of polycrystalline fine grain (ASTM 5) niobium, the Q-drop can be significantly reduced by a low-temperature ({approx} 120 C) 'in-situ' baking of the cavity if the chemical treatment was EP rather than BCP. As part of the effort to understand this phenomenon, we investigated the effect of introducing a polarization potential during buffered chemical polishing, creating a process which is between the standard BCP and EP. While preliminary results on the application of this process to Nb cavities have been previously reported, in this contribution we focus on the characterization of this novel electrochemical process by measuring polarization curves, etching rates, surface finish, electrochemical impedance and the effects of temperature and electrolyte composition. In particular, it is shown that the anodic potential of Nb during BCP reduces the etching rate and improves the surface finish.

  9. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  10. Networks, Buffer Allocation Problem typeset May 18, 2004 Smith & Cruz The Buffer Allocation Problem for

    E-Print Network [OSTI]

    Cruz, Frederico

    Networks, Buffer Allocation Problem typeset May 18, 2004 Smith & Cruz The Buffer Allocation Problem-mail: fcruz@ufmg.br May 18, 2004 Abstract -- The Buffer Allocation Problem (BAP) is a difficult stochastic, integer, nonlinear program- ming problem. In general, the objective function and constraints

  11. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  12. Early Users to Test New Burst Buffer on Cori

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Early Users to Test New Burst Buffer on Cori Early Users to Test New Burst Buffer on Cori Designed to Accelerate IO Performance October 5, 2015 | Tags: Burst Buffer, Cori...

  13. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  14. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  15. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  16. Stacked Switched Capacitor Energy Buffer Architecture

    E-Print Network [OSTI]

    Perreault, Dave

    , as illustrated in Fig. 1. Applications for such buffering include power supplies, solar photovoltaic inverters, Eb, indicated by the shaded area in (b). frequency of a power electronic converter interfacing

  17. Buffer assignment algorithms for data driven architectures 

    E-Print Network [OSTI]

    Chatterjee, Mitrajit

    1994-01-01

    Data driven architectures designed to achieve high performance and throughput require the corresponding data flow graph to have no accumulation of data at its nodes and simultaneous arrival of all input data to a multi-input node. Buffers...

  18. Buffer layer for thin film structures

    DOE Patents [OSTI]

    Foltyn, Stephen R.; Jia, Quanxi; Arendt, Paul N.; Wang, Haiyan

    2010-06-15

    A composite structure including a base substrate and a layer of a mixture of strontium titanate and strontium ruthenate is provided. A superconducting article can include a composite structure including an outermost layer of magnesium oxide, a buffer layer of strontium titanate or a mixture of strontium titanate and strontium ruthenate and a top-layer of a superconducting material such as YBCO upon the buffer layer.

  19. Buffer layer for thin film structures

    DOE Patents [OSTI]

    Foltyn, Stephen R.; Jia, Quanxi; Arendt, Paul N.; Wang, Haiyan

    2006-10-31

    A composite structure including a base substrate and a layer of a mixture of strontium titanate and strontium ruthenate is provided. A superconducting article can include a composite structure including an outermost layer of magnesium oxide, a buffer layer of strontium titanate or a mixture of strontium titanate and strontium ruthenate and a top-layer of a superconducting material such as YBCO upon the buffer layer.

  20. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  1. Burst Buffer Architecture and Software Roadmap

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury Science Museum6 Shares of U.S.6 201022Buffer Burst Buffer

  2. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  3. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  4. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  5. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  6. Technical Report On Buffered Clos Switches

    E-Print Network [OSTI]

    Technical Report On Buffered Clos Switches Santosh Krishnan Henning G. Schulzrinne Department There is a widespread interest in switching architectures that can scale in capacity with increasing interface transmission rates and higher port counts. Furthermore, packet switches that provide Quality of Service (Qo

  7. Design and synthesis of novel isoelectric buffers 

    E-Print Network [OSTI]

    Lalwani, Sanjiv Kumar Shankerdass

    2006-04-12

    and served as effective cathodic membranes for the IET of small ampholytic molecules and proteins. In pH-biased IET, proteins are collected into solutions of isoelectric buffers that set the pH to keep the proteins in a charged state affording high solubility...

  8. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  9. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  10. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  11. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  12. Tidally-driven Roche-Lobe Overflow of Hot Jupiters with MESA

    E-Print Network [OSTI]

    Valsecchi, Francesca; Rasio, Frederic A; Marchant, Pablo; Rogers, Leslie A

    2015-01-01

    Many exoplanets have now been detected in orbits with ultra-short periods, very close to the Roche limit. Building upon our previous work, we study the possibility that mass loss through Roche lobe overflow (RLO) may affect the evolution of these planets, and could possibly transform a hot Jupiter into a lower-mass planet (hot Neptune or super-Earth). We focus here on systems in which the mass loss occurs slowly ("stable mass transfer" in the language of binary star evolution) and we compute their evolution in detail with the binary evolution code MESA. We include the effects of tides, RLO, irradiation and photo-evaporation of the planet, as well as the stellar wind and magnetic braking. Our calculations all start with a hot Jupiter close to its Roche limit, in orbit around a sun-like star. The initial orbital decay and onset of RLO are driven by tidal dissipation in the star. We confirm that such a system can indeed evolve to produce lower-mass planets in orbits of a few days. The RLO phase eventually ends a...

  13. Optimal buffer control during congestion in an ATM network node *

    E-Print Network [OSTI]

    Panwar, Shivendra S.

    scheme which creates cells with different priorit.ies[G]. When a cell finds the buffer full upon itr the number of cells to be st,ored in the buffer exceeds the available buffer space, ccriaiii cells have to be dropped. Different traffic classes have different sensitivities to cell losses. By a

  14. GIS Fundamentals Lesson 8: Buffering and Overlay Lesson 8: Buffering and Overlay in ArcGIS -ArcMAP

    E-Print Network [OSTI]

    Butler, Christopher J.

    GIS Fundamentals Lesson 8: Buffering and Overlay Lesson 8: Buffering and Overlay in ArcGIS - Arc. You should read chapter 9 in the GIS Fundamentals textbook. Data: All data are in \\L9 subdirectory within the bounds of an "in" polygon. 1 #12;GIS Fundamentals Lesson 8: Buffering and Overlay Surface DIST

  15. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  16. Buffer for a gamma-insensitive optical sensor with gas and a buffer assembly

    DOE Patents [OSTI]

    Kruger, H.W.

    1994-05-10

    A buffer assembly is disclosed for a gamma-insensitive gas avalanche focal plane array operating in the ultra-violet/visible/infrared energy wavelengths and using a photocathode and an avalanche gas located in a gap between an anode and the photocathode. The buffer assembly functions to eliminate chemical compatibility between the gas composition and the materials of the photocathode. The buffer assembly in the described embodiment is composed of two sections, a first section constructed of glass honeycomb under vacuum and a second section defining a thin barrier film or membrane constructed, for example, of Al and Be, which is attached to and supported by the honeycomb. The honeycomb section, in turn, is supported by and adjacent to the photocathode. 7 figures.

  17. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  18. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  19. Competitive Parallel Disk Prefetching and Buffer Management

    E-Print Network [OSTI]

    Barve, Rakesh; Kallahalla, Mahesh; Varman, Peter J.; Vitter, Jeffrey Scott

    2000-01-01

    Competitive Parallel Disk Prefetching and Buffer Managementa0 Rakesh Barvea1 Mahesh Kallahallaa2 Peter J. Varmana2 Jeffrey Scott Vittera3 rbarve@cs.duke.edu kalla@rice.edu pjv@rice.edu jsv@cs.duke.edu Dept. of CS Dept. of ECE Dept. of ECE Dept. of CS Duke... descriptions of I/O performance metrics, lookahead models, and parallel disk configura- tions are given in section 1.1. Our parallel prefetching algorithms NOM and GREED are described 3 in section 1.2. In section 2, we discuss practical situations in which...

  20. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  1. System and method for implementing periodic early discard in on-chip buffer memories of network elements

    DOE Patents [OSTI]

    Francini, Andrea

    2013-05-14

    An advance is made over the prior art in accordance with the principles of the present invention that is directed to a new approach for a system and method for a buffer management scheme called Periodic Early Discard (PED). The invention builds on the observation that, in presence of TCP traffic, the length of a queue can be stabilized by selection of an appropriate frequency for packet dropping. For any combination of number of TCP connections and distribution of the respective RTT values, there exists an ideal packet drop frequency that prevents the queue from over-flowing or under-flowing. While the value of the ideal packet drop frequency may quickly change over time and is sensitive to the series of TCP connections affected by past packet losses, and most of all is impossible to compute inline, it is possible to approximate it with a margin of error that allows keeping the queue occupancy within a pre-defined range for extended periods of time. The PED scheme aims at tracking the (unknown) ideal packet drop frequency, adjusting the approximated value based on the evolution of the queue occupancy, with corrections of the approximated packet drop frequency that occur at a timescale that is comparable to the aggregate time constant of the set of TCP connections that traverse the queue.

  2. Back contact buffer layer for thin-film solar cells

    DOE Patents [OSTI]

    Compaan, Alvin D.; Plotnikov, Victor V.

    2014-09-09

    A photovoltaic cell structure is disclosed that includes a buffer/passivation layer at a CdTe/Back contact interface. The buffer/passivation layer is formed from the same material that forms the n-type semiconductor active layer. In one embodiment, the buffer layer and the n-type semiconductor active layer are formed from cadmium sulfide (CdS). A method of forming a photovoltaic cell includes the step of forming the semiconductor active layers and the buffer/passivation layer within the same deposition chamber and using the same material source.

  3. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  4. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  5. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  6. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  7. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  8. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  9. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  10. ASIC UTOPIA Buffer Management and Flow Control in

    E-Print Network [OSTI]

    Steenkiste, Peter

    DRAM PCI SONET 155 or 622 i960 SRAM ATM ASIC UTOPIA bridge Buffer Management and Flow Control the architecture of a PCI bus host adapter for OC­3 and OC­12 ATM, focusing on challenges in the areas of buffer endpoint hosts. 1 Introduction This paper describes the architecture and implementation of the Credit Net

  11. Methods for improved growth of group III nitride buffer layers

    DOE Patents [OSTI]

    Melnik, Yurity; Chen, Lu; Kojiri, Hidehiro

    2014-07-15

    Methods are disclosed for growing high crystal quality group III-nitride epitaxial layers with advanced multiple buffer layer techniques. In an embodiment, a method includes forming group III-nitride buffer layers that contain aluminum on suitable substrate in a processing chamber of a hydride vapor phase epitaxy processing system. A hydrogen halide or halogen gas is flowing into the growth zone during deposition of buffer layers to suppress homogeneous particle formation. Some combinations of low temperature buffers that contain aluminum (e.g., AlN, AlGaN) and high temperature buffers that contain aluminum (e.g., AlN, AlGaN) may be used to improve crystal quality and morphology of subsequently grown group III-nitride epitaxial layers. The buffer may be deposited on the substrate, or on the surface of another buffer. The additional buffer layers may be added as interlayers in group III-nitride layers (e.g., GaN, AlGaN, AlN).

  12. Modeling Buffers with Data Refresh Semantics in Automotive Architectures

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Modeling Buffers with Data Refresh Semantics in Automotive Architectures Linh T.X. Phan1 Reinhard,lee}@cis.upenn.edu reinhard.schneider@rcs.ei.tum.de samarjit@tum.de ABSTRACT Automotive architectures consist of multiple estimate various timing and perfor- mance metrics for automotive ECU networks consisting of buffers

  13. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  14. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  15. Replenishing data descriptors in a DMA injection FIFO buffer

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Cernohous, Bob R. (Rochester, MN); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN)

    2011-10-11

    Methods, apparatus, and products are disclosed for replenishing data descriptors in a Direct Memory Access (`DMA`) injection first-in-first-out (`FIFO`) buffer that include: determining, by a messaging module on an origin compute node, whether a number of data descriptors in a DMA injection FIFO buffer exceeds a predetermined threshold, each data descriptor specifying an application message for transmission to a target compute node; queuing, by the messaging module, a plurality of new data descriptors in a pending descriptor queue if the number of the data descriptors in the DMA injection FIFO buffer exceeds the predetermined threshold; establishing, by the messaging module, interrupt criteria that specify when to replenish the injection FIFO buffer with the plurality of new data descriptors in the pending descriptor queue; and injecting, by the messaging module, the plurality of new data descriptors into the injection FIFO buffer in dependence upon the interrupt criteria.

  16. Mitigation of substrate defects in reticles using multilayer buffer layers

    DOE Patents [OSTI]

    Mirkarimi, Paul B. (Sunol, CA); Bajt, Sasa (Livermore, CA); Stearns, Daniel G. (Los Altos, CA)

    2001-01-01

    A multilayer film is used as a buffer layer to minimize the size of defects on a reticle substrate prior to deposition of a reflective coating on the substrate. The multilayer buffer layer deposited intermediate the reticle substrate and the reflective coating produces a smoothing of small particles and other defects on the reticle substrate. The reduction in defect size is controlled by surface relaxation during the buffer layer growth process and by the degree of intermixing and volume contraction of the materials at the multilayer interfaces. The buffer layers are deposited at near-normal incidence via a low particulate ion beam sputtering process. The growth surface of the buffer layer may also be heated by a secondary ion source to increase the degree of intermixing and improve the mitigation of defects.

  17. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  18. Buffer layers for REBCO films for use in superconducting devices

    SciTech Connect (OSTI)

    Goyal, Amit; Wee, Sung-Hun

    2014-06-10

    A superconducting article includes a substrate having a biaxially textured surface. A biaxially textured buffer layer, which can be a cap layer, is supported by the substrate. The buffer layer includes a double perovskite of the formula A.sub.2B'B''O.sub.6, where A is rare earth or alkaline earth metal and B' and B'' are different transition metal cations. A biaxially textured superconductor layer is deposited so as to be supported by the buffer layer. A method of making a superconducting article is also disclosed.

  19. Enhanced adhesion for LIGA microfabrication by using a buffer layer

    DOE Patents [OSTI]

    Bajikar, Sateesh S.; De Carlo, Francesco; Song, Joshua J.

    2004-01-27

    The present invention is an improvement on the LIGA microfabrication process wherein a buffer layer is applied to the upper or working surface of a substrate prior to the placement of a resist onto the surface of the substrate. The buffer layer is made from an inert low-Z material (low atomic weight), a material that absorbs secondary X-rays emissions from the substrate that are generated from the substrate upon exposure to a primary X-rays source. Suitable materials for the buffer layer include polyamides and polyimide. The preferred polyimide is synthesized form pyromellitic anhydride and oxydianiline (PMDA-ODA).

  20. Enhanced adhesion for LIGA microfabrication by using a buffer layer

    DOE Patents [OSTI]

    Bajikar, Sateesh S. (San Jose, CA); De Carlo, Francesco (Darien, IL); Song, Joshua J. (Naperville, IL)

    2001-01-01

    The present invention is an improvement on the LIGA microfabrication process wherein a buffer layer is applied to the upper or working surface of a substrate prior to the placement of a resist onto the surface of the substrate. The buffer layer is made from an inert low-Z material (low atomic weight), a material that absorbs secondary X-rays emissions from the substrate that are generated from the substrate upon exposure to a primary X-rays source. Suitable materials for the buffer layer include polyamides and polyimide. The preferred polyimide is synthesized form pyromellitic anhydride and oxydianiline (PMDA-ODA).

  1. Smart buildings with electric vehicle interconnection as buffer for local renewables?

    E-Print Network [OSTI]

    Stadler, Michael

    2012-01-01

    as buffer for local renewables? Michael Stadler, Gonçaloas buffer for local renewables? *) Michael Stadler Gonçaloowners to integrate renewables and electric vehicles?

  2. Optimal control of wireless networks with finite buffers

    E-Print Network [OSTI]

    Le, Long Bao

    This paper considers network control for wireless networks with finite buffers. We investigate the performance of joint flow control, routing, and scheduling algorithms which achieve high network utility and deterministically ...

  3. Optimizing the availability of a buffered industrial process

    DOE Patents [OSTI]

    Martz, Jr., Harry F.; Hamada, Michael S.; Koehler, Arthur J.; Berg, Eric C.

    2004-08-24

    A computer-implemented process determines optimum configuration parameters for a buffered industrial process. A population size is initialized by randomly selecting a first set of design and operation values associated with subsystems and buffers of the buffered industrial process to form a set of operating parameters for each member of the population. An availability discrete event simulation (ADES) is performed on each member of the population to determine the product-based availability of each member. A new population is formed having members with a second set of design and operation values related to the first set of design and operation values through a genetic algorithm and the product-based availability determined by the ADES. Subsequent population members are then determined by iterating the genetic algorithm with product-based availability determined by ADES to form improved design and operation values from which the configuration parameters are selected for the buffered industrial process.

  4. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  5. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  6. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  7. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  8. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  9. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  10. Quasi-Output-Buffered Switches Cheng-Shang Chang, Fellow, IEEE, Jay Cheng, Senior Member, IEEE,

    E-Print Network [OSTI]

    Chang, Cheng-Shang

    1 Quasi-Output-Buffered Switches Cheng-Shang Chang, Fellow, IEEE, Jay Cheng, Senior Member, IEEE-buffered switches have better performance than other switch architectures. However, output-buffered switches also-buffered switches are difficult. In this paper, we study the problem of constructing scalable switches that have

  11. Performance of Shared Buffer Switches Under NonUniform Traffic Pattern

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    Performance of Shared Buffer Switches Under Non­Uniform Traffic Pattern Mahmoud Saleh Mohammed@cs.latrobe.edu.au ABSTRACT ATM switches based on shared buffering are known to have better performance and buffer uti­ lization than input or output queued switches. Al­ though shared buffer switches do not suffer from head

  12. An accurate performance model of shared buffer ATM switches under hot spot traffic

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    An accurate performance model of shared buffer ATM switches under hot spot traffic M. Saleha , M Abstract Asynchronous transfer mode (ATM) switches based on shared buffering are known to have better performance and buffer utilization than input or output queued switches. Shared buffer switches do not suffer

  13. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  14. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  15. Rare earth zirconium oxide buffer layers on metal substrates

    DOE Patents [OSTI]

    Williams, Robert K. (Knoxville, TN); Paranthaman, Mariappan (Knoxville, TN); Chirayil, Thomas G. (Knoxville, TN); Lee, Dominic F. (Knoxville, TN); Goyal, Amit (Knoxville, TN); Feenstra, Roeland (Knoxville, TN)

    2001-01-01

    A laminate article comprises a substrate and a biaxially textured (RE.sub.x A.sub.(1-x)).sub.2 O.sub.2-(x/2) buffer layer over the substrate, wherein 0buffer layer can be deposited using sol-gel or metal-organic decomposition. The laminate article can include a layer of YBCO over the (RE.sub.x A.sub.(1-x)).sub.2 O.sub.2-(x/2) buffer layer. A layer of CeO.sub.2 between the YBCO layer and the (RE.sub.x A.sub.(1-x)).sub.2 O.sub.2-(x/2) buffer layer can also be include. Further included can be a layer of YSZ between the CeO.sub.2 layer and the (RE.sub.x A.sub.(1-x)).sub.2 O.sub.2-(x/2) buffer layer. The substrate can be a biaxially textured metal, such as nickel. A method of forming the laminate article is also disclosed.

  16. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  17. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  18. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  19. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  20. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  1. Fifteenmile Creek Riparian Buffers Project, Annual Report 2002-2003.

    SciTech Connect (OSTI)

    Graves, Ron

    2004-02-01

    This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Fifteenmile Subbasin Summary, June 30, 2000. The project is providing the technical planning support needed to implement at least 36 riparian buffer system contracts on approximately 872 acres covering an estimated 40 miles of anadromous fish streams over a three year period. During this second year of the project, 11 buffer contracts were implemented on 10.9 miles of stream. Buffer widths averaged 132 ft. on each side of the stream. Implementation included prescribed plantings, fencing, and related practices. Actual implementation costs, lease payments, and maintenance costs are borne by existing USDA programs: Conservation Reserve and Conservation Reserve Enhancement Programs. The lease period of each contract may vary between 10 to 15 years. During this year the average was 14.6 years. The total value of contracts established this year is $666,121 compared with $71,115 in Bonneville Power Administration (BPA) contract costs to provide the technical support needed to get the contracts implemented. This project provides technical staffing to conduct assessments and develop plans to help keep pace with the growing backlog of potential riparian buffer projects. Word of mouth from satisfied customers has brought in many new sign-ups during the year. In addition, specific outreach efforts targeting the orchard areas of the county began to bear fruit with orchardists sign-ups as the project year ended. Progress this second year of project includes only work accomplished in the Fifteenmile subbasin. A similar but separate effort to implement buffers in the Columbia Plateau Province was initiated during the year under project number 2002-019-00. This project supports RPA 150 and 153 as required under the Federal Hydropower System biological opinion.

  2. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  3. Maximizing Throughput in Wireless Networks with Finite Internal Buffers

    E-Print Network [OSTI]

    Chang, Cheng-Shang

    Maximizing Throughput in Wireless Networks with Finite Internal Buffers Ching-Min Lien, Cheng of a discrete-time wireless network, where only certain sets of links can transmit simultaneously. It is well of the configuration vectors determines the capacity region of the wireless network. In the literature, packet

  4. Predictive Line Buffer: A fast, Energy Efficient Cache Architecture

    E-Print Network [OSTI]

    Aboelaze, Mokhtar

    . In this paper, we propose a new cache architecture that results in a faster memory access and lower energy memory access time, and energy consuption. In this paper, we propose a new cache architecturePredictive Line Buffer: A fast, Energy Efficient Cache Architecture Kashif Ali MoKhtar Aboelaze

  5. Energy Efficient Prefetching with Buffer Disks for Cluster File Systems

    E-Print Network [OSTI]

    Qin, Xiao

    Energy Efficient Prefetching with Buffer Disks for Cluster File Systems Adam Manzanares, Xiaojun the energy- efficiency of large scale parallel storage systems. To address these issues we introduce EEVFS (Energy Efficient Virtual File System), which is able to manage data placement and disk states to help

  6. GPU Accelerated Voxel Traversal using the Prediction Buffer Colin Braley

    E-Print Network [OSTI]

    Cao, Yong

    GPU Accelerated Voxel Traversal using the Prediction Buffer Colin Braley Virginia Tech Robert Hagan Virginia Tech Yong Cao Virginia Tech Denis Gracanin Virginia Tech Figure 1: The rendered iso size of data sets for scientific and medical vi- sualization demands new isosurface volume rendering

  7. Thread Row Buffers: Improving Memory Performance Isolation and Throughput

    E-Print Network [OSTI]

    Tullsen, Dean M.

    and energy efficiency. Furthermore, concurrent execution of applications also has shown the needThread Row Buffers: Improving Memory Performance Isolation and Throughput in Multiprogrammed of performance isolation among threads in the memory controller to enforce a quality of service in virtualized

  8. Buffered Crossbar Fabrics Based on Networks on Chip

    E-Print Network [OSTI]

    switching architecture where the buffered crossbar fabric is designed using a Network on Chip (NoC). Instead the switch inputs to its outputs. This results in long delays and consumes high power to drive these wires. In this paper, we propose a novel design for the CICQ switch architecture. Instead of using a dedicated internal

  9. Optimizing buffer sizes for pipeline workflow scheduling with setup times

    E-Print Network [OSTI]

    Benoit, Anne

    Optimizing buffer sizes for pipeline workflow scheduling with setup times Anne Benoit1, Jean real-life applications have a linear pipelined struc- ture, where each data set must go through all (data sets) enters the pipeline and must go through several stages such as filters, encoders, and so

  10. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  11. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  12. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  13. Experimental Study of High-Z Gas Buffers in Gas-Filled ICF Engines...

    Office of Scientific and Technical Information (OSTI)

    Experimental Study of High-Z Gas Buffers in Gas-Filled ICF Engines Citation Details In-Document Search Title: Experimental Study of High-Z Gas Buffers in Gas-Filled ICF Engines ...

  14. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  15. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  16. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  17. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  18. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  7. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  8. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  9. Buffered coscheduling for parallel programming and enhanced fault tolerance

    DOE Patents [OSTI]

    Petrini, Fabrizio (Los Alamos, NM); Feng, Wu-chun (Los Alamos, NM)

    2006-01-31

    A computer implemented method schedules processor jobs on a network of parallel machine processors or distributed system processors. Control information communications generated by each process performed by each processor during a defined time interval is accumulated in buffers, where adjacent time intervals are separated by strobe intervals for a global exchange of control information. A global exchange of the control information communications at the end of each defined time interval is performed during an intervening strobe interval so that each processor is informed by all of the other processors of the number of incoming jobs to be received by each processor in a subsequent time interval. The buffered coscheduling method of this invention also enhances the fault tolerance of a network of parallel machine processors or distributed system processors

  10. RNA ISOLATION 1/2 BUFFERS AND SOLUTIONS

    E-Print Network [OSTI]

    .1 M Tris-Cl 1 mM EDTA 0.1 M LiCl · PCI: 50% citrate-buffered and water equilibrated-phenol (pH 4.2) 48 1 l sample in 500 l. Check for degradation on 1.2% agarose TAE formaldehyde gel. Use 1.33 g at 80 V. If no degradation has occurred you will see 3 bands, 2 for ribosomal RNA and one for mRNA. #12;

  11. MEMS-based Disk Buffer for Streaming Media Servers Raju Rangaswami

    E-Print Network [OSTI]

    Rangaswami, Raju

    MEMS-based Disk Buffer for Streaming Media Servers Raju Rangaswami raju@cs.ucsb.edu Zoran of large DRAM buffers to im- prove the overall streaming throughput. MEMS-based stor- age is an exciting on the class of streaming media applications. We evaluate the use of MEMS-based storage for buffering

  12. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  13. Photo-induced wettability of TiO{sub 2} film with Au buffer layer

    SciTech Connect (OSTI)

    Purkayastha, Debarun Dhar; Sangani, L. D. Varma; Krishna, M. Ghanashyam; Madhurima, V.

    2014-04-24

    The effect of thickness of Au buffer layer (15-25 nm) between TiO{sub 2} film and substrate on the wettability of TiO{sub 2} films is reported. TiO{sub 2} films grown on Au buffer layer have a higher contact angle of 96-;100° as compared to 47.6o for the film grown without buffer layer. The transition from hydrophobicity to hydrophilicity under UV irradiation occurs within 10 min. for the buffer layered films whereas it is almost 30 min. for the film grown without buffer layer. The enhanced photo induced hydrophilicity is shown to be surface energy driven.

  14. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  15. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  16. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  17. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  18. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  19. Conductive and robust nitride buffer layers on biaxially textured substrates

    DOE Patents [OSTI]

    Sankar, Sambasivan; Goyal, Amit; Barnett, Scott A.; Kim, Ilwon; Kroeger, Donald M.

    2004-08-31

    The present invention relates to epitaxial, electrically conducting and mechanically robust, cubic nitride buffer layers deposited epitaxially on biaxially textured substrates such as metal and alloys. The invention comprises of a biaxially textured substrate with epitaxial layers of nitrides. The invention also discloses a method to form such epitaxial layers using a high rate deposition method as well as without the use of forming gases. The invention further comprises epitaxial layers of oxides on the biaxially textured nitride layers. In some embodiments the article further comprises electromagnetic devices which may be super conducting properties.

  20. Conductive and robust nitride buffer layers on biaxially textured substrates

    DOE Patents [OSTI]

    Sankar, Sambasivan [Chicago, IL; Goyal, Amit [Knoxville, TN; Barnett, Scott A [Evanston, IL; Kim, Ilwon [Skokie, IL; Kroeger, Donald M [Knoxville, TN

    2009-03-31

    The present invention relates to epitaxial, electrically conducting and mechanically robust, cubic nitride buffer layers deposited epitaxially on biaxially textured substrates such as metals and alloys. The invention comprises of a biaxially textured substrate with epitaxial layers of nitrides. The invention also discloses a method to form such epitaxial layers using a high rate deposition method as well as without the use of forming gases. The invention further comprises epitaxial layers of oxides on the biaxially textured nitride layer. In some embodiments the article further comprises electromagnetic devices which may have superconducting properties.

  1. Non-Sticking of Helium Buffer Gas to Hydrocarbons

    E-Print Network [OSTI]

    Croft, James F E

    2014-01-01

    Lifetimes of complexes formed during helium-hydrocarbon collisions at low temperature are estimated for symmetric top hydrocarbons. The lifetimes are obtained using a density-of-states approach. In general the lifetimes are less than 10-100 ns, and are found to decrease with increasing hydrocarbon size. This suggests that clustering will not limit precision spectroscopy in helium buffer gas experiments. Lifetimes are computed for noble-gas benzene collisions and are found to be in reasonable agreement with lifetimes obtained from classical trajectories as reported by Cui {\\it et al}.

  2. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  3. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  4. Office of Environment, Health and Safety (EH&S) -Sanitary Sewer Overflow Incident Form (rev. 12/2014) STEP 1 Immediately call EH&S at (510) 642-3073 with the following details of the incident

    E-Print Network [OSTI]

    Yaghi, Omar M.

    Office of Environment, Health and Safety (EH&S) - Sanitary Sewer Overflow Incident Form (rev. 12 a drainage channel that flows to a surface water body gallons Estimated spill volume recovered from a drainage channel that flows to a surface water body gallons Estimated spill volume discharged directly

  5. Buffer layers on rolled nickel or copper as superconductor substrates

    DOE Patents [OSTI]

    Paranthaman, Mariappan (Knoxville, TN); Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

    2000-01-01

    Buffer layer architectures are epitaxially deposited on biaxially-textured rolled substrates of nickel and/or copper and their alloys for high current conductors, and more particularly buffer layer architectures such as Y.sub.2 O.sub.3 /Ni, YSZ/Y.sub.2 O.sub.3 /Ni, Yb.sub.2 O.sub.3 /Ni, Yb.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Ni, Yb.sub.2 O.sub.3 /CeO.sub.2 /Ni, RE.sub.2 O.sub.3 /Ni (RE=Rare Earth), and Yb.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Ni, Y.sub.2 O.sub.3 /Cu, YSZ/Y.sub.2 O.sub.3 /Cu, Yb.sub.2 O.sub.3 /Cu, Yb.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Cu, Yb.sub.2 O.sub.3 /CeO.sub.2 /Cu, RE.sub.2 O.sub.3 /Cu, and Yb.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Cu. Deposition methods include physical vapor deposition techniques which include electron-beam evaporation, rf magnetron sputtering, pulsed laser deposition, thermal evaporation, and solution precursor approach, which includes chemical vapor deposition, combustion CVD, metal-organic decomposition, sol-gel processing, and plasma spray.

  6. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  7. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  8. Doped Y.sub.2O.sub.3 buffer layers for laminated conductors

    DOE Patents [OSTI]

    Paranthaman, Mariappan Parans (Knoxville, TN) [Knoxville, TN; Schoop, Urs (Westborough, MA) [Westborough, MA; Goyal, Amit (Knoxville, TN) [Knoxville, TN; Thieme, Cornelis Leo Hans (Westborough, MA) [Westborough, MA; Verebelyi, Darren T. (Oxford, MA) [Oxford, MA; Rupich, Martin W. (Framingham, MA) [Framingham, MA

    2007-08-21

    A laminated conductor includes a metallic substrate having a surface, a biaxially textured buffer layer supported by the surface of the metallic substrate, the biaxially textured buffer layer comprising Y.sub.2O.sub.3 and a dopant for blocking cation diffusion through the Y.sub.2O.sub.3, and a biaxially textured conductor layer supported by the biaxially textured buffer layer.

  9. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  10. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  11. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  12. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  13. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  14. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  15. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  16. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  17. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  18. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  19. (c)DepartmentofComputerScience,Bishop'sUniversity http://cs.ubishops.ca/research

    E-Print Network [OSTI]

    of the attacking hacker. This problem appeared early in the history of computers. Indeed, buffer overflow is first of buffer overflows was reserved for the elite of hackers. It was often learned within hacker communities

  20. Superconducting composite with multilayer patterns and multiple buffer layers

    DOE Patents [OSTI]

    Wu, X.D.; Muenchausen, R.E.

    1993-10-12

    An article of manufacture is described including a substrate, a patterned interlayer of a material selected from the group consisting of magnesium oxide, barium-titanium oxide or barium-zirconium oxide, the patterned interlayer material overcoated with a secondary interlayer material of yttria-stabilized zirconia or magnesium-aluminum oxide, upon the surface of the substrate whereby an intermediate article with an exposed surface of both the overcoated patterned interlayer and the substrate is formed, a coating of a buffer layer selected from the group consisting of cerium oxide, yttrium oxide, curium oxide, dysprosium oxide, erbium oxide, europium oxide, iron oxide, gadolinium oxide, holmium oxide, indium oxide, lanthanum oxide, manganese oxide, lutetium oxide, neodymium oxide, praseodymium oxide, plutonium oxide, samarium oxide, terbium oxide, thallium oxide, thulium oxide, yttrium oxide and ytterbium oxide over the entire exposed surface of the intermediate article, and, a ceramic superconductor. 5 figures.

  1. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  2. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  3. Buffer Sizing for Minimum Energy-Delay Product by Using an Approximating Polynomial

    E-Print Network [OSTI]

    Pedram, Massoud

    Buffer Sizing for Minimum Energy-Delay Product by Using an Approximating Polynomial Chang Woo Kang to derive sizing rules for buffered chains, which optimize the overall energy-delay product. Categories result in a poor solution in terms of the energy-delay product. The focus of this work is on multi

  4. Optimization of out-of-plane magnetized Co/Pt multilayers with resistive buffer layers

    E-Print Network [OSTI]

    Emori, Satoru

    Ta oxide (TaOx) is investigated as a resistive buffer layer for the growth of high-quality Co/Pt multilayers with perpendicular magnetic anisotropy (PMA). The Pt/(Co/Pt)3 films grown on TaOx buffer layers exhibit stronger ...

  5. Asymptotic Performance Limits of Switches with Buffered Crossbars supporting Multicast Traffic

    E-Print Network [OSTI]

    Asymptotic Performance Limits of Switches with Buffered Crossbars supporting Multicast Traffic.leonardi@polito.it Abstract-- Input queued switches exploiting buffered crossbars (CICQ switches) are widely considered very promising architec- tures that outperform input queued (IQ) switches with bufferless switching fabrics both

  6. A Survey of Buffer Management Policies for Packet Switches1 Michael H. Goldwasser2

    E-Print Network [OSTI]

    Goldwasser, Michael

    A Survey of Buffer Management Policies for Packet Switches1 Michael H. Goldwasser2 Abstract Over of packet transmission for network switches. In a typical model, a switch receives packets on one or more the buffering of packets within a switch, and variations in packet properties used to differentiate quality

  7. BATTERY-POWERED, ELECTRIC-DRIVE VEHICLES PROVIDING BUFFER STORAGE FOR PV CAPACITY VALUE

    E-Print Network [OSTI]

    Perez, Richard R.

    BATTERY-POWERED, ELECTRIC-DRIVE VEHICLES PROVIDING BUFFER STORAGE FOR PV CAPACITY VALUE Steven applications, batteries can serve to provide firm peak-shaving for distributed PV installations. To date, however, the use of batteries from parked electric- drive vehicles (EDV) to provide buffer storage for PV

  8. Author's personal copy Evaluation of stainless steel cathodes and a bicarbonate buffer

    E-Print Network [OSTI]

    production in microbial electrolysis cells using a new method for measuring gas production Jack R. Ambler: Biohydrogen Bioenergy Gas bag Buffer Electrohydrogenesis a b s t r a c t Microbial electrolysis cells (MECs) are often examined for hydrogen production using non- sustainable phosphate buffered solutions (PBS

  9. IEEE INFOCOM 2001 Behavior of TCP-like elastic traffic at a buffered

    E-Print Network [OSTI]

    Schwefel, Hans-Peter

    IEEE INFOCOM 2001 Behavior of TCP-like elastic traffic at a buffered bottleneck router Hans by a stochastic process. The essential behavior of TCP-like flow-control mechanisms is captured in the analytic to existing congestion, the throttling mechanism is only activated when the buffer-occupancy at the bottleneck

  10. Catalyst functionalized buffer sorbent pebbles for rapid separation of carbon dioxide from gas mixtures

    DOE Patents [OSTI]

    Aines, Roger D

    2015-03-31

    A method for separating CO.sub.2 from gas mixtures uses a slurried media impregnated with buffer compounds and coating the solid media with a catalyst or enzyme that promotes the transformation of CO.sub.2 to carbonic acid. Buffer sorbent pebbles with a catalyst or enzyme coating are provided for rapid separation of CO.sub.2 from gas mixtures.

  11. Catalyst functionalized buffer sorbent pebbles for rapid separation of carbon dioxide from gas mixtures

    DOE Patents [OSTI]

    Aines, Roger D.

    2013-03-12

    A method for separating CO.sub.2 from gas mixtures uses a slurried media impregnated with buffer compounds and coating the solid media with a catalyst or enzyme that promotes the transformation of CO.sub.2 to carbonic acid. Buffer sorbent pebbles with a catalyst or enzyme coating are provided for rapid separation of CO.sub.2 from gas mixtures.

  12. Method of deforming a biaxially textured buffer layer on a textured metallic substrate and articles therefrom

    DOE Patents [OSTI]

    Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

    2000-01-01

    The present invention provides methods and biaxially textured articles having a deformed epitaxial layer formed therefrom for use with high temperature superconductors, photovoltaic, ferroelectric, or optical devices. A buffer layer is epitaxially deposited onto biaxially-textured substrates and then mechanically deformed. The deformation process minimizes or eliminates grooves, or other irregularities, formed on the buffer layer while maintaining the biaxial texture of the buffer layer. Advantageously, the biaxial texture of the buffer layer is not altered during subsequent heat treatments of the deformed buffer. The present invention provides mechanical densification procedures which can be incorporated into the processing of superconducting films through the powder deposit or precursor approaches without incurring unfavorable high-angle grain boundaries.

  13. Propagation of misfit dislocations from buffer/Si interface into Si

    DOE Patents [OSTI]

    Liliental-Weber, Zuzanna (El Sobrante, CA); Maltez, Rogerio Luis (Porto Alegre, BR); Morkoc, Hadis (Richmond, VA); Xie, Jinqiao (Raleigh, VA)

    2011-08-30

    Misfit dislocations are redirected from the buffer/Si interface and propagated to the Si substrate due to the formation of bubbles in the substrate. The buffer layer growth process is generally a thermal process that also accomplishes annealing of the Si substrate so that bubbles of the implanted ion species are formed in the Si at an appropriate distance from the buffer/Si interface so that the bubbles will not migrate to the Si surface during annealing, but are close enough to the interface so that a strain field around the bubbles will be sensed by dislocations at the buffer/Si interface and dislocations are attracted by the strain field caused by the bubbles and move into the Si substrate instead of into the buffer epi-layer. Fabrication of improved integrated devices based on GaN and Si, such as continuous wave (CW) lasers and light emitting diodes, at reduced cost is thereby enabled.

  14. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  15. Superconducting composite with multilayer patterns and multiple buffer layers

    DOE Patents [OSTI]

    Wu, Xin D. (Greenbelt, MD); Muenchausen, Ross E. (Espanola, NM)

    1993-01-01

    An article of manufacture including a substrate, a patterned interlayer of a material selected from the group consisting of magnesium oxide, barium-titanium oxide or barium-zirconium oxide, the patterned interlayer material overcoated with a secondary interlayer material of yttria-stabilized zirconia or magnesium-aluminum oxide, upon the surface of the substrate whereby an intermediate article with an exposed surface of both the overcoated patterned interlayer and the substrate is formed, a coating of a buffer layer selected from the group consisting of cerium oxide, yttrium oxide, curium oxide, dysprosium oxide, erbium oxide, europium oxide, iron oxide, gadolinium oxide, holmium oxide, indium oxide, lanthanum oxide, manganese oxide, lutetium oxide, neodymium oxide, praseodymium oxide, plutonium oxide, samarium oxide, terbium oxide, thallium oxide, thulium oxide, yttrium oxide and ytterbium oxide over the entire exposed surface of the intermediate article, and, a ceramic superco n FIELD OF THE INVENTION The present invention relates to the field of superconducting articles having two distinct regions of superconductive material with differing in-plane orientations whereby the conductivity across the boundary between the two regions can be tailored. This invention is the result of a contract with the Department of Energy (Contract No. W-7405-ENG-36).

  16. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  17. Buffer Pellets for High-Yield, Top-Seeded Melt Growth of Large Grain Y?Ba?Cu?O Superconductors

    E-Print Network [OSTI]

    Kumar, Namburi Devendra; Shi, Yunhua; Zhai, Wei; Dennis, Anthony R.; Durrell, John H.; Cardwell, David A.

    2015-01-19

    , which was determined by optimizing targeted critical parameters of the buffer pellet, including the choice of the buffer pellet composition and its aspect ratio, for the reliable fabrication of large, single grains of (RE)BCO. Potential candidates...

  18. Buffer architecture for biaxially textured structures and method of fabricating same

    DOE Patents [OSTI]

    Norton, David P.; Park, Chan; Goyal, Amit

    2004-04-06

    The invention relates to an article with an improved buffer layer architecture comprising a substrate having a metal surface, and an epitaxial buffer layer on the surface of the substrate. The epitaxial buffer layer comprises at least one of the group consisting of ZrO.sub.2, HfO.sub.2, and compounds having at least one of Ca and a rare earth element stabilizing cubic phases of ZrO.sub.2 and/or HfO.sub.2. The article can also include a superconducting layer deposited on the epitaxial buffer layer. The article can also include an epitaxial capping layer between the epitaxial buffer layer and the superconducting layer. A method for preparing an epitaxial article comprises providing a substrate with a metal surface, depositing on the metal surface an epitaxial buffer layer comprising at least one material selected from the group consisting of ZrO.sub.2, HfO.sub.2, and compounds having at least one of Ca and a rare earth element stabilizing cubic phases of at least one of ZrO.sub.2 and HfO.sub.2. The epitaxial layer depositing step occurs in a vacuum with a background pressure of no more than 1.times.10.sup.-5 Torr. The method can further comprise depositing a superconducting layer on the epitaxial layer, and depositing an epitaxial capping layer between the epitaxial buffer layer and the superconducting layer.

  19. GaAs buffer layer technique for vertical nanowire growth on Si substrate

    SciTech Connect (OSTI)

    Xu, Xiaoqing Parizi, Kokab B.; Huo, Yijie; Kang, Yangsen; Philip Wong, H.-S.; Li, Yang

    2014-02-24

    Gold catalyzed vapor-liquid-solid method is widely applied to III–V nanowire (NW) growth on Si substrate. However, the easy oxidation of Si, possible Si contamination in the NWs, high defect density in the NWs, and high sensitivity of the NW morphology to growth conditions largely limit its controllability. In this work, we developed a buffer layer technique by introducing a GaAs thin film with predefined polarity as a template. It is found that samples grown on these buffer layers all have high vertical NW yields in general, due to the single-orientation of the buffer layers. Low temperature buffer with smoother surface leads to highest yield of vertical NWs, while high temperature (HT) buffer with better crystallinity results in perfect NW quality. The defect-free property we observed here is very promising for optoelectronic device applications based on GaAs NW. Moreover, the buffer layers can eliminate Si contamination by preventing Si-Au alloy formation and by increasing the thickness of the Si diffusion barrier, thus providing more flexibility to vertical NW growth. The buffer layer technique we demonstrated here could be easily extended to other III-V on Si system for electronic and photonic applications.

  20. Quasi-output-buffered switches Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee and Chi-Feung Wu

    E-Print Network [OSTI]

    Chang, Cheng-Shang

    Quasi-output-buffered switches Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee and Chi-Feung Wu--Output-buffered switches are known to have better performance than other switch architectures. However, output- buffered switches also suffer from the notorious scalability prob- lem, and direct constructions of large output

  1. MgO buffer layers on rolled nickel or copper as superconductor substrates

    DOE Patents [OSTI]

    Paranthaman, Mariappan (Knoxville, TN); Goyal, Amit (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); List, III, Frederic A. (Andersonville, TN)

    2001-01-01

    Buffer layer architectures are epitaxially deposited on biaxially-textured rolled-Ni and/or Cu substrates for high current conductors, and more particularly buffer layer architectures such as MgO/Ag/Pt/Ni, MgO/Ag/Pd/Ni, MgO/Ag/Ni, MgO/Ag/Pd/Cu, MgO/Ag/Pt/Cu, and MgO/Ag/Cu. Techniques used to deposit these buffer layers include electron beam evaporation, thermal evaporation, rf magnetron sputtering, pulsed laser deposition, metal-organic chemical vapor deposition (MOCVD), combustion CVD, and spray pyrolysis.

  2. Method for making MgO buffer layers on rolled nickel or copper as superconductor substrates

    DOE Patents [OSTI]

    Paranthaman, Mariappan (Knoxville, TN); Goyal, Amit (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); List, III, Frederic A. (Andersonville, TN)

    2002-01-01

    Buffer layer architectures are epitaxially deposited on biaxially-textured rolled-Ni and/or Cu substrates for high current conductors, and more particularly buffer layer architectures such as MgO/Ag/Pt/Ni, MgO/Ag/Pd/Ni, MgO/Ag/Ni, MgO/Ag/Pd/Cu, MgO/Ag/Pt/Cu, and MgO/Ag/Cu. Techniques used to deposit these buffer layers include electron beam evaporation, thermal evaporation, rf magnetron sputtering, pulsed laser deposition, metal-organic chemical vapor deposition (MOCVD), combustion CVD, and spray pyrolysis.

  3. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  4. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  5. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  6. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  7. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  8. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  9. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  10. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  11. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  12. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  13. Poly(vinyl alcohol)-based buffering membranes for isoelectric trapping separations 

    E-Print Network [OSTI]

    Craver, Helen C.

    2009-05-15

    Isoelectric trapping (IET) in multicompartment electrolyzers (MCE) has been widely used for the electrophoretic separation of ampholytic compounds such as proteins. In IET, the separation occurs in the buffering membranes that form a step-wise p...

  14. SEPARATION OF PROTEINS BY ION EXCHANGE AND MEMBRANE CHROMATOGRAPHY: BUFFER COMPOSITION, INTERFERING IMPURITIES AND FOULING CONSIDERATIONS 

    E-Print Network [OSTI]

    Imam, Tahmina

    2010-01-16

    in all studies buffers. The second study consisted of surface modification of microfiltration membranes for protein purification and separation and reduces fouling. This study describes adsorption and fouling of chemically modified microfiltration...

  15. Potential for N pollution swapping from riparian buffer strips and an instream wetland 

    E-Print Network [OSTI]

    Boukelia, Willena Esther

    2012-11-29

    Diffuse agricultural pollution is a major contributor to poor water quality in many parts of the world. Consequently agri-environment policy promotes the use of riparian buffer strips and/or denitrifying wetlands to ...

  16. Intermixing at the absorber-buffer layer interface in thin-film...

    Office of Scientific and Technical Information (OSTI)

    Intermixing at the absorber-buffer layer interface in thin-film solar cells: The electronic effects of point defects in Cu(In,Ga)(Se,S)sub 2 and Cusub 2ZnSn(Se,S)sub 4...

  17. A non-blocking buffer mechanism for real-time event message communication

    E-Print Network [OSTI]

    Kim, KHK

    2006-01-01

    A Non-Blocking Buffer Mechanism for Real-Time Event Messagecomputing systems. An interaction mechanism, called the non-blocking writer (NBW) mechanism and invented by Kopetz, is

  18. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  19. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  20. Method of depositing an electrically conductive oxide buffer layer on a textured substrate and articles formed therefrom

    DOE Patents [OSTI]

    Paranthaman, M. Parans; Aytug, Tolga; Christen, David K.

    2003-09-09

    An article with an improved buffer layer architecture includes a substrate having a textured metal surface, and an electrically conductive lanthanum metal oxide epitaxial buffer layer on the surface of the substrate. The article can also include an epitaxial superconducting layer deposited on the epitaxial buffer layer. An epitaxial capping layer can be placed between the epitaxial buffer layer and the superconducting layer. A method for preparing an epitaxial article includes providing a substrate with a metal surface and depositing on the metal surface a lanthanum metal oxide epitaxial buffer layer. The method can further include depositing a superconducting layer on the epitaxial buffer layer, and depositing an epitaxial capping layer between the epitaxial buffer layer and the superconducting layer.

  1. Method of depositing an electrically conductive oxide buffer layer on a textured substrate and articles formed therefrom

    DOE Patents [OSTI]

    Paranthaman, M. Parans; Aytug, Tolga; Christen, David K.

    2005-10-18

    An article with an improved buffer layer architecture includes a substrate having a textured metal surface, and an electrically conductive lanthanum metal oxide epitaxial buffer layer on the surface of the substrate. The article can also include an epitaxial superconducting layer deposited on the epitaxial buffer layer. An epitaxial capping layer can be placed between the epitaxial buffer layer and the superconducting layer. A method for preparing an epitaxial article includes providing a substrate with a metal surface and depositing on the metal surface a lanthanum metal oxide epitaxial buffer layer. The method can further include depositing a superconducting layer on the epitaxial buffer layer, and depositing an epitaxial capping layer between the epitaxial buffer layer and the superconducting layer.

  2. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  3. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  4. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  5. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  6. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  7. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  8. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  9. East Boston buffer : a transferable urban framework for adapting to sea rise

    E-Print Network [OSTI]

    Jenkins, Carolyn (Carolyn Hiller)

    2013-01-01

    Urban vulnerability to climate change is constantly increasing. Many coastal cities will need to begin sea rise mitigation efforts soon, and now is a critical time for architects to intervene in this process with good ...

  10. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  11. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  12. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  13. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  14. Structural c aracterization and microwave loss of Ndl~s5CeO~15Cu04-y superconducting thin films on yttria-stabilized zirconia buffered sapphire

    E-Print Network [OSTI]

    Anlage, Steven

    on yttria-stabilized zirconia buffered sapphire S. N. Mao, X. X. Xi, Jian Mao, D. H. Wu, Qi Li, S. M. Anlage) thin films on (liO2) sapphire using a yttria-stabilized zirconia (YSZ) buffer layer, which has been-type yttria-stabilized zirconia (YSZ) buffer layer. It is well known that the buffer layer between the sap

  15. Riparian Buffer Project : Annual Report for the Period April 1, 2001 to March 31, 2002.

    SciTech Connect (OSTI)

    Wasco County Soil and Water Conservation District

    2002-01-01

    This project implements riparian buffer systems in the Mid-Columbia, addressing limiting factors identified in the Fifteen mile Subbasin Summary, June 30, 2000. The project is providing the technical planning support needed to implement at least 36 riparian buffer system contracts on approximately 872 acres covering an estimated 40 miles of anadromous fish streams over a three year period. In the first year of implementation, 26 buffer contracts were established on 25-26 miles of stream. This nearly doubled the annual goal. Buffer widths averaged 83 ft. on each side of the stream. Implementation included prescribed plantings, fencing, and related practices. Actual implementation costs, lease payments, and maintenance costs are borne by existing USDA programs: Conservation Reserve and Conservation Reserve Enhancement Programs. The lease period of each contract may vary between 10 to 15 years. During this year the average was 14.5 years. The total value of contracts established this year is $1,491,235 compared with $64,756 in BPA contract costs to provide the technical support needed to get the contracts implemented. This project provides technical staffing to conduct assessments and develop plans to help keep pace with the growing backlog of potential riparian buffer projects. Word of mouth from satisfied customers has brought in many new sign-ups during the year. More than half of the contracts this year have been done in the Hood and Fifteen mile sub-basins with additional contracts in adjacent sub-basins.

  16. Optically pumped alkali laser and amplifier using helium-3 buffer gas

    DOE Patents [OSTI]

    Beach, Raymond J. (Livermore, CA); Page, Ralph (Castro Valley, CA); Soules, Thomas (Livermore, CA); Stappaerts, Eddy (San Ramon, CA); Wu, Sheldon Shao Quan (Livermore, CA)

    2010-09-28

    In one embodiment, a laser oscillator is provided comprising an optical cavity, the optical cavity including a gain medium including an alkali vapor and a buffer gas, the buffer gas including .sup.3He gas, wherein if .sup.4He gas is also present in the buffer gas, the ratio of the concentration of the .sup.3He gas to the .sup.4He gas is greater than 1.37.times.10.sup.-6. Additionally, an optical excitation source is provided. Furthermore, the laser oscillator is capable of outputting radiation at a first frequency. In another embodiment, an apparatus is provided comprising a gain medium including an alkali vapor and a buffer gas including .sup.3He gas, wherein if .sup.4He gas is also present in the buffer gas, the ratio of the concentration of the .sup.3He gas to the .sup.4He gas is greater than 1.37.times.10.sup.-6. Other embodiments are also disclosed.

  17. Methods of producing free-standing semiconductors using sacrificial buffer layers and recyclable substrates

    DOE Patents [OSTI]

    Ptak, Aaron Joseph; Lin, Yong; Norman, Andrew; Alberi, Kirstin

    2015-05-26

    A method of producing semiconductor materials and devices that incorporate the semiconductor materials are provided. In particular, a method is provided of producing a semiconductor material, such as a III-V semiconductor, on a spinel substrate using a sacrificial buffer layer, and devices such as photovoltaic cells that incorporate the semiconductor materials. The sacrificial buffer material and semiconductor materials may be deposited using lattice-matching epitaxy or coincident site lattice-matching epitaxy, resulting in a close degree of lattice matching between the substrate material and deposited material for a wide variety of material compositions. The sacrificial buffer layer may be dissolved using an epitaxial liftoff technique in order to separate the semiconductor device from the spinel substrate, and the spinel substrate may be reused in the subsequent fabrication of other semiconductor devices. The low-defect density semiconductor materials produced using this method result in the enhanced performance of the semiconductor devices that incorporate the semiconductor materials.

  18. Electron dynamics of the buffer layer and bilayer graphene on SiC

    SciTech Connect (OSTI)

    Shearer, Alex J.; Caplins, Benjamin W.; Suich, David E.; Harris, Charles B., E-mail: cbharris@berkeley.edu [Department of Chemistry, University of California at Berkeley, Berkeley, California 94720 (United States); Chemical Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States); Johns, James E. [Department of Chemistry, University of Minnesota Twin Cities, Minneapolis, Minnesota 55455 (United States); Hersam, Mark C. [Department of Materials Science and Engineering, Northwestern University, Evanston, Illinois 60208 (United States); Department of Chemistry, Northwestern University, Evanston, Illinois 60208 (United States)

    2014-06-09

    Angle- and time-resolved two-photon photoemission (TPPE) was used to investigate electronic states in the buffer layer of 4H-SiC(0001). An image potential state (IPS) series was observed on this strongly surface-bound buffer layer, and dispersion measurements indicated free-electron-like behavior for all states in this series. These results were compared with TPPE taken on bilayer graphene, which also show the existence of a free-electron-like IPS series. Lifetimes for the n?=?2, and n?=?3 states were obtained from time-resolved TPPE; slightly increased lifetimes were observed in the bilayer graphene sample for the n?=?2 the n?=?3 states. Despite the large band gap of graphene at the center of the Brillouin zone, the lifetime results demonstrate that the graphene layers do not behave as a simple tunneling barrier, suggesting that the buffer layer and graphene overlayers play a direct role in the decay of IPS electrons.

  19. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  20. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  1. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  2. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  3. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  4. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  5. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  6. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  7. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  8. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  9. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  10. Designing a Residential Hybrid Electrical Energy Storage System Based on the Energy Buffering Strategy

    E-Print Network [OSTI]

    Pedram, Massoud

    energy price during peak hours for residential users. Moreover, recent research on smart grid proposesDesigning a Residential Hybrid Electrical Energy Storage System Based on the Energy Buffering companies generally raise electrical energy price during periods of high load demand. A grid

  11. The Impact of Transmit Buffer on EDCF with Frame-Bursting Option for Wireless Networks

    E-Print Network [OSTI]

    Selvadurai, Selvakennedy

    a single contention, an optional feature known as controlled frame- bursting (CFB) is introduced in its with the CFB option to quantify its performance gain. The impact of the MAC transmit buffer size is also duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve

  12. DRAM-Level Prefetching for Fully-Buffered DIMM: Design, Performance and Power Saving

    E-Print Network [OSTI]

    Zhu, Zhichun

    at the first-level connecting the mem- ory controller and Advanced Memory Buffers (AMBs); and DDR2 buses DDR2 DRAM chips. It This work is supported in part by the National Science Foundation under grants CPA and thus provides higher memory bandwidth. Meanwhile, it uses exist- ing DDR2/DDR3 DRAM to avoid the high

  13. Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches

    E-Print Network [OSTI]

    Chao, Jonathan

    Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches Roberto Rojas of Clos-network switches make them an alternative to single-stages switches for implementing large- size packet switches. This paper introduces a cell dispatching scheme, called maximum weight matching

  14. Scalable Central-stage Buffered Clos-network Packet Switches with QoS

    E-Print Network [OSTI]

    Hamdi, Mounir

    Scalable Central-stage Buffered Clos-network Packet Switches with QoS Feng Wang and Mounir Hamdi}@cs.ust.hk Abstract - In our previous work [1], we proposed a scalable packet switch architecture based on the Central-queued (OQ) switch and left the corresponding scheduling algorithms unexplored. In this paper1 , we set out

  15. ATM Input-Buffered Switches with the Guaranteed-Rate Property

    E-Print Network [OSTI]

    McKeown, Nick

    ATM Input-Buffered Switches with the Guaranteed-Rate Property A. Hung G. Kesidis N. Mc the problem of how to support guaranteed-rate services in a single-stage, input-bu ered switch suitable for a LAN switch, an ATM switch or an IP router. Such a switch must be feasible at hightransmissionspeeds, o

  16. A Single-Phase Photovoltaic Inverter Topology with a Series-Connected Power Buffer

    E-Print Network [OSTI]

    Perreault, Dave

    1 A Single-Phase Photovoltaic Inverter Topology with a Series-Connected Power Buffer Brandon J developement for single-phase grid-tied photovoltaic applications. The capacitive energy storage implementation is analyzed and experimentally demonstrated. I. INTRODUCTION Grid-tied inverters for photovoltaic systems

  17. A Single-Phase Photovoltaic Inverter Topology with a Series-Connected Energy Buffer

    E-Print Network [OSTI]

    Perreault, Dave

    1 A Single-Phase Photovoltaic Inverter Topology with a Series-Connected Energy Buffer Brandon J (MICs) have been under rapid development for single-phase grid-tied photovoltaic applications Grid-tied inverters for photovoltaic systems represent a rapidly developing area. Module

  18. The potential for behavioral thermoregulation to buffer ``cold-blooded'' animals against

    E-Print Network [OSTI]

    Turner, Monica G.

    extensive discussion, but methods to trans- late broad-scale shifts in climate into direct impacts on living is the buffering influence of behavioral thermoregulation. Here, we show how behavioral and mass/energy balance of global biodiversity). We show that for most ``cold-blooded'' terrestrial animals, the primary thermal

  19. AIP ADVANCES 5, 097150 (2015) Buffer layer between a planar optical concentrator

    E-Print Network [OSTI]

    2015-01-01

    the fabrica- tion costs without significantly reducing the efficiency of the solar cell. Both crystallineAIP ADVANCES 5, 097150 (2015) Buffer layer between a planar optical concentrator and a solar cell optical concentrator and a photovoltaic solar cell was theoretically investigated. The substitution

  20. Optimal Buffer Management Using Hybrid Systems Wei Zhang and Jianghai Hu

    E-Print Network [OSTI]

    Zhang, Wei

    with some heuristic schemes. I. INTRODUCTION Dynamic buffer management (DBM) is an effective power general DBM problem, where the component to be controlled has multiple power modes. Since different power as a piecewise-constant hybrid system, or more accurately, a multi-rate automata [7]. The DBM problem is thus

  1. Preparation of CIGS-based solar cells using a buffered electrodeposition bath

    DOE Patents [OSTI]

    Bhattacharya, Raghu Nath (Littleton, CO)

    2007-11-20

    A photovoltaic cell exhibiting an overall conversion efficiency of at least 9.0% is prepared from a copper-indium-gallium-diselenide thin film. The thin film is prepared by simultaneously electroplating copper, indium, gallium, and selenium onto a substrate using a buffered electro-deposition bath. The electrodeposition is followed by adding indium to adjust the final stoichiometry of the thin film.

  2. Deflating Link Buffers in a Wireless Mesh Network Kamran Jamshaida,1

    E-Print Network [OSTI]

    Shihada, Basem

    a multihop wireless backhaul. Client devices connect to their preferred mesh router via wire or an orthogonal of wireless mesh routers, and thus buffers are more likely to build up at the mesh routers. Most routers that share the wireless spectrum with other mesh devices. While these mesh nodes carry only

  3. Making Fast Buffer Insertion Even Faster Via Approximation Techniques , C. N. Sze1

    E-Print Network [OSTI]

    Shi, Weiping "Peter"

    , Charles J. Alpert* , Jiang Hu1 , and Weiping Shi1 1 Dept. of Electrical Engineering, Texas A&M University of even moderate length for both critical paths and fixing electrical vio- lations. Consequently, buffer timing objectives and fixing electrical violations for interconnects. It is stated in [1] that the number

  4. AN ADAPTIVE PREDICTOR FOR MEDIA PLAYOUT BUFFERING Phillip DeLeon

    E-Print Network [OSTI]

    De Leon, Phillip

    AN ADAPTIVE PREDICTOR FOR MEDIA PLAYOUT BUFFERING Phillip DeLeon New Mexico State University such as those commonly used in the Internet, autore- gressively measure the network delay and variation and ad Internet packet traces that it can yield reductions in average total end-to-end delays. 1. INTRODUCTION

  5. Epitaxial growth of lead zirconium titanate thin films on Ag buffered Si substrates using rf sputtering

    E-Print Network [OSTI]

    Laughlin, David E.

    Epitaxial growth of lead zirconium titanate thin films on Ag buffered Si substrates using rf 7 February 2007; accepted 25 March 2007; published online 23 April 2007 Epitaxial lead zirconium American Institute of Physics. DOI: 10.1063/1.2731515 The ferroelectric material lead zirconium titanate Pb

  6. Unreliable Data Transmissions and Limited Hardware Communication Buffers in Automotive E/E Virtual Prototypes

    E-Print Network [OSTI]

    Teich, Jürgen

    Unreliable Data Transmissions and Limited Hardware Communication Buffers in Automotive E/E Virtual automotive E/E architectures requires a thorough sys- tem evaluation already in early design phases. This can validation. A case-study from the automotive infotainment domain highlights the benefit that results from

  7. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  8. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  9. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  10. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  11. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  12. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  13. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  14. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  15. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  16. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  17. IEEE TRANSACTIONS ON ENERGY CONVERSION, VOL. 22, NO. 2, 2007 457 Effects of Battery Buffering on the

    E-Print Network [OSTI]

    Mazumder, Sudip K.

    efficiency, near-zero emissions, ease of installation in urban as well as in remote regions, silent operIEEE TRANSACTIONS ON ENERGY CONVERSION, VOL. 22, NO. 2, 2007 457 Effects of Battery Buffering, the effectiveness of the energy buffering is investigated. Index Terms--Balance-of-plant subsystem (BOPS

  18. An Analytical Model for Shared Fiber-Delay Line Buffers in Asynchronous Optical Packet and Burst Switches

    E-Print Network [OSTI]

    Jue, Jason P.

    Switches Tao Zhang, Kejie Lu, and Jason P. Jue Department of Computer Science The University of Texas and burst switching networks. Optical buffering, which is implemented by fiber delay lines (FDLs), is fundamental to many optical switch implementations for resolving contention. Most existing optical buffering

  19. Buffer Allocation in General Single-Server Queueing2 F. R. B. Cruz a,, A. R. Duarte a

    E-Print Network [OSTI]

    Cruz, Frederico

    1 Buffer Allocation in General Single-Server Queueing2 Networks3 F. R. B. Cruz a,, A. R. Duarte of Technology, Eindhoven, The6 Netherlands7 Abstract8 The optimal buffer allocation in queueing network systems function, the constraints or both are usually not available in closed-10 form, making the problem even

  20. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  1. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  2. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  3. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  4. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  5. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  6. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  7. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  8. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  9. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  10. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  11. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  12. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  13. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua [Los Alamos National Laboratory; Nicol, David M [UNIV OF IL; Jin, Dong [UNIV OF IL

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  14. An ultra-thin buffer layer for Ge epitaxial layers on Si

    SciTech Connect (OSTI)

    Kawano, M.; Yamada, S.; Tanikawa, K.; Miyao, M.; Hamaya, K. [Department of Electronics, Kyushu University, 744 Motooka, Fukuoka 819-0395 (Japan)] [Department of Electronics, Kyushu University, 744 Motooka, Fukuoka 819-0395 (Japan); Sawano, K. [Advanced Research Laboratories, Tokyo City University, 8-15-1 Todoroki, Tokyo 158-0082 (Japan)] [Advanced Research Laboratories, Tokyo City University, 8-15-1 Todoroki, Tokyo 158-0082 (Japan)

    2013-03-25

    Using an Fe{sub 3}Si insertion layer, we study epitaxial growth of Ge layers on a Si substrate by a low-temperature molecular beam epitaxy technique. When we insert only a 10-nm-thick Fe{sub 3}Si layer in between Si and Ge, epitaxial Ge layers can be obtained on Si. The detailed structural characterizations reveal that a large lattice mismatch of {approx}4% is completely relaxed in the Fe{sub 3}Si layer. This means that the Fe{sub 3}Si layers can become ultra-thin buffer layers for Ge on Si. This method will give a way to realize a universal buffer layer for Ge, GaAs, and related devices on a Si platform.

  15. A Case for Small Row Buffers in! Non-Volatile Main Memories!

    E-Print Network [OSTI]

    Mutlu, Onur

    mapping schemes! Buffering large rows is energy-inefficient! 8-cores, DDR3-1066 simulator; modified for NVM timing and energy; 31 workloads! 47/67% less main memory energy for PCM/ STT-RAM with 64B row (Relative to DRAM)! PCM! STT-RAM! Energy (Read/Write)! 2x/100x! 0.5x/1x! Latency (Read/Write)! 5x/10x! 1x/1x

  16. OPTIMIZATION OF QUEUEING PERFORMANCE AND EMBEDDED I/O BUFFERS FOR MPEG CODEC DESIGN

    E-Print Network [OSTI]

    Holliday, JoAnne

    with fixed hardware configuration. Let P be the throughput of the system; P= f1 (x1, x 2, ..., xn), and B, and Si is the set of all possible buffer sizes. Optimize P = f1(x1, x2, ..., xn) subject to P > c and B a vector Pi,j for all j U. Fix xt to the temporal optimal values where t j. Then f1 becomes a function

  17. Scaling nitrogen and carbon interactions: What are the consequences of biological buffering?

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Weston, David J.; Rogers, Alistair; Tschaplinski, Timothy J.; Gunter, Lee E.; Jawdy, Sara A.; Engle, Nancy L.; Heady, Lindsey E.; Tuskan, Gerald A.; Wullschleger, Stan D.

    2015-06-25

    Understanding the consequences of elevated CO2 (eCO2; 800 ppm) on terrestrial ecosystems is a central theme in global change biology, but relatively little is known about how altered plant C and N metabolism influences higher levels of biological organization. Here, we investigate the consequences of C and N interactions by genetically modifying the N-assimilation pathway in Arabidopsis and initiating growth chamber and mesocosm competition studies at current CO2 (cCO2; 400 ppm) and eCO2 over multiple generations. Using a suite of ecological, physiological, and molecular genomic tools, we show that a single-gene mutant of a key enzyme (nia2) elicited a highlymore »orchestrated buffering response starting with a fivefold increase in the expression of a gene paralog (nia1) and a 63% increase in the expression of gene network module enriched for N-assimilation genes. The genetic perturbation reduced amino acids, protein, and TCA-cycle intermediate concentrations in the nia2 mutant compared to the wild-type, while eCO2 mainly increased carbohydrate concentrations. The mutant had reduced net photosynthetic rates due to a 27% decrease in carboxylation capacity and an 18% decrease in electron transport rates. The expression of these buffering mechanisms resulted in a penalty that negatively correlated with fitness and population dynamics yet showed only minor alterations in our estimates of population function, including total per unit area biomass, ground cover, and leaf area index. As a result, this study provides insight into the consequences of buffering mechanisms that occur post-genetic perturbations in the N pathway and the associated outcomes these buffering systems have on plant populations relative to eCO2.« less

  18. Photovoltaic devices comprising zinc stannate buffer layer and method for making

    DOE Patents [OSTI]

    Wu, Xuanzhi (Golden, CO); Sheldon, Peter (Lakewood, CO); Coutts, Timothy J. (Lakewood, CO)

    2001-01-01

    A photovoltaic device has a buffer layer zinc stannate Zn.sub.2 SnO.sub.4 disposed between the semiconductor junction structure and the transparent conducting oxide (TCO) layer to prevent formation of localized junctions with the TCO through a thin window semiconductor layer, to prevent shunting through etched grain boundaries of semiconductors, and to relieve stresses and improve adhesion between these layers.

  19. ZnS/Zn(O,OH)S-based buffer layer deposition for solar cells

    DOE Patents [OSTI]

    Bhattacharya, Raghu N. (Littleton, CO)

    2009-11-03

    The invention provides CBD ZnS/Zn(O,OH)S and spray deposited ZnS/Zn(O,OH)S buffer layers prepared from a solution of zinc salt, thiourea and ammonium hydroxide dissolved in a non-aqueous/aqueous solvent mixture or in 100% non-aqueous solvent. Non-aqueous solvents useful in the invention include methanol, isopropanol and triethyl-amine. One-step deposition procedures are described for CIS, CIGS and other solar cell devices.

  20. SUPPORTING INFORMATION METHODS Buffers. Buffer U is 20 mM TrisHCl, 6 mM NaCl, 1.7 mM MgCl2, 5 mM 2-mercaptoethanol (2-ME),

    E-Print Network [OSTI]

    Lohman, Timothy M.

    SUPPORTING INFORMATION METHODS Buffers. Buffer U is 20 mM Tris·HCl, 6 mM NaCl, 1.7 mM MgCl2, 5 mM 2H 7.5 at 25°C. SM buffer is 50 mM Tris·HCl, 0.1 M NaCl, 8 mM MgSO4, 0.01% gelatin, pH 7.5 at 25°C. Lysis buffer is 50 mM Tris·HCl, 0.2 M NaCl, 20% (w/v) sucrose, 15% (v/v) glycerol, 1 mM EDTA, 2 mM 2-ME

  1. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  2. Ultrathin amorphous zinc-tin-oxide buffer layer for enhancing heterojunction interface quality in metal-oxide solar cells

    E-Print Network [OSTI]

    Heo, Jaeyeong

    We demonstrate a tunable electron-blocking layer to enhance the performance of an Earth-abundant metal-oxide solar-cell material. A 5 nm thick amorphous ternary metal-oxide buffer layer reduces interface recombination, ...

  3. Carbonic anhydrase-facilitated CO2 absorption with polyacrylamide buffering bead capture

    SciTech Connect (OSTI)

    Dilmore, Robert; Griffith, Craid; Liu, Zhu; Soong, Yee; Hedges, Sheila W.; Koepsel, Richard; Ataai, M [Ataai, Mohammad

    2009-07-01

    A novel CO2 separation concept is described wherein the enzyme carbonic anhydrase (CA) is used to increase the overall rate Of CO2 absorption after which hydrated CO2 reacts with regenerable amine-bearing polyacrylamide buffering beads (PABB). Following saturation of the material's immobilized tertiary amines, CA-bearing carrier water is separated and recycled to the absorption stage while CO2-loaded material is thermally regenerated. Process application of this concept would involve operation of two or more columns in parallel with thermal regeneration with low-pressure steam taking place after the capacity of a column of amine-bearing polymeric material was exceeded. PABB CO2- bearing capacity was evaluated by thermogravimetric analysis (TGA) for beads of three acrylamido buffering monomer ingredient concentrations: 0 mol/kg bead, 0.857 mol/kg bead, and 2 mol/kg bead. TGA results demonstrate that CO2- bearing capacity increases with increasing PABB buffering concentration and that up to 78% of the theoretical CO2- bearing capacity was realized in prepared PABB samples (0.857 mol/kg recipe). The highest observed CO2-bearing capacity of PABB was 1.37 mol of CO2 per kg dry bead. TGA was also used to assess the regenerability Of CO2-loaded PABB. Preliminary results suggest that CO2 is partially driven from PABB samples at temperatures as low as 55 degrees C, with complete regeneration occurring at 100 degrees C. Other physical characteristics of PABB are discussed. In addition, the effectiveness of bovine carbonic anhydrase for the catalysis Of CO2 dissolution is evaluated. Potential benefits and drawbacks of the proposed process are discussed. Published by Elsevier Ltd.

  4. Using Whole-House Field Tests to Empirically Derive Moisture Buffering Model Inputs

    SciTech Connect (OSTI)

    Woods, J.; Winkler, J.; Christensen, D.; Hancock, E.

    2014-08-01

    Building energy simulations can be used to predict a building's interior conditions, along with the energy use associated with keeping these conditions comfortable. These models simulate the loads on the building (e.g., internal gains, envelope heat transfer), determine the operation of the space conditioning equipment, and then calculate the building's temperature and humidity throughout the year. The indoor temperature and humidity are affected not only by the loads and the space conditioning equipment, but also by the capacitance of the building materials, which buffer changes in temperature and humidity. This research developed an empirical method to extract whole-house model inputs for use with a more accurate moisture capacitance model (the effective moisture penetration depth model). The experimental approach was to subject the materials in the house to a square-wave relative humidity profile, measure all of the moisture transfer terms (e.g., infiltration, air conditioner condensate) and calculate the only unmeasured term: the moisture absorption into the materials. After validating the method with laboratory measurements, we performed the tests in a field house. A least-squares fit of an analytical solution to the measured moisture absorption curves was used to determine the three independent model parameters representing the moisture buffering potential of this house and its furnishings. Follow on tests with realistic latent and sensible loads showed good agreement with the derived parameters, especially compared to the commonly-used effective capacitance approach. These results show that the EMPD model, once the inputs are known, is an accurate moisture buffering model.

  5. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  6. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  7. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  8. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  9. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  10. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  11. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  12. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  13. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  14. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  15. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  16. Novel Coherent Optical Medium Based on Buffer-Gas-Cooled Rb Vapor

    E-Print Network [OSTI]

    Hong, Tao; Patterson, David; Zibrov, Alexander S; Doyle, John M; Lukin, Mikhail D; Prentiss, Mara G

    2008-01-01

    We demonstrate a novel coherent optical medium with high optical depth and low Doppler broadening that offers metastable states with low collisional and motional decoherence. In our approach, helium buffer gas cools 87Rb atoms to below 7 K, while at the same time slowing atom diffusion. We demonstrate that electromagnetically induced transparency (EIT) allows 50% transmission in a medium with initial OD > 70. Slow pulse propagation experiments in this medium yield delays exceeding initial pulse duration by a factor > 25. Efficient four-wave mixing is observed in the high-OD regime, resulting in a pronounced modification of the atomic optical response.

  17. Photo-induced separation of chiral isomers in a classical buffer gas

    E-Print Network [OSTI]

    B. Spivak; A. V. Andreev

    2008-08-22

    We develop a theory of photo-induced drift of chiral molecules or small particles in classical buffer gases. In the absence of a magnetic field there exists a flux of chiral molecules, provided the electromagnetic field is circularly polarized. It has opposite signs for different chiral isomers. In the presence of a magnetic field the flux can be also induced by a linearly polarized (or unpolarized) electromagnetic field. The magnitude of the flux is not proportional to either linear or orbital momentum of the electromagnetic field.

  18. Hydrogen responses of ultrathin Pd films and nanowire networks with a Ti buffer layer.

    SciTech Connect (OSTI)

    Zeng, X. Q.; Wang, Y. L.; Xiao, Z. L.; Latimer, M. L.; Xu, T.; Kwok, W. K.

    2012-01-01

    We report on hydrogen responses of ultrathin films and nanowire networks of palladium on titanium buffered silicon substrates and filtration membranes, respectively. We found that in both systems signatures such as retarding responses and saturation of the resistance changes at high hydrogen concentrations associated with the transition from Pd/H solid solution to Pd hydride diminish with decreasing the thickness of the palladium layer from 7 to 2 nm. Our results not only reveal a new way to suppress the phase transition in Pd/H system but also provide an alternative approach to achieve fast and sensitive hydrogen sensors with a wide concentration detection range.

  19. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  20. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  1. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  2. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  3. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  4. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  5. Buffer layers on metal surfaces having biaxial texture as superconductor substrates

    DOE Patents [OSTI]

    Paranthaman, Mariappan (Knoxville, TN); Lee, Dominic F. (Knoxville, TN); Kroeger, Donald M. (Knoxville, TN); Goyal, Amit (Knoxville, TN)

    2000-01-01

    Buffer layer architectures are epitaxially deposited on biaxially-textured rolled substrates of nickel and/or copper and their alloys for high current conductors, and more particularly buffer layer architectures such as Y.sub.2 O.sub.3 /Ni, YSZ/Y.sub.2 O.sub.3 /Ni, RE.sub.2 O.sub.3 /Ni, (RE=Rare Earth), RE.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Ni, RE.sub.2 O.sub.3 /CeO.sub.2 /Ni, and RE.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Ni, Y.sub.2 O.sub.3 /Cu, YSZ/Y.sub.2 O.sub.3 /Cu, RE.sub.2 O.sub.3 /Cu, RE.sub.2 O.sub.3 /Y.sub.2 O.sub.3 /Cu, RE.sub.2 O.sub.3 /CeO.sub.2 /Cu, and RE.sub.2 O.sub.3 /YSZ/CeO.sub.2 /Cu. Deposition methods include physical vapor deposition techniques which include electron-beam evaporation, rf magnetron sputtering, pulsed laser deposition, thermal evaporation, and solution precursor approaches, which include chemical vapor deposition, combustion CVD, metal-organic decomposition, sol-gel processing, and plasma spray.

  6. Calcium manganate: A promising candidate as buffer layer for hybrid halide perovskite photovoltaic-thermoelectric systems

    SciTech Connect (OSTI)

    Zhao, Pengjun; Wang, Hongguang; Kong, Wenwen; Xu, Jinbao Wang, Lei; Ren, Wei; Bian, Liang; Chang, Aimin

    2014-11-21

    We have systematically studied the feasibility of CaMnO{sub 3} thin film, an n-type perovskite, to be utilized as the buffer layer for hybrid halide perovskite photovoltaic-thermoelectric device. Locations of the conduction band and the valence band, spontaneous polarization performance, and optical properties were investigated. Results indicate the energy band of CaMnO{sub 3} can match up well with that of CH{sub 3}NH{sub 3}PbI{sub 3} on separating electron-hole pairs. In addition, the consistent polarization angle helps enlarge the open circuit voltage of the composite system. Besides, CaMnO{sub 3} film shows large absorption coefficient and low extinction coefficient under visible irradiation, demonstrating high carrier concentration, which is beneficial to the current density. More importantly, benign thermoelectric properties enable CaMnO{sub 3} film to assimilate phonon vibration from CH{sub 3}NH3PbI{sub 3}. All the above features lead to a bright future of CaMnO{sub 3} film, which can be a promising candidate as a buffer layer for hybrid halide perovskite photovoltaic-thermoelectric systems.

  7. Effects of high-temperature AIN buffer on the microstructure of AlGaN/GaN HEMTs

    SciTech Connect (OSTI)

    Coerekci, S.; Oeztuerk, M. K.; Yu, Hongbo; Cakmak, M.; Oezcelik, S.; Oezbay, E.

    2013-06-15

    Effects on AlGaN/GaN high-electron-mobility transistor structure of a high-temperature AlN buffer on sapphire substrate have been studied by high-resolution x-ray diffraction and atomic force microscopy techniques. The buffer improves the microstructural quality of GaN epilayer and reduces approximately one order of magnitude the edge-type threading dislocation density. As expected, the buffer also leads an atomically flat surface with a low root-mean-square of 0.25 nm and a step termination density in the range of 10{sup 8} cm{sup -2}. Due to the high-temperature buffer layer, no change on the strain character of the GaN and AlGaN epitaxial layers has been observed. Both epilayers exhibit compressive strain in parallel to the growth direction and tensile strain in perpendicular to the growth direction. However, an high-temperature AlN buffer layer on sapphire substrate in the HEMT structure reduces the tensile stress in the AlGaN layer.

  8. Redox buffered hydrofluoric acid etchant for the reduction of galvanic attack during release etching of MEMS devices having noble material films

    DOE Patents [OSTI]

    Hankins, Matthew G. (Albuquerque, NM)

    2009-10-06

    Etchant solutions comprising a redox buffer can be used during the release etch step to reduce damage to the structural layers of a MEMS device that has noble material films. A preferred redox buffer comprises a soluble thiophosphoric acid, ester, or salt that maintains the electrochemical potential of the etchant solution at a level that prevents oxidation of the structural material. Therefore, the redox buffer preferentially oxidizes in place of the structural material. The sacrificial redox buffer thereby protects the exposed structural layers while permitting the dissolution of sacrificial oxide layers during the release etch.

  9. Characterising the secondary structure changes occurring in high density systems of BLG dissolved in aqueous pH 3 buffer

    E-Print Network [OSTI]

    Ioannou, J. C.; Donald, A. M.; Tromp, R. H.

    2014-12-31

    in the mouth (i.e. feeling dry and hard to pro- cess). This is part of the reason why many high-protein food for- mulations have to be structured by adding starch and/or oil. Therefore, in-depth knowledge of protein folding/unfolding which can relate... . It illustrates the changes in sub-band peak intensity of the five main ascribed J.C. Ioannou et al. / Food Hydrocolloids 46 (2015) 216e225 221was firstly buffer-corrected by subtracting out the buffer signal and background noise spectrum. Each data spectrum...

  10. ZnO buffer layer for metal films on silicon substrates

    SciTech Connect (OSTI)

    Ihlefeld, Jon

    2014-09-16

    Dramatic improvements in metallization integrity and electroceramic thin film performance can be achieved by the use of the ZnO buffer layer to minimize interfacial energy between metallization and adhesion layers. In particular, the invention provides a substrate metallization method utilizing a ZnO adhesion layer that has a high work of adhesion, which in turn enables processing under thermal budgets typically reserved for more exotic ceramic, single-crystal, or metal foil substrates. Embodiments of the present invention can be used in a broad range of applications beyond ferroelectric capacitors, including microelectromechanical systems, micro-printed heaters and sensors, and electrochemical energy storage, where integrity of metallized silicon to high temperatures is necessary.

  11. CAST solar axion search with 3^He buffer gas: Closing the hot dark matter gap

    E-Print Network [OSTI]

    M. Arik; S. Aune; K. Barth; A. Belov; S. Borghi; H. Brauninger; G. Cantatore; J. M. Carmona; S. A. Cetin; J. I. Collar; E. Da Riva; T. Dafni; M. Davenport; C. Eleftheriadis; N. Elias; G. Fanourakis; E. Ferrer-Ribas; P. Friedrich; J. Galan; J. A. Garcia; A. Gardikiotis; J. G. Garza; E. N. Gazis; T. Geralis; E. Georgiopoulou; I. Giomataris; S. Gninenko; H. Gomez; M. Gomez Marzoa; E. Gruber; T. Guthorl; R. Hartmann; S. Hauf; F. Haug; M. D. Hasinoff; D. H. H. Hoffmann; F. J. Iguaz; I. G. Irastorza; J. Jacoby; K. Jakovcic; M. Karuza; K. Konigsmann; R. Kotthaus; M. Krcmar; M. Kuster; B. Lakic; P. M. Lang; J. M. Laurent; A. Liolios; A. Ljubicic; V. Lozza; G. Luzon; S. Neff; T. Niinikoski; A. Nordt; T. Papaevangelou; M. J. Pivovaroff; G. Raffelt; H. Riege; A. Rodriguez; M. Rosu; J. Ruz; I. Savvidis; I. Shilon; P. S. Silva; S. K. Solanki; L. Stewart; A. Tomas; M. Tsagri; K. van Bibber; T. Vafeiadis; J. Villar; J. K. Vogel; S. C. Yildiz; K. Zioutas

    2014-09-15

    The CERN Axion Solar Telescope (CAST) has finished its search for solar axions with 3^He buffer gas, covering the search range 0.64 eV < m_a <1.17 eV. This closes the gap to the cosmological hot dark matter limit and actually overlaps with it. From the absence of excess X-rays when the magnet was pointing to the Sun we set a typical upper limit on the axion-photon coupling of g_ag < 3.3 x 10^{-10} GeV^{-1} at 95% CL, with the exact value depending on the pressure setting. Future direct solar axion searches will focus on increasing the sensitivity to smaller values of g_a, for example by the currently discussed next generation helioscope IAXO.

  12. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  13. Mechanical reorganization of cross-linked F-actin networks at the air-buffer Thomas Boatwright,a

    E-Print Network [OSTI]

    Dennin, Michael

    Mechanical reorganization of cross-linked F-actin networks at the air-buffer interface Thomas compression is studied. We observe two distinct classes of behavior: a mechanically induced structural reorganization of the monolayer and a subsequent reversible, nonlinear mechanical response. Measurements

  14. Tin Anode for Sodium-Ion Batteries Using Natural Wood Fiber as a Mechanical Buffer and Electrolyte Reservoir

    E-Print Network [OSTI]

    Rubloff, Gary W.

    Tin Anode for Sodium-Ion Batteries Using Natural Wood Fiber as a Mechanical Buffer and Electrolyte Information ABSTRACT: Sodium (Na)-ion batteries offer an attractive option for low cost grid scale storage due to the abundance of Na. Tin (Sn) is touted as a high capacity anode for Na-ion batteries with a high theoretical

  15. DISTORTIONS TO CURRENT-VOLTAGE CURVES OF CIGS CELLS WITH SPUTTERED Zn(O,S) BUFFER LAYERS

    E-Print Network [OSTI]

    Sites, James R.

    alternative to CdS for (CIGS) thin-film solar cells' buffer layer. It has a higher band gap and thus allows to current- voltage (J-V) curves of sputtered-Zn(O,S)/CIGS solar cells. A straightforward photodiode model partner in the CIGS team, and Russell for showing me the solar cells characterization, and John, Jen

  16. BUFFER MANAGER, FILES AND RECORDS (LOOSELY BASED ON THE COW BOOK: 9.4 9.7)

    E-Print Network [OSTI]

    Patel, Jignesh

    Eally looks like one big file that is a large byte array 2. OR, the DBMS grabs;9/10/13 CS 564: Database Management Systems 4 Buffer Management in a DBMS · Data must be in RAM for DBMS to operate on it! ­ Can't keep all the DBMS pages in main

  17. 11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-are-vulnerable-to-slackers/#comment-8042

    E-Print Network [OSTI]

    West, Stuart

    11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers « Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-NonCommercial- ShareAlike 2.5 License. Carnivals #12;11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers

  18. 486 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS--II: EXPRESS BRIEFS, VOL. 59, NO. 8, AUGUST 2012 A Compact Rail-to-Rail Class-AB CMOS Buffer

    E-Print Network [OSTI]

    Serdijn, Wouter A.

    circuits, high speed, rail to rail, slew-rate enhancement. I. INTRODUCTION IN ORDER to drive a large A Compact Rail-to-Rail Class-AB CMOS Buffer With Slew-Rate Enhancement Chutham Sawigun, Member, IEEE Abstract--Two prior-art transconductance amplifier-based rail-to-rail class-AB analog buffers are examined

  19. Evaluation of methods for application of epitaxial buffer and superconductor layers

    SciTech Connect (OSTI)

    1999-03-30

    The recent achievements of critical currents exceeding million amperes per square centimeter at 77K in YBCO deposited over suitably textured substrate have stimulated interest in the potential applications of coated conductors at high temperatures and in high magnetic fields. Currently, ion-beam assisted deposition (IBAD), and rolling assisted bi-axially textured substrate (RABiTS), represent two available options for obtaining textured substrates. For applying suitable coatings of buffer and high temperature superconductor (HTS) material over textured substrates, several options are available which include sputtering, electron-beam evaporation, laser ablation, electrophoresis, chemical vapor deposition (including metal organics chemical vapor deposition), sol-gel, metal organics decomposition, electrodeposition and aerosol/spray pyrolysis. A commercial continuous long-length wire/tape manufacturing scheme developed out of any suitable combination of the above techniques would consist of operations involving preparation of the substrate and application of buffer, HTS and passivation/insulation materials and special treatment steps such as post-annealing. These operations can be effected by various process parameters that can be classified into chemistry, materials, engineering and environmental related parameters. Under the DOE-sponsored program, to carry out an engineering evaluation, first, the process flow schemes were developed for various candidate options identifying the major operating steps, process conditions, and process streams. Next, to evaluate quantifiable parameters such as process severity (e.g. temperature and pressure), coating thickness and deposition rate for HTS material, achieved maximum J{sub c} value (for films >1{micro}m thick) and cost of chemical and material utilization efficiency, the multi-attribute method was used to determine attributes/merits for various parameters and candidate options. To determine similar attribute values for the non-quantifiable parameters, a subjective evaluation was used. Results of the two evaluations were then combined to calculate the overall merit/utility of a given option using weighting factors. To evaluate the effect of arbitrarily determined weighting factors, a sensitivity analysis was carried out by using three different sets of weighting factors. In the end, the results of the overall utility/merit values calculated using different sets of weighting factors were utilized to determine the preliminary ranking among the candidate options. As a result of this study, MOD, Sol-Gel, MOCVD, E-Beam and PLD options have been identified as the leading candidates for continuous, long-length processing of coated HTS conductors. However, there are several technical concerns related to each of these which need to be addressed first before a commercially viable option can be developed out of any one of them.

  20. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  1. Climate change vulnerability of forest biodiversity: climate and competition tracking of demographic rates

    E-Print Network [OSTI]

    Teskey, Robert O.

    al., 2002; Thomas et al., 2004; Jetz et al., 2007). Some experts argue that responses will depend insight regarding vulnerability to any one (Streng et al., 1989; Elliott & Baker, 2004; Iba´n~ez et al., 2006; Yang et al., 2006; Canham & Thomas, 2010). CIS are further complicated by the fact that current

  2. On the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    , the Tor network consists of roughly 2000 "Onion Routers" that voluntarily relay traffic between who can observe a Tor client's network connections and even control some Onion Routers shouldOn the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design Jon

  3. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  4. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  5. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  6. American Journal of Botany 89(12): 19161924. 2002. THE VULNERABILITY TO FREEZING-INDUCED XYLEM

    E-Print Network [OSTI]

    Pockman, William T.

    1916 American Journal of Botany 89(12): 1916­1924. 2002. THE VULNERABILITY TO FREEZING, Albuquerque, New Mexico 87131-1091 USA The temperature dependence of freezing-induced xylem cavitation- rated the previously observed relationship between minimum freezing temperature and embolism. The area

  7. How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems

    E-Print Network [OSTI]

    and computer expert Vickie Lynch have been computer-modeling the vulnerability of electrical grids for several ever-larger power networks to transmit electricity, experts said Thursday. When a system becomes super-power failures. "The whole grid is very strongly coupled, and when you do something in one point

  8. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  9. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  10. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  11. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    that the population of a city grows, new problems arise, which include scarcity of resources, pollution, and traffic [1]. However, bigger cities generate new kinds of problems, such as scarcity of resources, pollutionDetection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz

  12. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  13. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  14. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  15. Software mitigations to hedge AES against cachebased software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache­based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat­ forms, software side channels have become a subject of interest. Recent publications discussed cache­based software side channel

  16. Software mitigations to hedge AES against cache-based software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat- forms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel

  17. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    are built with traditional metrics of complexity, code churn, and fault history. We have performed to the code [17]. Hence, complexity metrics and code churn metrics have been used for fault prediction [5, 17 fault prediction metrics ­ complexity, code churn, and fault history metrics for vulnerability

  18. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  19. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  20. A Plague of Plug-ins Thomas Ball

    E-Print Network [OSTI]

    Borgs, Christian

    Interaction · Other thoughts ­ Smart phone ­ Cloud computing ­ Human-based computation #12;Car Plug-ins #12: "DOM Level 1" recommended by W3C #12;2000s: Buffer Overflow and Security Exploits · Connectedness of code with many buffer overflows (lack of isolation) leads to a security crisis at Microsoft · Security

  1. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  2. CAST search for sub-eV mass solar axions with 3He buffer gas

    E-Print Network [OSTI]

    M. Arik; S. Aune; K. Barth; A. Belov; S. Borghi; H. Bräuninger; G. Cantatore; J. M. Carmona; S. A. Cetin; J. I. Collar; T. Dafni; M. Davenport; C. Eleftheriadis; N. Elias; C. Ezer; G. Fanourakis; E. Ferrer-Ribas; P. Friedrich; J. Galán; J. A. García; A. Gardikiotis; E. N. Gazis; T. Geralis; I. Giomataris; S. Gninenko; H. Gómez; E. Gruber; T. Guthörl; R. Hartmann; F. Haug; M. D. Hasinoff; D. H. H. Hoffmann; F. J. Iguaz; I. G. Irastorza; J. Jacoby; K. Jakov?i?; M. Karuza; K. Königsmann; R. Kotthaus; M. Kr?mar; M. Kuster; B. Laki?; J. M. Laurent; A. Liolios; A. Ljubi?i?; V. Lozza; G. Lutz; G. Luzón; J. Morales; T. Niinikoski; A. Nordt; T. Papaevangelou; M. J. Pivovaroff; G. Raffelt; T. Rashba; H. Riege; A. Rodríguez; M. Rosu; J. Ruz; I. Savvidis; P. S. Silva; S. K. Solanki; L. Stewart; A. Tomás; M. Tsagri; K. van Bibber; T. Vafeiadis; J. Villar; J. K. Vogel; S. C. Yildiz; K. Zioutas

    2012-10-04

    The CERN Axion Solar Telescope (CAST) has extended its search for solar axions by using 3He as a buffer gas. At T=1.8 K this allows for larger pressure settings and hence sensitivity to higher axion masses than our previous measurements with 4He. With about 1 h of data taking at each of 252 different pressure settings we have scanned the axion mass range 0.39 eV < m_a < 0.64 eV. From the absence of excess X-rays when the magnet was pointing to the Sun we set a typical upper limit on the axion-photon coupling of g_ag < 2.3 x 10^{-10} GeV^{-1} at 95% CL, the exact value depending on the pressure setting. KSVZ axions are excluded at the upper end of our mass range, the first time ever for any solar axion search. In future we will extend our search to m_a < 1.15 eV, comfortably overlapping with cosmological hot dark matter bounds.

  3. Determination of effective axion masses in the helium-3 buffer of CAST

    SciTech Connect (OSTI)

    Ruz, J

    2011-11-18

    The CERN Axion Solar Telescope (CAST) is a ground based experiment located in Geneva (Switzerland) searching for axions coming from the Sun. Axions, hypothetical particles that not only could solve the strong CP problem but also be one of the favored candidates for dark matter, can be produced in the core of the Sun via the Primakoff effect. They can be reconverted into X-ray photons on Earth in the presence of strong electromagnetic fields. In order to look for axions, CAST points a decommissioned LHC prototype dipole magnet with different X-ray detectors installed in both ends of the magnet towards the Sun. The analysis of the data acquired during the first phase of the experiment yielded the most restrictive experimental upper limit on the axion-to-photon coupling constant for axion masses up to about 0.02 eV/c{sup 2}. During the second phase, CAST extends its mass sensitivity by tuning the electron density present in the magnetic field region. Injecting precise amounts of helium gas has enabled CAST to look for axion masses up to 1.2 eV/c{sup 2}. This paper studies the determination of the effective axion masses scanned at CAST during its second phase. The use of a helium gas buffer at temperatures of 1.8 K has required a detailed knowledge of the gas density distribution. Complete sets of computational fluid dynamic simulations validated with experimental data have been crucial to obtain accurate results.

  4. Effect of ZnO seed layer on the morphology and optical properties of ZnO nanorods grown on GaN buffer layers

    SciTech Connect (OSTI)

    Nandi, R. Mohan, S. Major, S. S.; Srinivasa, R. S.

    2014-04-24

    ZnO nanorods were grown by chemical bath deposition on sputtered, polycrystalline GaN buffer layers with and without ZnO seed layer. Scanning electron microscopy and X-ray diffraction show that the ZnO nanorods on GaN buffer layers are not vertically well aligned. Photoluminescence spectrum of ZnO nanorods grown on GaN buffer layer, however exhibits a much stronger near-band-edge emission and negligible defect emission, compared to the nanorods grown on ZnO buffer layer. These features are attributed to gallium incorporation at the ZnO-GaN interface. The introduction of a thin (25 nm) ZnO seed layer on GaN buffer layer significantly improves the morphology and vertical alignment of ZnO-NRs without sacrificing the high optical quality of ZnO nanorods on GaN buffer layer. The presence of a thick (200 nm) ZnO seed layer completely masks the effect of the underlying GaN buffer layer on the morphology and optical properties of nanorods.

  5. Growth mechanisms of GaSb heteroepitaxial films on Si with an AlSb buffer layer

    SciTech Connect (OSTI)

    Vajargah, S. Hosseini; Botton, G. A.; Brockhouse Institute for Materials Research, McMaster University, Hamilton, Ontario L8S 4M1; Canadian Centre for Electron Microscopy, McMaster University, Hamilton, Ontario L8S 4M1 ; Ghanad-Tavakoli, S.; Preston, J. S.; Kleiman, R. N.; Centre for Emerging Device Technologies, McMaster University, Hamilton, Ontario L8S 4L7; Department of Engineering Physics, McMaster University, Hamilton, Ontario L8S 4L7

    2013-09-21

    The initial growth stages of GaSb epilayers on Si substrates and the role of the AlSb buffer layer were studied by high-angle annular dark-field scanning transmission electron microscopy (HAADF-STEM). Heteroepitaxy of GaSb and AlSb on Si both occur by Volmer-Weber (i.e., island mode) growth. However, the AlSb and GaSb islands have distinctly different characteristics as revealed through an atomic-resolution structural study using Z-contrast of HAADF-STEM imaging. While GaSb islands are sparse and three dimensional, AlSb islands are numerous and flattened. The introduction of 3D island-forming AlSb buffer layer facilitates the nucleation of GaSb islands. The AlSb islands-assisted nucleation of GaSb islands results in the formation of drastically higher quality planar film at a significantly smaller thickness of films. The interface of the AlSb and GaSb epilayers with the Si substrate was further investigated with energy dispersive X-ray spectrometry to elucidate the key role of the AlSb buffer layer in the growth of GaSb epilayers on Si substrates.

  6. Structural characterization of ZnO films grown by molecular beam epitaxy on sapphire with MgO buffer

    SciTech Connect (OSTI)

    Pecz, B.; El-Shaer, A.; Bakin, A.; Mofor, A.-C.; Waag, A.; Stoemenos, J. [Research Institute for Technical Physics and Materials Science, Hungarian Academy of Sciences, P.O. Box 49, H-1525 Budapest (Hungary); Institute of Semiconductor Technology, Technical University Braunschweig, Hans-Sommer-Strasse 66, D-38106 Braunschweig (Germany); Physics Department, Aristotle University, University Campus, 54006 Thessaloniki (Greece)

    2006-11-15

    The structural characteristics of the ZnO film grown on sapphire substrate using a thin MgO buffer layer were studied using transmission electron microscopy and high-resolution x-ray diffraction. The growth was carried out in a modified plasma-molecular beam epitaxy system. The observed misfit dislocations were well confined at the sapphire overgrown interface exhibiting domain matching epitaxy, where the integral multiples of lattice constants match across the interface. The main extended defects in the ZnO film were the threading dislocations having a mean density of 4x10{sup 9} cm{sup -2}. The formation of the MgO buffer layer as well as the ZnO growth were monitored in situ by reflection high-energy electron diffraction. The very thin {approx}1 nm, MgO buffer layer can partially interdiffuse with the ZnO as well as react with the Al{sub 2}O{sub 3} substrate forming an intermediate epitaxial layer having the spinel (MgO/Al{sub 2}O{sub 3}) structure.

  7. Static analysis of modern software systems

    E-Print Network [OSTI]

    Might, Matt

    . FBI Security vulnerabilities 8 #12;Cost and cause of insecurity Vulnerabilities Fraud Dumb Employees DoS Cost of cybercrime ($80bn) 9 #12;Cost and cause of insecurity Source: CSI/FBI Survey 2007 Overflow Injection Int Overflow Format String Other Source: US CERT, Feb 2008Source: CSI/FBI Survey 2007

  8. TO OVERFLOW P DUNDEE CITY COUNCIL

    E-Print Network [OSTI]

    Swain, Peter

    Building 13 Geography Tower Building 1 Graduate School of Natural Resources Law, Policy & Management School Resource Room 5 Airlie Place 11 Energy, Petroleum and Mineral Law and Policy (Centre for) Carnegie Building Resources Tower Building 1 Institute of Sport and Exercise (ise) 19 International Advice Service Enquiry

  9. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  10. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  11. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  12. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  13. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin|

  14. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore »to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  15. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  16. High quality metamorphic graded buffers with lattice-constants intermediate to GaAs an InP for device applications

    E-Print Network [OSTI]

    Lee, Kenneth Eng Kian

    2009-01-01

    We have investigated the use of a continuous, linear grading scheme for compositionally-graded metamorphic InxGal-As buffers on GaAs, which can be used as virtual substrates for optical emitters operating at wavelengths > ...

  17. Metamorphic GaAsP buffers for growth of wide-bandgap InGaP solar cells J. Simon,1,a

    E-Print Network [OSTI]

    Haller, Gary L.

    . INTRODUCTION Triple-junction metamorphic solar cells have reached ef- ficiencies as high as 41.1% by combiningMetamorphic GaAsP buffers for growth of wide-bandgap InGaP solar cells J. Simon,1,a S. Tomasulo,1 P-yP solar cells. Tensile-strained GaAsxP1-x buffers grown on GaAs using unoptimized conditions

  18. Vulnerability in Holstein-Friesian dairy cows : risk factors for culling and effect of temperament on oestrus 

    E-Print Network [OSTI]

    Chiumia, Daniel

    2011-11-25

    The general aims of the work were to determine the factors associated with vulnerability in Holstein- Friesian dairy cows in two scenarios: A) culling and B) the effect of temperament on days to first recorded oestrus ...

  19. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  20. Parallel log structured file system collective buffering to achieve a compact representation of scientific and/or dimensional data

    DOE Patents [OSTI]

    Grider, Gary A.; Poole, Stephen W.

    2015-09-01

    Collective buffering and data pattern solutions are provided for storage, retrieval, and/or analysis of data in a collective parallel processing environment. For example, a method can be provided for data storage in a collective parallel processing environment. The method comprises receiving data to be written for a plurality of collective processes within a collective parallel processing environment, extracting a data pattern for the data to be written for the plurality of collective processes, generating a representation describing the data pattern, and saving the data and the representation.

  1. EXAMINATION OF DISLOCATIONS IN LATTICE-MISMATCHED GaInAs/BUFFER LAYER/GaAs FOR III-V PHOTOVOLTAICS

    SciTech Connect (OSTI)

    Levander, A.; Geisz, J.

    2007-01-01

    Dislocations act as sites for nonradiative electron/hole pair recombination, which reduces the effi ciency of photovoltaics. Lattice-matched materials can be grown on top of one another without forming a high density of dislocations. However, when the growth of lattice-mismatched (LMM) materials is attempted, many dislocations result from the relaxation of strain in the crystal structure. In an attempt to reduce the number of dislocations that propagate into a solar device when using LMM materials, a compositionally step-graded buffer is placed between the two LMM materials. In order to confi ne the dislocations to the buffer layer and therefore increase material quality and device effi ciency, the growth temperature and thickness of the buffer layer were varied. A GaInP compositionally graded buffer and GaInAs p-n junction were grown on a GaAs substrate in a metal-organic chemical vapor deposition (MOCVD) system. A multibeam optical stress sensor (MOSS) and X-ray diffraction (XRD) were used to characterize the strain in the epilayers. Electrical and optoelectronic properties were measured using a probe station and multimeter setup, solar simulator, and a quantum effi ciency instrument. It was determined that device functionality was highly dependent on the growth temperature of the graded buffer. As growth temperature increased, so did the dislocation density in the device despite an increase in the dislocation velocity, which should have increased the dislocation annihilation rate and the diffusion of dislocations to the edge of the crystal. The thickness of the graded buffer also affected device effi ciency with thinner samples performing poorly. The thinner graded buffer layers had high internal resistances from reduced carrier concentrations. In terms of effi ciency, the empirically derived recipe developed by the scientists at the National Renewable Energy Laboratory (NREL) produced the highest quality cells.

  2. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  3. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  4. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  5. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department

  6. Nanostructured europium oxide thin films deposited by pulsed laser ablation of a metallic target in a He buffer atmosphere

    SciTech Connect (OSTI)

    Luna, H.; Franceschini, D. F.; Prioli, R.; Guimaraes, R. B.; Sanchez, C. M.; Canal, G. P.; Barbosa, M. D. L.; Galvao, R. M. O. [Instituto de Fisica, Universidade Federal do Rio de Janeiro, Cx. Postal 68528, Rio de Janeiro, RJ 21941-972 (Brazil); Instituto de Fisica, Universidade Federal Fluminense, Niteroi, RJ 24210-346 (Brazil); Departamento de Fisica, Pontificia Universidade Catolica do Rio de Janeiro, Rua Marques de Sao Vicente 225, 22453-970, Rio de Janeiro, RJ (Brazil); Instituto de Fisica, Universidade Federal Fluminense, Niteroi, RJ 24210-346 (Brazil); Centro Brasileiro de Pesquisas Fisicas, Laboratorio de Plasmas Aplicados, Rua Xavier Sigaud 150, 22290-180, Rio de Janeiro, RJ (Brazil); Instituto de Fisica, Departamento de Fisica Nuclear, Universidade de Sao Paulo, Caixa Postal 66328, 05315-970, Sao Paulo, SP (Brazil); Centro Brasileiro de Pesquisas Fisicas, Laboratorio de Plasmas Aplicados, Rua Xavier Sigaud 150, 22290-180, Rio de Janeiro, RJ (Brazil)

    2010-09-15

    Nanostrucured europium oxide and hydroxide films were obtained by pulsed Nd:YAG (532 nm) laser ablation of a europium metallic target, in the presence of a 1 mbar helium buffer atmosphere. Both the produced film and the ambient plasma were characterized. The plasma was monitored by an electrostatic probe, for plume expansion in vacuum or in the presence of the buffer atmosphere. The time evolution of the ion saturation current was obtained for several probe to substrate distances. The results show the splitting of the plume into two velocity groups, being the lower velocity profile associated with metal cluster formation within the plume. The films were obtained in the presence of helium atmosphere, for several target-to-substrate distances. They were analyzed by Rutherford backscattering spectrometry, x-ray diffraction, and atomic force microscopy, for as-deposited and 600 deg. C treated-in-air samples. The results show that the as-deposited samples are amorphous and have chemical composition compatible with europium hydroxide. The thermally treated samples show x-ray diffraction peaks of Eu{sub 2}O{sub 3}, with chemical composition showing excess oxygen. Film nanostructuring was shown to be strongly correlated with cluster formation, as shown by velocity splitting in probe current versus time plots.

  7. LAVA/CIS Version 2. 0: A software system for vulnerability and risk assessment

    SciTech Connect (OSTI)

    Smith, S.T.

    1990-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is an original systematic approach to risk assessment developed at the Los Alamos National Laboratory. It is an alternative to existing quantitative methods, providing an approach that is both objective and subjective, and producing results that are both quantitative and qualitative. LAVA was developed as a tool to help satisfy federal requirements for periodic vulnerability and risk assessments of a variety of systems and to satisfy the resulting need for an inexpensive, reusable, automated risk assessment tool firmly rooted in science. LAVA is a three-part systematic approach to risk assessment that can be used to model a variety of application systems such as computer security systems, communications security systems, information security systems, and others. The first part of LAVA is the mathematical model based on classical risk assessment, hierarchical multilevel system theory, decision theory, fuzzy possibility theory, expert system theory, utility theory, and cognitive science. The second part is the implementation of the mathematical risk model as a general software engine executed on a large class of personal computers. The third part is the application data sets written for a specific application system. The user of a LAVA application is not required to have knowledge of formal risk assessment techniques. All the technical expertise and specialized knowledge are built into the software engine and the application system itself. 36 refs., 5 figs.

  8. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  9. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  10. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  11. Development of Production PVD-AIN Buffer Layer System and Processes to Reduce Epitaxy Costs and Increase LED Efficiency

    SciTech Connect (OSTI)

    Cerio, Frank

    2013-09-14

    The DOE has set aggressive goals for solid state lighting (SSL) adoption, which require manufacturing and quality improvements for virtually all process steps leading to an LED luminaire product. The goals pertinent to this proposed project are to reduce the cost and improve the quality of the epitaxial growth processes used to build LED structures. The objectives outlined in this proposal focus on achieving cost reduction and performance improvements over state-of-the-art, using technologies that are low in cost and amenable to high efficiency manufacturing. The objectives of the outlined proposal focus on cost reductions in epitaxial growth by reducing epitaxy layer thickness and hetero-epitaxial strain, and by enabling the use of larger, less expensive silicon substrates and would be accomplished through the introduction of a high productivity reactive sputtering system and an effective sputtered aluminum-nitride (AlN) buffer/nucleation layer process. Success of the proposed project could enable efficient adoption of GaN on-silicon (GaN/Si) epitaxial technology on 150mm silicon substrates. The reduction in epitaxy cost per cm{sup 2} using 150mm GaN-on-Si technology derives from (1) a reduction in cost of ownership and increase in throughput for the buffer deposition process via the elimination of MOCVD buffer layers and other throughput and CoO enhancements, (2) improvement in brightness through reductions in defect density, (3) reduction in substrate cost through the replacement of sapphire with silicon, and (4) reduction in non-ESD yield loss through reductions in wafer bow and temperature variation. The adoption of 150mm GaN/Si processing will also facilitate significant cost reductions in subsequent wafer fabrication manufacturing costs. There were three phases to this project. These three phases overlap in order to aggressively facilitate a commercially available production GaN/Si capability. In Phase I of the project, the repeatability of the performance was analyzed and improvements implemented to the Veeco PVD-AlN prototype system to establish a specification and baseline PVD-AlN films on sapphire and in parallel the evaluation of PVD AlN on silicon substrates began. In Phase II of the project a Beta tool based on a scaled-up process module capable of depositing uniform films on batches of 4”or 6” diameter substrates in a production worthy operation was developed and qualified. In Phase III, the means to increase the throughput of the PVD-AlN system was evaluated and focused primarily on minimizing the impact of the substrate heating and cooling times that dominated the overall cycle time.

  12. Compositionally graded relaxed AlGaN buffers on semipolar GaN for mid-ultraviolet emission

    SciTech Connect (OSTI)

    Young, Erin C.; Wu Feng; Haeger, Daniel A.; Nakamura, Shuji; Denbaars, Steven P.; Cohen, Daniel A.; Speck, James S.; Romanov, Alexey E.

    2012-10-01

    In this Letter, we report on the growth and properties of relaxed, compositionally graded Al{sub x}Ga{sub 1-x}N buffer layers on freestanding semipolar (2021) GaN substrates. Continuous and step compositional grades with Al concentrations up to x = 0.61 have been achieved, with emission wavelengths in the mid-ultraviolet region as low as 265 nm. Coherency stresses were relaxed progressively throughout the grades by misfit dislocation generation via primary (basal) slip and secondary (non-basal) slip systems. Threading dislocation densities in the final layers of the grades were less than 10{sup 6}/cm{sup 2} as confirmed by plan-view transmission electron microscopy and cathodoluminescence studies.

  13. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  14. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  15. New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one

    E-Print Network [OSTI]

    Gilbes, Fernando

    New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one contaminant at a level of concern for human contaminants in groundwater. Regional summaries of where and why groundwater is vulnerable to contamination now

  16. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  17. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  18. Formation of a Buffer Layer for Graphene on C-face SiC{0001} Guowei He, N. Srivastava, and R. M. Feenstra

    E-Print Network [OSTI]

    Feenstra, Randall

    . Feenstra Dept. Physics, Carnegie Mellon University, Pittsburgh, PA 15213 Abstract Graphene films prepared, the formation of interface structures and subsequent graphene films strongly depends on preparation conditions1 Formation of a Buffer Layer for Graphene on C-face SiC{0001} Guowei He, N. Srivastava, and R. M

  19. TrueWay: A Highly Scalable Multi-Plane Multi-Stage Buffered Packet Switch H. Jonathan Chao, Jinsoo Park, Sertac Artan, Shi Jiang

    E-Print Network [OSTI]

    Chao, Jonathan

    , Brooklyn, NY 11201 chao@poly.edu, jspark118@yahoo.com, {sartan01, sjiang01}@utopia.poly.edu Guansong Zhang growth, researchers have been continually exploring new switch architectures with new electronic the multi-plane multi-stage buffered architecture. For instance, Cisco's CRS-1 system [4] based on Benes

  20. Sandy beaches and dunes provide a natural buffer to coastal hazards, habitat for many estuarine species, and water quality services. While

    E-Print Network [OSTI]

    Sandy beaches and dunes provide a natural buffer to coastal hazards, habitat for many estuarine recreation. The importance of sandy shores was recognized with the passage of the Coastal Primary Sand Dune also defined a beach and coastal primary sand dune and included a list of those plants which grow upon

  1. 2446 IEEE TRANSACTIONS ON MAGNETICS, VOL. 46, NO. 6, JUNE 2010 Buffer Layers for Highly Ordered L10 FePt-Oxide Thin Film Granular

    E-Print Network [OSTI]

    Laughlin, David E.

    at moderate depo- sition temperatures. In most previous studies, a FePt-Oxide layer is directly deposited on a (001) textured MgO layer. By introducing a buffer layer in between the FePt-oxide layer and the MgO underlayer, we are able to substantially enhance the L10 ordering of the FePt-oxide layer while lowering

  2. Structural and chemical investigations of CBD-and PVD-CdS buffer layers and interfaces in Cu(In,Ga)Se2-based thin film solar cells

    E-Print Network [OSTI]

    Romeo, Alessandro

    (In,Ga)Se2-based thin film solar cells D. Abou-Rasa,b,*, G. Kostorza , A. Romeob,1 , D. Rudmannb , A Available online 8 December 2004 Abstract It is known that high-efficiency thin film solar cells based on Cu in efficiencies of solar cells with CBD- and PVD-CdS buffer layers can partly be explained by referring

  3. Silica–silica Polyimide Buffered Optical Fibre Irradiation and Strength Experiment at Cryogenic Temperatures for 355 nm Pulsed Lasers

    E-Print Network [OSTI]

    Takala, E; Bordini, B; Bottura, L; Bremer, J; Rossi, L

    2012-01-01

    A controlled UV-light delivery system is envisioned to be built in order to study the stability properties of superconducting strands. The application requires a wave guide from room temperature to cryogenic temperatures. Hydrogen loaded and unloaded polyimide buffered silica–silica 100 microm core fibres were tested at cryogenic temperatures. A thermal stress test was done at 1.9 K and at 4.2 K which shows that the minimal mechanical bending radius for the fibre can be 10 mm for testing (transmission was not measured). The cryogenic transmission loss was measured for one fibre to assess the magnitude of the transmission decrease due to microbending that takes place during cooldown. UV-irradiation degradation measurements were done for bent fibres at 4.2 K with a deuterium lamp and 355 nm pulsed lasers. The irradiation tests show that the fibres have transmission degradation only for wavelengths smaller than 330 nm due to the two photon absorption. The test demonstrates that the fibres are suitable for the ...

  4. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  5. Intrusion Detection using Sequences of System Calls Steven A. Hofmeyr

    E-Print Network [OSTI]

    New Mexico, University of

    Somayaji Dept. of Computer Science University of New Mexico Albuquerque, NM 87131-1386 steveah buffer overflow or bug in Microsoft Internet Explorer, our applications and operating systems are full

  6. A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies

    E-Print Network [OSTI]

    Kindy, Diallo Abdoulaye

    2012-01-01

    In today's world, Web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions are done online with the aid of different Web applications. Though these applications are used by hundreds of people, in many cases the security level is weak, which makes them vulnerable to get compromised. In most of the scenarios, a user has to be identified before any communication is established with the backend database. An arbitrary user should not be allowed access to the system without proof of valid credentials. However, a crafted injection gives access to unauthorized users. This is mostly accomplished via SQL Injection input. In spite of the development of different approaches to prevent SQL injection, it still remains an alarming threat to Web applications. In this paper, we present a detailed ...

  7. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  8. Electron density and currents of AlN/GaN high electron mobility transistors with thin GaN/AlN buffer layer

    SciTech Connect (OSTI)

    Bairamis, A.; Zervos, Ch.; Georgakilas, A.; Adikimenakis, A.; Kostopoulos, A.; Kayambaki, M.; Tsagaraki, K.; Konstantinidis, G.

    2014-09-15

    AlN/GaN high electron mobility transistor (HEMT) structures with thin GaN/AlN buffer layer have been analyzed theoretically and experimentally, and the effects of the AlN barrier and GaN buffer layer thicknesses on two-dimensional electron gas (2DEG) density and transport properties have been evaluated. HEMT structures consisting of [300?nm GaN/ 200?nm AlN] buffer layer on sapphire were grown by plasma-assisted molecular beam epitaxy and exhibited a remarkable agreement with the theoretical calculations, suggesting a negligible influence of the crystalline defects that increase near the heteroepitaxial interface. The 2DEG density varied from 6.8?×?10{sup 12} to 2.1 × 10{sup 13} cm{sup ?2} as the AlN barrier thickness increased from 2.2 to 4.5?nm, while a 4.5?nm AlN barrier would result to 3.1?×?10{sup 13} cm{sup ?2} on a GaN buffer layer. The 3.0?nm AlN barrier structure exhibited the highest 2DEG mobility of 900?cm{sup 2}/Vs for a density of 1.3?×?10{sup 13} cm{sup ?2}. The results were also confirmed by the performance of 1??m gate-length transistors. The scaling of AlN barrier thickness from 1.5?nm to 4.5?nm could modify the drain-source saturation current, for zero gate-source voltage, from zero (normally off condition) to 0.63?A/mm. The maximum drain-source current was 1.1?A/mm for AlN barrier thickness of 3.0?nm and 3.7?nm, and the maximum extrinsic transconductance was 320 mS/mm for 3.0?nm AlN barrier.

  9. Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope2, Marta M. Jankowska3, Christopher Funk4, Gregory Husak1 and

    E-Print Network [OSTI]

    Lopez-Carr, David

    Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope, and environmental degradation reduce adaptive capacity (Bremner, Lopez-Carr et al. 2010). In such a volatile context

  10. BUFFERED WELL FIELD OUTLINES

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium MarketingYear Jan Feb Mar OIL & GAS FIELD

  11. Buffer Bomb Lab Introduction

    E-Print Network [OSTI]

    values for printing characters. The program SENDSTRING can help you generate these raw strings. It takes statutes governing such activities. Logistics This is an individual assignment. The "hand will be unpacked in the directory: MAKECOOKIE: Generates a "cookie" based on your login name. BUFBOMB: The code you

  12. Accelerated Kernel Input Buffer

    E-Print Network [OSTI]

    Bergman, Keren

    of Electrical Engineering, Columbia University, New York, NY 2 Department of Computer Science, Columbia University, New York, NY Abstract--Off-chip data movement capability is critical to the performance alternative to electrical wires with unprecedented bandwidth and scalable energy efficiency. This work

  13. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  14. Enhanced photocatalytic efficiency in zirconia buffered n-NiO/p-NiO single crystalline heterostructures by nanosecond laser treatment

    SciTech Connect (OSTI)

    Molaei, R.; Bayati, M. R.; Alipour, H. M.; Nori, S.; Narayan, J.

    2013-06-21

    We report the formation of NiO based single crystalline p-n junctions with enhanced photocatalytic activity induced by pulsed laser irradiation. The NiO epilayers were grown on Si(001) substrates buffered with cubic yttria-stabilized zirconia (c-YSZ) by using pulsed laser deposition. The NiO/c-YSZ/Si heterostructures were subsequently laser treated by 5 pulses of KrF excimer laser (pulse duration = 25 Multiplication-Sign 10{sup -9} s) at lower energies. Microstructural studies, conducted by X-ray diffraction ({theta}-2{theta} and {phi} techniques) and high resolution transmission electron microscope, showed a cube-on-cube epitaxial relationship at the c-YSZ/Si interface; the epitaxial relationship across the NiO/c-YSZ interface was established as NiO<111 > Double-Vertical-Line Double-Vertical-Line c-YSZ<001> and in-plane NiO<110> Double-Vertical-Line Double-Vertical-Line c-YSZ<100>. Electron microscopy studies showed that the interface between the laser annealed and the pristine region as well as the NiO/c-YSZ interface was atomically sharp and crystallographically continuous. The formation of point defects, namely oxygen vacancies and NiO, due to the coupling of the laser photons with the NiO epilayers was confirmed by XPS. The p-type electrical characteristics of the pristine NiO epilayers turned to an n-type behavior and the electrical conductivity was increased by one order of magnitude after laser treatment. Photocatalytic activity of the pristine (p-NiO/c-YSZ/Si) and the laser-annealed (n-NiO/p-NiO/c-YSZ/Si) heterostructures were assessed by measuring the decomposition rate of 4-chlorophenol under UV light. The photocatalytic reaction rate constants were determined to be 0.0059 and 0.0092 min{sup -1} for the as-deposited and the laser-treated samples, respectively. The enhanced photocatalytic efficiency was attributed to the suppressed charge carrier recombination in the NiO based p-n junctions and higher electrical conductivity. Besides, the oxygen vacancies ease the adsorption of 4-chlorophenol, hydroxyl, and water molecules to the surface. Thus, n-NiO/p-NiO single crystalline catalysts can be introduced as a potent candidate to remediate the environmental pollution.

  15. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  16. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  17. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  18. Transgenic Expression of Glud1 (Glutamate Dehydrogenase 1) in Neurons: In Vivo Model of Enhanced Glutamate Release, Altered Synaptic Plasticity, and Selective Neuronal Vulnerability

    E-Print Network [OSTI]

    Bao, Xiaodong; Pal, Ranu; Hascup, Kevin N.; Wang, Yongfu; Wang, Wen-Tung; Xu, Wenhao; Hui, Dongwei; Agbas, Abdulbaki; Wang, Xinkun; Michaelis, Mary L.; Choi, In-Young; Belousov, Andrei B.; Gerhardt, Greg A.; Michaelis, Eli K.

    2009-11-04

    (P2) and a purified synaptosome fraction were isolated (Michaelis et al., 1983). The pelleted organelles were resuspended in 1–2ml of buffer (0.32 M sucrose, 10 mM ?-aminocaproic acid, 0.1 mM EGTA, 1:100 di- luted protease inhibitor mixture, pH 7...

  19. Topological Performance Measures as Surrogates for Physical Flow Models for Risk and Vulnerability Analysis for Electric Power Systems

    E-Print Network [OSTI]

    LaRocca, Sarah; Hassel, Henrik; Guikema, Seth

    2013-01-01

    Critical infrastructure systems must be both robust and resilient in order to ensure the functioning of society. To improve the performance of such systems, we often use risk and vulnerability analysis to find and address system weaknesses. A critical component of such analyses is the ability to accurately determine the negative consequences of various types of failures in the system. Numerous mathematical and simulation models exist which can be used to this end. However, there are relatively few studies comparing the implications of using different modeling approaches in the context of comprehensive risk analysis of critical infrastructures. Thus in this paper, we suggest a classification of these models, which span from simple topologically-oriented models to advanced physical flow-based models. Here, we focus on electric power systems and present a study aimed at understanding the tradeoffs between simplicity and fidelity in models used in the context of risk analysis. Specifically, the purpose of this pa...

  20. Silberschatz, Galvin and Gagne 2009Operating System Concepts 8th Edition, Security (Chapter 15)

    E-Print Network [OSTI]

    Iamnitchi, Adriana

    and Gagne ©2009Operating System Concepts ­ 8th Edition Program Threats Trojan Horse Code segment Concepts ­ 8th Edition C Program with Buffer-overflow Condition #include #define BUFFER SIZE 256 and Gagne ©2009Operating System Concepts ­ 8th Edition Program Threats (Cont.) Viruses Code fragment

  1. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J of Madras and Faculty of Environmental Studies, York University. Pages 451 ­ 464. SOLID WASTE MANAGEMENT the responsibility of solid waste management remains primarily with the municipal bodies, several other stakeholder

  2. ISET Journal of Earthquake Technology, Paper No. 502, Vol. 46, No. 1, March 2009, pp. 2945 SEISMIC PERFORMANCE AND VULNERABILITY OF INDIAN CODE-

    E-Print Network [OSTI]

    Gupta, Vinay Kumar

    The current seismic design practice in India is based on the force-based design philosophy, with a partial-based seismic design does not provide complete insight into the expected performance and associated risks of the designed buildings. KEYWORDS: Force-Based Design, Pushover Analysis, Seismic Performance, Vulnerability, RC

  3. Hawaii International Conference on System Science, January 2004, Hawaii, copyright 2004 IEEE Dynamical and probabilistic approaches to the study of blackout vulnerability of the

    E-Print Network [OSTI]

    Dynamical and probabilistic approaches to the study of blackout vulnerability of the power transmission grid to a similar characterization for power transmission system blackouts are identified in the OPA dynamical model of series of blackouts. The comparison between the CASCADE and OPA models yields parameters that can

  4. Polarization fatigue and photoinduced current in (Pb0.72La0.28)Ti0.93O3 buffered Pb(Zr0.52Ti0.48)O3 films on platinized silicon

    E-Print Network [OSTI]

    Cao, Wenwu

    , The Pennsylvania State University, University Park, PA, 16802, USA 1. Introduction Lead zirconate titanate (PZT-current (ac) field, prohibits commercial use of PZT films [1,2]. The use of oxide electrodes instead of Pt if the oxide electrodes or buffer layers were used on both sides of PZT films. There were also several

  5. Aspects of the SrO-CuO-TiO2 Ternary System Related to the Deposition of SrTiO3 and Copper-Doped SrTiO3 Thin-Film Buffer Layers

    SciTech Connect (OSTI)

    A. Ayala

    2004-12-20

    YBa{sub 2}Cu{sub 3}O{sub 7-{delta}} (YBCO) coated conductors are promising materials for large-scale superconductivity applications. One version of a YBCO coated conductor is based on ion beam assisted deposition (IBAD) of magnesium oxide (MgO) onto polycrystalline metal substrates. SrTiO{sub 3} (STO) is often deposited by physical vapor deposition (PVD) methods as a buffer layer between the YBCO and IBAD MgO due to its chemical stability and lattice mismatch of only {approx}1.5% with YBCO. In this work, some aspects of the stability of STO with respect to copper (Cu) and chemical solution deposition of STO on IBAD MgO templates were examined. Solubility limits of Cu in STO were established by processing Cu-doped STO powders by conventional bulk preparation techniques. The maximum solubility of Cu in STO was {approx}1% as determined by transmission electron microscopy (TEM) and Rietveld refinements of x-ray diffraction (XRD) data. XRD analysis, performed in collaboration with NIST, on powder compositions on the STO/SrCuO{sub 2} tie line did not identify any ternary phases. SrCu{sub 0.10}Ti{sub 0.90}O{sub y} buffer layers were prepared by pulsed laser deposition (PLD) and CSD on IBAD MgO flexible metallic textured tapes. TEM analysis of a {approx}100 nm thick SrCu{sub 0.10}Ti{sub 0.90}O{sub y} buffer layer deposited by PLD showed a smooth Cu-doped STO/MgO interface. A {approx}600 nm thick YBCO film, deposited onto the SrCu{sub 0.10}Ti{sub 0.90}O{sub y} buffer by PLD, exhibited a T{sub c} of 87 K and critical current density (J{sub c}) of {approx}1 MA/cm{sup 2}. STO and Cu-doped STO thin films by CSD were {approx}30 nm thick. The in plane alignment (FWHM) after deposition of the STO improved by {approx}1{sup o} while it degraded by {approx}2{sup o} with the SrCu{sub 0.05}TiO{sub y} buffer. YBCO was deposited by PLD on the STO and SrCu{sub 0.05}TiO{sub y} buffers. The in plane alignment (FWHM) of the YBCO with the STO buffer layer slightly improved while that of the YBCO with the SrCu{sub 0.05}TiO{sub y} buffer layer remained constant. A goal of the CSD approach to fabrication of coated conductors is process simplicity. In this study, single layer textured films were obtained without a nucleating seed layer that has been deemed necessary by several investigators. These results indicate that Cu-doped STO buffer layers deposited by PLD or CSD are compatible with IBAD MgO and YBCO and that CSD is a viable approach to coated conductor fabrication.

  6. Power-dependent microwave properties of superconducting YBa{sub 2}Cu{sub 3}O{sub 7{minus}x} films on buffered polycrystalline substrates

    SciTech Connect (OSTI)

    Findikoglu, A.T.; Arendt, P.N.; Foltyn, S.R.; Groves, J.R.; Jia, Q.X.; Peterson, E.J.; Bulaevskii, L.; Maley, M.P.; Reagor, D.W.

    1997-06-01

    We have studied the microwave properties of 0.4 {mu}m thick YBa{sub 2}Cu{sub 3}O{sub 7{minus}x} (YBCO) films on polycrystalline substrates with ion-beam-assisted-deposited yttria-stabilized zirconia buffer layers using a parallel-plate resonator technique at 10 GHz. The YBCO films with similar in-plane texture grown on both forsterite and Ni-based alloy substrates show similar microwave properties. We measure low-power surface resistance R{sub s} values of about 0.5 m{Omega} at 76 K and 0.15 m{Omega} at 4 K for films with an in-plane mosaic spread of about 7{degree}. Single-tone power-dependence measurements show that the surface resistance and the surface reactance increase linearly and by the same amount with increasing microwave field level. At intermediate power levels, the intermodulation measurements show odd-order intermodulation products that increase quadratically with two-tone input power. These results indicate a hysteretic vortex penetration mechanism in the weak links as the most plausible source of the observed nonlinearities in these films. {copyright} {ital 1997 American Institute of Physics.}

  7. Epitaxial c-axis oriented BaTiO{sub 3} thin films on SrTiO{sub 3}-buffered Si(001) by atomic layer deposition

    SciTech Connect (OSTI)

    Ngo, Thong Q.; McDaniel, Martin D.; Ekerdt, John G., E-mail: ekerdt@che.utexas.edu [Department of Chemical Engineering, The University of Texas at Austin, Austin, Texas 78712 (United States); Posadas, Agham B.; Demkov, Alexander A. [Department of Physics, The University of Texas at Austin, Austin, Texas 78712 (United States); Hu, Chengqing; Yu, Edward T. [Department of Electrical Engineering, The University of Texas at Austin, Austin, Texas 78712 (United States); Bruley, John [IBM Research Division, Yorktown Heights, New York 10593 (United States)

    2014-02-24

    Atomic layer deposition (ALD) of epitaxial c-axis oriented BaTiO{sub 3} (BTO) on Si(001) using a thin (1.6?nm) buffer layer of SrTiO{sub 3} (STO) grown by molecular beam epitaxy is reported. The ALD growth of crystalline BTO films at 225??°C used barium bis(triisopropylcyclopentadienyl), titanium tetraisopropoxide, and water as co-reactants. X-ray diffraction (XRD) reveals a high degree of crystallinity and c-axis orientation of as-deposited BTO films. Crystallinity is improved after vacuum annealing at 600??°C. Two-dimensional XRD confirms the tetragonal structure and orientation of 7–20-nm thick films. The effect of the annealing process on the BTO structure is discussed. A clean STO/Si interface is found using in-situ X-ray photoelectron spectroscopy and confirmed by cross-sectional scanning transmission electron microscopy. The capacitance-voltage characteristics of 7–20?nm-thick BTO films are examined and show an effective dielectric constant of ?660 for the heterostructure.

  8. Structural characterisation of BaTiO{sub 3} thin films deposited on SrRuO{sub 3}/YSZ buffered silicon substrates and silicon microcantilevers

    SciTech Connect (OSTI)

    Colder, H.; Jorel, C. Méchin, L.; Domengès, B.; Marie, P.; Boisserie, M.; Guillon, S.; Nicu, L.; Galdi, A.

    2014-02-07

    We report on the progress towards an all epitaxial oxide layer technology on silicon substrates for epitaxial piezoelectric microelectromechanical systems. (101)-oriented epitaxial tetragonal BaTiO{sub 3} (BTO) thin films were deposited at two different oxygen pressures, 5.10{sup ?2} mbar and 5.10{sup ?3} mbar, on SrRuO{sub 3}/Yttria-stabilized zirconia (YSZ) buffered silicon substrates by pulsed laser deposition. The YSZ layer full (001) orientation allowed the further growth of a fully (110)-oriented conductive SrRuO{sub 3} electrode as shown by X-ray diffraction. The tetragonal structure of the BTO films, which is a prerequisite for the piezoelectric effect, was identified by Raman spectroscopy. In the BTO film deposited at 5.10{sup ?2} mbar strain was mostly localized inside the BTO grains whereas at 5.10{sup ?3} mbar, it was localized at the grain boundaries. The BTO/SRO/YSZ layers were finally deposited on Si microcantilevers at an O{sub 2} pressure of 5.10{sup ?3} mbar. The strain level was low enough to evaluate the BTO Young modulus. Transmission electron microscopy (TEM) was used to investigate the epitaxial quality of the layers and their epitaxial relationship on plain silicon wafers as well as on released microcantilevers, thanks to Focused-Ion-Beam TEM lamella preparation.

  9. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  10. Microstructural evaluation of Sb-adjusted Al{sub 0.5}Ga{sub 0.5}As{sub 1{minus}y}Sb{sub y} buffer layer systems for IR applications

    SciTech Connect (OSTI)

    Chen, E.; Paine, D.C.; Uppal, P.; Ahearn, J.S.; Nichols, K.; Charache, G.W.

    1998-06-01

    The authors report on a transmission electron microscopy (TEM) study of Sb-adjusted quaternary Al{sub 0.5}Ga{sub 0.5}As{sub 1{minus}y}Sb{sub y} buffer-layers grown on <001> GaAs substrates. A series of structures were grown by MBE at 470 C that utilize a multilayer grading scheme in which the Sb content of Al{sub 0.5}Ga{sub 0.5}As{sub 1{minus}y}Sb{sub y} buffer-layers grown on <001> GaAs substrates. A series of structures were grown by MBe at 470 C that utilize a multilayer grading scheme in which the Sb content of Al{sub 0.5}Ga{sub 0.5}As{sub 1{minus}y}Sb{sub y} is successively increased in a series of 125 nm thick layers. Post growth analysis using conventional bright field and weak beam dark field imaging of these buffer layers in cross-section reveals that the interface misfit dislocations are primarily of the 60{degree} type and are distributed through out the interfaces of the buffer layer. When optimized, the authors have shown, using plan view and cross-sectional TEM, that this approach can reduce the threading defect density to below the detectability limit of TEM (< 10{sup 5}/cm{sup 2}) and preserve growth surface planarity. The Sb-graded approach was used to fabricate two 2.2 {micro}m power converter structures fabricated using InGaAs grown on Sb-based buffer layers on GaAs substrates. A microstructural and electrical characterization was performed on these device structures and the results are contrasted with a sample in which InP was selected as the substrate. Microstructure, defect density and device performance in these not-yet-optimized Sb-based buffer layers compares favorably to equivalent devices fabricated using InP substrates.

  11. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  12. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

    2015-08-31

    The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grassesmore »(prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.« less

  13. Oxidation of In2S3 films to synthetize In2S3(1-x)O3x thin films as a buffer layer in solar cells

    E-Print Network [OSTI]

    Boyer, Edmond

    for fabricating Cd-free CIGS solar cells [1, 2, 3]. One of its advantages is that it can be obtained from solutionOxidation of In2S3 films to synthetize In2S3(1-x)O3x thin films as a buffer layer in solar cells S layers for solar cells. PACS : 68.55.ag Semiconductors, 68.55.J Morphology of films , 68.55.Nq

  14. Towards III-V solar cells on Si: Improvement in the crystalline quality of Ge-on-Si virtual substrates through low porosity porous silicon buffer layer and annealing

    SciTech Connect (OSTI)

    Calabrese, Gabriele; Baricordi, Stefano; Bernardoni, Paolo; Fin, Samuele; Guidi, Vincenzo; Vincenzi, Donato

    2014-09-26

    A comparison between the crystalline quality of Ge grown on bulk Si and on a low porosity porous Si (pSi) buffer layer using low energy plasma enhanced chemical vapor deposition is reported. Omega/2Theta coupled scans around the Ge and Si (004) diffraction peaks show a reduction of the Ge full-width at half maximum (FWHM) of 22.4% in presence of the pSi buffer layer, indicating it is effective in improving the epilayer crystalline quality. At the same time atomic force microscopy analysis shows an increase in root means square roughness for Ge grown on pSi from 38.5 nm to 48.0 nm, as a consequence of the larger surface roughness of pSi compared to bulk Si. The effect of 20 minutes vacuum annealing at 580°C is also investigated. The annealing leads to a FWHM reduction of 23% for Ge grown on Si and of 36.5% for Ge on pSi, resulting in a FWHM of 101 arcsec in the latter case. At the same time, the RMS roughness is reduced of 8.8% and of 46.5% for Ge grown on bulk Si and on pSi, respectively. The biggest improvement in the crystalline quality of Ge grown on pSi with respect to Ge grown on bulk Si observed after annealing is a consequence of the simultaneous reorganization of the Ge epilayer and the buffer layer driven by energy minimization. A low porosity buffer layer can thus be used for the growth of low defect density Ge on Si virtual substrates for the successive integration of III-V multijunction solar cells on Si. The suggested approach is simple and fast –thus allowing for high throughput-, moreover is cost effective and fully compatible with subsequent wafer processing. Finally it does not introduce new chemicals in the solar cell fabrication process and can be scaled to large area silicon wafers.

  15. Nuclear Fuel Cycle & Vulnerabilities

    SciTech Connect (OSTI)

    Boyer, Brian D.

    2012-06-18

    The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

  16. Safeguarding Vulnerable Groups Policy

    E-Print Network [OSTI]

    Martin, Ralph R.

    is defined by the Children Act 1989 and Joint Chief Inspectors Report on Arrangements to Safeguard Children social work 4. Assistance with general household activities 5. Assistance with conduct of a persons own

  17. Dynamics, risk, and vulnerability

    E-Print Network [OSTI]

    Ligon, Ethan A.

    2011-01-01

    month, plus that obtained from reprocessing, from businessthe quantity used for reprocessing or to feed animals, given

  18. Sample Buffer: ReservoirVolume

    E-Print Network [OSTI]

    Gaudet, Rachelle

    Multivalent 10. (A10) 0.1 M Zinc chloride Multivalent 11. (A11) 0.1 M Iron(III) chloride hexahydrate) 30% v/v Dimethyl sulfoxide Dissociating Agent 29. (C5) 0.1 M Sodium bromide Dissociating Agent 30. (C

  19. Burst Buffer Early User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    * Chombo-Crunch + VisIt for carbon sequestration, David Trebotich, Berkeley Lab (BES) * SigmaUniFamSipros bioinformatics codes, Chongle Pan, Oak Ridge National Laboratory (BER)...

  20. Buffer layers for coated conductors

    DOE Patents [OSTI]

    Stan, Liliana (Los Alamos, NM); Jia, Quanxi (Los Alamos, NM); Foltyn, Stephen R. (Los Alamos, NM)

    2011-08-23

    A composite structure is provided including a base substrate, an IBAD oriented material upon the base substrate, and a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material. Additionally, an article is provided including a base substrate, an IBAD oriented material upon the base substrate, a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material, and a thick film upon the cubic metal oxide material. Finally, a superconducting article is provided including a base substrate, an IBAD oriented material upon the base substrate, a cubic metal oxide material selected from the group consisting of rare earth zirconates and rare earth hafnates upon the IBAD oriented material, and an yttrium barium copper oxide material upon the cubic metal oxide material.

  1. Domain matched epitaxial growth of (111) Ba{sub 0.5}Sr{sub 0.5}TiO{sub 3} thin films on (0001) Al{sub 2}O{sub 3} with ZnO buffer layer

    SciTech Connect (OSTI)

    Krishnaprasad, P. S. E-mail: mkj@cusat.ac.in; Jayaraj, M. K. E-mail: mkj@cusat.ac.in; Antony, Aldrin; Rojas, Fredy

    2015-03-28

    Epitaxial (111) Ba{sub 0.5}Sr{sub 0.5}TiO{sub 3} (BST) thin films have been grown by pulsed laser deposition on (0001) Al{sub 2}O{sub 3} substrate with ZnO as buffer layer. The x-ray ?-2?, ?-scan and reciprocal space mapping indicate epitaxial nature of BST thin films. The domain matched epitaxial growth of BST thin films over ZnO buffer layer was confirmed using Fourier filtered high resolution transmission electron microscope images of the film-buffer interface. The incorporation of ZnO buffer layer effectively suppressed the lattice mismatch and promoted domain matched epitaxial growth of BST thin films. Coplanar inter digital capacitors fabricated on epitaxial (111) BST thin films show significantly improved tunable performance over polycrystalline thin films.

  2. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  3. Ge{sub 1-y}Sn{sub y} (y = 0.01-0.10) alloys on Ge-buffered Si: Synthesis, microstructure, and optical properties

    SciTech Connect (OSTI)

    Senaratne, C. L.; Kouvetakis, J. [Department of Chemistry and Biochemistry, Arizona State University, Tempe, Arizona 85287-1604 (United States); Gallagher, J. D.; Jiang, Liying; Smith, D. J.; Menéndez, J. [Department of Physics, Arizona State University, Tempe, Arizona 85287-1504 (United States); Aoki, Toshihiro [LeRoy Eyring Center for Solid State Science, Arizona State University, Tempe, Arizona 85287-1704 (United States)

    2014-10-07

    Novel hydride chemistries are employed to deposit light-emitting Ge{sub 1-y}Sn{sub y} alloys with y ? 0.1 by Ultra-High Vacuum Chemical Vapor Deposition (UHV-CVD) on Ge-buffered Si wafers. The properties of the resultant materials are systematically compared with similar alloys grown directly on Si wafers. The fundamental difference between the two systems is a fivefold (and higher) decrease in lattice mismatch between film and virtual substrate, allowing direct integration of bulk-like crystals with planar surfaces and relatively low dislocation densities. For y ? 0.06, the CVD precursors used were digermane Ge?H? and deuterated stannane SnD?. For y ? 0.06, the Ge precursor was changed to trigermane Ge?H?, whose higher reactivity enabled the fabrication of supersaturated samples with the target film parameters. In all cases, the Ge wafers were produced using tetragermane Ge?H?? as the Ge source. The photoluminescence intensity from Ge{sub 1–y}Sn{sub y}/Ge films is expected to increase relative to Ge{sub 1–y}Sn{sub y}/Si due to the less defected interface with the virtual substrate. However, while Ge{sub 1–y}Sn{sub y}/Si films are largely relaxed, a significant amount of compressive strain may be present in the Ge{sub 1–y}Sn{sub y}/Ge case. This compressive strain can reduce the emission intensity by increasing the separation between the direct and indirect edges. In this context, it is shown here that the proposed CVD approach to Ge{sub 1–y}Sn{sub y}/Ge makes it possible to approach film thicknesses of about 1 ?m, for which the strain is mostly relaxed and the photoluminescence intensity increases by one order of magnitude relative to Ge{sub 1–y}Sn{sub y}/Si films. The observed strain relaxation is shown to be consistent with predictions from strain-relaxation models first developed for the Si{sub 1–x}Ge{sub x}/Si system. The defect structure and atomic distributions in the films are studied in detail using advanced electron-microscopy techniques, including aberration corrected STEM imaging and EELS mapping of the average diamond–cubic lattice.

  4. Microwave surface resistance of YBa{sub 2}Cu{sub 3}Cu{sub 3}O{sub 7{minus}{ital x}} films on polycrystalline ceramic substrates with textured buffer layers

    SciTech Connect (OSTI)

    Findikoglu, A.T.; Foltyn, S.R.; Arendt, P.N.; Groves, J.R.; Jia, Q.X.; Peterson, E.J.; Wu, X.D.; Reagor, D.W.

    1996-09-01

    We have used a parallel-plate resonator technique to measure the microwave surface resist- ance {ital R}{sub {ital s}} of YBa{sub 2}Cu{sub 3}O{sub 7{minus}{ital x}} (YBCO) films on buffered ceramic substrates at around 10 GHz, and studied the correlation between their {ital R}{sub {ital s}} and materials properties. A 0.4-{mu}m-thick YBCO film (with an in-plane mosaic spread of 7{degree}) grown on a polycrystalline alumina substrate with an ion-beam-assisted-deposited yttria-stabilized zirconia buffer layer showed an {ital R}{sub {ital s}} of 1.89 m{Omega} at 76 K and 0.21 m{Omega} at 4 K. We have observed a strong correlation between the {ital R}{sub {ital s}} of the samples and the in-plane mosaic spread of the YBCO films. This correlation can be explained qualitatively in terms of a simple model in which the weak links between the grains of the YBCO film form an electrical network of Josephson junctions.

  5. Climate change and climate variability affect all regions of the world. U.S. vulnerability to the changes and variations are not only dependent on changes within the U.S. but also on

    E-Print Network [OSTI]

    OVERVIEW Climate change and climate variability affect all regions of the world. U.S. vulnerability, it is important to assess emerging threats to national security due to climate change far into the future. Having access to relevant weather and climate data is essential for developing appropriate planning, risk

  6. Operating System Concepts with Java 7th Edition, Nov 15, 2006 Silberschatz, Galvin and Gagne 2007 Chapter 15: Security

    E-Print Network [OSTI]

    Bezrukov, Sergei

    with Java ­ 7th Edition, Nov 15, 2006 Chapter 15: Security The Security Problem Program Threats System Edition, Nov 15, 2006 Program Threats Trojan Horse Code segment that misuses its environment Exploits Edition, Nov 15, 2006 C Program with Buffer-overflow Condition #12;15.10 Silberschatz, Galvin and Gagne

  7. Telematics group University of Gttingen, Germany

    E-Print Network [OSTI]

    Fu, Xiaoming

    the network ­ Sometimes the load is more than the network can handle #12;5WS 2003/04, fu spare room by including value of RcvWindow in segments · Sender limits unACKed data to Rcv to handle" · different from flow control! · manifestations: ­ lost packets (buffer overflow at routers

  8. Principles of a Computer Immune System Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest

    E-Print Network [OSTI]

    Somayaji, Anil

    Department of Computer Science University of New Mexico Albuquerque, NM 87131 soma, steveah, forrest¡ @cs of the Internet. Immune systems have many features that are desirable for the im- perfect, uncontrolled, and open vulnera- bilities. Whether it is the latest UNIX buffer overflow or bug in Microsoft Internet Explorer

  9. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    1994-09-01

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  10. Yttria-stabilized zirconia buffered silicon to optimize in-plane electrical conductivity of [Ca{sub 2}CoO{sub 3}]{sub 0.62}[CoO{sub 2}] thin films

    SciTech Connect (OSTI)

    Kraus, T.; Griesser, A.; Klein, O.; Fischer, M.; Schreck, M.; Karl, H.

    2014-05-05

    The monolithic integration of thermoelectric generators and magnetoresistive functionality on the basis of misfit cobaltate [Ca{sub 2}CoO{sub 3}]{sub 0.62}[CoO{sub 2}] thin films into silicon technology is a prerequisite for their application in miniaturized electric circuits. Here, we report on [Ca{sub 2}CoO{sub 3}]{sub 0.62}[CoO{sub 2}] thin films grown by pulsed laser deposition on (001)-silicon with a thin epitaxial yttria-stabilized zirconia (YSZ) buffer layer. X-ray diffraction and cross-sectional high resolution transmission electron microscopy analysis reveal that high quality c-axis oriented heteroepitaxial [Ca{sub 2}CoO{sub 3}]{sub 0.62}[CoO{sub 2}] films with a 12-fold in-plane rotational symmetry can be grown, which exhibit remarkable lower electrical resistivity compared to those with random in-plane orientation. This result is explained by energetically preferred epitaxial growth directions of the pseudo hexagonal [CoO{sub 2}] sublayer in monoclinic [Ca{sub 2}CoO{sub 3}]{sub 0.62}[CoO{sub 2}] onto the cubic (001)-YSZ surface leading to a highly symmetric in-plane mutual orientation of the charge transporting CoO{sub 2} sublayer domains.

  11. Vulnerable Strong Farm Finance Scorecard

    E-Print Network [OSTI]

    risk and borrowing capacity of the business. 9. Rate of return on farm equity - represents the interest farm income - represents return to 3 things, · Your labor, · Your management and · Your equity, that you have invested in the business. It is the reward for investing your unpaid family labor, management

  12. Energy Spending and Vulnerable Households

    E-Print Network [OSTI]

    Jamasb, Tooraj; Meier, Helena

    2011-01-26

     of gas and electricity prices. Figure 1 shows the average yearly gas  and electricity price developments for the UK during the period of our study. The  data is drawn from the IEA (1997) and IEA (2008).3 Both prices have developed  rather  similarly,  and  were  below  their  1991... time. 3 The IEA data is also published by the Department of Energy and Climate Change (DECC). EPRG No                                                                                                                     6 reduction  in  electricity...

  13. Vulnerability Scanning Policy 1 Introduction

    E-Print Network [OSTI]

    -out of the scan. Only the user responsible for a host may opt-out of the scanning process. AC&N will make a web

  14. FUEL CASK IMPACT LIMITER VULNERABILITIES

    SciTech Connect (OSTI)

    Leduc, D; Jeffery England, J; Roy Rothermel, R

    2009-02-09

    Cylindrical fuel casks often have impact limiters surrounding just the ends of the cask shaft in a typical 'dumbbell' arrangement. The primary purpose of these impact limiters is to absorb energy to reduce loads on the cask structure during impacts associated with a severe accident. Impact limiters are also credited in many packages with protecting closure seals and maintaining lower peak temperatures during fire events. For this credit to be taken in safety analyses, the impact limiter attachment system must be shown to retain the impact limiter following Normal Conditions of Transport (NCT) and Hypothetical Accident Conditions (HAC) impacts. Large casks are often certified by analysis only because of the costs associated with testing. Therefore, some cask impact limiter attachment systems have not been tested in real impacts. A recent structural analysis of the T-3 Spent Fuel Containment Cask found problems with the design of the impact limiter attachment system. Assumptions in the original Safety Analysis for Packaging (SARP) concerning the loading in the attachment bolts were found to be inaccurate in certain drop orientations. This paper documents the lessons learned and their applicability to impact limiter attachment system designs.

  15. Climate Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment of EnergyResearchersOctoberCharles RousseauxNearly 1005AsU.S.The Energy

  16. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal EnergyRenewable Energy IntegrationRiskProgram

  17. Dielectric properties of <001>-oriented Ba{sub 0.6}Sr{sub 0.4}TiO{sub 3} thin films on polycrystalline metal tapes using biaxially oriented MgO/{gamma}-Al{sub 2}O{sub 3} buffer layers

    SciTech Connect (OSTI)

    Choi, W.; Kang, B.S.; Jia, Q.X.; Matias, V.; Findikoglu, A.T.

    2006-02-06

    We report the growth of <001>-oriented Ba{sub 0.6}Sr{sub 0.4}TiO{sub 3} (BST) thin films on polycrystalline Ni-alloy tapes by pulsed laser deposition using biaxially oriented, ion-beam-assisted deposited (IBAD) MgO and {gamma}-Al{sub 2}O{sub 3} buffer layers. Dielectric constant values of our BST films were up to {approx}85% of those in the epitaxial films prepared under similar conditions on single-crystal MgO substrates. No significant dispersion of the dielectric constant was observed for frequencies from 100 Hz to 1 MHz. These results demonstrate the versatility of using IBAD-textured MgO and {gamma}-Al{sub 2}O{sub 3} buffer layers to integrate highly oriented good-quality BST films with nonsingle-crystalline substrates.

  18. Rapid screening buffer layers in photovoltaics

    DOE Patents [OSTI]

    List, III, Frederick Alyious; Tuncer, Enis

    2014-09-09

    An apparatus and method of testing electrical impedance of a multiplicity of regions of a photovoltaic surface includes providing a multi-tipped impedance sensor with a multiplicity of spaced apart impedance probes separated by an insulating material, wherein each impedance probe includes a first end adapted for contact with a photovoltaic surface and a second end in operable communication with an impedance measuring device. The multi-tipped impedance sensor is used to contact the photovoltaic surface and electrical impedance of the photovoltaic material is measured between individual first ends of the probes to characterize the quality of the photovoltaic surface.

  19. An efficient buffer management methods for Cachet

    E-Print Network [OSTI]

    Kim, Byungsub, 1978-

    2004-01-01

    (cont.) running simulation. Third, since BCachet is almost linear under the assumption of a reasonable number of sites, BCachet is very scalable. Therefore, it can be used to for very large scale multiprocessor systems.

  20. Enhanced Bipolar Stacked Switched Capacitor Energy Buffers

    E-Print Network [OSTI]

    Perreault, Dave

    at high power factor (such as power supplies, solar inverters, electric vehicle chargers and off- line LED

  1. Freshwater flooding from rivers, overflowing sewage and septic systems and other sources can have a signifi-

    E-Print Network [OSTI]

    on the source of the flood water and the materials carried in the water. Flooded plants usually die because there is no hazardous flood debris such as pro- pane tanks, pressurized-gas cylinders, refrigerators, air conditioners and Laboratory Manager, and Professor and Extension Water Resources Specialist, The Texas A&M System. Before

  2. The effect of a hydraulic parameterisation of overflows on the ocean circulation

    E-Print Network [OSTI]

    Born, Andreas

    eine Bistabilit¨at erm¨oglichen. #12;Contents 1 Introduction 7 2 The circulation in the Atlantic Ocean

  3. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers Gain

  4. USDA Forest Service Gen. Tech. Rep. PSW-GTR-168. 1998. 71 Buffering the Buffer1

    E-Print Network [OSTI]

    upstream storage of water · Maintenance of downstream channel form and in- stream habitat through they regulate the type and amount of sediment coming from upslope and upstream, moderate downstream flood peaks tool for helping to sustain aquatic ecosystems and to protect downstream resources and values

  5. Power Optimal Dual-Vdd Buffered Tree Considering Buffer Stations and Blockages

    E-Print Network [OSTI]

    He, Lei

    details about experimental settings and proof of theorems are included in our technical report [9]. 2 « · rw · l (1) where cw and rw are the unit length capacitance and resis- tance of the interconnect

  6. BuffersA guide for the preparation and use of buffers in biological systems

    E-Print Network [OSTI]

    Lebendiker, Mario

    . Please call us today for a free copy of our LATEST Catalog that includes tools for signal transduction?. . . . . . . . 1 Water, The Fluid of Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Ionization of Water

  7. T-604: Google Chrome updated version of the Adobe Flash player

    Broader source: Energy.gov [DOE]

    The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process.

  8. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 3, Site team reports

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    A self assessment was conducted of those Hanford facilities that are utilized to store Reactor Irradiated Nuclear Material, (RINM). The objective of the assessment is to identify the Hanford inventories of RINM and the ES & H concerns associated with such storage. The assessment was performed as proscribed by the Project Plan issued by the DOE Spent Fuel Working Group. The Project Plan is the plan of execution intended to complete the Secretary`s request for information relevant to the inventories and vulnerabilities of DOE storage of spent nuclear fuel. The Hanford RINM inventory, the facilities involved and the nature of the fuel stored are summarized. This table succinctly reveals the variety of the Hanford facilities involved, the variety of the types of RINM involved, and the wide range of the quantities of material involved in Hanford`s RINM storage circumstances. ES & H concerns are defined as those circumstances that have the potential, now or in the future, to lead to a criticality event, to a worker radiation exposure event, to an environmental release event, or to public announcements of such circumstances and the sensationalized reporting of the inherent risks.

  9. Energy Department Issues Tribal Energy System Vulnerabilities...

    Broader source: Energy.gov (indexed) [DOE]

    202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy issued a report today showing that threats to tribal energy infrastructure are expected to increase as climate change...

  10. Power Grid Vulnerability to Geographically Correlated Failures

    E-Print Network [OSTI]

    Shepard, Kenneth

    potential locations for grid monitoring, and hence, will have impact on the deployment of the smart-grid

  11. Vulnerability Assessment for Hood County, TX 

    E-Print Network [OSTI]

    Aldalbahi, Farisal; Cousins, Tiffany; Franks, Kristie; Hamidah, Nur; Herring, Kalen; Kirimli, Ridvan; Rojas, Ricardo Maga; McCharen, Robert; Paiz-Tabash, William; Phillips, Ellen; Thapa, Jeewasmi; Wallick, Andrew; Yan, Wenqian; Zhang, Yixun

    2015-01-01

    Looking forward, we mapped the 100-year and 500-year floodplains in the County. A 100-year floodplain indicates areas that have a 1% chance each year of flooding. The majority of the floodplain follows the Brazos River, as would be expected, and its...

  12. Privacy Vulnerability of Published Anonymous Mobility Traces

    E-Print Network [OSTI]

    2010-07-07

    Sep 20, 2010 ... urban sensing, where mobile nodes carried by ordinary city residents or ... of interest in their city areas. ... held devices including smart phones.

  13. Privacy Vulnerability of Published Anonymous Mobility Traces

    E-Print Network [OSTI]

    2012-08-01

    city residents or their vehicles are used to monitor various events of interest in their city areas. Example ...... security, network incentives, and smart grids. Dr. Yau ...

  14. US Energy Sector Vulnerabilities to Climate Change

    Office of Environmental Management (EM)

    storms and hurricanes for the Calvert Cliffs Nuclear facility (Maryland) and the Turkey Point Nuclear facility (Florida). Under current conditions, storm surge would range...

  15. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced (2008)] #12;Natural Disaster Trend and Number of People Affected (1975 ­ 2008) Natural Disaster Trend conflicting criteria used in decision-making; · constraints on resources: natural, human, financial, time, etc

  16. Guide to Using Vulnerability Naming Schemes

    E-Print Network [OSTI]

    welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL the development of technical, physical, administrative, and management standards and guidelines for the cost Institute of Standards and Technology David Waltermire Karen Scarfone Daniel Owens C O M P U T E R S E C U R

  17. NIST Interagency Report 7435 The Common Vulnerability

    E-Print Network [OSTI]

    by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 August 2007 U

  18. Texas Water Resources: Vulnerability from Contaminants 

    E-Print Network [OSTI]

    Dwivedi, Dipankar

    2012-10-02

    Numerical models of flow and transport are commonly applied for the sustainable management of water resources and for the selection of appropriate remediation techniques. However, these numerical models are not always ...

  19. Thermal study of vulnerable atherosclerotic plaque 

    E-Print Network [OSTI]

    Kim, Taehong

    2009-05-15

    ) . . . . . . . . . . . . . . . . . . . . . . . . . . 53 IX Elastic material parameters of arterial wall and lipid core . . . . . . . 103 x LIST OF FIGURES FIGURE Page 1 Plaque classified based on morphological description (a) Intimal xantoma is a pre-atherosclerotic lesion that usually does not de... effects, and (3) a rear region (P9, P10 and P11) which has no conduction, but significant convection effect) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 30 Temperature history under the variation of heat generation, ?qm = 0.05, 0.1 and 0.2...

  20. Protection of Use Control Vulnerabilities and Design

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-11

    This manual establishes a general process and provides direction for controlling access to and disseminating Sigma 14 and 15 nuclear weapon data (NWD) at the Department of Energy (DOE). It supplements DOE O 452.4A, Security and Control of Nuclear Explosives and Nuclear Weapons, dated 12-17-01, which establishes DOE requirements and responsibilities to prevent the deliberate unauthorized use of U.S. nuclear explosives and nuclear weapons. Cancels DOE M 452.4-1. Canceled by DOE O 452.7, 5-14-2010