Sample records for design basis threat

  1. design basis threat

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 |0/%2A en6/%2A

  2. Design Basis Threat Policy (U)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-11-29T23:59:59.000Z

    This Order is classified and will not be available on the Directives Portal. For distribution, contact John Fitzgibbons, 301-903-1361, john.fitzgibbons@hq.doe.gov. Cancels: DOE O 470.3

  3. Design Basis Threat Policy (U)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-10-01T23:59:59.000Z

    This Order is classified and will not be available on the Directives Portal. For distribution, NA employees should contact Jon Todd, 202-586-2579; all other DOE employees should contact Ron Francis, 301-903-6874. Does not cancel other directives.

  4. Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik

    E-Print Network [OSTI]

    Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

  5. Design Basis Threat | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management FermiDavid Turner David3Depth Profile RECORD

  6. design basis threat | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14Russian NuclearNational5/%2A en Office| National Nucleardesign

  7. THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS

    E-Print Network [OSTI]

    THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

  8. CRAD, Engineering Design and Safety Basis - December 22, 2009...

    Broader source: Energy.gov (indexed) [DOE]

    Engineering Design and Safety Basis - December 22, 2009 CRAD, Engineering Design and Safety Basis - December 22, 2009 December 22, 2009 Engineering Design and Safety Basis...

  9. PRELIMINARY SELECTION OF MGR DESIGN BASIS EVENTS

    SciTech Connect (OSTI)

    J.A. Kappes

    1999-09-16T23:59:59.000Z

    The purpose of this analysis is to identify the preliminary design basis events (DBEs) for consideration in the design of the Monitored Geologic Repository (MGR). For external events and natural phenomena (e.g., earthquake), the objective is to identify those initiating events that the MGR will be designed to withstand. Design criteria will ensure that radiological release scenarios resulting from these initiating events are beyond design basis (i.e., have a scenario frequency less than once per million years). For internal (i.e., human-induced and random equipment failures) events, the objective is to identify credible event sequences that result in bounding radiological releases. These sequences will be used to establish the design basis criteria for MGR structures, systems, and components (SSCs) design basis criteria in order to prevent or mitigate radiological releases. The safety strategy presented in this analysis for preventing or mitigating DBEs is based on the preclosure safety strategy outlined in ''Strategy to Mitigate Preclosure Offsite Exposure'' (CRWMS M&O 1998f). DBE analysis is necessary to provide feedback and requirements to the design process, and also to demonstrate compliance with proposed 10 CFR 63 (Dyer 1999b) requirements. DBE analysis is also required to identify and classify the SSCs that are important to safety (ITS).

  10. System Design and the Safety Basis

    SciTech Connect (OSTI)

    Ellingson, Darrel

    2008-05-06T23:59:59.000Z

    The objective of this paper is to present the Bechtel Jacobs Company, LLC (BJC) Lessons Learned for system design as it relates to safety basis documentation. BJC has had to reconcile incomplete or outdated system description information with current facility safety basis for a number of situations in recent months. This paper has relevance in multiple topical areas including documented safety analysis, decontamination & decommissioning (D&D), safety basis (SB) implementation, safety and design integration, potential inadequacy of the safety analysis (PISA), technical safety requirements (TSR), and unreviewed safety questions. BJC learned that nuclear safety compliance relies on adequate and well documented system design information. A number of PIS As and TSR violations occurred due to inadequate or erroneous system design information. As a corrective action, BJC assessed the occurrences caused by systems design-safety basis interface problems. Safety systems reviewed included the Molten Salt Reactor Experiment (MSRE) Fluorination System, K-1065 fire alarm system, and the K-25 Radiation Criticality Accident Alarm System. The conclusion was that an inadequate knowledge of system design could result in continuous non-compliance issues relating to nuclear safety. This was especially true with older facilities that lacked current as-built drawings coupled with the loss of 'historical knowledge' as personnel retired or moved on in their careers. Walkdown of systems and the updating of drawings are imperative for nuclear safety compliance. System design integration with safety basis has relevance in the Department of Energy (DOE) complex. This paper presents the BJC Lessons Learned in this area. It will be of benefit to DOE contractors that manage and operate an aging population of nuclear facilities.

  11. Threat assessment design for driver assistance system at intersections

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

  12. Office of Nuclear Safety Basis and Facility Design

    Broader source: Energy.gov [DOE]

    The Office of Nuclear Safety Basis & Facility Design establishes safety basis and facility design requirements and expectations related to analysis and design of nuclear facilities to ensure protection of workers and the public from the hazards associated with nuclear operations.

  13. CRAD, Integrated Safety Basis and Engineering Design Review ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Safety Basis and Engineering Design Review - August 20, 2014 (EA CRAD 31-4, Rev. 0) CRAD, Integrated Safety Basis and Engineering Design Review - August 20, 2014 (EA...

  14. Review and Approval of Nuclear Facility Safety Basis and Safety Design Basis Documents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-12-19T23:59:59.000Z

    This Standard describes a framework and the criteria to be used for approval of (1) safety basis documents, as required by 10 Code of Federal Regulation (C.F.R.) 830, Nuclear Safety Management, and (2) safety design basis documents, as required by Department of Energy (DOE) Standard (STD)-1189-2008, Integration of Safety into the Design Process.

  15. Engineering Design and Safety Basis Inspection Criteria, Inspection...

    Broader source: Energy.gov (indexed) [DOE]

    to this is our commitment to enhance our program. Therefore, we have developed the Engineering Design and Safety Basis Inspection Criteria, Inspection Activities, and Lines of...

  16. Assessing Beyond Design Basis Seismic Events and Implications...

    Office of Environmental Management (EM)

    on Seismic Risk Assessing Beyond Design Basis Seismic Events and Implications on Seismic Risk September 19, 2012 Presenter: Jeffrey Kimball, Technical Specialist (Seismologist)...

  17. The Functional Requirements and Design Basis for Information Barriers

    SciTech Connect (OSTI)

    Fuller, James L.

    2012-05-01T23:59:59.000Z

    This report summarizes the results of the Information Barrier Working Group workshop held at Sandia National Laboratory in Albuquerque, NM, February 2-4, 1999. This workshop was convened to establish the functional requirements associated with warhead radiation signature information barriers, to identify the major design elements of any such system or approach, and to identify a design basis for each of these major elements. Such information forms the general design basis to be used in designing, fabricating, and evaluating the complete integrated systems developed for specific purposes.

  18. Solar Power Tower Design Basis Document, Revision 0

    SciTech Connect (OSTI)

    ZAVOICO,ALEXIS B.

    2001-07-01T23:59:59.000Z

    This report contains the design basis for a generic molten-salt solar power tower. A solar power tower uses a field of tracking mirrors (heliostats) that redirect sunlight on to a centrally located receiver mounted on top a tower, which absorbs the concentrated sunlight. Molten nitrate salt, pumped from a tank at ground level, absorbs the sunlight, heating it up to 565 C. The heated salt flows back to ground level into another tank where it is stored, then pumped through a steam generator to produce steam and make electricity. This report establishes a set of criteria upon which the next generation of solar power towers will be designed. The report contains detailed criteria for each of the major systems: Collector System, Receiver System, Thermal Storage System, Steam Generator System, Master Control System, and Electric Heat Tracing System. The Electric Power Generation System and Balance of Plant discussions are limited to interface requirements. This design basis builds on the extensive experience gained from the Solar Two project and includes potential design innovations that will improve reliability and lower technical risk. This design basis document is a living document and contains several areas that require trade-studies and design analysis to fully complete the design basis. Project- and site-specific conditions and requirements will also resolve open To Be Determined issues.

  19. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect (OSTI)

    CROWE, R.D.

    1999-09-09T23:59:59.000Z

    This document provides the detailed accident analysis to support ''HNF-3553, Spent Nuclear Fuel Project Final Safety, Analysis Report, Annex A,'' ''Canister Storage Building Final Safety Analysis Report.'' All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  20. Cold Vacuum Drying (CVD) Facility Design Basis Accident Analysis Documentation

    SciTech Connect (OSTI)

    PIEPHO, M.G.

    1999-10-20T23:59:59.000Z

    This document provides the detailed accident analysis to support HNF-3553, Annex B, Spent Nuclear Fuel Project Final Safety Analysis Report, ''Cold Vacuum Drying Facility Final Safety Analysis Report (FSAR).'' All assumptions, parameters and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the FSAR.

  1. Canister Storage Building (CSB) Design Basis Accident Analysis Documentation

    SciTech Connect (OSTI)

    CROWE, R.D.; PIEPHO, M.G.

    2000-03-23T23:59:59.000Z

    This document provided the detailed accident analysis to support HNF-3553, Spent Nuclear Fuel Project Final Safety Analysis Report, Annex A, ''Canister Storage Building Final Safety Analysis Report''. All assumptions, parameters, and models used to provide the analysis of the design basis accidents are documented to support the conclusions in the Canister Storage Building Final Safety Analysis Report.

  2. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect (OSTI)

    L.E. Demick

    2010-08-01T23:59:59.000Z

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  3. Basis for NGNP Reactor Design Down-Selection

    SciTech Connect (OSTI)

    L.E. Demick

    2011-11-01T23:59:59.000Z

    The purpose of this paper is to identify the extent of technology development, design and licensing maturity anticipated to be required to credibly identify differences that could make a technical choice practical between the prismatic and pebble bed reactor designs. This paper does not address a business decision based on the economics, business model and resulting business case since these will vary based on the reactor application. The selection of the type of reactor, the module ratings, the number of modules, the configuration of the balance of plant and other design selections will be made on the basis of optimizing the Business Case for the application. These are not decisions that can be made on a generic basis.

  4. AN APPROACH TO SAFETY DESIGN BASIS DOCUMENTATION CHANGE CONTROL

    SciTech Connect (OSTI)

    RYAN GW

    2008-05-15T23:59:59.000Z

    This paper describes a safety design basis documentation change control process. The process identifies elements that can be used to manage the project/facility configuration during design evolution through the Initiation, Definition, and Execution project phases. The project phases addressed by the process are defined in US Department of Energy (DOE) Order (O) 413.3A, Program and Project Management for the Acquisition of Capital Assets, in support of DOE project Critical Decisions (CD). This approach has been developed for application to two Hanford Site projects in their early CD phases and is considered to be a key element of safety and design integration. As described in the work that has been performed, the purpose of change control is to maintain consistency among design requirements, the physical configuration, related facility documentation, and the nuclear safety basis during the evolution of the design. The process developed (1) ensures an appropriate level of rigor is applied at each project phase and (2) is considered to implement the requirements and guidance provided in DOE-STD-1189-2008, Integration of Safety into the Design Process. Presentation of this work is expected to benefit others in the DOE Complex that may be implementing DOE-STD-1189-2008 or managing nuclear safety documentation in support of projects in-process.

  5. Threat Assessment Design for Driver Assistance System at Intersections Georges S. Aoude, Brandon D. Luders, Kenneth K. H. Lee, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment Design for Driver Assistance System at Intersections Georges S. Aoude, Brandon D, potentially errant, drivers. Our approach relies on a novel threat assessment module, which combines an intention predictor based on support vector machines with an efficient threat assessor using rapidly

  6. Spent Nuclear Fuel (SNF) Project Design Basis Capacity Study

    SciTech Connect (OSTI)

    CLEVELAND, K.J.

    2000-08-17T23:59:59.000Z

    This study of the design basis capacity of process systems was prepared by Fluor Federal Services for the Spent Nuclear Fuel Project. The evaluation uses a summary level model of major process sub-systems to determine the impact of sub-system interactions on the overall time to complete fuel removal operations. The process system model configuration and time cycle estimates developed in the original version of this report have been updated as operating scenario assumptions evolve. The initial document released in Fiscal Year (FY) 1996 varied the number of parallel systems and transport systems over a wide range, estimating a conservative design basis for completing fuel processing in a two year time period. Configurations modeling planned operations were updated in FY 1998 and FY 1999. The FY 1998 Base Case continued to indicate that fuel removal activities at the basins could be completed in slightly over 2 years. Evaluations completed in FY 1999 were based on schedule modifications that delayed the start of KE Basin fuel removal, with respect to the start of KW Basin fuel removal activities, by 12 months. This delay resulted in extending the time to complete all fuel removal activities by 12 months. However, the results indicated that the number of Cold Vacuum Drying (CVD) stations could be reduced from four to three without impacting the projected time to complete fuel removal activities. This update of the design basis capacity evaluation, performed for FY 2000, evaluates a fuel removal scenario that delays the start of KE Basin activities such that staffing peaks are minimized. The number of CVD stations included in all cases for the FY 2000 evaluation is reduced from three to two, since the scenario schedule results in minimal time periods of simultaneous fuel removal from both basins. The FY 2000 evaluation also considers removal of Shippingport fuel from T Plant storage and transfer to the Canister Storage Building for storage.

  7. Reactivity accidents: A reassessment of the design-basis events

    SciTech Connect (OSTI)

    Diamond, D.J.; Hsu, Chia-Jung; Fitzpatrick, R.; Mirkovic, D.

    1989-01-01T23:59:59.000Z

    This paper summarizes a study of light water reactor event sequences which have been investigated for their potential to result in reactivity accidents with severe consequences. The study is an outgrowth of the concern which arose after the accident at Chernobyl and was recommended by the report of the US Nuclear Regulatory Commission (NRC) on the implications of that accident (NUREG-1251). The work was done for the NRC to reconfirm or bring into question previous judgments on reactivity events which must be analyzed for licensing. Event sequences were defined and then a probabilistic assessment was completed to estimate the frequency of the reactivity event and/or a deterministic calculation was completed to estimate the consequences to the fuel. Using the results of this analysis, analysis done by others, and a set of screening criteria developed within this study, judgments were made for each sequence as to its importance, and recommendations were made as to whether the NRC ought to be considering the important sequences as part of the design basis or for further, more detailed, investigation. 31 refs., 9 figs., 1 tab.

  8. Theoretical Basis for the Design of a DWPF Evacuated Canister

    SciTech Connect (OSTI)

    Routt, K.R.

    2001-09-17T23:59:59.000Z

    This report provides the theoretical bases for use of an evacuated canister for draining a glass melter. Design recommendations are also presented to ensure satisfactory performance in future tests of the concept.

  9. A BASIS FOR MODIFYING THE TANK 12 COMPOSITE SAMPLING DESIGN

    SciTech Connect (OSTI)

    Shine, G.

    2014-11-25T23:59:59.000Z

    The SRR sampling campaign to obtain residual solids material from the Savannah River Site (SRS) Tank Farm Tank 12 primary vessel resulted in obtaining appreciable material in all 6 planned source samples from the mound strata but only in 5 of the 6 planned source samples from the floor stratum. Consequently, the design of the compositing scheme presented in the Tank 12 Sampling and Analysis Plan, Pavletich (2014a), must be revised. Analytical Development of SRNL statistically evaluated the sampling uncertainty associated with using various compositing arrays and splitting one or more samples for compositing. The variance of the simple mean of composite sample concentrations is a reasonable standard to investigate the impact of the following sampling options. Composite Sample Design Option (a). Assign only 1 source sample from the floor stratum and 1 source sample from each of the mound strata to each of the composite samples. Each source sample contributes material to only 1 composite sample. Two source samples from the floor stratum would not be used. Composite Sample Design Option (b). Assign 2 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that one source sample from the floor must be used twice, with 2 composite samples sharing material from this particular source sample. All five source samples from the floor would be used. Composite Sample Design Option (c). Assign 3 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that several of the source samples from the floor stratum must be assigned to more than one composite sample. All 5 source samples from the floor would be used. Using fewer than 12 source samples will increase the sampling variability over that of the Basic Composite Sample Design, Pavletich (2013). Considering the impact to the variance of the simple mean of the composite sample concentrations, the recommendation is to construct each sample composite using four or five source samples. Although the variance using 5 source samples per composite sample (Composite Sample Design Option (c)) was slightly less than the variance using 4 source samples per composite sample (Composite Sample Design Option (b)), there is no practical difference between those variances. This does not consider that the measurement error variance, which is the same for all composite sample design options considered in this report, will further dilute any differences. Composite Sample Design Option (a) had the largest variance for the mean concentration in the three composite samples and should be avoided. These results are consistent with Pavletich (2014b) which utilizes a low elevation and a high elevation mound source sample and two floor source samples for each composite sample. Utilizing the four source samples per composite design, Pavletich (2014b) utilizes aliquots of Floor Sample 4 for two composite samples.

  10. Drain Tank Information for Developing Design Basis of the Preliminary Design

    SciTech Connect (OSTI)

    Ferrada, Juan J [ORNL

    2012-02-01T23:59:59.000Z

    Tokamak Cooling Water System (TCWS) drain tanks (DTs) serve two functions: normal operation and safety operation. Normal DTs are used for regular maintenance operations when draining is necessary. Safety DTs are used to receive the water leaked into the Vacuum Vessel (VV) after an in-vessel loss of coolant accident (LOCA) event. The preliminary design of the DTs shall be based on the information provided by this document. The capacity of the normal DTs is estimated based on the internal volume of in-vessel components [e.g., First Wall/Blanket (FW/BLK) and Divertor (DIV)]; Neutral Beam Injector (NBI) components; and TCWS piping, heat exchangers, electric heaters, pump casing, pressurizers, and valves. Water volumes have been updated based on 2004-design information, changes adopted because of approved Project Change Requests (PCRs), and data verification by US ITER and AREVA Federal Services, the US ITER A and E Company. Two tanks will store water from normal draining operations of the FW/BLK and DIV Primary Heat Transfer Systems (PHTSs). One tank will store water from normal draining operations of the NBI PHTS. The capacity of the safety DTs is based on analysis of a design basis accident: a large leak from in-vessel components. There are two safety DTs that will receive water from a VV LOCA event and drainage from the VV, as needed. In addition, there is one sump tank for the DIV that will be used for collecting drain water from the draining and drying processes and specifically for draining the DIV system as the DIV cassette lines are at a lower elevation than the DT connection point. Information documented in this report must be refined and verified during the preliminary design of the DTs, and there are several aspects to be considered to complete the preliminary design. Input to these design considerations is discussed in this report and includes, but is not limited to, water inventory; operating procedures/maintenance; Failure Modes and Effects Analysis (FMEA); tank layout and dimensions, including design margin; classification under French Nuclear Pressure Directives, Equipements Sous Pression Nucleaires (ESPN); and adaptations for construction.

  11. Opportunities and Threats of Green Building Design for ABC Engineers, Kansas City

    E-Print Network [OSTI]

    Wikoff, Brandon D.

    2008-12-19T23:59:59.000Z

    estate expert, Charles Lockwood. (Yudelson 2008, 27). The ‘Green’ building revolution has presented a unique opportunity for Consulting Engineering firms specializing in mechanical, electrical, and plumbing (MEP) design, such as ABC Engineers, to capture...

  12. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect (OSTI)

    Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

    2011-10-05T23:59:59.000Z

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  13. The Mixed Waste Management Facility. Design basis integrated operations plan (Title I design)

    SciTech Connect (OSTI)

    NONE

    1994-12-01T23:59:59.000Z

    The Mixed Waste Management Facility (MWMF) will be a fully integrated, pilotscale facility for the demonstration of low-level, organic-matrix mixed waste treatment technologies. It will provide the bridge from bench-scale demonstrated technologies to the deployment and operation of full-scale treatment facilities. The MWMF is a key element in reducing the risk in deployment of effective and environmentally acceptable treatment processes for organic mixed-waste streams. The MWMF will provide the engineering test data, formal evaluation, and operating experience that will be required for these demonstration systems to become accepted by EPA and deployable in waste treatment facilities. The deployment will also demonstrate how to approach the permitting process with the regulatory agencies and how to operate and maintain the processes in a safe manner. This document describes, at a high level, how the facility will be designed and operated to achieve this mission. It frequently refers the reader to additional documentation that provides more detail in specific areas. Effective evaluation of a technology consists of a variety of informal and formal demonstrations involving individual technology systems or subsystems, integrated technology system combinations, or complete integrated treatment trains. Informal demonstrations will typically be used to gather general operating information and to establish a basis for development of formal demonstration plans. Formal demonstrations consist of a specific series of tests that are used to rigorously demonstrate the operation or performance of a specific system configuration.

  14. The power of simplification: Operator interface with the AP1000{sup R} during design-basis and beyond design-basis events

    SciTech Connect (OSTI)

    Williams, M. G.; Mouser, M. R.; Simon, J. B. [Westinghouse Electric Company, 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

    2012-07-01T23:59:59.000Z

    The AP1000{sup R} plant is an 1100-MWe pressurized water reactor with passive safety features and extensive plant simplifications that enhance construction, operation, maintenance, safety and cost. The passive safety features are designed to function without safety-grade support systems such as component cooling water, service water, compressed air or HVAC. The AP1000 passive safety features achieve and maintain safe shutdown in case of a design-basis accident for 72 hours without need for operator action, meeting the expectations provided in the European Utility Requirements and the Utility Requirement Document for passive plants. Limited operator actions may be required to maintain safe conditions in the spent fuel pool (SFP) via passive means. This safety approach therefore minimizes the reliance on operator action for accident mitigation, and this paper examines the operator interaction with the Human-System Interface (HSI) as the severity of an accident increases from an anticipated transient to a design basis accident and finally, to a beyond-design-basis event. The AP1000 Control Room design provides an extremely effective environment for addressing the first 72 hours of design-basis events and transients, providing ease of information dissemination and minimal reliance upon operator actions. Symptom-based procedures including Emergency Operating Procedures (EOPs), Abnormal Operating Procedures (AOPs) and Alarm Response Procedures (ARPs) are used to mitigate design basis transients and accidents. Use of the Computerized Procedure System (CPS) aids the operators during mitigation of the event. The CPS provides cues and direction to the operators as the event progresses. If the event becomes progressively worse or lasts longer than 72 hours, and depending upon the nature of failures that may have occurred, minimal operator actions may be required outside of the control room in areas that have been designed to be accessible using components that have been designed to be reliable in these conditions. The primary goal of any such actions is to maintain or refill the passive inventory available to cool the core, containment and spent fuel pool in the safety-related and seismically qualified Passive Containment Cooling Water Storage Tank (PCCWST). The seismically-qualified, ground-mounted Passive Containment Cooling Ancillary Water Storage Tank (PCCAWST) is also available for this function as appropriate. The primary effect of these actions would be to increase the coping time for the AP1000 during design basis events, as well as events such as those described above, from 72 hours without operator intervention to 7 days with minimal operator actions. These Operator actions necessary to protect the health and safety of the public are addressed in the Post-72 Hour procedures, as well as some EOPs, AOPs, ARPs and the Severe Accident Management Guidelines (SAMGs). Should the event continue to become more severe and plant conditions degrade further with indications of inadequate core cooling, the SAMGs provide guidance for strategies to address these hypothetical severe accident conditions. The AP1000 SAMG diagnoses and actions are prioritized to first utilize the AP1000 features that are expected to retain a damaged core inside the reactor vessel. Only one strategy is undertaken at any time. This strategy will be followed and its effectiveness evaluated before other strategies are undertaken. This is a key feature of both the symptom-oriented AP1000 EOPs and the AP1000 SAMGs which maximizes the probability of retaining a damaged core inside the reactor vessel and containment while minimizing the chances for confusion and human errors during implementation. The AP1000 SAMGs are simple and straight-forward and have been developed with considerable input from human factors and plant operations experts. Most importantly, and different from severe accident management strategies for other plants, the AP1000 SAMGs do not require diagnosis of the location of the core (i.e., whether reactor vessel failure has occurred). This is a fun

  15. Design-Basis Flood Estimation for Site Characterization at Nuclear Power Plants in the United States of America

    SciTech Connect (OSTI)

    Prasad, Rajiv; Hibler, Lyle F.; Coleman, Andre M.; Ward, Duane L.

    2011-11-01T23:59:59.000Z

    The purpose of this document is to describe approaches and methods for estimation of the design-basis flood at nuclear power plant sites. Chapter 1 defines the design-basis flood and lists the U.S. Nuclear Regulatory Commission's (NRC) regulations that require estimation of the design-basis flood. For comparison, the design-basis flood estimation methods used by other Federal agencies are also described. A brief discussion of the recommendations of the International Atomic Energy Agency for estimation of the design-basis floods in its member States is also included.

  16. Comparison of CRBR design-basis events with those of foreign LMFBR plants

    SciTech Connect (OSTI)

    Agrawal, A.K.

    1983-04-01T23:59:59.000Z

    As part of the Construction Permit (CP) review of the Clinch River Breeder Reactor Plant (CRBR), the Brookhaven National Laboratory was asked to compare the Design Basis Accidents that are considered in CRBR Preliminary Safety Analysis Report with those of the foreign contemporary plants (PHENIX, SUPER-PHENIX, SNR-300, PFR, and MONJU). A brief introductory review of any special or unusual characteristics of these plants is given. This is followed by discussions of the design basis accidents and their acceptance criteria. In spite of some discrepancies due either to semantics or to licensing decisions, there appears to be a considerable degree of unanimity in the selection (definition) of DBAs in all of these plants.

  17. Demonstrating Structural Adequacy of Nuclear Power Plant Containment Structures for Beyond Design-Basis Pressure Loadings

    SciTech Connect (OSTI)

    Braverman, J.I.; Morante, R.

    2010-07-18T23:59:59.000Z

    ABSTRACT Demonstrating the structural integrity of U.S. nuclear power plant (NPP) containment structures, for beyond design-basis internal pressure loadings, is necessary to satisfy Nuclear Regulatory Commission (NRC) requirements and performance goals. This paper discusses methods for demonstrating the structural adequacy of the containment for beyond design-basis pressure loadings. Three distinct evaluations are addressed: (1) estimating the ultimate pressure capacity of the containment structure (10 CFR 50 and US NRC Standard Review Plan, Section 3.8) ; (2) demonstrating the structural adequacy of the containment subjected to pressure loadings associated with combustible gas generation (10 CFR 52 and 10 CFR 50); and (3) demonstrating the containment structural integrity for severe accidents (10 CFR 52 as well as SECY 90-016, SECY 93-087, and related NRC staff requirements memoranda (SRMs)). The paper describes the technical basis for specific aspects of the methods presented. It also presents examples of past issues identified in licensing activities related to these evaluations.

  18. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Guo, Ting

    THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

  19. Development of Probabilistic Design Basis Earthquake (DBE) Parameters for Moderate and High Hazard Facilities at INEEL

    SciTech Connect (OSTI)

    S. M. Payne; V. W. Gorman; S. A. Jensen; M. E. Nitzel; M. J. Russell; R. P. Smith

    2000-03-01T23:59:59.000Z

    Design Basis Earthquake (DBE) horizontal and vertical response spectra are developed for moderate and high hazard facilities or Performance Categories (PC) 3 and 4, respectively, at the Idaho National Engineering and Environmental Laboratory (INEEL). The probabilistic DBE response spectra will replace the deterministic DBE response spectra currently in the U.S. Department of Energy Idaho Operations Office (DOE-ID) Architectural Engineering Standards that govern seismic design criteria for several facility areas at the INEEL. Probabilistic DBE response spectra are recommended to DOE Naval Reactors for use at the Naval Reactor Facility at INEEL. The site-specific Uniform Hazard Spectra (UHS) developed by URS Greiner Woodward Clyde Federal Services are used as the basis for developing the DBE response spectra. In 1999, the UHS for all INEEL facility areas were recomputed using more appropriate attenuation relationships for the Basin and Range province. The revised UHS have lower ground motions than those produced in the 1996 INEEL site-wide probabilistic ground motion study. The DBE response spectra were developed by incorporating smoothed broadened regions of the peak accelerations, velocities, and displacements defined by the site-specific UHS. Portions of the DBE response spectra were adjusted to ensure conservatism for the structural design process.

  20. Vacuoles: a hollow threat?

    E-Print Network [OSTI]

    Yaksh, Tony L.

    2010-01-01T23:59:59.000Z

    2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda l’esprit : Vacuoles: a hollow threat? Ces vacuoles acides

  1. Research Article Signaling Threat

    E-Print Network [OSTI]

    Gross, James J.

    Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

  2. Airborne Particulate Threat Assessment

    SciTech Connect (OSTI)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31T23:59:59.000Z

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  3. Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-02T23:59:59.000Z

    To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

  4. Decentralized Semantic Threat Graphs Simon N. Foley1

    E-Print Network [OSTI]

    Foley, Simon

    Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

  5. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01T23:59:59.000Z

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  6. Application of the MELCOR code to design basis PWR large dry containment analysis.

    SciTech Connect (OSTI)

    Phillips, Jesse; Notafrancesco, Allen (USNRC, Office of Nuclear Regulatory Research, Rockville, MD); Tills, Jack Lee (Jack Tills & Associates, Inc., Sandia Park, NM)

    2009-05-01T23:59:59.000Z

    The MELCOR computer code has been developed by Sandia National Laboratories under USNRC sponsorship to provide capability for independently auditing analyses submitted by reactor manufactures and utilities. MELCOR is a fully integrated code (encompassing the reactor coolant system and the containment building) that models the progression of postulated accidents in light water reactor power plants. To assess the adequacy of containment thermal-hydraulic modeling incorporated in the MELCOR code for application to PWR large dry containments, several selected demonstration designs were analyzed. This report documents MELCOR code demonstration calculations performed for postulated design basis accident (DBA) analysis (LOCA and MSLB) inside containment, which are compared to other code results. The key processes when analyzing the containment loads inside PWR large dry containments are (1) expansion and transport of high mass/energy releases, (2) heat and mass transfer to structural passive heat sinks, and (3) containment pressure reduction due to engineered safety features. A code-to-code benchmarking for DBA events showed that MELCOR predictions of maximum containment loads were equivalent to similar predictions using a qualified containment code known as CONTAIN. This equivalency was found to apply for both single- and multi-cell containment models.

  7. SRS BEDROCK PROBABILISTIC SEISMIC HAZARD ANALYSIS (PSHA) DESIGN BASIS JUSTIFICATION (U)

    SciTech Connect (OSTI)

    (NOEMAIL), R

    2005-12-14T23:59:59.000Z

    This represents an assessment of the available Savannah River Site (SRS) hard-rock probabilistic seismic hazard assessments (PSHAs), including PSHAs recently completed, for incorporation in the SRS seismic hazard update. The prior assessment of the SRS seismic design basis (WSRC, 1997) incorporated the results from two PSHAs that were published in 1988 and 1993. Because of the vintage of these studies, an assessment is necessary to establish the value of these PSHAs considering more recently collected data affecting seismic hazards and the availability of more recent PSHAs. This task is consistent with the Department of Energy (DOE) order, DOE O 420.1B and DOE guidance document DOE G 420.1-2. Following DOE guidance, the National Map Hazard was reviewed and incorporated in this assessment. In addition to the National Map hazard, alternative ground motion attenuation models (GMAMs) are used with the National Map source model to produce alternate hazard assessments for the SRS. These hazard assessments are the basis for the updated hard-rock hazard recommendation made in this report. The development and comparison of hazard based on the National Map models and PSHAs completed using alternate GMAMs provides increased confidence in this hazard recommendation. The alternate GMAMs are the EPRI (2004), USGS (2002) and a regional specific model (Silva et al., 2004). Weights of 0.6, 0.3 and 0.1 are recommended for EPRI (2004), USGS (2002) and Silva et al. (2004) respectively. This weighting gives cluster weights of .39, .29, .15, .17 for the 1-corner, 2-corner, hybrid, and Greens-function models, respectively. This assessment is judged to be conservative as compared to WSRC (1997) and incorporates the range of prevailing expert opinion pertinent to the development of seismic hazard at the SRS. The corresponding SRS hard-rock uniform hazard spectra are greater than the design spectra developed in WSRC (1997) that were based on the LLNL (1993) and EPRI (1988) PSHAs. The primary reasons for this difference is the greater activity rate used in contemporary models for the Charleston source zone and proper incorporation of uncertainty and randomness in GMAMs.

  8. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Boyce, Richard L.

    BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

  9. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect (OSTI)

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J. [Los Alamos National Lab., NM (United States); McKinney, S.J. [Technadyne Engineering Consultants, Inc., Albuquerque, NM (United States); Roush, M.L. [Maryland Univ., College Park, MD (United States). Center for Reliability Engineering

    1992-12-01T23:59:59.000Z

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  10. Probabilistic risk assessment for the Los Alamos Meson Physics Facility worst-case design-basis accident

    SciTech Connect (OSTI)

    Sharirli, M.; Butner, J.M.; Rand, J.L.; Macek, R.J. (Los Alamos National Lab., NM (United States)); McKinney, S.J. (Technadyne Engineering Consultants, Inc., Albuquerque, NM (United States)); Roush, M.L. (Maryland Univ., College Park, MD (United States). Center for Reliability Engineering)

    1992-01-01T23:59:59.000Z

    This paper presents results from a Los Alamos National Laboratory Engineering and Safety Analysis Group assessment of the worse-case design-basis accident associated with the Clinton P. Anderson Meson Physics Facility (LAMPF)/Weapons Neutron Research (WNR) Facility. The primary goal of the analysis was to quantify the accident sequences that result in personnel radiation exposure in the WNR Experimental Hall following the worst-case design-basis accident, a complete spill of the LAMPF accelerator 1L beam. This study also provides information regarding the roles of hardware systems and operators in these sequences, and insights regarding the areas where improvements can increase facility-operation safety. Results also include confidence ranges to incorporate combined effects of uncertainties in probability estimates and importance measures to determine how variations in individual events affect the frequencies in accident sequences.

  11. Bomb threat There are two types of Bomb Threats

    E-Print Network [OSTI]

    Hickman, Mark

    v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

  12. WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS

    E-Print Network [OSTI]

    Edinburgh, University of

    WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

  13. BomB ThreaT Assume threat is real

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

  14. Somatic mutations in PI3K[alpha]: Structural basis for enzyme activation and drug design

    SciTech Connect (OSTI)

    Gabelli, Sandra B.; Mandelker, Diana; Schmidt-Kittler, Oleg; Vogelstein, Bert; Amzel, L. Mario (JHU); (HHMI)

    2011-09-06T23:59:59.000Z

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  15. Somatic Mutations in PI3Kalpha: Structural Basis for Enzyme Activation and Drug Design

    SciTech Connect (OSTI)

    S Gabelli; D Mandelker; O Schmidt-Kittler; B Vogelstein; L Amzel

    2011-12-31T23:59:59.000Z

    The PI3K pathway is a communication hub coordinating critical cell functions including cell survival, cell growth, proliferation, motility and metabolism. Because PI3K{alpha} harbors recurrent somatic mutations resulting in gains of function in human cancers, it has emerged as an important drug target for many types of solid tumors. Various PI3K isoforms are also being evaluated as potential therapeutic targets for inflammation, heart disease, and hematological malignancies. Structural biology is providing insights into the flexibility of the PI3Ks, and providing basis for understanding the effects of mutations, drug resistance and specificity.

  16. Review and Approval of Nuclear Facility Safety Basis and Safety Design

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection TechnicalResonant Soft X-Ray ScatteringBenefitsReversingReviewBasis

  17. Cyber Threat Trees for Large System Threat Cataloging and Analysis*

    E-Print Network [OSTI]

    Thornton, Mitchell

    Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

  18. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1993-03-18T23:59:59.000Z

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. Therefore, empirically based approaches that are used for other regions, such as Western North America, are not appropriate for Eastern North America. Moreover, recent advances in science and technology have now made it possible to combine theoretical and empirical methods to develop new procedures and models for estimating ground motion. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. Specifically considered are magnitudes M from 5 to 8, distances from 0 to 500 km, and frequencies from 1 to 35 Hz.

  19. Threat Insight Quarterly Wireless Technology

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

  20. Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 2, Appendices

    SciTech Connect (OSTI)

    Not Available

    1993-03-18T23:59:59.000Z

    This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. This document, Volume II, contains Appendices 2, 3, 5, 6, and 7 covering the following topics: Eastern North American Empirical Ground Motion Data; Examination of Variance of Seismographic Network Data; Soil Amplification and Vertical-to-Horizontal Ratios from Analysis of Strong Motion Data From Active Tectonic Regions; Revision and Calibration of Ou and Herrmann Method; Generalized Ray Procedure for Modeling Ground Motion Attenuation; Crustal Models for Velocity Regionalization; Depth Distribution Models; Development of Generic Site Effects Model; Validation and Comparison of One-Dimensional Site Response Methodologies; Plots of Amplification Factors; Assessment of Coupling Between Vertical & Horizontal Motions in Nonlinear Site Response Analysis; and Modeling of Dynamic Soil Properties.

  1. Pretreatment of neutralized cladding removal waste sludge: Results of the second design basis experiment

    SciTech Connect (OSTI)

    Lumetta, G.J.

    1994-05-01T23:59:59.000Z

    For several years, the Pacific Northwest Laboratory (PNL) has been investigating methods to pretreat Hanford neutralized cladding removal waste (NCRW) sludge. In the past, Zircaloy-clad metallic U fuel was chemically decladded using the Zirflex process; NCRW sludge was formed when the decladding solution was neutralized for storage in carbon-steel tanks. This sludge, which is currently stored in Tanks 103-AW and 105-AW on the Hanford Site, primarily consists of insoluble Zr hydroxides and/or oxides and NaF. Significant quantities of Al, La, U, as well as other insoluble minor constituents are present in the sludge, along with sodium and potassium nitrates, nitrites, and hydroxides in the interstitial liquid. The sludge contains about 2,000 nCi of transuranic (TRU) material per gram of dry sludge, and mixed fission products. Therefore, the sludge must be handled as high-level waste (HLW). The NCRW sludge must be pretreated before treatment (e.g., vitrification) and disposal, so that the overall cost of disposal can be minimized. The NCRW pretreatment flowsheet was designed to achieve the following objectives: (a) to separate Am and Pu from the major sludge constituents (Na, Zr). (b) to separate Am and Pu from U. (c) to concentrate Am and Pu in a small volume for immobilization in borosilicate glass, based on Hanford Waste Vitrification Plant (HWVP). The flowsheet involves: (1) sludge washing, (2) sludge dissolution, (3) extraction of U with tributyl phosphate (TBP), and (4) extraction of TRUs with octyl(phenyl)-N,N-diisobutlycarbamoylmethyl-phosphine oxide (CMPO). As presented in the flowsheet, the NCRW sludge is first washed with 0.I M NaOH to remove interstitial liquid and soluble salts from the sludge including sodium and potassium fluorides, carbonates, hydroxides, nitrates, and nitrites. The washed sludge is then subjected to two dissolution steps to achieve near complete dissolution of Zr.

  2. An Information Fusion Framework for Threat Assessment

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL; Kerekes, Ryan A [ORNL; Treadwell, Jim N [ORNL

    2009-01-01T23:59:59.000Z

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  3. Development of Site-Specific Soil Design Basis Earthquake (DBE) Parameters for the Integrated Waste Treatment Unit (IWTU)

    SciTech Connect (OSTI)

    Payne, Suzette

    2008-08-01T23:59:59.000Z

    Horizontal and vertical PC 3 (2,500 yr) Soil Design Basis Earthquake (DBE) 5% damped spectra, corresponding time histories, and strain-compatible soil properties were developed for the Integrated Waste Treatment Unit (IWTU). The IWTU is located at the Idaho Nuclear Technology and Engineering Center (INTEC) at the Idaho National Laboratory (INL). Mean and 84th percentile horizontal DBE spectra derived from site-specific site response analyses were evaluated for the IWTU. The horizontal and vertical PC 3 (2,500 yr) Soil DBE 5% damped spectra at the 84th percentile were selected for Soil Structure Interaction (SSI) analyses at IWTU. The site response analyses were performed consistent with applicable Department of Energy (DOE) Standards, recommended guidance of the Nuclear Regulatory Commission (NRC), American Society of Civil Engineers (ASCE) Standards, and recommendations of the Blue Ribbon Panel (BRP) and Defense Nuclear Facilities Safety Board (DNFSB).

  4. After Action Report:Idaho National Laboratory (INL) 2014 Multiple Facility Beyond Design Basis (BDBE) Evaluated Drill October 21, 2014

    SciTech Connect (OSTI)

    V. Scott Barnes

    2014-12-01T23:59:59.000Z

    On October 21, 2014, Idaho National Laboratory (INL), in coordination with local jurisdictions, and Department of Energy (DOE) Idaho Operations Office (DOE ID) conducted an evaluated drill to demonstrate the ability to implement the requirements of DOE O 151.1C, “Comprehensive Emergency Management System” when responding to a beyond design basis event (BDBE) scenario as outlined in the Office of Health, Safety, and Security Operating Experience Level 1 letter (OE-1: 2013-01). The INL contractor, Battelle Energy Alliance, LLC (BEA), in coordination with CH2M-WG Idaho, LLC (CWI), and Idaho Treatment Group LLC (ITG), successfully demonstrated appropriate response measures to mitigate a BDBE event that would impact multiple facilities across the INL while protecting the health and safety of personnel, the environment, and property. Offsite response organizations participated to demonstrate appropriate response measures.

  5. 105-K Basin Material Design Basis Feed Description for Spent Nuclear Fuel (SNF) Project Facilities VOL 1 Fuel

    SciTech Connect (OSTI)

    PACKER, M.J.

    1999-11-04T23:59:59.000Z

    Metallic uranium Spent Nuclear Fuel (SNF) is currently stored within two water filled pools, 105-KE Basin (KE Basin) and 105-KW Basin (KW Basin), at the United States Department of Energy (U.S. DOE) Hanford Site, in southeastern Washington State. The Spent Nuclear Fuel Project (SNF Project) is responsible to DOE for operation of these fuel storage pools and for the 2100 metric tons of SNF materials that they contain. The SNF Project mission includes safe removal and transportation of all SNF from these storage basins to a new storage facility in the 200 East Area. To accomplish this mission, the SNF Project modifies the existing KE Basin and KW Basin facilities and constructs two new facilities: the 100 K Area Cold Vacuum Drying Facility (CVDF), which drains and dries the SNF; and the 200 East Area Canister Storage Building (CSB), which stores the SNF. The purpose of this document is to describe the design basis feed compositions for materials stored or processed by SNF Project facilities and activities. This document is not intended to replace the Hanford Spent Fuel Inventory Baseline (WHC 1994b), but only to supplement it by providing more detail on the chemical and radiological inventories in the fuel (this volume) and sludge. A variety of feed definitions is required to support evaluation of specific facility and process considerations during the development of these new facilities. Six separate feed types have been identified for development of new storage or processing facilities. The approach for using each feed during design evaluations is to calculate the proposed facility flowsheet assuming each feed. The process flowsheet would then provide a basis for material compositions and quantities which are used in follow-on calculations.

  6. Possible Methods to Estimate Core Location in a Beyond-Design-Basis Accident at a GE BWR with a Mark I Containment Stucture

    SciTech Connect (OSTI)

    Walston, S; Rowland, M; Campbell, K

    2011-07-27T23:59:59.000Z

    It is difficult to track to the location of a melted core in a GE BWR with Mark I containment during a beyond-design-basis accident. The Cooper Nuclear Station provided a baseline of normal material distributions and shielding configurations for the GE BWR with Mark I containment. Starting with source terms for a design-basis accident, methods and remote observation points were investigated to allow tracking of a melted core during a beyond-design-basis accident. The design of the GE BWR with Mark-I containment highlights an amazing poverty of expectations regarding a common mode failure of all reactor core cooling systems resulting in a beyond-design-basis accident from the simple loss of electric power. This design is shown in Figure 1. The station blackout accident scenario has been consistently identified as the leading contributor to calculated probabilities for core damage. While NRC-approved models and calculations provide guidance for indirect methods to assess core damage during a beyond-design-basis loss-of-coolant accident (LOCA), there appears to be no established method to track the location of the core directly should the LOCA include a degree of fuel melt. We came to the conclusion that - starting with detailed calculations which estimate the release and movement of gaseous and soluble fission products from the fuel - selected dose readings in specific rooms of the reactor building should allow the location of the core to be verified.

  7. Testing Basis of Design

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafetyTed Donat About Us TedJ.LCommerce |330 Final

  8. Overlooked? The Growing Threat of Desertification

    E-Print Network [OSTI]

    Zhu, Julian

    2012-01-01T23:59:59.000Z

    Overlooked? The Growing Threat of Desertification Julian Zhuovergrazing directly threat- ens the natural resilience ofspite the fact that the threat of desertification is both

  9. Proliferation: Threat and response

    SciTech Connect (OSTI)

    NONE

    1996-04-01T23:59:59.000Z

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  10. Threat Insight Quarterly Regulatory Compliance

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

  11. BOMB THREAT CHECKLIST Telephone Procedures

    E-Print Network [OSTI]

    Derisi, Joseph

    BOMB THREAT CHECKLIST Telephone Procedures DATE: / / TIME RECEIVED: : AM/PM CONCLUDED: : AM - GIVE NOTE SAYING "CALL UC POLICE - BOMB THREAT" 9-911 IF YOUR PHONE HAS CALLER ID DISPLAY, RECORD NUMBER OF INCOMING CALL __________________________ WRITE DOWN EXACT WORDS OF THE CALLER AND THREAT DON

  12. Threat Insight Quarterly Browser Exploitation

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

  13. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  14. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  15. Emerging Threats and Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasRelease Date:researchEmerging Threats and Opportunities

  16. Analysis of main steam isolation valve leakage in design basis accidents using MELCOR 1.8.6 and RADTRAD.

    SciTech Connect (OSTI)

    Salay, Michael (United States Nuclear Regulatory Commission, Washington, D.C.); Kalinich, Donald A.; Gauntt, Randall O.; Radel, Tracy E.

    2008-10-01T23:59:59.000Z

    Analyses were performed using MELCOR and RADTRAD to investigate main steam isolation valve (MSIV) leakage behavior under design basis accident (DBA) loss-of-coolant (LOCA) conditions that are presumed to have led to a significant core melt accident. Dose to the control room, site boundary and LPZ are examined using both approaches described in current regulatory guidelines as well as analyses based on best estimate source term and system response. At issue is the current practice of using containment airborne aerosol concentrations as a surrogate for the in-vessel aerosol concentration that exists in the near vicinity of the MSIVs. This study finds current practice using the AST-based containment aerosol concentrations for assessing MSIV leakage is non-conservative and conceptually in error. A methodology is proposed that scales the containment aerosol concentration to the expected vessel concentration in order to preserve the simplified use of the AST in assessing containment performance under assumed DBA conditions. This correction is required during the first two hours of the accident while the gap and early in-vessel source terms are present. It is general practice to assume that at {approx}2hrs, recovery actions to reflood the core will have been successful and that further core damage can be avoided. The analyses performed in this study determine that, after two hours, assuming vessel reflooding has taken place, the containment aerosol concentration can then conservatively be used as the effective source to the leaking MSIV's. Recommendations are provided concerning typical aerosol removal coefficients that can be used in the RADTRAD code to predict source attenuation in the steam lines, and on robust methods of predicting MSIV leakage flows based on measured MSIV leakage performance.

  17. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  18. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  19. Threat Characterization: Trajectory Dynamics

    E-Print Network [OSTI]

    Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

    2006-08-15T23:59:59.000Z

    Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

  20. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

  1. PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS

    E-Print Network [OSTI]

    Jiang, Huiqiang

    AND COMMUNITIES PITTSBURGH, PA. | AUGUST 2013 #12;PRETA AIR: HAZARDOUS AIR POLLUTANTS 32 PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS REPORT PRETA AIR: HAZARDOUS AIR POLLUTANTS (HAPs)/AIR TOXICS PREPARED BY AUTHORSPITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS (PRETA) REPORT PRETA AIR: HAZARDOUS AIR

  2. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald

    2014-09-16T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  3. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald N

    2012-10-23T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  4. The New Nuclear Threat John Deutch

    E-Print Network [OSTI]

    Deutch, John

    The New Nuclear Threat John Deutch FOREIGN AFFAIRS Volume 71 · Number 4 Foreign AffairsThe contents. Deutch THE NEW NUCLEAR THREAT he threat of nuclear weapons spread across the world has displaced the fear

  5. Network Television and the Digital Threat

    E-Print Network [OSTI]

    Lapan, Lisa

    2009-01-01T23:59:59.000Z

    NETWORK TV AND THE DIGITAL THREAT tertainment are availableNETWORK TV AND THE DIGITAL THREAT luring users to watch the91 Ryan Nakashima, Digital Threat Prompts Movie Industry

  6. EPR Severe Accident Threats and Mitigation

    SciTech Connect (OSTI)

    Azarian, G. [Framatome ANP SAS, Tour Areva, Place de la Coupole 92084 Paris la Defense (France); Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J. [Framatome ANP GmbH, Freyeslebenstrasse, 1, D-91058 Erlangen (Germany); Stoudt, R.H. [Framatome ANP Inc. - 3315 Old Forest Rd, Lynchburgh, VA 24501 (United States)

    2004-07-01T23:59:59.000Z

    Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

  7. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  8. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  9. Some Thoughts on Threat Modelling Peter Gutmann

    E-Print Network [OSTI]

    Gutmann, Peter

    Some Thoughts on Threat Modelling Peter Gutmann University of Auckland Traditional Threat Modelling Think up threats until you get bored, then declare victory Often leads to circular reasoning · "Our threat model is whatever our application defends against" Example: DNSSEC · The requirements document

  10. Livestock Basis

    E-Print Network [OSTI]

    Mintert, James R.; Davis, Ernest E.; Dhuyvetter, Kevin C.; Bevers, Stan

    1999-06-23T23:59:59.000Z

    the cash price. Conversely, a positive basis indicates the futures price is less than the cash price. Basis is usually computed using the nearby (closest to expiration) futures con- tract. For example, in October the nearby corn futures contract... for market in September. The October Live Cattle contract is currently trading at $71 per cwt. But what does that mean to you when feeding and selling fin- ished steers in Hereford, Texas? To more accu- rately estimate what your actual selling price might be...

  11. Safety Basis Report

    SciTech Connect (OSTI)

    R.J. Garrett

    2002-01-14T23:59:59.000Z

    As part of the internal Integrated Safety Management Assessment verification process, it was determined that there was a lack of documentation that summarizes the safety basis of the current Yucca Mountain Project (YMP) site characterization activities. It was noted that a safety basis would make it possible to establish a technically justifiable graded approach to the implementation of the requirements identified in the Standards/Requirements Identification Document. The Standards/Requirements Identification Documents commit a facility to compliance with specific requirements and, together with the hazard baseline documentation, provide a technical basis for ensuring that the public and workers are protected. This Safety Basis Report has been developed to establish and document the safety basis of the current site characterization activities, establish and document the hazard baseline, and provide the technical basis for identifying structures, systems, and components (SSCs) that perform functions necessary to protect the public, the worker, and the environment from hazards unique to the YMP site characterization activities. This technical basis for identifying SSCs serves as a grading process for the implementation of programs such as Conduct of Operations (DOE Order 5480.19) and the Suspect/Counterfeit Items Program. In addition, this report provides a consolidated summary of the hazards analyses processes developed to support the design, construction, and operation of the YMP site characterization facilities and, therefore, provides a tool for evaluating the safety impacts of changes to the design and operation of the YMP site characterization activities.

  12. Threats from space: 20 years of progress

    E-Print Network [OSTI]

    Remo, J L

    2014-01-01T23:59:59.000Z

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  13. Chinese Workers: Under Threat or a Threat to American Workers?

    E-Print Network [OSTI]

    Harper Ho, Virginia E.; Zhang, Lu

    2010-07-01T23:59:59.000Z

    . At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

  14. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01T23:59:59.000Z

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  15. Material Performance of Fully-Ceramic Micro-Encapsulated Fuel under Selected LWR Design Basis Scenarios: Final Report

    SciTech Connect (OSTI)

    B. Boer; R. S. Sen; M. A. Pope; A. M. Ougouag

    2011-09-01T23:59:59.000Z

    The extension to LWRs of the use of Deep-Burn coated particle fuel envisaged for HTRs has been investigated. TRISO coated fuel particles are used in Fully-Ceramic Microencapsulated (FCM) fuel within a SiC matrix rather than the graphite of HTRs. TRISO particles are well characterized for uranium-fueled HTRs. However, operating conditions of LWRs are different from those of HTRs (temperature, neutron energy spectrum, fast fluence levels, power density). Furthermore, the time scales of transient core behavior during accidents are usually much shorter and thus more severe in LWRs. The PASTA code was updated for analysis of stresses in coated particle FCM fuel. The code extensions enable the automatic use of neutronic data (burnup, fast fluence as a function of irradiation time) obtained using the DRAGON neutronics code. An input option for automatic evaluation of temperature rise during anticipated transients was also added. A new thermal model for FCM was incorporated into the code; so-were updated correlations (for pyrocarbon coating layers) suitable to estimating dimensional changes at the high fluence levels attained in LWR DB fuel. Analyses of the FCM fuel using the updated PASTA code under nominal and accident conditions show: (1) Stress levels in SiC-coatings are low for low fission gas release (FGR) fractions of several percent, as based on data of fission gas diffusion in UO{sub 2} kernels. However, the high burnup level of LWR-DB fuel implies that the FGR fraction is more likely to be in the range of 50-100%, similar to Inert Matrix Fuels (IMFs). For this range the predicted stresses and failure fractions of the SiC coating are high for the reference particle design (500 {micro}mm kernel diameter, 100 {micro}mm buffer, 35 {micro}mm IPyC, 35 {micro}mm SiC, 40 {micro}mm OPyC). A conservative case, assuming 100% FGR, 900K fuel temperature and 705 MWd/kg (77% FIMA) fuel burnup, results in a 8.0 x 10{sup -2} failure probability. For a 'best-estimate' FGR fraction of 50% and a more modest burnup target level of 500 MWd/kg ,the failure probability drops below 2.0 x 10{sup -5}, the typical performance of TRISO fuel made under the German HTR research program. An optimization study on particle design shows improved performance if the buffer size is increased from 100 to 120 {micro}mm while reducing the OPyC layer. The presence of the latter layer does not provide much benefit at high burnup levels (and fast fluence levels). Normally the shrinkage of the OPyC would result in a beneficial compressive force on the SiC coating. However, at high fluence levels the shrinkage is expected to turn into swelling, resulting in the opposite effect. However, this situation is different when the SiC-matrix, in which the particles are embedded, is also considered: the OPyC swelling can result in a beneficial compressive force on the SiC coating since outward displacement of the OPyC outer surface is inhibited by the presence of the also-swelling SiC matrix. Taking some credit for this effect by adopting a 5 {micro}mm SiC-matrix layer, the optimized particle (100 {micro}mm buffer and 10 {micro}mm OPyC), gives a failure probability of 1.9 x 10{sup -4} for conservative conditions. During a LOCA transient, assuming core re-flood in 30 seconds, the temperature of the coated particle can be expected to be about 200K higher than nominal temperature (900K). For this event the particle failure fraction for a conservative case is 1.0 x 10{sup -2}, for the optimized particle design. For a FGR-fraction of 50% this value reduces to 6.4 x 10{sup -4}.

  16. Android Keylogging Threat Fadi Mohsen, Mohammed Shehab

    E-Print Network [OSTI]

    Shehab, Mohamed

    Android Keylogging Threat Fadi Mohsen, Mohammed Shehab Department of Software and Information of keylogging attacks on Android. Which is a security threat pertaining to Android openness on specific feature

  17. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect (OSTI)

    George A. Beitel

    2004-02-01T23:59:59.000Z

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  18. Nuclear Radiological Threat Task Force Established | National...

    National Nuclear Security Administration (NNSA)

    Radiological Threat Task Force Established | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    E-Print Network [OSTI]

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01T23:59:59.000Z

    Chlorine Gas: An Evolving Hazardous Material Threat andChlorine gas represents a hazardous material threat fromrepresents a persistent hazardous material (HAZMAT) threat.

  20. Rethinking the Cyber Threat A Framework and Path Forward

    E-Print Network [OSTI]

    Bernstein, Phil

    Rethinking the Cyber Threat A Framework and Path Forward SCOTT CHARNEY Corporate Vice President ..................................................................................................................................................5 Understanding the Cyber Threat .................................................................................................................5 Rethinking the Cyber Threat

  1. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

  2. Collision Course: The Threat and Effects of an Asteroid Impact

    E-Print Network [OSTI]

    Reddy, Sharath

    2013-01-01T23:59:59.000Z

    reviewing asteroid impact threat. Retrieved from http://reviewing-asteroid-impact-threat/ Edwards, L. (2010, Octoberoccurring. Comparing the threat of an asteroid impact to the

  3. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Pacific Northwestbased model for analyzing threats that include those usually

  4. Bayesian Discovery of Threat Networks

    E-Print Network [OSTI]

    Smith, Steven T; Senne, Kenneth D; Bernstein, Garrett; Philips, Scott

    2013-01-01T23:59:59.000Z

    A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to the Bayesian formulation is proven. A general diffusion model is introduced that utilizes spatio-temporal relationships between vertices, and is used for a specific space-time formulation that leads to significant performance improvements on coordinated covert networks. This performance is demonstrated using a new hybrid interaction model introduced to simulate random covert networks with realistic properties.

  5. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly February 2007 #12;X-Force® Threat Insight Monthly > February 2007 www.iss.netwww.iss.net About this report

  6. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net June 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly June 2007 #12;X-Force® Threat Insight Monthly > June 2007 www.iss.netwww.iss.net About this report

  7. BOMB THREAT CHECKLIST QUESTIONS TO ASK

    E-Print Network [OSTI]

    Cui, Yan

    BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

  8. REVIEW/SYNTHSE Threat display in birds

    E-Print Network [OSTI]

    Hurd, Peter L.

    REVIEW/SYNTHČSE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

  9. Neural Mechanisms Underlying Selective Attention to Threat

    E-Print Network [OSTI]

    Bishop, Sonia

    Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

  10. Developmental Changes in Responsivity to Threat are

    E-Print Network [OSTI]

    Barr, Gordon A.

    Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

  11. Deriving Security Requirements from Crosscutting Threat Descriptions

    E-Print Network [OSTI]

    Haley, Charles B.

    Deriving Security Requirements from Crosscutting Threat Descriptions Charles B. Haley, Robin C representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats

  12. Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aďna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

  13. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  14. Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

  15. Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection

    E-Print Network [OSTI]

    Sarinopoulos, Issidoros

    Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

  16. Effects of non-latching blast valves on the source term and consequences of the design-basis accidents in the Device Assembly Facility (DAF)

    SciTech Connect (OSTI)

    Nguyen, D.H.

    1993-08-01T23:59:59.000Z

    The analysis of the Design-Basis Accidents (DBA) involving high explosives (HE) and Plutonium (Pu) in the assembly cell of the Device Assembly Facility (DAF), which was completed earlier, assumed latching blast valves in the ventilation system of the assembly cell. Latching valves effectively sealed a release path through the ventilation duct system. However, the blast valves in the assembly cell, as constructed are actually non-latching valves, and would reopen when the gas pressure drops to 0.5 psi above one atmosphere. Because the reopening of the blast valves provides an additional release path to the environment, and affects the material transport from the assembly cell to other DAF buildings, the DOE/NV DAF management has decided to support an additional analysis of the DAF`s DBA to account for the effects of non-latching valves. Three cases were considered in the DAF`s DBA, depending on the amount of HE and Pu involved, as follows: Case 1 -- 423 {number_sign}HE, 16 kg Pu; Case 2 -- 150 {number_sign}HE 10 kg Pu; Case 3 -- 55 {number_sign}HE 5 kg Pu. The results of the analysis with non-latching valves are summarized.

  17. A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles

    E-Print Network [OSTI]

    Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

  18. Sensor-guided threat countermeasure system

    DOE Patents [OSTI]

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25T23:59:59.000Z

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  19. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect (OSTI)

    INL

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  20. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema (OSTI)

    INL

    2009-09-01T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  1. National Science Foundation Industry/University Cooperative Research Center for e-Design! SEEK: Semantic Extraction of Engineering Knowledge from a Functional Basis Perspective!

    E-Print Network [OSTI]

    Mountziaris, T. J.

    : Semantic Extraction of Engineering Knowledge from a Functional Basis Perspective! REU Student: Leo Xuzhang these documents for them to be useful.! Represent Engineering Knowledge in a Semantic Framework using Ontology engineering knowledge such as functional basis or materials used! v Extracted knowledge is added as semantic

  2. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  3. The Nature of the Bioterrorism Threat

    SciTech Connect (OSTI)

    Regens, J. L.

    2003-02-25T23:59:59.000Z

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  4. Nuclear threats from small states

    SciTech Connect (OSTI)

    Kahan, J.H.

    1994-06-13T23:59:59.000Z

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  5. ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and

    E-Print Network [OSTI]

    Sen, Sevil

    ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

  6. Coping with stereotype threat: Denial as an impression management strategy

    E-Print Network [OSTI]

    Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

    2005-01-01T23:59:59.000Z

    , Ferguson, Brooks, & Hagadone, 2004), suggest- ing that one manner of coping with stereotype threat is by using humor to reinterpret the situation as a challenge rather than a threat (see Kuiper, Martin, & Olinger, 1993). Stereotype threat has also been...

  7. An Intelligent Threat Prevention Framework with Heterogeneous Information

    E-Print Network [OSTI]

    Liu, Weiru

    An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

  8. How to determine threat probabilities using ontologies and Bayesian networks

    E-Print Network [OSTI]

    How to determine threat probabilities using ontologies and Bayesian networks [Extended Abstract Business Austria Vienna, Austria neubauer@securityresearch.ac.at ABSTRACT The subjective threat probability- and Bayesian-based approach for determining asset-specific and comprehensible threat probabilities

  9. Constructing Ionospheric Irregularity Threat Model for Korean SBAS

    E-Print Network [OSTI]

    Stanford University

    Constructing Ionospheric Irregularity Threat Model for Korean SBAS Eugene Bang, Jinsil Lee Points (IGPs). Using an ionospheric irregularity undersampled threat model, the integrity bounds, called Grid Ionospheric Vertical Errors (GIVEs), must be augmented to bound ionospheric irregularity threats

  10. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  11. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  12. The rise of "china threat" arguments

    E-Print Network [OSTI]

    Ueki, Chikako

    2006-01-01T23:59:59.000Z

    The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

  13. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect (OSTI)

    NOEL,WILLIAM P.

    2000-01-01T23:59:59.000Z

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  14. Nuclear weapons are illegal threats

    SciTech Connect (OSTI)

    Meyrowitz, E.L.

    1985-05-01T23:59:59.000Z

    Challenging Harry Almond's position that nuclear deterrence is workable, the author contends that there is no historical basis for believing that anticipation of the horrors of war will be an effective deterrent. He questions the belief that the nuclear balance of terror has maintained the peace for the past 40 years because an arms race is inherently unstable. The argument that the pursuit of national interests takes precedence over any limitation imposed by international law reflects a perception of international law that is comparable to the Third Reich. The bases for a legal evaluation of the status of nuclear weapons under international law come from express and implicit treaty provisions, international custom, general principles of international law, judicial decisions, resolutions at the United Nations, and the opinions of qualified jurists as well as military necessity.

  15. An Approach to Security Policy Configuration Using Semantic Threat Graphs

    E-Print Network [OSTI]

    Foley, Simon

    An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

  16. Invited Paper New Frontiers of Network Security: The Threat Within

    E-Print Network [OSTI]

    Sanyal, Sugata

    Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

  17. Multi-threat Containment with Dynamic Wireless Neighborhood Networks

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    Multi-threat Containment with Dynamic Wireless Neighborhood Networks Nathan A. Ransoma teams to solve a multi-threat containment problem. The multi-threat containment problem has the robot teams surround a number of threats that may occur randomly. Approaches with and without utilizing

  18. A threat-based definition of IA- and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-07-01T23:59:59.000Z

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  19. A threat-based definition of IA and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-09-01T23:59:59.000Z

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  20. Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

  1. Distributed Basis Pursuit

    E-Print Network [OSTI]

    2012-03-14T23:59:59.000Z

    Index Terms—Basis pursuit, distributed optimization, sensor networks, augmented ... and image denoising and restoration [1], [2], compression, fitting and ...

  2. Unauthorized Collaboration on Facebook: Threats and Responses

    E-Print Network [OSTI]

    McQuade, D. Tyler

    Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered and collaboration. The Problem: When students, faculty, and staff join Facebook using a valid FSU email address this and believe it is affiliated with or endorsed by Florida State University. Facebook also allows students

  3. Global Warming: The Threat to the Planet*

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming: The Threat to the Planet* Jim Hansen 17 April 2007 2007 Leo Szilard Lecture. Graham Red Squirrel #12;Survival of Species 1. "Business-as-Usual" Scenario - Global Warming ~ 3ÂşC - Likely Extinctions ~ 50 percent 2. "Alternative" Scenario - Global Warming ~ 1ÂşC - Likely Extinctions

  4. Final Design Completion The Comprehensive Final Design Review1

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    a complete and satisfactory design basis for the system design. FMEAs should be performed and documented

  5. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    SciTech Connect (OSTI)

    Draelos, T.J.; Craft, R.L.

    1996-03-01T23:59:59.000Z

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  6. Technical Basis for the Determination that Current Characterization Data and Processes are Sufficient to Ensure Safe Storage and to Design Waste Disposal

    SciTech Connect (OSTI)

    SIMPSON, B.C.

    1999-08-12T23:59:59.000Z

    This document presents the technical basis for closure of Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 93-5 Implementation Plan milestone 5.6.3.13, ''Core sample all tanks by 2002'' (DOE-RL 1996). The milestone was based on the need for characterization data to ensure safe storage of the waste, to operate the tanks safely, and to plan and implement retrieval and processing of the waste. Sufficient tank characterization data have been obtained to ensure that existing controls are adequate for safe storage of the waste in the 177 waste tanks at the Hanford Site. In addition, a process has been developed, executed, and institutionalized to systemically identify information needs, to integrate and prioritize the needs, and to reliably obtain and analyze the associated samples. This document provides a technical case that the remaining 45 incompletely sampled tanks no longer require sampling to support the intent of the Implementation Plan milestone. Sufficient data have been obtained to close the Unreviewed Safety Questions (USQs), and to ensure that existing hazard controls are adequate and appropriately applied. However, in the future, additional characterization of tanks at the site will be required to support identified information needs. Closure of this milestone allows sampling and analytical data to be obtained in a manner that is consistent with the integrated priority process.

  7. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect (OSTI)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01T23:59:59.000Z

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  8. Use of the TRUEX process for the pretreatment of neutralized cladding removal waste (NCRW) sludge: Results of a design basis experiment

    SciTech Connect (OSTI)

    Swanson, J L

    1991-07-01T23:59:59.000Z

    This report presents the results of an experiment designed to demonstrate the feasibility of a sludge dissolution/solvent extraction process to separate transuranic elements from the bulk components of Hanford neutralized cladding removal waste (NCRW) sludge. Such a separation would allow the bulk of the waste to be disposed of as low-level waste, which is much less costly than geologic disposal as would be required for the waste in its current form. The results indicate that the proposed process is well suited to meet the desired objectives. A composite sample of NCRW sludge taken from Tank 103-AW in 1986 was dissolved in nitric acid at room temperature. Dissolution of bulk components and all radionuclides was {ge}95% complete; thus, {le}5% of the bulk components will require geologic disposal. The TRUEX (TRansUranium EXtraction) solvent extraction process gave very good separation of the transuranic from the bulk components of the waste.

  9. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Insider Threat” [Gel05] Mike Gelles. Exploring the mind ofL. Krofcheck and Mike G. Gelles. Behavioral consultation in

  10. The same, only different: Threat management systems as homologues in the tree of life

    E-Print Network [OSTI]

    Holbrook, Colin; Fessler, Daniel M.T.

    2015-01-01T23:59:59.000Z

    T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

  11. Reducing Stereotype Threat in Academically At-Risk African-Americans Students: A Self-

    E-Print Network [OSTI]

    Simmons, Crystal Marie

    2011-01-01T23:59:59.000Z

    the effects of stereotype threat on African American collegeThe role of stereotype threat. Psychological Science, 12,and  White:  Stereotype  threat and the  race  gap  on  

  12. The Chronicles of Grokster: Who is the Biggest Threat in the P2P Battle?

    E-Print Network [OSTI]

    Chan, Alvin

    2008-01-01T23:59:59.000Z

    Groksten Who is the Biggest Threat in the P2P Battle? Alvininvariably identify a different threat as marginalizing itsnently identifiable threats are perhaps not as hazardous as

  13. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    E-Print Network [OSTI]

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01T23:59:59.000Z

    and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

  14. The Threat from Within: American Jews, the State of Israel, and Intermarriage

    E-Print Network [OSTI]

    Minkin, Sarah Anne

    2011-01-01T23:59:59.000Z

    and Nation. Sage Publications. Minkin, Threat from Within14, 2: 32-6. Minkin, Threat from Within Eisen, Arnold. 1986.Brandeis University Press. Minkin, Threat from Within Sarna,

  15. Minimizing the threat of pandemic emergence from avian influenza in poultry systems

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Open Access Minimizing the threat of pandemic emergence fromY: The continued pandemic threat posed by avian influenzaet al. : Minimizing the threat of pandemic emergence from

  16. A Policy of Stereotype Threat: The Intergroup Impact of Policing Stereotypes

    E-Print Network [OSTI]

    Epstein, Liana Maris

    2012-01-01T23:59:59.000Z

    J. (1995). Stereotype threat and the intellectual testC. L. (2002). The role of threats in intergroup relations.factors in stereotype threat. Journal of Experimental Social

  17. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  18. Predictors of Threat and Error Management: Identification of Core

    E-Print Network [OSTI]

    Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

  19. INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS

    E-Print Network [OSTI]

    Barbero, Ever J.

    INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS Xavier Martinez1 , Julio Davalos2 and government entities. Fires, noxious fumes, deadly gasses, and flooding threats have occurred in major are of difficult and limited accessibility, but also because most of the potential threats, such as fires, flooding

  20. BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE

    E-Print Network [OSTI]

    Slatton, Clint

    BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

  1. Insider Threat Detection using Stream Mining and Graph Mining

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

  2. FACTS about threat Possible INTERVENTIONS Strong domain identification

    E-Print Network [OSTI]

    Chisholm, Rex L.

    FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

  3. Security Threat Mitigation Trends in Low-cost RFID Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security Threat Mitigation Trends in Low-cost RFID Systems Joaquin Garcia-Alfaro1,2 , Michel of security threat mitigation mecha- nisms in RFID systems, specially in low-cost RFID tags, are gaining great. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints

  4. Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

  5. Pervasive competition between threat and reward in the brain

    E-Print Network [OSTI]

    Pessoa, Luiz

    Pervasive competition between threat and reward in the brain Jong Moon Choi, Srikanth Padmala, USA In the current functional MRI study, we investigated interactions between reward and threat to the salience hypothesis, in the condition involving both reward and threat, enhanced activation would

  6. Maritime Threat Detection using Plan Recognition Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

  7. Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

  8. Metamaterials for threat reduction applications: imaging, signal processing, and cloaking

    E-Print Network [OSTI]

    Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

  9. Joshua Rosenthol, CISSP Trends in the Threat Landscape

    E-Print Network [OSTI]

    Joshua Rosenthol, CISSP Trends in the Threat Landscape #12;2 Year in Review Data Theft Targeted-virus, firewalls, and intrusion prevention) are only effective against 30-50% of current security threats. Moreover, customers expect the effectiveness of signature-based security to continue to decline rapidly. IDC Threat

  10. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  11. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect (OSTI)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12T23:59:59.000Z

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  12. Radiological Threat Reduction | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Radiation Protection Regulations:Radiological Threat Reduction SHARE

  13. Basi di dati: Funzionalit,

    E-Print Network [OSTI]

    Ghelli, Giorgio

    Basi di dati: Funzionalità, Progettazione, Interrogazione Giorgio Ghelli DBMS's 2 Temi · Funzionalità ed uso dei DBMS · Progettazione di una Base di Dati · Interrogazione di una Base di Dati Funzionalità dei DBMS DBMS's 4 Riferimenti · A. Albano, G. Ghelli, R. Orsini, Basi di Dati Relazionali e

  14. Resilient Control Systems Practical Metrics Basis for Defining Mission Impact

    SciTech Connect (OSTI)

    Craig G. Rieger

    2014-08-01T23:59:59.000Z

    "Resilience” describes how systems operate at an acceptable level of normalcy despite disturbances or threats. In this paper we first consider the cognitive, cyber-physical interdependencies inherent in critical infrastructure systems and how resilience differs from reliability to mitigate these risks. Terminology and metrics basis are provided to integrate the cognitive, cyber-physical aspects that should be considered when defining solutions for resilience. A practical approach is taken to roll this metrics basis up to system integrity and business case metrics that establish “proper operation” and “impact.” A notional chemical processing plant is the use case for demonstrating how the system integrity metrics can be applied to establish performance, and

  15. Technical Planning Basis

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-11T23:59:59.000Z

    The Guide assists DOE/NNSA field elements and operating contractors in identifying and analyzing hazards at facilities and sites to provide the technical planning basis for emergency management programs. Cancels DOE G 151.1-1, Volume 2.

  16. Threat Analysis Framework | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transferon theTed Donat AboutTheDepartment ofEarlyThreat Analysis

  17. Design and testing of a roadside traffic threat alerting mechanism

    E-Print Network [OSTI]

    Powale, Pallavi

    2013-01-01T23:59:59.000Z

    Every year, law enforcement officials, emergency personnel, and other workers stopped in traffic outside their vehicles are struck by inattentive drivers. Until now, most efforts to prevent these types of accidents have ...

  18. 3.System Design Basis 2) MODELING

    E-Print Network [OSTI]

    Hong, Deog Ki

    was added to the heat gain of the each tank, because propane circulation system does not affect the propane

  19. Events Beyond Design Safety Basis Analysis

    Broader source: Energy.gov [DOE]

    This Safety Alert provides information on a safety concern related to the identification and mitigation of events that may fall outside those analyzed in the documented safety analysis. [Safety Bulletin 2011-01

  20. Beyond Design Basis Events | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy:WhetherNovember 13, 2009OakDepartment ofTheDepartment

  1. Deterring regional threats from nuclear proliferation

    SciTech Connect (OSTI)

    Spector, L.S.

    1992-03-12T23:59:59.000Z

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  2. NNSA's Global Threat Reduction Initiative launches mobile app...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative launches mobile app...

  3. NNSA's Global Threat Reduction Initiative Removes More Than One...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative Removes More ......

  4. Mitigating the Insider Threat Using Behavioral Science Workshop

    SciTech Connect (OSTI)

    Landers, John; De Castro, Kara

    2012-11-26T23:59:59.000Z

    PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

  5. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

  6. The Brain Basis of Emotions 1 BRAIN BASIS OF EMOTION

    E-Print Network [OSTI]

    Barrett, Lisa Feldman

    The Brain Basis of Emotions 1 BRAIN BASIS OF EMOTION The brain basis of emotion: A meta, Building 149 Charlestown, MA 02129 lindqukr@nmr.mgh.harvard.edu #12;The Brain Basis of Emotions 2 Abstract Researchers have wondered how the brain creates emotions since the early days of psychological science

  7. Management of Security Policy Configuration using a Semantic Threat Graph Approach

    E-Print Network [OSTI]

    Foley, Simon

    Management of Security Policy Configuration using a Semantic Threat Graph Approach Simon N. Foley, in turn, unnec- essarily expose the enterprise to known threats. This paper proposes a threat management Threat Graphs, a variation of the tradi- tional Threat/Attack Tree, extended in order to relate semantic

  8. Radioactive Waste Management Basis

    SciTech Connect (OSTI)

    Perkins, B K

    2009-06-03T23:59:59.000Z

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  9. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    SciTech Connect (OSTI)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24T23:59:59.000Z

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  10. Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college

    E-Print Network [OSTI]

    Rose, Annkatrin

    Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college campus in North Carolina, or a hurricane warning information about a specific threat directed towards the University. May involve a man-made threat, or flash

  11. Superluminous supernovae: No threat from Eta Carinae

    E-Print Network [OSTI]

    Brian C. Thomas; Adrian L. Melott; Brian D. Fields; Barbara J. Anthony-Twarog

    2007-09-25T23:59:59.000Z

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree.

  12. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  13. THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT

    E-Print Network [OSTI]

    Post, Jessica

    2012-01-01T23:59:59.000Z

    FLAVISSIMA) TO DETERMINE THREAT JESSICA   POST Integrative be used by fish to assess threat, and indicate when it is were  important in assessing threat.   Multiple cues were 

  14. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Abi-Antoun, Marwan

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

  15. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

  16. Tilting at Modern: Elizabeth Gordon's "The Threat to the Next America"

    E-Print Network [OSTI]

    Corbett, Kathleen LaMoine

    2010-01-01T23:59:59.000Z

    philosophy Gordon, ?The Threat to the Next America,?129.Advertisement for “The Threat to the Next America,” Business121. Figure 27. “The Threat to the Next America” carried a

  17. Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

  18. Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring

    E-Print Network [OSTI]

    Whalen, Paul J.

    Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring Leah H disorders is hypervigilant threat monitoring, its biological bases in humans remain poorly understood. Animal models suggest that anxious processes such as hypervigilant threat monitoring are distinct from

  19. Global threat reduction initiative Russian nuclear material removal progress

    SciTech Connect (OSTI)

    Cummins, Kelly [DOE/NNSA (United States); Bolshinsky, Igor [INL/NNSA (United States)

    2008-07-15T23:59:59.000Z

    In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

  20. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Dir90] [DOD08] [FK92] A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  1. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    554–563, October 1992. A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  2. Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)

    E-Print Network [OSTI]

    ANDERSON, Eric

    2013-01-01T23:59:59.000Z

    application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,an overview of China’s additive manufacturing industry is

  3. Threat-aware Path Planning in Uncertain Urban Environments

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

  4. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

    2010-01-01T23:59:59.000Z

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  5. Global Security: Asymmetric Threats The modules in this class introduce transnational, asymmetric threats/warfare, from terror organizations

    E-Print Network [OSTI]

    Rhode Island, University of

    /Global Shipping) 5. Agriculture & Food 6. Water Supplies 7. Telecommunications 8. Chemicals & Hazardous Materials 9. Nuclear & Radiological Materials Module 2 Asymmetric Tactics to Combat Nation States 1, terrorist threats to America's agriculture and food supplies, water telecommunications, chemicals

  6. Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities

    E-Print Network [OSTI]

    Manikas, Theodore

    Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities Theodore W importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat

  7. Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu Upadhyaya

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu}@cse.buffalo.edu Abstract Insider attacks are a well-known problem acknowl- edged as a threat as early as 1980s. The threat to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence

  8. Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

  9. Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci

    E-Print Network [OSTI]

    Chisci, Luigi

    Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

  10. Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision

    E-Print Network [OSTI]

    Thornton, Mitchell

    Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision Diagrams securing systems from both natural and intentional threats. Extremely large and complex systems can have an ac- cordingly large number of threat scenarios, thus simply listing the threats and devising

  11. Matching and fairness in threat-based mobile sensor coverage

    SciTech Connect (OSTI)

    Ma, Cheng-Yu {Jan} L [ORNL; Yau, King Y [ORNL; Chin, Jren-Chit [ORNL; Rao, Nageswara S [ORNL; Shankar, Mallikarjun [ORNL

    2009-12-01T23:59:59.000Z

    Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: (1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensor's movement, (2) efficient, and (3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.

  12. Protecting Networked Systems from Malware Threats

    E-Print Network [OSTI]

    Shin, Seung Won

    2013-07-26T23:59:59.000Z

    -axis for value) . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.1 EFFORT design architecture, (M1 is for human-process-network cor- relation analysis module, M2 for system resource exposure analysis module, M3 for process reputation analysis module, M4.... By simply assigning values to each interface and connecting necessary modules, a FRESCO developer can replicate a range of essential security functions, such as rewalls, scan detectors, attack de ectors, or IDS detection logic. FRESCO modules can also...

  13. Geospatiotemporal Data Mining in an Early Warning System for Forest Threats in the United States

    SciTech Connect (OSTI)

    Hoffman, Forrest M [ORNL; Mills, Richard T [ORNL; Kumar, Jitendra [ORNL; Vulli, Srinivasa S [ORNL; HargroveJr., William Walter [United States Department of Agriculture (USDA), United States Forest Service (USFS)

    2010-01-01T23:59:59.000Z

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250~m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster analysis of this massive data set, using high-performance computing, provides a basis for several possible approaches to defining the bounds of ``normal'' phenological patterns, indicating healthy vegetation in a given geographic location. We demonstrate the applicability of such an approach, using it to identify areas in Colorado, USA, where an ongoing mountain pine beetle outbreak has caused significant tree mortality.

  14. Sorghum Ergot: New Disease Threat to the Sorghum Industry

    E-Print Network [OSTI]

    Krausz, Joseph P.; Isakeit, Thomas

    1998-07-20T23:59:59.000Z

    of the sorghum ergot pathogen and likely serves as an overwintering source of ergot inoculum in south Texas. E-461 6-98 Sorghum Ergot New Disease Threat to the Sorghum Industry *Extension Plant Pathologists, The Texas A&M University System. Newly formed honeydew... dripping from an infected panicle. Joseph Krausz and Thomas Isakeit* Ho w is it a Threat to Texas? Each f_lo wer infected with ergot represents a direct loss of one seed. Additional losses occur because the stickiness of infected panicles inter- feres...

  15. Will Russian Scientists Go Rogue? A Survey on the Threat and the Impact of Western Assistance

    SciTech Connect (OSTI)

    Ball, D Y; Gerber, T P

    2004-12-27T23:59:59.000Z

    The collapse of the Soviet Union sparked fears throughout the world that rogue nations and terrorist organizations would gain access to weapons of mass destruction (WMD). One specific concern has been 'WMD brain drain.' Russians with knowledge about nuclear, chemical, and biological weapons could now depart to any country of their choice, including rogue nations seeking to produce WMD. Meanwhile, Russian science fell into a protracted crisis, with plummeting salaries, little funding for research, and few new recruits to science. These developments increased both the incentives and the opportunities for scientists to sell their knowledge to governments and terrorist organizations with hostile intentions toward the United States. Recognizing the threat of WMD brain drain from Russia, the United States, and other governments implemented a host of programs designed to reduce the risk. Despite, or perhaps partly because of, massive assistance from the West to prevent scientists with WMD knowledge from emigrating, the threat of Russian WMD brain drain has recently faded from view. Yet we have seen no evidence that these programs are effective and little systematic assessment of the current threat of WMD migration. Our data from an unprecedented survey of 602 Russian physicists, biologists, and chemists suggest that the threat of WMD brain drain from Russia should still be at the forefront of our attention. Roughly 20 percent of Russian physicists, biologists, and chemists say they would consider working in rogue nations such as North Korea, Iran, Syria, or Iraq (still considered a rogue state at the time of the survey). At the same time, the data reveal that U.S. and Western nonproliferation assistance programs work. They significantly reduce the likelihood that Russian scientists would consider working in these countries. Moreover, Russian grants do not reduce scientists' propensity to 'go rogue'. These survey findings have clear policy implications: the U.S. and its allies must continue to adequately fund nonproliferation assistance programs rather than hastily declare victory. The U.S. should remain engaged with former Soviet WMD scientists until they are willing and able to find support for their research from competitive, civilian-oriented, privately funded projects. Otherwise, we run a great risk that WMD expertise will migrate from the former Soviet Union to countries or organizations that harbor hostile intentions toward the U.S. Assistance programs work to reduce the threat of WMD brain drain, but their task is not complete. Now is not the time to pull back.

  16. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    SciTech Connect (OSTI)

    Nelson, K; Sokkappa, P

    2008-10-29T23:59:59.000Z

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the range of possibilities. Once an object is generated, its radiation signature is calculated using a 1-dimensional deterministic transport code. Objects that do not make sense based on physics principles or other constraints are rejected. Thus, the model can be used to generate a population of spectral signatures that spans a large space, including smuggled nuclear material and nuclear weapons.

  17. WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President

    E-Print Network [OSTI]

    WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

  18. AMBASSADOR BONNIE D. JENKINS Coordinator, Threat Reduction Programs,

    E-Print Network [OSTI]

    to address these challenges? How can PNNL's capabilities--from basic science through technology development, deployment, and training--address emerging threats? For more information, please contact PNNL's Center for Global Security. Jana Fankhauser, Director, jana.fankhauser@pnl.gov · http://cgs.pnnl.gov PNNL-SA-78562

  19. Climate Threat to the Planet* Implications for Energy Policy

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Threat to the Planet* Implications for Energy Policy Jim Hansen 4 July 2008 United Nations's Paleoclimate History 2. On-Going Climate Changes 3. Climate Models #12;#12;Green Triangle = Volcano; Red Box;#12;Observations: Domingues, C.M. et al., Nature 453, 1090-1093, 2008. Model: Hansen, J. et al., Science 308, 1431

  20. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg, dated 9-13-2013, cancels DOE O 100.1E.

  1. Secretarial Succession, Threat Level Notification and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

  2. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-04-20T23:59:59.000Z

    This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1C. Canceled by DOE O 100.1E

  3. Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe

    E-Print Network [OSTI]

    Zimmermann, Niklaus E.

    Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe Luigi Maiorano1 to extreme climates. Our results outline that the Mediterranean basin represents both an important hotspot change projected to occur over the coming decades, especially in the Mediterranean bioregion, posing

  4. The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?

    E-Print Network [OSTI]

    New Hampshire, University of

    The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google Maps. #12;Is the SCO a Military Threat?Is the SCO a Military Threat?Is the SCO a Military Threat

  5. Milk Futures, Options and Basis

    E-Print Network [OSTI]

    Haigh, Michael; Stockton, Matthew; Anderson, David P.; Schwart Jr., Robert B.

    2001-10-12T23:59:59.000Z

    The milk futures and options market enables producers and processors to manage price risk. This publication explains hedging, margin accounts, basis and how to track it, and other fundamentals of the futures and options market....

  6. Facility worker technical basis document

    SciTech Connect (OSTI)

    SHULTZ, M.V.

    2003-08-28T23:59:59.000Z

    This technical basis document was developed to support the Tank Farm Documented Safety Analysis (DSA). It describes the criteria and methodology for allocating controls to hazardous conditions with significant facility work consequence and presents the results of the allocation.

  7. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    SciTech Connect (OSTI)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01T23:59:59.000Z

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  8. Basis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperationalAugustDecade5-F,INITIAL

  9. Basis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperationalAugustDecade5-F,INITIALoperator bispectral analysis

  10. DDE Design Status Report Nov 2011

    SciTech Connect (OSTI)

    N.E. Woolstenhulme; R.B. Nielson

    2011-11-01T23:59:59.000Z

    The National Nuclear Security Agency Global Threat Reduction Initiative employs the Reduced Enrichment for Research and Test Reactors (RERTR) Fuel Development program to facilitate maturation of Low Enriched Uranium (LEU) fuel technology in order to enable conversion of High Power Research Reactors (HPRR) to LEU fuels. The RERTR Fuel Development program has overseen design, fabrication, irradiation, and examination of numerous tests on small to medium sized specimens containing LEU fuels. To enable the three nearest term HPRR conversions, including the Massachusetts Institutes of Technology Reactor (MITR), University of Missouri Research Reactor (MURR), and National Bureau of Standard Reactor (NBSR), the FD pillar is currently focused on qualification of the 'Base Monolithic Design'. The Base Monolithic Design consists of uranium-10 wt% molybdenum alloy (U-10Mo) in the form of a monolithic foil, with thin zirconium interlayers, clad in aluminum by hot isostatic press. The licensing basis of the aforementioned HPRR's restricts them from testing lead test elements of their respective LEU fuel element designs. In order to provide the equivalent of a lead test assembly, one Design Demonstration Experiment (DDE) is planned for each of the three NRC licensed reactors.

  11. Reduced Basis Method for Nanodevices Simulation

    SciTech Connect (OSTI)

    Pau, George Shu Heng

    2008-05-23T23:59:59.000Z

    Ballistic transport simulation in nanodevices, which involves self-consistently solving a coupled Schrodinger-Poisson system of equations, is usually computationally intensive. Here, we propose coupling the reduced basis method with the subband decomposition method to improve the overall efficiency of the simulation. By exploiting a posteriori error estimation procedure and greedy sampling algorithm, we are able to design an algorithm where the computational cost is reduced significantly. In addition, the computational cost only grows marginally with the number of grid points in the confined direction.

  12. Notice of Intent to Develop DOE O 470.X, Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-10-17T23:59:59.000Z

    The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

  13. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  14. A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues

    E-Print Network [OSTI]

    Shapira, Yoav

    2006-01-01T23:59:59.000Z

    There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

  15. MultiMulti--threat Containment withthreat Containment with Cooperative Autonomous AgentsCooperative Autonomous Agents

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    as Newtonian particles Quadratic APF (QAPF) · Simple yet does the job Three QAPFs · Moving toward the threats

  16. Abstract--Grazing incidence metal mirrors in laser-driven IFE power plants are subject to a variety of threats that result

    E-Print Network [OSTI]

    Tillack, Mark

    Abstract--Grazing incidence metal mirrors in laser-driven IFE power plants are subject to a variety [4] at UCSD, and help define design windows for the GIMM in a laser-driven IFE power plant of threats that result in damages leading to increased laser absorption, beam quality degradation and reduced

  17. Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat

    E-Print Network [OSTI]

    Hooker, Courtney

    2011-01-01T23:59:59.000Z

    dissonance, and stereotype threat A Spencer’s talk, “Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

  18. Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

  19. Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial

    E-Print Network [OSTI]

    Wang, Hai

    Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P Security has determined that external weapon threats due to surface-air missiles, as well as some

  20. Threat to the point: improving the value of comparative extinction risk analysis for conservation action

    E-Print Network [OSTI]

    Davidson, Ana

    Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

  1. OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring

    E-Print Network [OSTI]

    OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring Capabilities Reawakens Volcanic Threat Assessment: Analysis of Hazard and Risk Factors......................... 14 · Table 2. List of hazard and exposure factors used in the NVEWS threat assessment · Figure 3

  2. Reducing the Wildland Fire Threat to Homes: Where and How Much?1

    E-Print Network [OSTI]

    Standiford, Richard B.

    Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract. The threat of life and property losses during wildland fires is a significant issue for Federal, State such as hazard mapping and fuel management. The threat of life and property losses during wildland fires

  3. Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

  4. DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1 FORT BELVOIR, VA 22060-6201 February 28, 2013 Industry and Academia Partners of the Defense Threat Reduction Agency and U.S. Strategic of unceltainty for the entire Department of Defense. The Def1 ns Threat Reduction Agency and U. S. Strategic

  5. Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4

    E-Print Network [OSTI]

    Swaddle, John

    Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4 personal force or violence [and] threats of violence." The policy also fulfills the university's statutory obligations under Section 23-9.2:10 of the Code of Virginia, pursuant to which it has established a threat

  6. Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations. Journal of Experimental for the Bomber: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations Tad T. Brunyé U

  7. High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces

    E-Print Network [OSTI]

    Witkowski, Mark

    High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

  8. Fast Threat Detection and Localization Using Super-Regenerative Transceiver in

    E-Print Network [OSTI]

    Zhang, Yan

    Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

  9. Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems

    E-Print Network [OSTI]

    Menascé, Daniel A.

    Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

  10. Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via

    E-Print Network [OSTI]

    Adcock, R. Alison

    Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via Amygdala circuits associated with motivated declarative encoding and active threat avoidance have both been an upcoming scene image. Items associated with the threat of shock were better recognized 24 h later

  11. Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

  12. On the Value of a Threat Advisory System for Managing Supply Chain Disruptions

    E-Print Network [OSTI]

    Snyder, Larry

    On the Value of a Threat Advisory System for Managing Supply Chain Disruptions Brian T. Tomlin "lean" otherwise. In this paper, we propose and investigate a threat advisory system in which the firm in the threat level. We consider a model in which the firm has a single unreliable supplier, for which inventory

  13. Moderate threat causes longer lasting disruption to processing in anxious individuals

    E-Print Network [OSTI]

    Bishop, Sonia

    Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

  14. Subversion as a Threat in Information Warfare Emory A. Anderson1

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    Subversion as a Threat in Information Warfare Emory A. Anderson1 , Cynthia E. Irvine2 , and Roger R-mail: Roger.Schell@aesec.com; ABSTRACT As adversaries develop Information Warfare capabilities, the threat for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation

  15. The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change?

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change? Remarks of James E to describe the threat to our planet posed by unbridled consumption of fossil fuels. I recognize the debt owed to the threat of climate change has been sudden and profound. Only in recent years has the extent and immediacy

  16. LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring

    E-Print Network [OSTI]

    Stanford University

    LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring Ming Luo of users for the current Category I LAAS architecture. In the ionosphere threat model used by previous-case ionosphere conditions. In this paper, the ionosphere threat model is reexamined based on WAAS and IGS data

  17. Enabling Automated Threat Response through the Use of a Dynamic Security Policy

    E-Print Network [OSTI]

    Boyer, Edmond

    Enabling Automated Threat Response through the Use of a Dynamic Security Policy Herv´e Debar1: Intrusion Detection, Threat Response, Reaction, Access Control Abstract Information systems security issues to provide countermea- sures to threats compromising the security policy. The response process is far from

  18. 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS

    E-Print Network [OSTI]

    457 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS Estimated specific or generic information indicating relatively high susceptibility to certain threats (e susceptibility to threats and/or known occurrence in diverse or marginal habitats. Many, if not most, species

  19. TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY

    E-Print Network [OSTI]

    Grishok, Alla

    TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY the patient's authorization in order to prevent a serious threat to health or safety. PURPOSE The purpose will release a patient's PHI without the patient's authorization to prevent a serious threat to health

  20. Worry Is Associated With Impaired Gating of Threat From Working Memory

    E-Print Network [OSTI]

    Larson, Christine L.

    Emotion Worry Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout, C. L. (2014, August 25). Worry Is Associated With Impaired Gating of Threat From Working Memory Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout University of Wisconsin

  1. University of Newcastle upon Tyne Threat Analysis of Cryptographic Election Schemes

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    University of Newcastle upon Tyne COMPUTING SCIENCE Threat Analysis of Cryptographic Election IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-971 June, 2006 Threat Analysis of Cryptographic Election Schemes P. Y. A. Ryan and T. Peacock. Abstract We discuss some vulnerabilities, threats and counter

  2. THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN

    E-Print Network [OSTI]

    Zhu, Chen

    THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

  3. Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat

    E-Print Network [OSTI]

    Toronto, University of

    Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

  4. Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions

    E-Print Network [OSTI]

    Vermont, University of

    population density, and the extinction risk of species. This threat index is positively correlated with allFactoring species, non-species values and threats into biodiversity prioritisation across Biodiversity Species Non-species biological values Threat A B S T R A C T Biodiversity in Africa, Madagascar

  5. SmartNotes: Application of Crowdsourcing to the Detection of Web Threats

    E-Print Network [OSTI]

    Fink, Eugene

    --Crowdsourcing, Machine Learning, Web Security. I. INTRODUCTION Cybersecurity threats can be broadly divided to two high such security threats is still an ongoing battle, but there is another critical type of cybersecurity threats at al., 2009] and other similar scams have emerged due to the increased popularity of on-line banking

  6. Physical protection: threat response and performance goals as applied at the nuclear material inspection and storage (NMIS) building

    SciTech Connect (OSTI)

    Sanford, T.H.

    1982-01-01T23:59:59.000Z

    Only one aspect of nuclear security has been discussed here, a disciplined approach to physical protection systems (PPS) design. The best security against a multitude of threats to the nuclear industry is a dynamic and multifaceted safeguards program. It is one that combines PPS design with employee screening, reliability or behavioral observation programs, procedural control, assessment techniques, response capabilities, and security hardware. To be effective, such a program must be supported by management and applied uniformly to all personnel, including the safeguards and security staff.

  7. Facility worker technical basis document

    SciTech Connect (OSTI)

    EVANS, C.B.

    2003-03-21T23:59:59.000Z

    This report documents the technical basis for facility worker safety to support the Tank Farms Documented Safety Analysis and described the criteria and methodology for allocating controls to hazardous conditions with significant facility worker consequences and presents the results of the allocation.

  8. Calendar Year 2006

    Broader source: Energy.gov (indexed) [DOE]

    "Design Basis Threat" (DBT) process to guide and manage its safeguards and security program throughout the complex. The DBT identifies the most credible threats posed by...

  9. INL FCF Basis Review Follow-up

    Broader source: Energy.gov (indexed) [DOE]

    Basis. The four Significant Issues addressed the: 1) analysis of cadmium releases in seismic events, 2) analysis of radiological releases following an evaluation basis earthquake...

  10. Organic solvent technical basis document

    SciTech Connect (OSTI)

    SANDGREN, K.R.

    2003-03-22T23:59:59.000Z

    This technical basis document was developed to support the Tank Farms Documented Safety Analysis (DSA), and describes the risk binning process and the technical basis for assigning risk bins for the organic solvent fire representative and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses, as described in this report.

  11. Knowing and Managing Grain Basis

    E-Print Network [OSTI]

    Amosson, Stephen H.; Mintert, James R.; Tierney Jr., William I.; Waller, Mark L.

    1999-06-23T23:59:59.000Z

    Knowing and Managing Grain Basis Stephen Amosson, Jim Mintert, William Tierney and Mark Waller* Differences in grain prices throughout the world are the result of surplus or deficit production in various regions. In general, grain prices are lower... in the inland producing regions and higher in grain-deficit, densely populated and port regions. Distances between producing and consuming regions explain the price differential. Transfer costs, which include loading or handling and transportation charges...

  12. TCAP Aluminium Dissolution Flowsheet Basis

    SciTech Connect (OSTI)

    PIERCE, ROBERTA.

    2004-03-01T23:59:59.000Z

    The Actinide Technology Section has proposed the use of an nitric acid HNO3 and potassium fluoride KF flowsheet for stripping palladium Pd from palladium-coated kieselguhr Pd/K and removing aluminum (Al) metal foam from the TCAP coils. The basis for the HNO3-KF flowsheet is drawn from many sources. A brief review of the sources will be presented. The basic flowsheet involves three process steps, each with its own chemistry.

  13. Hanford Generic Interim Safety Basis

    SciTech Connect (OSTI)

    Lavender, J.C.

    1994-09-09T23:59:59.000Z

    The purpose of this document is to identify WHC programs and requirements that are an integral part of the authorization basis for nuclear facilities that are generic to all WHC-managed facilities. The purpose of these programs is to implement the DOE Orders, as WHC becomes contractually obligated to implement them. The Hanford Generic ISB focuses on the institutional controls and safety requirements identified in DOE Order 5480.23, Nuclear Safety Analysis Reports.

  14. FACILITY WORKER TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    SHULTZ, M.V.

    2005-03-31T23:59:59.000Z

    This technical basis document was developed to support RPP-13033, ''Tank Farms Documented Safety Analysis (DSA). It describes the criteria and methodology for allocating controls to hazardous conditions with significant facility worker (FW) consequence and presents the results of the allocation. The criteria and methodology for identifying controls that address FW safety are in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses''.

  15. Establishing a Cost Basis for Converting the High Flux Isotope Reactor from High Enriched to Low Enriched Uranium Fuel

    SciTech Connect (OSTI)

    Primm, Trent [ORNL; Guida, Tracey [University of Pittsburgh

    2010-02-01T23:59:59.000Z

    Under the auspices of the Global Threat Reduction Initiative Reduced Enrichment for Research and Test Reactors Program, the National Nuclear Security Administration /Department of Energy (NNSA/DOE) has, as a goal, to convert research reactors worldwide from weapons grade to non-weapons grade uranium. The High Flux Isotope Reactor (HFIR) at Oak Ridge National Lab (ORNL) is one of the candidates for conversion of fuel from high enriched uranium (HEU) to low enriched uranium (LEU). A well documented business model, including tasks, costs, and schedules was developed to plan the conversion of HFIR. Using Microsoft Project, a detailed outline of the conversion program was established and consists of LEU fuel design activities, a fresh fuel shipping cask, improvements to the HFIR reactor building, and spent fuel operations. Current-value costs total $76 million dollars, include over 100 subtasks, and will take over 10 years to complete. The model and schedule follows the path of the fuel from receipt from fuel fabricator to delivery to spent fuel storage and illustrates the duration, start, and completion dates of each subtask to be completed. Assumptions that form the basis of the cost estimate have significant impact on cost and schedule.

  16. Identification of threats using linguistics-based knowledge extraction.

    SciTech Connect (OSTI)

    Chew, Peter A.

    2008-09-01T23:59:59.000Z

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

  17. RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11)

    E-Print Network [OSTI]

    Rusu, Adrian

    RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11) Rowan will use available resources within the Division of Student Affairs in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests

  18. FLAMMABLE GAS TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    KRIPPS, L.J.

    2003-10-09T23:59:59.000Z

    This technical basis document was developed to support of the Tank Farms Documented Safety Analysis (DSA) and describes the risk binning process for the flammable gas representative accidents and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous condition based on an evaluation of the event frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSC and/or TSR-level controls.

  19. Anomaly Detection in Multiple Scale for Insider Threat Analysis

    SciTech Connect (OSTI)

    Kim, Yoohwan [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hively, Lee M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    We propose a method to quantify malicious insider activity with statistical and graph-based analysis aided with semantic scoring rules. Different types of personal activities or interactions are monitored to form a set of directed weighted graphs. The semantic scoring rules assign higher scores for the events more significant and suspicious. Then we build personal activity profiles in the form of score tables. Profiles are created in multiple scales where the low level profiles are aggregated toward more stable higherlevel profiles within the subject or object hierarchy. Further, the profiles are created in different time scales such as day, week, or month. During operation, the insider s current activity profile is compared to the historical profiles to produce an anomaly score. For each subject with a high anomaly score, a subgraph of connected subjects is extracted to look for any related score movement. Finally the subjects are ranked by their anomaly scores to help the analysts focus on high-scored subjects. The threat-ranking component supports the interaction between the User Dashboard and the Insider Threat Knowledge Base portal. The portal includes a repository for historical results, i.e., adjudicated cases containing all of the information first presented to the user and including any additional insights to help the analysts. In this paper we show the framework of the proposed system and the operational algorithms.

  20. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

    2009-03-10T23:59:59.000Z

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  1. Social/Ethical Issues in Predictive Insider Threat Monitoring

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah

    2011-01-01T23:59:59.000Z

    Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to prevent harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.

  2. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  3. Review and Approval of Nuclear Facility Safety Basis and Safety Design Basis Documents

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy at Waste-to-Energy usingofRetrofitting Doors onNovember 14, DOE-STD-1104-96

  4. Review and Approval of Nuclear Facility Safety Basis and Safety Design Basis Documents

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy at Waste-to-Energy usingofRetrofitting Doors onNovember 14, DOE-STD-1104-96

  5. Wilderness threats matrix: A framework for assessing impacts. Forest Service research paper

    SciTech Connect (OSTI)

    Cole, D.N.

    1994-04-01T23:59:59.000Z

    The report includes the framework represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential application of the matrix are described. An application of the matrix to the wildernesses in the Forest Service's Northern Region (northern Idaho and Montana) suggests that fire management is the most significant threat to those wildernesses and that aquatic systems are the most threatened wilderness attribute.

  6. BASIS Set Exchange (BSE): Chemistry Basis Sets from the William R. Wiley Environmental Molecular Sciences Laboratory (EMSL) Basis Set Library

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Feller, D; Schuchardt, Karen L.; Didier, Brett T.; Elsethagen, Todd; Sun, Lisong; Gurumoorthi, Vidhya; Chase, Jared; Li, Jun

    The Basis Set Exchange (BSE) provides a web-based user interface for downloading and uploading Gaussian-type (GTO) basis sets, including effective core potentials (ECPs), from the EMSL Basis Set Library. It provides an improved user interface and capabilities over its predecessor, the EMSL Basis Set Order Form, for exploring the contents of the EMSL Basis Set Library. The popular Basis Set Order Form and underlying Basis Set Library were originally developed by Dr. David Feller and have been available from the EMSL webpages since 1994. BSE not only allows downloading of the more than 200 Basis sets in various formats; it allows users to annotate existing sets and to upload new sets. (Specialized Interface)

  7. FLAMMABLE GAS TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    KRIPPS, L.J.

    2005-03-03T23:59:59.000Z

    This document describes the qualitative evaluation of frequency and consequences for DST and SST representative flammable gas accidents and associated hazardous conditions without controls. The evaluation indicated that safety-significant structures, systems and components (SSCs) and/or technical safety requirements (TSRs) were required to prevent or mitigate flammable gas accidents. Discussion on the resulting control decisions is included. This technical basis document was developed to support WP-13033, Tank Farms Documented Safety Analysis (DSA), and describes the risk binning process for the flammable gas representative accidents and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous condition based on an evaluation of the event frequency and consequence.

  8. FLAMMABLE GAS TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    KRIPPS, L.J.

    2005-02-18T23:59:59.000Z

    This document describes the qualitative evaluation of frequency and consequences for double shell tank (DST) and single shell tank (SST) representative flammable gas accidents and associated hazardous conditions without controls. The evaluation indicated that safety-significant SSCs and/or TSRS were required to prevent or mitigate flammable gas accidents. Discussion on the resulting control decisions is included. This technical basis document was developed to support of the Tank Farms Documented Safety Analysis (DSA) and describes the risk binning process for the flammable gas representative accidents and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous condition based on an evaluation of the event frequency and consequence.

  9. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    the Threat of Graphics in Interactive Fiction Aaron Kashtantwo contemporary works of interactive fiction (IF), NickHuman Factors Keywords Interactive fiction, ekphrasis, word-

  10. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    of the power of computer graphics, text still has access tothat are unavailable in graphics – including visual effects.Visuality and the Threat of Graphics in Interactive Fiction

  11. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    SciTech Connect (OSTI)

    Mills, Richard T [ORNL] [ORNL; Hoffman, Forrest M [ORNL] [ORNL; Kumar, Jitendra [ORNL] [ORNL; HargroveJr., William Walter [USDA Forest Service

    2011-01-01T23:59:59.000Z

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

  12. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  13. Spent nuclear fuel project design basis capacity study

    SciTech Connect (OSTI)

    Cleveland, K.J.

    1996-09-09T23:59:59.000Z

    A parametric study of the Spent Nuclear Fuel Project system capacity is presented. The study was completed using a commercially available software package to develop a summary level model of the major project systems. Alternative configurations, sub-system cycle times, and operating scenarios were tested to identify their impact on total project duration and equipment requirements.

  14. Spent nuclear fuel project design basis capacity study

    SciTech Connect (OSTI)

    Cleveland, K.J.

    1998-07-22T23:59:59.000Z

    A parametric study of the Spent Nuclear Fuel Project system capacity is presented. The study was completed using a commercially available software package to develop a summary level model of the major project systems. A base case, reflecting the Fiscal Year 1998 process configuration, is evaluated. Parametric evaluations are also considered, investigating the impact of higher fuel retrieval system productivity and reduced shift operations at the canister storage building on total project duration.

  15. Molecular Design Basis for Hydrogen Storage in Clathrate Hydrates

    SciTech Connect (OSTI)

    John, Vijay T [Tulane University] [Tulane University; McPherson, Gary L [Tulane University] [Tulane University; Ashbaugh, Hank [Tulane University] [Tulane University; Johnes, Camille Y [Columbia University] [Columbia University

    2013-06-28T23:59:59.000Z

    We attach a final technical report for the project. The report contains the list of all peer reviewed publications that have resulted from the contract. I will be happy to send the pdf files of the papers.

  16. Perspective on Beyond Design Basis Event Analysis and Response

    Broader source: Energy.gov [DOE]

    Presenter: John Schwenker, Nuclear Safety Manager for Liquid Operations, Savannah River Remediation, LLC, Savannah River Site

  17. Development of Guidance for Analysis of Beyond Design Basis Events

    Broader source: Energy.gov [DOE]

    Presenter: Dr. James O'Brien, Director, Office of Nuclear Safety, Office of Health, Safety and Security, US Department of Energy

  18. CRAD, Integrated Safety Basis and Engineering Design Review - August 20,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China U.S. Department ofJune 2,The BigSidingState6Report,COMMENTS ONPRGMofRev.AofTo2014

  19. Beyond Design Basis Event Pilot Evaluations | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand Sustained CoordinationWater PilotBeverlyBeyond

  20. Beyond Design Basis Events Analysis and Response Information | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The FutureCommentsEnergyand Sustained CoordinationWater PilotBeverlyBeyondof

  1. Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptember 2010 |of EnergySelectedofGeothermalImplementation of

  2. Assessing Beyond Design Basis Seismic Events and Implications on Seismic

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'s ReplyApplication of Training April 30,Wind ProgramRisk | Department of

  3. Advanced Fuel Cycle Cost Basis

    SciTech Connect (OSTI)

    D. E. Shropshire; K. A. Williams; W. B. Boore; J. D. Smith; B. W. Dixon; M. Dunzik-Gougar; R. D. Adams; D. Gombert; E. Schneider

    2009-12-01T23:59:59.000Z

    This report, commissioned by the U.S. Department of Energy (DOE), provides a comprehensive set of cost data supporting a cost analysis for the relative economic comparison of options for use in the Advanced Fuel Cycle Initiative (AFCI) Program. The report describes the AFCI cost basis development process, reference information on AFCI cost modules, a procedure for estimating fuel cycle costs, economic evaluation guidelines, and a discussion on the integration of cost data into economic computer models. This report contains reference cost data for 25 cost modules—23 fuel cycle cost modules and 2 reactor modules. The cost modules were developed in the areas of natural uranium mining and milling, conversion, enrichment, depleted uranium disposition, fuel fabrication, interim spent fuel storage, reprocessing, waste conditioning, spent nuclear fuel (SNF) packaging, long-term monitored retrievable storage, near surface disposal of low-level waste (LLW), geologic repository and other disposal concepts, and transportation processes for nuclear fuel, LLW, SNF, transuranic, and high-level waste.

  4. Advanced Fuel Cycle Cost Basis

    SciTech Connect (OSTI)

    D. E. Shropshire; K. A. Williams; W. B. Boore; J. D. Smith; B. W. Dixon; M. Dunzik-Gougar; R. D. Adams; D. Gombert; E. Schneider

    2008-03-01T23:59:59.000Z

    This report, commissioned by the U.S. Department of Energy (DOE), provides a comprehensive set of cost data supporting a cost analysis for the relative economic comparison of options for use in the Advanced Fuel Cycle Initiative (AFCI) Program. The report describes the AFCI cost basis development process, reference information on AFCI cost modules, a procedure for estimating fuel cycle costs, economic evaluation guidelines, and a discussion on the integration of cost data into economic computer models. This report contains reference cost data for 25 cost modules—23 fuel cycle cost modules and 2 reactor modules. The cost modules were developed in the areas of natural uranium mining and milling, conversion, enrichment, depleted uranium disposition, fuel fabrication, interim spent fuel storage, reprocessing, waste conditioning, spent nuclear fuel (SNF) packaging, long-term monitored retrievable storage, near surface disposal of low-level waste (LLW), geologic repository and other disposal concepts, and transportation processes for nuclear fuel, LLW, SNF, transuranic, and high-level waste.

  5. Advanced Fuel Cycle Cost Basis

    SciTech Connect (OSTI)

    D. E. Shropshire; K. A. Williams; W. B. Boore; J. D. Smith; B. W. Dixon; M. Dunzik-Gougar; R. D. Adams; D. Gombert

    2007-04-01T23:59:59.000Z

    This report, commissioned by the U.S. Department of Energy (DOE), provides a comprehensive set of cost data supporting a cost analysis for the relative economic comparison of options for use in the Advanced Fuel Cycle Initiative (AFCI) Program. The report describes the AFCI cost basis development process, reference information on AFCI cost modules, a procedure for estimating fuel cycle costs, economic evaluation guidelines, and a discussion on the integration of cost data into economic computer models. This report contains reference cost data for 26 cost modules—24 fuel cycle cost modules and 2 reactor modules. The cost modules were developed in the areas of natural uranium mining and milling, conversion, enrichment, depleted uranium disposition, fuel fabrication, interim spent fuel storage, reprocessing, waste conditioning, spent nuclear fuel (SNF) packaging, long-term monitored retrievable storage, near surface disposal of low-level waste (LLW), geologic repository and other disposal concepts, and transportation processes for nuclear fuel, LLW, SNF, and high-level waste.

  6. GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES

    E-Print Network [OSTI]

    Mills, Richard

    GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES F) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster States (CONUS) as part of a two tier system: An early warning system that monitors continental-scale ar

  7. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  8. Recommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities

    E-Print Network [OSTI]

    . Gleicki October 9, 2008 Lack of a National Water Policy As we enter the 21st century, pressures on waterRecommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Background Material Dr. Peter H

  9. Climate change is one of the greatest threats facing us today. CICERO's mission

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

  10. Insider Threat - Material Control and Accountability Mitigation (Presentation)

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

  11. 324 Building safety basis criteria document

    SciTech Connect (OSTI)

    STEFFEN, J.M.

    1999-06-02T23:59:59.000Z

    The Safety Basis Criteria document describes the proposed format, content, and schedule for the preparation of an updated Safety Analysis Report (SAR) and Operational Safety Requirements document (OSR) for the 324 Building. These updated safety authorization basis documents are intended to cover stabilization and deactivation activities that will prepare the facility for turnover to the Environmental Restoration Contractor for final decommissioning. The purpose of this document is to establish the specific set of criteria needed for technical upgrades to the 324 Facility Safety Authorization Basis, as required by Project Hanford Procedure HNF-PRO-705, Safety Basis Planning, Documentation, Review, and Approval.

  12. 52293Federal Register / Vol. 79, No. 170 / Wednesday, September 3, 2014 / Proposed Rules that even if each threat individually

    E-Print Network [OSTI]

    if each threat individually does not result in population-level effects that may warrant protection). For the other six petitioned species, we have specifically considered whether two or more of the threats or in the foreseeable future. We have no information to suggest that the identified threats to the species will work

  13. 36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e.g., fishery interactions, ship

    E-Print Network [OSTI]

    36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e concludes that the recovering population in combination with the removal of previously identified threats- and long-term; (7) the effects of other threats, including whaling, disease and predation, contaminants

  14. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    E-Print Network [OSTI]

    Parasuraman, Raja

    Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

  15. Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,

    E-Print Network [OSTI]

    McMains, Sara

    Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

  16. Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin

    E-Print Network [OSTI]

    Maddox, W. Todd

    Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

  17. Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa

    E-Print Network [OSTI]

    Pessoa, Luiz

    Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

  18. INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the

    E-Print Network [OSTI]

    Meyers, Steven D.

    pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

  19. 34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0.02 Bomb Threat Procedures Approved September 25, 2001 Revised April 30, 2010 Next scheduled review: April 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously

  20. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information University, Chicago, IL, USA Preferential processing of threat has been implicated in the development and perpetuation of anxiety. We investigated threat processing and anxiety using a subliminal priming paradigm

  1. Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan

    SciTech Connect (OSTI)

    Pereira, Mario M.; Slonecker, Bruce D.

    2012-06-01T23:59:59.000Z

    The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

  2. Darwin's Pangenesis and the Problem of Unconceived Alternatives P. Kyle Stanford has argued that the most substantial threat to scientific realism

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    argued that the most substantial threat to scientific realism arises from the problem of unconceived significant threat to scientific realism derives neither from traditional underdetermination arguments nor

  3. Informing design decisions : an approach to corporate building design

    E-Print Network [OSTI]

    Maxwell, Marc A

    1985-01-01T23:59:59.000Z

    This thesis is an investigation into design methodologies. How do we, as designers, prepare ourselves for decision making and evaluate our assumptions and decisions? The intent is to employ this information as a basis for ...

  4. Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool

    E-Print Network [OSTI]

    Weiss, M. L.

    2006-01-01T23:59:59.000Z

    beyond traditional disciplines including risk/threat analysis and mitigation programs. This paper discusses the growing trend of using a commissioning approach as a documentation process for the validation requirements, which are documented in the study...

  5. Threat assessment for safe navigation in environments with uncertainty in predictability

    E-Print Network [OSTI]

    Aoudé, Georges Salim

    2011-01-01T23:59:59.000Z

    This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is ...

  6. What Happens When Low Status Groups Start Moving Up? Prejudice and Threat to Group Position

    E-Print Network [OSTI]

    Nierman, Angela J.

    2007-11-20T23:59:59.000Z

    Does threat operate as a cause or a consequence of prejudice? Three studies investigated how high status groups respond to low status groups' advances. I hypothesized that gays' status gains are threatening to heterosexuals' privileged group...

  7. CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    district heating sector in 2007, confirms the theoretical predictions. Keywords: regulatory threat, district heating, Sweden JEL Classification: L12, L21, L51, L97 hal-00659458,version1-12Jan2012 #12;2 1

  8. Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Moose, Steve

    2011-04-25T23:59:59.000Z

    Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  9. Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS)

    E-Print Network [OSTI]

    Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS) Mr. Jack Summe currently Psychological Operations Group (Airborne) from 2003-2005. A native of Warsaw, Indiana, he holds a bachelor

  10. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    SciTech Connect (OSTI)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01T23:59:59.000Z

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  11. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31T23:59:59.000Z

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  12. DISCLOSURE OF EDUCATION RECORDS IN HEALTH AND SAFETY EMERGENCIES If the university determines that there is an articulable and significant threat to the health or safety of a student or

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    If the university determines that there is an articulable and significant threat individuals. · ``Articulable and significant threat'' means that if a school reasonably believes that a student poses a significant threat, such as a threat

  13. CRAD, Safety Basis - Los Alamos National Laboratory Waste Characteriza...

    Office of Environmental Management (EM)

    Safety Basis - Los Alamos National Laboratory Waste Characterization, Reduction, and Repackaging Facility CRAD, Safety Basis - Los Alamos National Laboratory Waste...

  14. 222-S Laboratory interim safety basis

    SciTech Connect (OSTI)

    WEAVER, L.L.

    2001-09-10T23:59:59.000Z

    The purpose of this document is to establish the Interim Safety Basis (ISB) for the 222-S Laboratory. An ISB is a documented safety basis that provides the justification for the continued operation of the facility until an upgraded documented safety analysis (DSA) is prepared in compliance with 10CFR 830, Subpart B. The 222-S Laboratory ISB is based on revised facility and process descriptions and revised accident analyses that reflect current conditions.

  15. Cold vacuum drying facility design requirements

    SciTech Connect (OSTI)

    Irwin, J.J.

    1997-09-24T23:59:59.000Z

    This release of the Design Requirements Document is a complete restructuring and rewrite to the document previously prepared and released for project W-441 to record the design basis for the design of the Cold Vacuum Drying Facility.

  16. Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders intents. We propose a novel threat assessment module, consisting of an intention predictor and a threat assessor, which augments the host vehicle's path planner with a real-time threat value representing

  17. Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is

    E-Print Network [OSTI]

    Rusu, Adrian

    Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

  18. Hanford External Dosimetry Technical Basis Manual PNL-MA-842

    SciTech Connect (OSTI)

    Rathbone, Bruce A.

    2005-02-25T23:59:59.000Z

    The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at Hanford. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with 10 CFR 835, DOELAP, DOE-RL, ORP, PNSO, and Hanford contractor requirements. The dosimetry system is operated by PNNL’s Hanford External Dosimetry Program which provides dosimetry services to all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. Rev. 0 marks the first revision to be released through PNNL’s Electronic Records & Information Capture Architecture (ERICA) database.

  19. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01T23:59:59.000Z

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  20. Project of the underwater system for chemical threat detection

    E-Print Network [OSTI]

    Silarski, M; Moskal, P; Smolis, M; Tadeja, S

    2015-01-01T23:59:59.000Z

    In this article we describe a novel method for the detection of explosives and other hazardous substances in the marine environment using neutron activation. Unlike the other considered methods based on this technique we propose to use guides forneutron and gamma quanta which speeds up and simplifies identification. Moreover, it may provide a determination of the density distribution of a dangerous substance. First preliminary results of Monte Carlo simulations dedicated for design of a device exploiting this method are also presented.

  1. Engineering applications of soil information system (sis): precision irrigation and drainage systems design

    E-Print Network [OSTI]

    Ceylan, Bilge Kagan

    2009-05-15T23:59:59.000Z

    that are currently employed in drainage design and construction were evaluated. A detailed market analysis was conducted with a focus on the industry stakeholders. A strategic strengths, weaknesses, opportunities and threats (SWOT) analysis was conducted...

  2. Technical basis document for natural event hazards

    SciTech Connect (OSTI)

    CARSON, D.M.

    2003-08-28T23:59:59.000Z

    This technical basis document was developed to support the documented safety analysis (DSA) and describes the risk binning process and the technical basis for assigning risk bins for natural event hazard (NEH)-initiated accidents. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls This report documents the technical basis for assigning risk bins for Natural Event Hazards Representative Accident and associated represented hazardous conditions.

  3. Invasion of French Polynesia by the Glassy-Winged Sharpshooter, Homalodisca coagulata (Hemiptera: Cicadellidae): A New Threat

    E-Print Network [OSTI]

    Hoddle, Mark S.

    (Hemiptera: Cicadellidae): A New Threat to the South Pacific1 Julie Grandgirard,2,3 Mark S. Hoddle,4 George K

  4. Hanford External Dosimetry Technical Basis Manual PNL-MA-842

    SciTech Connect (OSTI)

    Rathbone, Bruce A.

    2009-08-28T23:59:59.000Z

    The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at Hanford. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with 10 CFR 835, DOELAP, DOE-RL, ORP, PNSO, and Hanford contractor requirements. The dosimetry system is operated by PNNL’s Hanford External Dosimetry Program (HEDP) which provides dosimetry services to all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee (HPDAC) which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNL’s Electronic Records & Information Capture Architecture (ERICA) database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document.

  5. CRAD, Facility Safety- Nuclear Facility Safety Basis

    Broader source: Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) that can be used for assessment of a contractor's Nuclear Facility Safety Basis.

  6. The Equitable Basis for sl_2

    E-Print Network [OSTI]

    Benkart, Georgia

    2008-01-01T23:59:59.000Z

    This article contains an investigation of the equitable basis for the Lie algebra sl_2. Denoting this basis by {x,y,z}, we have [x,y] = 2x + 2y, [y,z] = 2y + 2z, [z, x] = 2z + 2x. One focus of our study is the group of automorphisms G generated by exp(ad x*), exp(ad y*), exp(ad z*), where {x*,y*,z*} is the basis for sl_2 dual to {x,y,z} with respect to the trace form (u,v) = tr(uv). We show that G is isomorphic to the modular group PSL_2(Z). Another focus of our investigation is the lattice L=Zx+Zy+Zz. We prove that the orbit G(x) equals {u in L |(u,u)=2}. We determine the precise relationship between (i) the group G, (ii) the group of automorphisms for sl_2 that preserve L, (iii) the group of automorphisms and antiautomorphisms for sl_2 that preserve L, and (iv) the group of isometries for (,) that preserve L. We obtain analogous results for the lattice L* =Zx*+Zy*+Zz*. Relative to the equitable basis, the matrix of the trace form is a Cartan matrix of hyperbolic type; consequently,we identify the equitable ...

  7. Technical basis document for external events

    SciTech Connect (OSTI)

    OBERG, B.D.

    2003-03-22T23:59:59.000Z

    This document supports the Tank Farms Documented Safety Analysis and presents the technical basis for the frequencies of externally initiated accidents. The consequences of externally initiated events are discussed in other documents that correspond to the accident that was caused by the external event. The external events include aircraft crash, vehicle accident, range fire, and rail accident.

  8. Waste transfer leaks technical basis document

    SciTech Connect (OSTI)

    ZIMMERMAN, B.D.

    2003-03-22T23:59:59.000Z

    This document provides technical support for the onsite radiological and toxicological, and offsite toxicological, portions of the waste transfer leak accident presented in the Documented Safety Analysis. It provides the technical basis for frequency and consequence bin selection, and selection of safety SSCs and TSRs.

  9. Virtual environments for nuclear power plant design

    SciTech Connect (OSTI)

    Brown-VanHoozer, S.A.; Singleterry, R.C. Jr.; King, R.W. [and others

    1996-03-01T23:59:59.000Z

    In the design and operation of nuclear power plants, the visualization process inherent in virtual environments (VE) allows for abstract design concepts to be made concrete and simulated without using a physical mock-up. This helps reduce the time and effort required to design and understand the system, thus providing the design team with a less complicated arrangement. Also, the outcome of human interactions with the components and system can be minimized through various testing of scenarios in real-time without the threat of injury to the user or damage to the equipment. If implemented, this will lead to a minimal total design and construction effort for nuclear power plants (NPP).

  10. Integrated Safety Management System as the Basis for Work Planning...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Safety Management System as the Basis for Work Planning and Control for Research and Development Integrated Safety Management System as the Basis for Work Planning and...

  11. ORISE: The Medical Basis for Radiation-Accident Preparedness...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Medical Basis for Radiation-Accident Preparedness: Medical Management Proceedings of the Fifth International REACTS Symposium on the Medical Basis for Radiation-Accident...

  12. Technical Cost Modeling - Life Cycle Analysis Basis for Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - Life Cycle Analysis Basis for Program Focus Technical Cost Modeling - Life Cycle Analysis Basis for Program Focus Polymer Composites Research in the LM Materials Program Overview...

  13. NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to

    E-Print Network [OSTI]

    human actˇvˇtˇes, such as dredging in the marˇne envˇronment 0r the ˇntakes of power plants, may ˇnc power plants often take in sea water to cool the reactors. Sea turtles may be trapped against intakeNOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve

  14. Modeling threat assessments of water supply systems using markov latent effects methodology.

    SciTech Connect (OSTI)

    Silva, Consuelo Juanita

    2006-12-01T23:59:59.000Z

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  15. Damage Threats and Response of Final Optics for Laser-Fusion Power Plants

    E-Print Network [OSTI]

    Tillack, Mark

    Damage Threats and Response of Final Optics for Laser-Fusion Power Plants M. S. Tillack1 , S. A-1597 The final optics for laser-IFE (inertial fusion energy) power plants will be exposed to a variety of damage to be the most serious concerns for a power plant. 1. Introduction Survival of the final optic is one of the most

  16. DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE

    E-Print Network [OSTI]

    DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE AND ENVIRONMENT? By Michael E. Mann I. Introduction The subjects of "global warming" and "climate change" have become parts of both the popular lexicon and the public discourse. Discussions of global warming often evoke passionate

  17. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  18. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    SciTech Connect (OSTI)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01T23:59:59.000Z

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  19. The threat of terrorism and other attacks raises profound dilemmas for the electric power industry.

    E-Print Network [OSTI]

    Amin, S. Massoud

    &D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports launched an Infrastructure Security Initiative (ISI), a two-year pro- gram funded by the electric powerThe threat of terrorism and other attacks raises profound dilemmas for the electric power industry

  20. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  1. ARTICLE doi:10.1038/nature09440 Global threats to human water security

    E-Print Network [OSTI]

    McIntyre, Peter

    ,20 . The success of integrated water management strategies depends on striking a balance between human resource use policy and management responses to this crisis, and underscores the necessity of limiting threats change, urb- anization, industrialization and engineering schemes like reservoirs, irrigation

  2. The Threat to the Planet* Dark & Bright Sides of Global Warming

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet* Dark & Bright Sides of Global Warming Jim Hansen 3 October 2007 presented provides most important information on global warming. Recorded human history occurs within the Holocene for these large climate change is perturbations of Earth's orbit. #12;Continental Drift Fig. 1 "Global Warming

  3. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  4. Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe

    E-Print Network [OSTI]

    Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe and the Cause; 23rd January 2009) Deliverable Report D28 Report on the risk of entry, establishment, spread OF TABLES LIST OF FIGURES LIST OF PARTICIPANTS AND CONTRIBUTORS 3 5 6 SUMMARY: PEST RISK ANALYSIS

  5. Systematic expansion for infrared oscillator basis extrapolations

    E-Print Network [OSTI]

    R. J. Furnstahl; S. N. More; T. Papenbrock

    2014-03-20T23:59:59.000Z

    Recent work has demonstrated that the infrared effects of harmonic oscillator basis truncations are well approximated by imposing a partial-wave Dirichlet boundary condition at a properly identified radius L. This led to formulas for extrapolating the corresponding energy E_L and other observables to infinite L and thus infinite basis size. Here we reconsider the energy for a two-body system with a Dirichlet boundary condition at L to identify and test a consistent and systematic expansion for E_L that depends only on observables. We also generalize the energy extrapolation formula to nonzero angular momentum, and apply it to the deuteron. Formulas given previously for extrapolating the radius are derived in detail.

  6. TECHNICAL BASIS DOCUMENT FOR NATURAL EVENT HAZARDS

    SciTech Connect (OSTI)

    KRIPPS, L.J.

    2006-07-31T23:59:59.000Z

    This technical basis document was developed to support the documented safety analysis (DSA) and describes the risk binning process and the technical basis for assigning risk bins for natural event hazard (NEH)-initiated accidents. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls.

  7. Technical basis document for natural event hazards

    SciTech Connect (OSTI)

    CARSON, D.M.

    2003-03-20T23:59:59.000Z

    This technical basis document was developed to support the Tank Farms Documented Safety Analysis (DSA), and describes the risk binning process and the technical basis for assigning risk bins for natural event hazards (NEH)-initiated representative accident and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses'', as described in this report.

  8. Chopped random-basis quantum optimization

    E-Print Network [OSTI]

    Tommaso Caneva; Tommaso Calarco; Simone Montangero

    2011-08-22T23:59:59.000Z

    In this work we describe in detail the "Chopped RAndom Basis" (CRAB) optimal control technique recently introduced to optimize t-DMRG simulations [arXiv:1003.3750]. Here we study the efficiency of this control technique in optimizing different quantum processes and we show that in the considered cases we obtain results equivalent to those obtained via different optimal control methods while using less resources. We propose the CRAB optimization as a general and versatile optimal control technique.

  9. RNEDE: Resilient Network Design Environment

    SciTech Connect (OSTI)

    Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

    2010-08-01T23:59:59.000Z

    Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

  10. Safety basis academy summary of project implementation from 2007-2009

    SciTech Connect (OSTI)

    Johnston, Julie A [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    During fiscal years 2007 through 2009, in accordance with Performance Based Incentives with DOE/NNSA Los Alamos Site Office, Los Alamos National Security (LANS) implemented and operated a Safety Basis Academy (SBA) to facilitate uniformity in technical qualifications of safety basis professionals across the nuclear weapons complex. The implementation phase of the Safety Basis Academy required development, delivery, and finalizing a set of 23 courses. The courses developed are capable of supporting qualification efforts for both federal and contractor personnel throughout the DOE/NNSA Complex. The LANS Associate Director for Nuclear and High Hazard Operations (AD-NHHO) delegated project responsibillity to the Safety Basis Division. The project was assigned to the Safety Basis Technical Services (SB-TS) Group at Los Alamos National Laboratory (LANL). The main tasks were project needs analysis, design, development, implementation of instructional delivery, and evaluation of SBA courses. DOE/NNSA responsibility for oversight of the SBA project was assigned to the Chief of Defense for Nuclear Safety, and delegated to the Authorization Basis Senior Advisor, Continuous Learning Chair (CDNS-ABSA/CLC). NNSA developed a memorandum of agreement with LANS AD-NHHO. Through a memorandum of agreement initiated by NNSA, the DOE National Training Center (NTC) will maintain the set of Safety Basis Academy courses and is able to facilitate course delivery throughout the DOE Complex.

  11. Natural phenomena hazards design and evaluation criteria for Department of Energy Facilities

    SciTech Connect (OSTI)

    NONE

    1996-01-01T23:59:59.000Z

    The Department of Energy (DOE) has issued an Order 420.1 which establishes policy for its facilities in the event of natural phenomena hazards (NPH) along with associated NPH mitigation requirements. This DOE Standard gives design and evaluation criteria for NPH effects as guidance for implementing the NPH mitigation requirements of DOE Order 420.1 and the associated implementation Guides. These are intended to be consistent design and evaluation criteria for protection against natural phenomena hazards at DOE sites throughout the United States. The goal of these criteria is to assure that DOE facilities can withstand the effects of natural phenomena such as earthquakes, extreme winds, tornadoes, and flooding. These criteria apply to the design of new facilities and the evaluation of existing facilities. They may also be used for modification and upgrading of existing facilities as appropriate. The design and evaluation criteria presented herein control the level of conservatism introduced in the design/evaluation process such that earthquake, wind, and flood hazards are treated on a consistent basis. These criteria also employ a graded approach to ensure that the level of conservatism and rigor in design/evaluation is appropriate for facility characteristics such as importance, hazards to people on and off site, and threat to the environment. For each natural phenomena hazard covered, these criteria consist of the following: Performance Categories and target performance goals as specified in the DOE Order 420.1 NPH Implementation Guide, and DOE-STD-1 021; specified probability levels from which natural phenomena hazard loading on structures, equipment, and systems is developed; and design and evaluation procedures to evaluate response to NPH loads and criteria to assess whether or not computed response is permissible.

  12. Technical basis for internal dosimetry at Hanford

    SciTech Connect (OSTI)

    Sula, M.J.; Carbaugh, E.H.; Bihl, D.E.

    1991-07-01T23:59:59.000Z

    The Hanford Internal Dosimetry Program, administered by Pacific Northwest Laboratory for the US Department of Energy, provides routine bioassay monitoring for employees who are potentially exposed to radionuclides in the workplace. This report presents the technical basis for routine bioassay monitoring and the assessment of internal dose at Hanford. The radionuclides of concern include tritium, corrosion products ({sup 58}Co, {sup 60}Co, {sup 54}Mn, and {sup 59}Fe), strontium, cesium, iodine, europium, uranium, plutonium, and americium,. Sections on each of these radionuclides discuss the sources and characteristics; dosimetry; bioassay measurements and monitoring; dose measurement, assessment, and mitigation and bioassay follow-up treatment. 78 refs., 35 figs., 115 tabs.

  13. Structural Basis for Activation of Cholera Toxin

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary900SteepStrengthening northern NewStructural Basis for

  14. Structural Basis for Activation of Cholera Toxin

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary900SteepStrengthening northern NewStructural Basis

  15. Structural Basis for Activation of Cholera Toxin

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary900SteepStrengthening northern NewStructural BasisStructural

  16. NDRPProtocolTechBasisCompiled020705.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gif Directorate - Events - Fermilab atNovelNC π5,NDLGS:Basis

  17. Technical Basis for PNNL Beryllium Inventory

    SciTech Connect (OSTI)

    Johnson, Michelle Lynn

    2014-07-09T23:59:59.000Z

    The Department of Energy (DOE) issued Title 10 of the Code of Federal Regulations Part 850, “Chronic Beryllium Disease Prevention Program” (the Beryllium Rule) in 1999 and required full compliance by no later than January 7, 2002. The Beryllium Rule requires the development of a baseline beryllium inventory of the locations of beryllium operations and other locations of potential beryllium contamination at DOE facilities. The baseline beryllium inventory is also required to identify workers exposed or potentially exposed to beryllium at those locations. Prior to DOE issuing 10 CFR 850, Pacific Northwest Nuclear Laboratory (PNNL) had documented the beryllium characterization and worker exposure potential for multiple facilities in compliance with DOE’s 1997 Notice 440.1, “Interim Chronic Beryllium Disease.” After DOE’s issuance of 10 CFR 850, PNNL developed an implementation plan to be compliant by 2002. In 2014, an internal self-assessment (ITS #E-00748) of PNNL’s Chronic Beryllium Disease Prevention Program (CBDPP) identified several deficiencies. One deficiency is that the technical basis for establishing the baseline beryllium inventory when the Beryllium Rule was implemented was either not documented or not retrievable. In addition, the beryllium inventory itself had not been adequately documented and maintained since PNNL established its own CBDPP, separate from Hanford Site’s program. This document reconstructs PNNL’s baseline beryllium inventory as it would have existed when it achieved compliance with the Beryllium Rule in 2001 and provides the technical basis for the baseline beryllium inventory.

  18. Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response

    SciTech Connect (OSTI)

    Hauschild, Veronique [U.S. Army Public Health Command] [U.S. Army Public Health Command; Watson, Annetta Paule [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facility recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.

  19. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

    E-Print Network [OSTI]

    Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

    2012-01-01T23:59:59.000Z

    Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

  20. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    SciTech Connect (OSTI)

    Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

    2013-11-01T23:59:59.000Z

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  1. Hanford External Dosimetry Technical Basis Manual PNL-MA-842

    SciTech Connect (OSTI)

    Rathbone, Bruce A.

    2011-04-04T23:59:59.000Z

    The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at the U.S. Department of Energy (DOE) Hanford site. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with requirements of 10 CFR 835, the DOE Laboratory Accreditation Program, the DOE Richland Operations Office, DOE Office of River Protection, DOE Pacific Northwest Office of Science, and Hanford’s DOE contractors. The dosimetry system is operated by the Pacific Northwest National Laboratory (PNNL) Hanford External Dosimetry Program which provides dosimetry services to PNNL and all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since its inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNL’s Electronic Records & Information Capture Architecture database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving significant changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Maintenance and distribution of controlled hard copies of the manual by PNNL was discontinued beginning with Revision 0.2.

  2. Hanford External Dosimetry Technical Basis Manual PNL-MA-842

    SciTech Connect (OSTI)

    Rathbone, Bruce A.

    2010-04-01T23:59:59.000Z

    The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at the U.S. Department of Energy (DOE) Hanford site. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with requirements of 10 CFR 835, the DOE Laboratory Accreditation Program, the DOE Richland Operations Office, DOE Office of River Protection, DOE Pacific Northwest Office of Science, and Hanford’s DOE contractors. The dosimetry system is operated by the Pacific Northwest National Laboratory (PNNL) Hanford External Dosimetry Program which provides dosimetry services to PNNL and all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since its inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNL’s Electronic Records & Information Capture Architecture database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving significant changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Maintenance and distribution of controlled hard copies of the manual by PNNL was discontinued beginning with Revision 0.2.

  3. Chapter citation (as of Dec., 2012): Barber, S. J., & Mather, M. (in press). Stereotype threat in older adults: When and why

    E-Print Network [OSTI]

    Mather, Mara

    Chapter citation (as of Dec., 2012): Barber, S. J., & Mather, M. (in press). Stereotype threat threat in older adults: When and why does it occur and who is most affected? Author Names: Sarah J: barbersa@usc.edu Abstract: Stereotype threat occurs when people fear that poor performance on their part

  4. The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response

    E-Print Network [OSTI]

    #12;Preface The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response to this threat has taken many forms, and respond to threats. The US Department of Homeland Security (DHS) chartered the National Visu- alization

  5. The City University of New York Medical Withdrawal and Re-entry Policy and Procedures Governing Student Behavior that Presents a Direct Threat of

    E-Print Network [OSTI]

    Qiu, Weigang

    Student Behavior that Presents a Direct Threat of Harm to Self or Others or Substantially Disrupts of a medical condition, engage in behavior that presents a direct threat of harm to themselves or to others 911 or taking other immediate action in case of imminent threat to life or limb. In addition to taking

  6. Before the deluge? Assessing the threat of nuclear leakage from the post-Soviet states

    SciTech Connect (OSTI)

    Potter, W.C.

    1995-10-01T23:59:59.000Z

    Most nuclear security problems are linked to the Russian Federation and the region`s troubled economic, political and social conditions. They are unlikely to be resolved without substantial progress in stabilizing the economy and renewing public trust in government institutions. The author makes a risk assessment of the threat and cites specific cases of theft and diversion of fissile materials and the need for action to control this activity. 17 refs.

  7. Worldwide threat assessment brief to the Senate Select Committee on intelligence statement for the record

    SciTech Connect (OSTI)

    Deutch, J.

    1996-02-22T23:59:59.000Z

    This report outlines the threats to the United States and its interests now and into the next century. We still call this the post-Cold War world. Among the opportunities and challenges of our time, there is not yet one dominant enough to define the era on its own terms and give it a name. Looking beyond our borders, we see much that is uncertain: The stability of many regions of the world is threatened by ethnic turmoil and humanitarian crises. Two great powers, Russia and China, are in the process of metamorphosis and their final shape is still very much in question.-Free nations of the world are threatened by rogue nations - - Iran, Iraq, North Korea, and Libya, that have built up significant military forces and seek to acquire weapons of mass destruction. The world community is under assault from those who deal in proliferation of weapons of mass destruction, terrorism, drugs and crime. And the interdependence of the world economy has made us more vulnerable to economic shocks beyond our borders. The strategic threat to our continent is reduced, but the potential for surprise is greater than it was in the days when we could focus our energies on the well-recognized instruments of Soviet power. No one challenge today is yet as formidable as the threat from the former Soviet Union. If nurtured by neglect on our part, these new challenges could expand to threaten the growth of democracy and free markets. All the tools of national security -- diplomacy, the military, and intelligence -- must remain sharp. It is the task of the Intelligence Community to provide policymakers and military commanders with early warning of emerging problems -- warning that can allow us to avoid crisis or military conflict. We must continuously monitor and assess the threats so that our leaders can manage these wisely.

  8. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    SciTech Connect (OSTI)

    NONE

    1993-12-31T23:59:59.000Z

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.

  9. Radioactive Waste Management BasisSept 2001

    SciTech Connect (OSTI)

    Goodwin, S S

    2011-08-31T23:59:59.000Z

    This Radioactive Waste Management Basis (RWMB) documents radioactive waste management practices adopted at Lawrence Livermore National Laboratory (LLNL) pursuant to Department of Energy (DOE) Order 435.1, Radioactive Waste Management. The purpose of this RWMB is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  10. Ultrasonic, Non-Invasive Classification/Discrimination of Liquid Explosives (LEs) and Threat Liquids from Non-Threat Liquids in Sealed Containers

    SciTech Connect (OSTI)

    Diaz, Aaron A.; Cinson, Anthony D.; Tucker, Brian J.; Samuel, Todd J.; Morales, Romarie

    2009-07-20T23:59:59.000Z

    Government agencies and homeland security organizations are searching for more effective approaches for dealing with the increasing demand for inspections involving potential threat liquids and hazardous chemicals, including liquid explosives (LEs). The quantity and variability of hand-held and cargo-sized containers being shipped worldwide drives the need for rapid and effective ways for conducting non-intrusive inspections of liquid-filled containers of a diverse range of types, shapes and sizes. Such inspections need to quickly classify/discriminate between liquids within containers and also ascertain the presence of unexpected objects within a container. The science base, methodology and prototype device for classification/discrimination between classes of liquids has been developed. The Pacific Northwest National Laboratory (PNNL) has developed a methodology and prototype device for classification/discrimination of a wide variety of liquids (including threat liquids and their precursors), providing noninvasive liquid classification/discrimination capabilities using a nondestructive ultrasonic measurement approach for inspecting sealed containers. The Container Screening Device (CSD) employs frequency-modulated (FM) chirp excitation and pulse-compression signal processing techniques to measure ultrasonic velocity and a relative attenuation value for liquids within a container, and is capable of determining other acoustic properties from through-transmission, contact measurements over a wide frequency range. Recent algorithm developments are beginning to address the issues of container wall variations and thickness. A description of the basic science, measurement approach and sources of variability in the measurement will be presented and laboratory measurements acquired from a suite of commercial products and precursor liquids used in the manufacturing of Homemade Explosives (HMEs) will be given.

  11. Experimental Progress Report--Modernizing the Fission Basis

    SciTech Connect (OSTI)

    Macri, R A

    2012-02-17T23:59:59.000Z

    In 2010 a proposal (Modernizing the Fission Basis) was prepared to 'resolve long standing differences between LANL and LLNL associated with the correct fission basis for analysis of nuclear test data'. Collaboration between LANL/LLNL/TUNL has been formed to implement this program by performing high precision measurements of neutron induced fission product yields as a function of incident neutron energy. This new program benefits from successful previous efforts utilizing mono-energetic neutrons undertaken by this collaboration. The first preliminary experiment in this new program was performed between July 24-31, 2011 at TUNL and had 2 main objectives: (1) demonstrating the capability to measure characteristic {gamma}-rays from specific fission products; (2) studying background effects from room scattered neutrons. In addition, a new dual fission ionization chamber has been designed and manufactured. The production design of the chamber is shown in the picture below. The first feasibility experiment to test this chamber is scheduled at the TUNL Tandem Laboratory from September 19-25, 2011. The dual fission chamber design will allow simultaneous exposure of absolute fission fragment emission rate detectors and the thick fission activation foils, positioned between the two chambers. This document formalizes the earlier experimental report demonstrating the experimental capability to make accurate (< 2 %) precision gamma-ray spectroscopic measurements of the excitation function of high fission product yields of the 239Pu(n,f) reaction (induced by quasimonoenergetic neutrons). A second experiment (9/2011) introduced an compact double-sided fission chamber into the experimental arrangement, and so the relative number of incident neutrons striking the sample foil at each bombarding energy is limited only by statistics. (The number of incident neutrons often limits the experimental accuracy.) Fission chamber operation was so exceptional that 2 more chambers have been fabricated; thus fission foils of different isotopes may be left in place with sample changes. The scope of the measurements is both greatly expanded and the results become vetted. Experiment 2 is not reported here. A continuing experiment has been proposed for February 2012.

  12. Hanford External Dosimetry Technical Basis Manual PNL-MA-842

    SciTech Connect (OSTI)

    Rathbone, Bruce A.

    2007-03-12T23:59:59.000Z

    The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at Hanford. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with 10 CFR 835, DOELAP, DOE-RL, ORP, PNSO, and Hanford contractor requirements. The dosimetry system is operated by PNNL’s Hanford External Dosimetry Program (HEDP) which provides dosimetry services to all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee (HPDAC) which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. Rev. 0 marks the first revision to be released through PNNL’s Electronic Records & Information Capture Architecture (ERICA) database. Revision numbers that are whole numbers reflect major revisions typically involving changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Revision Log: Rev. 0 (2/25/2005) Major revision and expansion. Rev. 0.1 (3/12/2007) Minor revision. Updated Chapters 5, 6 and 9 to reflect change in default ring calibration factor used in HEDP dose calculation software. Factor changed from 1.5 to 2.0 beginning January 1, 2007. Pages on which changes were made are as follows: 5.23, 5.69, 5.78, 5.80, 5.82, 6.3, 6.5, 6.29, 9.2.

  13. Nuclear Facility Safety Basis Fundamentals Self-Study Guide ...

    Broader source: Energy.gov (indexed) [DOE]

    Oak Ridge Operations Office Nuclear Facility Safety Basis Fundamentals Self-Study Guide Fulfills ORO Safety Basis Competency 1, 2 (Part 1), or 7 (Part 1) November 2002 Nuclear...

  14. Authorization basis status report (miscellaneous TWRS facilities, tanks and components)

    SciTech Connect (OSTI)

    Stickney, R.G.

    1998-04-29T23:59:59.000Z

    This report presents the results of a systematic evaluation conducted to identify miscellaneous TWRS facilities, tanks and components with potential needed authorization basis upgrades. It provides the Authorization Basis upgrade plan for those miscellaneous TWRS facilities, tanks and components identified.

  15. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    SciTech Connect (OSTI)

    Duren, Mike [Sypris Electronics, LLC] [Sypris Electronics, LLC; Aldridge, Hal [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution and management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.

  16. Physics Basis and Simulation of Burning Plasma Physics for the Fusion Ignition Research Experiment (FIRE)

    SciTech Connect (OSTI)

    C.E. Kessel; D. Meade; S.C. Jardin

    2002-01-18T23:59:59.000Z

    The FIRE [Fusion Ignition Research Experiment] design for a burning plasma experiment is described in terms of its physics basis and engineering features. Systems analysis indicates that the device has a wide operating space to accomplish its mission, both for the ELMing H-mode reference and the high bootstrap current/high beta advanced tokamak regimes. Simulations with 1.5D transport codes reported here both confirm and constrain the systems projections. Experimental and theoretical results are used to establish the basis for successful burning plasma experiments in FIRE.

  17. Core excitation effects in halo nuclei using a transformed oscillator basis

    SciTech Connect (OSTI)

    Lay, J. A.; Arias, J. M.; Moro, A. M. [Departamento de FAMN, Facultad de Fisica, Universidad de Sevilla, Apdo. 1065, E-41080 Sevilla (Spain); Gomez-Camacho, J. [Departamento de FAMN, Facultad de Fisica, Universidad de Sevilla, Apdo. 1065, E-41080 Sevilla, Spain and Centro Nacional de Aceleradores, Avda. Thomas A. Edison, E-41092, Sevilla (Spain)

    2013-06-10T23:59:59.000Z

    A recent generalization of the Transformed Harmonic Oscillator basis, intended to consider core excitations in the structure of one nucleon halo nuclei, is applied to the break up of {sup 11}Be. The reaction studied is {sup 11}Be+{sup 208}Pb at 69 MeV/nucleon. The experimental set up is designed to ensure pure dipole Coulomb excitations. Making use of the Equivalent Photon Method and the electromagnetic transition probabilities obtained with the transformed oscillator basis, a relevant contribution of the quadrupole excitations of the core is found. The inclusion of core excitations is, therefore, necessary for the correct extraction of the dipole electromagnetic transition probability of halo nuclei.

  18. Gravitational lens modeling with basis sets

    E-Print Network [OSTI]

    Birrer, Simon; Refregier, Alexandre

    2015-01-01T23:59:59.000Z

    We present a strong lensing modeling technique based on versatile basis sets for the lens and source planes. Our method uses high performance Monte Carlo algorithms, allows for an adaptive build up of complexity and bridges the gap between parametric and pixel based reconstruction methods. We apply our method to a HST image of the strong lens system RXJ1131-1231 and show that our method finds a reliable solution and is able to detect substructure in the lens and source planes simultaneously. Using mock data we show that our method is sensitive to sub-clumps with masses four orders of magnitude smaller than the main lens, which corresponds to about $10^8 M_{\\odot}$, without prior knowledge on the position and mass of the sub-clump. The modelling approach is flexible and maximises automation to facilitate the analysis of the large number of strong lensing systems expected in upcoming wide field surveys. The resulting search for dark sub-clumps in these systems, without mass-to-light priors, offers promise for p...

  19. LASER FUSION CHAMBER DESIGN James P. Blanchard1

    E-Print Network [OSTI]

    Raffray, A. René

    the energy emitted by the target in such a way that the plant can achieve a commercially viable power approaches required for commercially viable laser fusion power plants, the issues driving those designs define the chamber size by providing flux limits for the various threats. In cases where a dry

  20. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    SciTech Connect (OSTI)

    Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

    2012-06-04T23:59:59.000Z

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

  1. Student attitudes toward the threat of nuclear war: Friends as influential reference persons

    SciTech Connect (OSTI)

    Marasch, M.J.

    1992-01-01T23:59:59.000Z

    A renewed interest in research into the psychology of the threat of nuclear war occurred in the past decade as national attention focused increasingly on the arms race between the US and the USSR. Some of this research began the task of exploring the social influences upon attitudes and responses to the nuclear threat. Research on friends as potential influences upon nuclear attitudes was minimal. The present study investigated the role of college friends as potential reference persons in the formation of nuclear attitudes. A battery of questionnaires addressing various nuclear war and non-nuclear war attitudes was completed by 200 student-friend dyads from introductory psychology and sociology courses at the University of North Dakota. Three hypotheses were presented in this study. One hypothesis was that students would perceive their friends as having similar attitudes toward the threat of nuclear war. A second hypothesis was that the actual attitudes between pairs of students and friends would be similar. The third hypothesis was that the attitudes would have become more similar over the course of the development of the friendship (as measured retrospectively). The first hypothesis was borne out by the data. The second and third hypotheses were not supported. There are several implications of the findings. One implication is that the nuclear issue may not be as salient to college students as other, more immediate, issues. Another implication is that a relative lack of communication between college students on political issues precludes more effective mutual influence upon the development and change of such attitudes. A false consensus bias appeared to be operative when the students perceived that their attitudes were similar. Further discussion is presented in regard to past and future psychological research upon nuclear war attitudes.

  2. Hanford External Dosimetry Technical Basis Manual PNL-MA-842

    SciTech Connect (OSTI)

    Rathbone, Bruce A.

    2010-01-01T23:59:59.000Z

    The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at Hanford. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with 10 CFR 835, DOELAP, DOE-RL, ORP, PNSO, and Hanford contractor requirements. The dosimetry system is operated by PNNL’s Hanford External Dosimetry Program (HEDP) which provides dosimetry services to all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee (HPDAC) which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since its inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNL’s Electronic Records & Information Capture Architecture (ERICA) database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving significant changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Maintenance and distribution of controlled hard copies of the manual by PNNL was discontinued beginning with Revision 0.2. Revision Log: Rev. 0 (2/25/2005) Major revision and expansion. Rev. 0.1 (3/12/2007) Updated Chapters 5, 6 and 9 to reflect change in default ring calibration factor used in HEDP dose calculation software. Factor changed from 1.5 to 2.0 beginning January 1, 2007. Pages on which changes were made are as follows: 5.23, 5.69, 5.78, 5.80, 5.82, 6.3, 6.5, 6.29, and 9.2. Rev 0.2 (8/28/2009) Updated Chapters 3, 5, 6, 8 and 9. Chapters 6 and 8 were significantly expanded. References in the Preface and Chapters 1, 2, 4, and 7 were updated to reflect updates to DOE documents. Approved by HPDAC on 6/2/2009. Rev 1.0 (1/1/2010) Major revision. Updated all chapters to reflect the Hanford site wide implementation on January 1, 2010 of new DOE requirements for occupational radiation protection. The new requirements are given in the June 8, 2007 amendment to 10 CFR 835 Occupational Radiation Protection (Federal Register, June 8, 2007. Title 10 Part 835. U.S., Code of Federal Regulations, Vol. 72, No. 110, 31904-31941). Revision 1.0 to the manual replaces ICRP 26 dosimetry concepts and terminology with ICRP 60 dosimetry concepts and terminology and replaces external dose conversion factors from ICRP 51 with those from ICRP 74 for use in measurement of operational quantities with dosimeters. Descriptions of dose algorithms and dosimeter response characteristics, and field performance were updated to reflect changes in the neutron quality factors used in the measurement of operational quantities.

  3. Physics Basis for the ARIES-ST Power Plant S.C. Jardin,

    E-Print Network [OSTI]

    Physics Basis for the ARIES-ST Power Plant T.K. Mau, a S.C. Jardin, b C.E. Kessel, b J.E. Menard, b -- ARIES-ST, a fusion power plant design based on the spherical tokamak concept, has many attractive] as a potential power plant and volumetric neutron source. At the beginning of 1999, the ARIES Group has completed

  4. Nuclear Safety Basis Program Review Overview and Management Oversight...

    Broader source: Energy.gov (indexed) [DOE]

    This SRP, Nuclear Safety Basis Program Review, consists of five volumes. It provides information to help strengthen the technical rigor of line management oversight and federal...

  5. “If your vagina could speak, what would it say?”: Dangerous Femininity, Anxious Masculinity and the Threat of Female Desire in the 1975 Pornographic Movie "The Sex that Speaks"

    E-Print Network [OSTI]

    Garrigou-Kempton, Emilie

    2010-01-01T23:59:59.000Z

    speak, what would it say? ” Dangerous Femininity, Anxiouslies the threat of a dangerous feminine sexuality that needsthat women’s desire is dangerous without the implementation

  6. Technical Basis for Assessing Uranium Bioremediation Performance

    SciTech Connect (OSTI)

    PE Long; SB Yabusaki; PD Meyer; CJ Murray; AL N’Guessan

    2008-04-01T23:59:59.000Z

    In situ bioremediation of uranium holds significant promise for effective stabilization of U(VI) from groundwater at reduced cost compared to conventional pump and treat. This promise is unlikely to be realized unless researchers and practitioners successfully predict and demonstrate the long-term effectiveness of uranium bioremediation protocols. Field research to date has focused on both proof of principle and a mechanistic level of understanding. Current practice typically involves an engineering approach using proprietary amendments that focuses mainly on monitoring U(VI) concentration for a limited time period. Given the complexity of uranium biogeochemistry and uranium secondary minerals, and the lack of documented case studies, a systematic monitoring approach using multiple performance indicators is needed. This document provides an overview of uranium bioremediation, summarizes design considerations, and identifies and prioritizes field performance indicators for the application of uranium bioremediation. The performance indicators provided as part of this document are based on current biogeochemical understanding of uranium and will enable practitioners to monitor the performance of their system and make a strong case to clients, regulators, and the public that the future performance of the system can be assured and changes in performance addressed as needed. The performance indicators established by this document and the information gained by using these indicators do add to the cost of uranium bioremediation. However, they are vital to the long-term success of the application of uranium bioremediation and provide a significant assurance that regulatory goals will be met. The document also emphasizes the need for systematic development of key information from bench scale tests and pilot scales tests prior to full-scale implementation.

  7. Combining Radiography and Passive Measurements for Radiological Threat Detection in Cargo

    SciTech Connect (OSTI)

    Miller, Erin A.; White, Timothy A.; Jarman, Kenneth D.; Kouzes, Richard T.; Kulisek, Jonathan A.; Robinson, Sean M.; Scherrer, Charles; Wittman, Richard S.

    2012-12-01T23:59:59.000Z

    Abstract Radiography is widely understood to provide information complimentary to passive detection: while not directly sensitive to radiological materials, radiography can reveal highly shielded regions which may mask a passive radiological signal. We present a method for combining radiographic and passive data which uses the radiograph to provide an estimate of scatter and attenuation for possible sources. This approach allows quantitative use of radiographic images without relying on image interpretation, and results in a probabilistic description of likely source locations and strengths. We present first results for this method for a simple modeled test case of a cargo container driving through a PVT portal. With this inversion approach, we address criteria for an integrated passive and radiographic screening system and how detection of SNM threats might be improved in such a system.

  8. Does nitrate deposition following astrophysical ionizing radiation events pose an additional threat to amphibians?

    E-Print Network [OSTI]

    Brian C. Thomas; Michelle D. Honeyman

    2008-06-27T23:59:59.000Z

    It is known that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would not be sufficient to cause a serious additional stress on amphibian populations and may actually provide some benefit by acting as fertilizer.

  9. Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.

    SciTech Connect (OSTI)

    Boslough, Mark B.; Crawford, David A.

    2007-12-01T23:59:59.000Z

    The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

  10. Abstract--We identify the security threats facing a sensor network for wireless medical monitoring, and we propose a

    E-Print Network [OSTI]

    Wang, Lan

    1 Abstract--We identify the security threats facing a sensor network for wireless medical of medical sensors that convey information on his or her vital signs to a bedside monitoring device. However mobility, especially for long-term care. Recent advances in sensor technology have enabled the development

  11. CYBER THREAT ANALYSIS A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK INTRUSION DETECTION)

    E-Print Network [OSTI]

    Kumar, Vipin

    60000 90 91 92 93 94 95 96 97 98 99 00 01 Today computers control power, oil and gas deliveryCYBER THREAT ANALYSIS ­ A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK-of-systems technologies will enable decisive maneuver, both horizon- tal and vertical, during day and night, and in all

  12. The pointer basis and the feedback stabilization of quantum systems

    E-Print Network [OSTI]

    L. Li; A. Chia; H. M. Wiseman

    2014-11-19T23:59:59.000Z

    The dynamics for an open quantum system can be `unravelled' in infinitely many ways, depending on how the environment is monitored, yielding different sorts of conditioned states, evolving stochastically. In the case of ideal monitoring these states are pure, and the set of states for a given monitoring forms a basis (which is overcomplete in general) for the system. It has been argued elsewhere [D. Atkins et al., Europhys. Lett. 69, 163 (2005)] that the `pointer basis' as introduced by Zurek and Paz [Phys. Rev. Lett 70, 1187(1993)], should be identified with the unravelling-induced basis which decoheres most slowly. Here we show the applicability of this concept of pointer basis to the problem of state stabilization for quantum systems. In particular we prove that for linear Gaussian quantum systems, if the feedback control is assumed to be strong compared to the decoherence of the pointer basis, then the system can be stabilized in one of the pointer basis states with a fidelity close to one (the infidelity varies inversely with the control strength). Moreover, if the aim of the feedback is to maximize the fidelity of the unconditioned system state with a pure state that is one of its conditioned states, then the optimal unravelling for stabilizing the system in this way is that which induces the pointer basis for the conditioned states. We illustrate these results with a model system: quantum Brownian motion. We show that even if the feedback control strength is comparable to the decoherence, the optimal unravelling still induces a basis very close to the pointer basis. However if the feedback control is weak compared to the decoherence, this is not the case.

  13. Modest carbon price could save Borneo forests: study Reuters, 4 June 2009 -Tropical forests in Borneo under threat of conversion to palm oil

    E-Print Network [OSTI]

    in Borneo under threat of conversion to palm oil plantations could be more profitable left standing threat of being converted to oil palm plantations. "They are not meant to be clearing forest for palm oil development. It's pretty clear that forests are being felled for oil palm," said Venter, a conservation

  14. Cycling in the wet Wet weather (or at least the threat of rain) puts a

    E-Print Network [OSTI]

    Bristol, University of

    lubrication so you may need to check items such as chain and gears on a daily basis during a spell of bad weather. Make sure your brakes are in top condition, tyres well pumped and remember that it takes longer such as painted road markings and metal plates can provide very little friction in the rain and can be extremely

  15. Speculations About the Selective Basis for Modern Human Craniofacial Form

    E-Print Network [OSTI]

    Lieberman, Daniel E.

    Speculations About the Selective Basis for Modern Human Craniofacial Form DANIEL E. LIEBERMAN. To name just a few of our unusual craniofacial apo- morphies, we are the only extant pri- mate

  16. Quasi Sturmian Basis in Two-Electron Continuum Problems

    E-Print Network [OSTI]

    A. S. Zaytsev; L. U. Ancarani; S. A. Zaytsev

    2015-03-12T23:59:59.000Z

    A new type of basis functions is proposed to describe a two-electron continuum which arises as a final state in electron-impact ionization and double photoionization of atomic systems. We name these functions, which are calculated in terms of the recently introduced Quasi Sturmian functions, Convoluted Quasi Sturmian functions (CQS). By construction, the CQS functions look asymptotically like a six-dimensional spherical wave. The driven equation describing an $(e, 3e)$ process on helium in the framework of the Temkin-Poet model has been solved numerically using expansions on the basis CQS functions. The convergence behavior of the solution has been examined as the size of the basis has been increased. The calculations show that the convergence rate is significantly improved by introducing a phase factor corresponding the electron-electron interaction into the basis functions. Such a modification of the boundary conditions leads to appreciable change in the magnitude of the solution.

  17. auf basis einer: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    assoziiert. Ziel der vorliegenden Studie war es, den Einfluss einer (more) Zachmann, Christin 2014-01-01 23 77Weniger ist mehr Virtuelle Thin Clients auf Linux-Basis...

  18. Is the Preferred Basis selected by the environment?

    E-Print Network [OSTI]

    Tian Wang; David Hobill

    2014-12-09T23:59:59.000Z

    We show that in a quantum measurement, the preferred basis is determined by the interaction between the apparatus and the quantum system, instead of by the environment. This interaction entangles three degrees of freedom, one system degree of freedom we are interested in and preserved by the interaction, one system degree of freedom that carries the change due to the interaction, and the apparatus degree of freedom which is always ignored. Considering all three degrees of freedom the composite state only has one decomposition, and this guarantees that the apparatus would end up in the expected preferred basis of our daily experiences. We also point out some problems with the environment-induced super-selection (Einselection) solution to the preferred basis problem, and clarifies a common misunderstanding of environmental decoherence and the preferred basis problem.

  19. Technical Basis Document for PFP Area Monitoring Dosimetry Program

    SciTech Connect (OSTI)

    COOPER, J.R.

    2000-04-17T23:59:59.000Z

    This document describes the phantom dosimetry used for the PFP Area Monitoring program and establishes the basis for the Plutonium Finishing Plant's (PFP) area monitoring dosimetry program in accordance with the following requirements: Title 10, Code of Federal Regulations (CFR), part 835, ''Occupational Radiation Protection'' Part 835.403; Hanford Site Radiological Control Manual (HSRCM-1), Part 514; HNF-PRO-382, Area Dosimetry Program; and PNL-MA-842, Hanford External Dosimetry Technical Basis Manual.

  20. Achieving competitive excellence in nuclear energy: The threat of proliferation; the challenge of inertial confinement fusion

    SciTech Connect (OSTI)

    Nuckolls, J.H.

    1994-06-01T23:59:59.000Z

    Nuclear energy will have an expanding role in meeting the twenty-first-century challenges of population and economic growth, energy demand, and global warming. These great challenges are non-linearly coupled and incompletely understood. In the complex global system, achieving competitive excellence for nuclear energy is a multi-dimensional challenge. The growth of nuclear energy will be driven by its margin of economic advantage, as well as by threats to energy security and by growing evidence of global warming. At the same time, the deployment of nuclear energy will be inhibited by concerns about nuclear weapons proliferation, nuclear waste and nuclear reactor safety. These drivers and inhibitors are coupled: for example, in the foreseeable future, proliferation in the Middle East may undermine energy security and increase demand for nuclear energy. The Department of Energy`s nuclear weapons laboratories are addressing many of these challenges, including nuclear weapons builddown and nonproliferation, nuclear waste storage and burnup, reactor safety and fuel enrichment, global warming, and the long-range development of fusion energy. Today I will focus on two major program areas at the Lawrence Livermore National Laboratory (LLNL): the proliferation of nuclear weapons and the development of inertial confinement fusion (ICF) energy.

  1. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Brown, Christopher R.; Ferryman, Thomas A.

    2013-10-01T23:59:59.000Z

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developed based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

  2. Threat of a sinkhole: A reevaluation of Cavern 4, Bayou Choctaw salt dome, Louisiana

    SciTech Connect (OSTI)

    Neal, J.T.; Todd, J.L.; Linn, J.K. [Sandia National Labs., Albuquerque, NM (United States); Magorian, T.R. [Magorian (Thomas R.), Amherst, NY (United States)

    1993-09-01T23:59:59.000Z

    Cavern Lake at Bayou Choctaw salt dome resulted from the failure of Cavern 7 in 1954. Uncontrolled solutioning of this cavern through the thin caprock had set the stage for overburden to collapse into the cavern below. A similar situation developed with nearby Cavern 4, but with less dissolutioning of the caprock. Because pressure loss was already a problem and because another 800 ft diameter lake would have endangered surface operations, solutioning of Cavern 4 was stopped and the cavern abandoned in 1957 in order to protect the already-small site. In 1978 the Strategic Petroleum Reserve (SPR) acquired a number of caverns at Bayou Choctaw, including Cavern 4, and the possible repeat of the Cavern 7 failure and formation of another lake thus became an issue. The cavern dimensions were re-sonared in 1980 for comparison with 1963 and 1977 surveys. Annual surface leveling between 1982--1992 showed less subsidence occurring than the site average, and a cavern monitoring system, installed in 1984, has revealed no anomalous motion. Repeat sonar surveys in 1992 showed very little, if any, change occurred since 1980 although a small amount of uncertainty exists as a result of changing sonar techniques. We conclude that significant additional solutioning or erosion of the caprock has not occurred and that there is no increased threat to SPR operations.

  3. Identifying at-risk employees: A behavioral model for predicting potential insider threats

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.

    2010-09-01T23:59:59.000Z

    A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.

  4. An overview of the global threat reduction initiative's physical protection work in Tanzania.

    SciTech Connect (OSTI)

    Banzi, Firmi Paul (Tanzania Atomic Energy Commission Arusha, United Republic of Tanzania); Itamura, Michael Takeshi (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Robinson, Phillip W. (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Strosinski, Micheal Vernon

    2010-06-01T23:59:59.000Z

    The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) established the Global Threat Reduction Initiative's (GTRI) mission to reduce and protect nuclear and radiological materials located at civilian sites worldwide. Internationally, over 80 countries are cooperating with GTRI to enhance security of facilities with these materials. In 2004, a GTRI delegation began working with the Tanzania Atomic Energy Commission, (TAEC). The team conducted site assessments for the physical protection of radiological materials in Tanzania. Today, GTRI and the Government of Tanzania continue cooperative efforts to enhance physical security at several radiological sites, including a central sealed-source storage facility, and sites in the cities of Arusha, Dar Es Salaam, and Tanga. This paper describes the scope of physical protection work, lessons learned, and plans for future cooperation between the GTRI program and the TAEC. Additionally the paper will review the cooperative efforts between TAEC and the International Atomic Energy Agency (IAEA) with regards to a remote monitoring system at a storage facility and to the repackaging of radioactive sources.

  5. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    SciTech Connect (OSTI)

    Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

    2013-01-01T23:59:59.000Z

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  6. FHR Generic Design Criteria

    SciTech Connect (OSTI)

    Flanagan, G.F.; Holcomb, D.E.; Cetiner, S.M.

    2012-06-15T23:59:59.000Z

    The purpose of this document is to provide an initial, focused reference to the safety characteristics of and a licensing approach for Fluoride-Salt-Cooled High-Temperature Reactors (FHRs). The document does not contain details of particular reactor designs nor does it attempt to identify or classify either design basis or beyond design basis accidents. Further, this document is an initial attempt by a small set of subject matter experts to document the safety and licensing characteristics of FHRs for a larger audience. The document is intended to help in setting the safety and licensing research, development, and demonstration path forward. Input from a wider audience, further technical developments, and additional study will be required to develop a consensus position on the safety and licensing characteristics of FHRs. This document begins with a brief overview of the attributes of FHRs and then a general description of their anticipated safety performance. Following this, an overview of the US nuclear power plant approval process is provided that includes both test and power reactors, as well as the role of safety standards in the approval process. The document next describes a General Design Criteria (GDC)–based approach to licensing an FHR and provides an initial draft set of FHR GDCs. The document concludes with a description of a path forward toward developing an FHR safety standard that can support both a test and power reactor licensing process.

  7. Calibration Trumps Confidence as a Basis for Witness Credibility

    E-Print Network [OSTI]

    Tenney, Elizabeth R.; MacCoun, Robert J.; Spellman, Barbara A.; Hastie, Reid

    2006-01-01T23:59:59.000Z

    a 2x2 between-subject factorial design with two levels ofin a 2x2 within-subject factorial design, with two levels of

  8. Fusion Engineering and Design 38 (1997) 2757 Physics basis for a reversed shear tokamak power plant

    E-Print Network [OSTI]

    California at San Diego, University of

    1997-01-01T23:59:59.000Z

    fusion power plant. Analysis of plasma equilibrium and ideal MHD stability, bootstrap current and current the recirculating power fraction. The final plasma configuration for the ARIES-RS power plant obtains i of 4 reserved. Keywords: Reversed shear; Tokamak power plant; Plasma configuration 1. Introduction The reversed

  9. Fish schooling as a basis for vertical axis wind turbine farm design

    E-Print Network [OSTI]

    Whittlesey, Robert W; Dabiri, John O

    2010-01-01T23:59:59.000Z

    Most wind farms consist of horizontal axis wind turbines (HAWTs) due to the high power coefficient (mechanical power output divided by the power of the free-stream air through the turbine cross-sectional area) of an isolated turbine. However when in close proximity to neighbouring turbines, HAWTs suffer from a reduced power coefficient. In contrast, previous research on vertical axis wind turbines (VAWTs) suggests that closely-spaced VAWTs may experience only small decreases (or even increases) in an individual turbine's power coefficient when placed in close proximity to neighbours, thus yielding much higher power outputs for a given area of land. A potential flow model of inter-VAWT interactions is developed to investigate the effect of changes in VAWT spatial arrangement on the array performance coefficient, which compares the expected average power coefficient of turbines in an array to a spatially-isolated turbine. A geometric arrangement based on the configuration of shed vortices in the wake of schooli...

  10. MATERIAL-FLOW DATA STRUCTURES AS A BASIS FOR ENERGY INFORMATION SYSTEM DESIGN

    E-Print Network [OSTI]

    Krishnan, V.V.

    2013-01-01T23:59:59.000Z

    segragate crude oil and oil products into quasi-independentaccounting for crude oil and petroleum products separately,products, volume of oil (or product) storage and voltme in

  11. Ris-R-Report Grid fault and design-basis for wind turbines -

    E-Print Network [OSTI]

    of the new grid connection requirements for the fatigue and ultimate structural loads of wind turbines analysis for fatigue and ultimate structural loads, respectively, have been performed and compared for two variable speed wind turbines to produce power at wind speeds higher than 25m/s and up to 50m/s without

  12. Report to the Secretary of Energy on Beyond Design Basis Event...

    Energy Savers [EERE]

    Nuclear Facilities, January 2013 In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several...

  13. Report to the Secretary of Energy on Beyond Design Basis Event...

    Broader source: Energy.gov (indexed) [DOE]

    In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its...

  14. DOE M&O Contractor Perspectives on Beyond Design Basis Event Analysis and Response

    Broader source: Energy.gov [DOE]

    Presenter: Ron Crone, Director Research Reactors Division UT-Battelle, LLC Oak Ridge National Laboratory

  15. DEVELOPMENT OF THE DESIGN BASIS FOR AN INVENTORY OF SOURCES AND EMISSIONS

    E-Print Network [OSTI]

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 SPECIATION PROFILES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1.3 Stationary Fuel Combustion . 3.2.1.4 Metal Processing . . . . . . . . . 3.2.1.5 Mobile

  16. Nuclear Regulatory Commission Handling of Beyond Design Basis Events for Nuclear Power Reactors

    Broader source: Energy.gov [DOE]

    Presenter: Bill Reckley, Chief, Policy and Support Branch, Japan Lessons-Learned Project Directorate, Office of Nuclear Reactor Regulation, US Nuclear Regulatory Commission US Nuclear Regulatory Commission

  17. DOE's Safety Bulletin No. 2011-01, Events Beyond Design Safety Basis Analysis, March 2011

    Broader source: Energy.gov [DOE]

    PURPOSE This Safety Alert provides information on a safety concern related to the identification and mitigation of events that may fall outside those analyzed in the documented safety analysis.

  18. Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events

    Broader source: Energy.gov [DOE]

    This report describes the opportunities for improvement identified in DOE’s review, and provides recommendations for short-term and long-term actions for improving safety at DOE nuclear facilities.

  19. Report to the Secretary of Energy on Beyond Design Basis Event Pilot

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCO Overview OCHCODepartmentEnergyCouncilAffairs,Decommissioned Reactors

  20. A Report to the Secretary of Energy, Beyond Design Basis Event Pilot Evaluations

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartmentDepartment of Energy ThisThis guideQuarterly Update onReport to

  1. DOE's Safety Bulletin No. 2011-01, Events Beyond Design Safety Basis

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"WaveInteractionsMaterialsDevelopEnergy OakFrequently AskedAnalysis,

  2. Report to the Secretary of Energy on Beyond Design Basis Event Pilot

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014, an OHASeptemberAssessments | DepartmentThe

  3. A Report to the Secretary of Energy, Beyond Design Basis Event Pilot Evaluations

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems AnalysisVOLUMEStatement of WarrenA Path to ReduceA REPORT TO

  4. Improving Department of Energy Capabilities for Mitigating Beyond Design Basis Events

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers3.pdf0-45.pdf05 Identified Patent WaiverSmart Grid: DataImprove Operations1:

  5. C. Holcomb APS/DPP 2008 DIII-D 10-Year Vision: Developing the Scientific Basis for

    E-Print Network [OSTI]

    evaluation and optimization of ITER & FNSF scenarios Steerable NBI (20 MW) 0 5 10 15 0.0 0.2 0.4 0.6 0.8 1.0 1.2 0 5 10 15 0.0 0.5 1.0 1.5 2.0 2.0 2.5 H 98y / Te0/Ti0 Baseline N=1.7 Electron plasma of 2020 Prepare Basis for ITER Ops and FNSF Design Disruptions and ELM solutions Predictive basis

  6. Conceptual design. Final report: TFE Verification Program

    SciTech Connect (OSTI)

    Not Available

    1994-03-01T23:59:59.000Z

    This report documents the TFE Conceptual Design, which provided the design guidance for the TFE Verification program. The primary goals of this design effort were: (1) establish the conceptual design of an in-core thermionic reactor for a 2 Mw(e) space nuclear power system with a 7-year operating lifetime; (2) demonstrate scalability of the above concept over the output power range of 500 kW(e) to 5 MW(e); and (3) define the TFE which is the basis for the 2 MW (e) reactor design. This TFE specification provided the basis for the test program. These primary goals were achieved. The technical approach taking in the conceptual design effort is discussed in Section 2, and the results are discussed in Section 3. The remainder of this introduction draws a perspective on the role that this conceptual design task played in the TFE Verification Program.

  7. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

    2011-04-08T23:59:59.000Z

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  8. Threat of Hydride Re-orientation to Spent Fuel Integrity During Transportation Accidents: Myth or Reality?

    SciTech Connect (OSTI)

    Rashid, Joe [ANATECH, 5435 Oberlin Drive, San Diego, CA 92121 (United States); Machiels, Albert [EPRI, 3420 Hillview Avenue, Palo Alto, CA 94304 (United States)

    2007-07-01T23:59:59.000Z

    The source-term study conducted by Sandia National Laboratories nearly two decades ago for the spent fuel inventory known at the time, which was in the low-to-medium burnup range ({approx}35 GWd/MTU), showed that the effects of transportation accidents on spent fuel failures, and consequential radioactivity release to the environment, were relatively benign. However, with today's discharged fuel burnups routinely greater than 45 GWd/MTU, potential hydride reorientation during interim dry storage, and its effects on cladding properties, has become one of the primary concerns for spent fuel transportation. Laboratory tests of un-irradiated cladding specimens subjected to heat treatments promoting hydride dissolution followed by re-precipitation in the radial direction have shown that relatively moderate concentrations ({approx}70 ppm) of radial hydrides can significantly degrade cladding ductility, at least at room temperature. The absence of specific data that are relevant to high-burnup spent fuel under dry storage conditions have led to the conjecture, deduced from those tests, that massive cladding failures, possibly resulting in fuel reconfiguration, can be expected during cask drop events. Such conclusions are not borne out by the findings in this paper. The analysis results indicate that cladding failure is bi-modal: a state of failure initiation at the cladding ID remaining as part-wall damage with less than 2% probability of occurrence, and a through-wall failure at a probability of 1 E-5. These results indicate that spent fuel conditions that could promote the formation of radial hydrides during dry storage are not sufficient to produce radial hydrides concentrations of significant levels to cause major threat to spent fuel integrity. It is important to note in this regard that the through-wall cladding failure probability of 1 E-5 is of the same order of magnitude as calculated in the cited Sandia study for low burnup fuel. (authors)

  9. Simple basis for hydrogenic atoms in magnetic fields

    SciTech Connect (OSTI)

    Gallas, J.A.C.

    1984-01-01T23:59:59.000Z

    A field-dependent hydrogenic basis is used to obtain the evolution of the energy spectrum of atoms in strong (approx.10/sup 8/ G) and uniform magnetic fields. The basis allows results to be derived analytically. Numerical values for the first 13 excited states of hydrogen are found to be in very good agreement with much more elaborate calculations of Smith et al. and of Brandi. In addition, the possibility of having a remnant type of degeneracy in the presence of the magnetic field is investigated.

  10. Grid and basis adaptive polynomial chaos techniques for sensitivity and uncertainty analysis

    SciTech Connect (OSTI)

    Perkó, Zoltán, E-mail: Z.Perko@tudelft.nl; Gilli, Luca, E-mail: Gilli@nrg.eu; Lathouwers, Danny, E-mail: D.Lathouwers@tudelft.nl; Kloosterman, Jan Leen, E-mail: J.L.Kloosterman@tudelft.nl

    2014-03-01T23:59:59.000Z

    The demand for accurate and computationally affordable sensitivity and uncertainty techniques is constantly on the rise and has become especially pressing in the nuclear field with the shift to Best Estimate Plus Uncertainty methodologies in the licensing of nuclear installations. Besides traditional, already well developed methods – such as first order perturbation theory or Monte Carlo sampling – Polynomial Chaos Expansion (PCE) has been given a growing emphasis in recent years due to its simple application and good performance. This paper presents new developments of the research done at TU Delft on such Polynomial Chaos (PC) techniques. Our work is focused on the Non-Intrusive Spectral Projection (NISP) approach and adaptive methods for building the PCE of responses of interest. Recent efforts resulted in a new adaptive sparse grid algorithm designed for estimating the PC coefficients. The algorithm is based on Gerstner's procedure for calculating multi-dimensional integrals but proves to be computationally significantly cheaper, while at the same it retains a similar accuracy as the original method. More importantly the issue of basis adaptivity has been investigated and two techniques have been implemented for constructing the sparse PCE of quantities of interest. Not using the traditional full PC basis set leads to further reduction in computational time since the high order grids necessary for accurately estimating the near zero expansion coefficients of polynomial basis vectors not needed in the PCE can be excluded from the calculation. Moreover the sparse PC representation of the response is easier to handle when used for sensitivity analysis or uncertainty propagation due to the smaller number of basis vectors. The developed grid and basis adaptive methods have been implemented in Matlab as the Fully Adaptive Non-Intrusive Spectral Projection (FANISP) algorithm and were tested on four analytical problems. These show consistent good performance both in terms of the accuracy of the resulting PC representation of quantities and the computational costs associated with constructing the sparse PCE. Basis adaptivity also seems to make the employment of PC techniques possible for problems with a higher number of input parameters (15–20), alleviating a well known limitation of the traditional approach. The prospect of larger scale applicability and the simplicity of implementation makes such adaptive PC algorithms particularly appealing for the sensitivity and uncertainty analysis of complex systems and legacy codes.

  11. Modular High Temperature Gas-Cooled Reactor Safety Basis and Approach

    SciTech Connect (OSTI)

    David Petti; Jim Kinsey; Dave Alberstein

    2014-01-01T23:59:59.000Z

    Various international efforts are underway to assess the safety of advanced nuclear reactor designs. For example, the International Atomic Energy Agency has recently held its first Consultancy Meeting on a new cooperative research program on high temperature gas-cooled reactor (HTGR) safety. Furthermore, the Generation IV International Forum Reactor Safety Working Group has recently developed a methodology, called the Integrated Safety Assessment Methodology, for use in Generation IV advanced reactor technology development, design, and design review. A risk and safety assessment white paper is under development with respect to the Very High Temperature Reactor to pilot the Integrated Safety Assessment Methodology and to demonstrate its validity and feasibility. To support such efforts, this information paper on the modular HTGR safety basis and approach has been prepared. The paper provides a summary level introduction to HTGR history, public safety objectives, inherent and passive safety features, radionuclide release barriers, functional safety approach, and risk-informed safety approach. The information in this paper is intended to further the understanding of the modular HTGR safety approach. The paper gives those involved in the assessment of advanced reactor designs an opportunity to assess an advanced design that has already received extensive review by regulatory authorities and to judge the utility of recently proposed new methods for advanced reactor safety assessment such as the Integrated Safety Assessment Methodology.

  12. Formal Management Review of the Safety Basis Calculations Noncompliance

    SciTech Connect (OSTI)

    Altenbach, T J

    2008-06-24T23:59:59.000Z

    In Reference 1, LLNL identified a failure to adequately implement an institutional commitment concerning administrative requirements governing the documentation of Safety Basis calculations supporting the Documented Safety Analysis (DSA) process for LLNL Hazard Category 2 and Category 3 nuclear facilities. The AB Section has discovered that the administrative requirements of AB procedure AB-006, 'Safety Basis Calculation Procedure for Category 2 and 3 Nuclear Facilities', have not been uniformly or consistently applied in the preparation of Safety Basis calculations for LLNL Hazard Category 2 and 3 Nuclear Facilities. The SEP Associated Director has directed the AB Section to initiate a formal management review of the issue that includes, but is not necessarily limited to the following topics: (1) the basis establishing Ab-006 as a required internal procedure for Safety Basis calculations; (2) how requirements for Safety Basis calculations flow down in the institutional DSA process; (3) the extent to which affected Laboratory organizations have explicitly complied with the requirements of Procedure AB-006; (4) what alternative approaches LLNL organizations has used for Safety Basis calculations and how these alternate approaches compare with Procedure AB-006 requirements; and (5) how to reconcile Safety Basis calculations that were performed before Procedure AB-006 came into existence (i.e., August 2001). The management review2 also includes an extent-of-condition evaluation to determine how widespread the discovered issue is throughout Laboratory organizations responsible for operating nuclear facilities, and to determine if implementation of AB procedures other than AB-006 has been similarly affected. In Reference 2, Corrective Action 1 was established whereby the SEP Directorate will develop a plan for performing a formal management review of the discovered condition, including an extent-of condition evaluation. In Reference 3, a plan was provided to prepare a formal management review, satisfying Corrective Action 1. An AB-006 Working Group was formed,led by the AB Section, with representatives from the Nuclear Materials Technology Program (NMTP), the Radioactive and Hazardous Waste Management (RHWM) Division, and the Packaging and Transportation Safety (PATS) Program. The key action of this management review was for Working Group members to conduct an assessment of all safety basis calculations referenced in their respective DSAs. Those assessments were tasked to provide the following information: (1) list which safety basis calculations correctly follow AB-006 and therefore require no additional documentation; (2) identify and list which safety basis calculations do not strictly follow AB-006, these include NMTP Engineering Notes, Engineering Safety Notes, and calculations by organizations external to the nuclear facilities (such as Plant Engineering), subcontractor calculations, and other internally generated calculations. Each of these will be reviewed and listed on a memorandum with the facility manager's (or designee's) signature accepting that calculation for use in the DSA. If any of these calculations are lacking the signature of a technical reviewer, they must also be reviewed for technical content and that review documented per AB-006.

  13. Aggression, self-esteem, and perceived threat for university undergraduate research fellows

    E-Print Network [OSTI]

    Baumbach, Christopher Lloyd

    2013-02-22T23:59:59.000Z

    due to two factors: (1) situational variables that elicit aggressive responses, and (2) differences in the type and degree of SE people have. These two flictors are the basis for the interactive model proposed by Baumeister et al. , which suggests... that aggressive tsspoases are ll ihg by ~gt f . g. , "h rable 'ews of the self that gl p~ that in some way encounter an external appraisal that is far less favorable"; Baumeister dt Boden, 1998, p. 114). The crucial flictor in their model is the perception...

  14. Process of system design and analysis

    SciTech Connect (OSTI)

    Gardner, B.

    1995-09-01T23:59:59.000Z

    The design of an effective physical protection system includes the determination of the physical protection system objectives, the initial design of a physical protection system, the evaluation of the design, and, probably, a redesign or refinement of the system. To develop the objectives, the designer must begin by gathering information about facility operations and conditions, such as a comprehensive description of the facility, operating states, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: Class of adversary, adversary`s capabilities, and range of adversary`s tactics. Next, the designer should identify targets. Determination of whether or not nuclear materials are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the materiaL The designer now knows the objectives of the physical protection system, that is, ``What to protect against whom.`` The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors, procedures, communication devices, and protective force personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working together to assure protection rather than regarding each feature separately. Due to the complexity of protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted.

  15. A Qualitative Examination of the History of E-Extension (eXtension), Implementation of Moodle (A Course Management System) and Associated Strengths, Weaknesses, Opportunities and Threats

    E-Print Network [OSTI]

    Hightower, Tayla Elise

    2011-08-08T23:59:59.000Z

    ) in Extension. The second part sought to identify the strengths, weaknesses, opportunities and threats (SWOT) related to the use of Moodle as a Course Management System within eXtension. Interviews were conducted with five individuals knowledgeable...

  16. Molecular basis of infrared detection by Elena O. Gracheva1

    E-Print Network [OSTI]

    Newman, Eric A.

    , snakes detect infrared signals through a mechanism involving radiant heating of the pit organ, ratherARTICLES Molecular basis of infrared detection by snakes Elena O. Gracheva1 *, Nicholas T. Ingolia2 system for detecting infrared radiation, enabling them to generate a `thermal image' of predators or prey

  17. Revising Beliefs on the Basis of Evidence James P. Delgrande

    E-Print Network [OSTI]

    Delgrande, James P.

    Fraser University Burnaby, B.C., Canada V5A 1S6 jim@cs.sfu.ca Abstract Approaches to belief revision mostRevising Beliefs on the Basis of Evidence James P. Delgrande School of Computing Science Simon is not categorical. In revision, one may circumvent this fact by assuming that, in some fashion or other, an agent

  18. NEAT-IGERT Proposal C. THEMATIC BASIS FOR GROUP EFFORT

    E-Print Network [OSTI]

    Islam, M. Saif

    NEAT-IGERT Proposal C. THEMATIC BASIS FOR GROUP EFFORT The last decade has seen immense progress the research and teaching interests of fourteen investigators in seven different departments ranging from, to the actual structure and management of the group. The Ph.D.'s from this program will be well poised to embark

  19. Market Split and Basis Reduction: Towards a Solution of the

    E-Print Network [OSTI]

    Utrecht, Universiteit

    in the book by Williams [13]. There, the application was related to the oil market in the UKMarket Split and Basis Reduction: Towards a Solution of the Cornu#19;ejols-Dawande Instances K-and-bound. They o#11;ered these market split instances as a challenge to the integer programming community

  20. Implementing Radial Basis Functions Using Bump-Resistor Networks

    E-Print Network [OSTI]

    Harris, John G.

    performance using this for- mulation [SI. Anderson, Platt and Kirk previously demonstrated the use of follower]. An alter- nate strategy used by Anderson, Platt and Kirk [l] 0-7803-1901-X/94$4.0001994 IEEE 1894 #12 . Anderson, J. C. Platt, and D. Kirk. An analog VLSI chip for radial basis functions. In J. Han- son, J

  1. Cognitively Ergonomic Route A Potential Basis for the

    E-Print Network [OSTI]

    Klippel, Alexander

    1 Cognitively Ergonomic Route Directions A Potential Basis for the OpenLS Navigation Service? Stefan Hansen, Alexander Klippel, Kai-Florian Richter Overview Background Aspect of cognitively ergonomic Ontologies and cognitive modelling (cognitive engineering) Aspects of Cognitively Ergonomic Route Directions

  2. Learning Active Basis Models by EM-Type Algorithms

    E-Print Network [OSTI]

    Wu, Ying Nian

    Learning Active Basis Models by EM-Type Algorithms Zhangzhang Si1, Haifeng Gong1,2, Song-Chun Zhu1, and scales as latent variables into the image generation process, and learn the template by EM-type scheme for learning image templates of object categories where the learning is not fully supervised. We

  3. PRICING COMMODITY DERIVATIVES WITH BASIS RISK AND PARTIAL OBSERVATIONS

    E-Print Network [OSTI]

    Ludkovski, Mike

    LUDKOVSKI Abstract. We study the problem of pricing claims written on an over-the-counter energy con- tractPRICING COMMODITY DERIVATIVES WITH BASIS RISK AND PARTIAL OBSERVATIONS REN´E CARMONA AND MICHAEL. Because the underlying is illiquid, we work with an indifference pricing framework based on a liquid

  4. Theoretical Basis of Likelihood Methods in Molecular Phylogenetic Inference

    E-Print Network [OSTI]

    Das, Rhiju

    for molecular data by the maximum-likelihood approach has been attacked from a theoretical point of view is seen to be a classical statistical problem involving selection between composite hypothesesTheoretical Basis of Likelihood Methods in Molecular Phylogenetic Inference Rhiju Das, Centre

  5. CRAD, Safety Basis- Idaho Accelerated Retrieval Project Phase II

    Broader source: Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for a February 2006 Commencement of Operations assessment of the Safety Basis at the Idaho Accelerated Retrieval Project Phase II.

  6. CRAD, Safety Basis- Idaho MF-628 Drum Treatment Facility

    Broader source: Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for a May 2007 readiness assessment of the Safety Basis at the Advanced Mixed Waste Treatment Project.

  7. Data mining with sparse grids using simplicial basis functions

    E-Print Network [OSTI]

    Sminchisescu, Cristian

    Data mining with sparse grids using simplicial basis functions Jochen Garcke and Michael Griebel we presented a new approach [18] to the classifi- cation problem arising in data mining. It is based with the number of given data points. Finally we report on the quality of the classifier built by our new method

  8. Data mining with sparse grids using simplicial basis functions

    E-Print Network [OSTI]

    Sminchisescu, Cristian

    Data mining with sparse grids using simplicial basis functions Jochen Garcke and Michael Griebel Recently we presented a new approach [18] to the classi#12;- cation problem arising in data mining scales linearly with the number of given data points. Finally we report on the quality of the classi#12

  9. A quantitative and objective evaluation approach for optimal selection of design concept in conceptual design stage

    E-Print Network [OSTI]

    Tiwari, Sanjay

    2002-01-01T23:59:59.000Z

    matrix. Condoor, Suh and Burger [3] have established seven design principles to incorporate good practices in design and to evaluate it. Condoor [4] established an approach identifying coupling in design and effective management on the basis.... These are called the functional requirements (FRs) for the design. The high level functions are broken down into sub-tasks or low level functions. The high and low level functional requirements are systematically organized into a function structure. While...

  10. Strategic Basis for License Application Planning for a Potential Yucca Mountain Repository

    SciTech Connect (OSTI)

    Newberry, C. M.; Brocoum, S. J.; Gamble, R. P.; Murray, R. C.; Cline, M.

    2002-02-26T23:59:59.000Z

    If Yucca Mountain, Nevada is designated as the site for development of a geologic repository for disposal of spent nuclear fuel and high-level radioactive waste, the Department of Energy (DOE) must obtain Nuclear Regulatory Commission (NRC) approval first for repository construction, then for an operating license, and, eventually, for repository closure and decommissioning. The licensing criteria defined in Code of Federal Regulations, Title 10, Part 63 (10 CFR Part 63) establish the basis for these NRC decisions. Submittal of a license application (LA) to the NRC for authorization to construct a repository at the Yucca Mountain site is, at this point, only a potential future action by the DOE. The policy process defined in the Nuclear Waste Policy Act (NWPA), as amended, for recommendation and designation of Yucca Mountain as a repository site makes it difficult to predict whether or when the site might be designated. The DOE may only submit a LA to the NRC if the site designation takes effect. In spite of this uncertainty, the DOE must take prudent and appropriate action now, and over the next several years, to prepare for development and timely submittal of a LA. This is particularly true given the need for the DOE to develop, load, and certify the operation of its electronic information system to provide access to its relevant records as part of the licensing support network (LSN) in compliance with NRC requirements six months prior to LA submittal. The DOE must also develop a LA, which is a substantially different document from those developed to support a Site Recommendation (SR) decision. The LA must satisfy NRC licensing criteria and content requirements, and address the acceptance criteria defined by the NRC in its forthcoming Yucca Mountain Review Plan (YMRP). The content of the LA must be adequate to facilitate NRC acceptance and docketing for review, and the LA and its supporting documents must provide the documented basis for the NR C findings required for a construction authorization. The LA must also support a licensing proceeding before an Atomic Safety and Licensing Board panel prior to NRC action on any decision to authorize construction. The DOE has established a strategic basis for planning that is intended to provide the framework for development of an integrated plan for activities leading to preparation and submittal of a LA.

  11. The SU(3) Algebra in a Cyclic Basis

    E-Print Network [OSTI]

    P. F. Harrison; R. Krishnan; W. G. Scott

    2014-07-31T23:59:59.000Z

    With the couplings between the eight gluons constrained by the structure constants of the su(3) algebra in QCD, one would expect that there should exist a special basis (or set of bases) for the algebra wherein, unlike in a Cartan-Weyl basis, {\\em all} gluons interact identically (cyclically) with each other, explicitly on an equal footing. We report here particular such bases, which we have found in a computer search, and we indicate associated $3 \\times 3$ representations. We conjecture that essentially all cyclic bases for su(3) may be obtained from these making appropriate circulant transformations,and that cyclic bases may also exist for other su(n), n>3.

  12. MIXING OF INCOMPATIBLE MATERIALS IN WASTE TANKS TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    SANDGREN, K.R.

    2003-10-15T23:59:59.000Z

    This document presents onsite radiological, onsite toxicological, and offsite toxicological consequences, risk binning, and control decision results for the mixing of incompatible materials in waste tanks representative accident. This technical basis document was developed to support the tank farms documented safety analysis (DSA) and describes the risk binning process, the technical basis for assigning risk bins, and the controls selected for the mixing of incompatible materials representative accident and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and/or technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls.

  13. Technical basis document for the evaporator dump accident

    SciTech Connect (OSTI)

    GOETZ, T.G.

    2003-03-22T23:59:59.000Z

    This technical basis document was developed to support the documented safety analysis (DSA) and describes the risk binning process and the technical basis for assigning risk bins for the evaporator dump representative accident and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSC) and/or technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR-level controls. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses'', as described in this report.

  14. Mixing of incompatible materials in waste tanks technical basis document

    SciTech Connect (OSTI)

    SANDGREN, K.R.

    2003-03-21T23:59:59.000Z

    This technical basis document was developed to support the Tank Farms Documented Safety Analysis (DSA) and describes the risk binning process, the technical basis for assigning risk bins, and the controls selected for the mixing of incompatible materials representative accident and associated represented hazardous conditions. The purpose of the risk binning process is to determine the need for safety-significant structures, systems, and components (SSCs) and/or technical safety requirement (TSR)-level controls for a given representative accident or represented hazardous conditions based on an evaluation of the frequency and consequence. Note that the risk binning process is not applied to facility workers, because all facility worker hazardous conditions are considered for safety-significant SSCs and/or TSR level controls. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses'', as described in this report.

  15. The Neural Basis of Financial Risk-Taking* Supplementary Material

    E-Print Network [OSTI]

    Knutson, Brian

    1 The Neural Basis of Financial Risk-Taking* Supplementary Material Camelia M. Kuhnen1 and Brian in each block, a rational risk-neutral agent should pick stock i if he/she expects to receive a dividend D is the information set up to trial -1. That is: I-1 ={D i t| t-1, i{Stock T, Stock R, Bond C}}. Let x i = Pr{ Stock

  16. Use of Normalized Radial Basis Function in Hydrology

    SciTech Connect (OSTI)

    Cotar, Anton; Brilly, Mitja [Chair of Hydrology and Hydraulic Engineering, University of Ljubljana, Jamova 2, 1000 Ljubljana (Slovenia)

    2008-11-13T23:59:59.000Z

    In this article we will present a use of normalized radial basis function in hydrology for prediction of missing river Reka runoff data. The method is based on multidimensional normal distribution, where standard deviation is first optimized and later the whole prediction process is learned on existing data [5]. We can conclude, that the method works very well for middle ranges of data, but not so well for extremes because of its interpolating nature.

  17. Evolution of Safety Basis Documentation for the Fernald Site

    SciTech Connect (OSTI)

    Brown, T.; Kohler, S.; Fisk, P.; Krach, F.; Klein, B.

    2004-03-01T23:59:59.000Z

    The objective of the Department of Energy's (DOE) Fernald Closure Project (FCP), in suburban Cincinnati, Ohio, is to safely complete the environmental restoration of the Fernald site by 2006. Over 200 out of 220 total structures, at this DOE plant site which processed uranium ore concentrates into high-purity uranium metal products, have been safely demolished, including eight of the nine major production plants. Documented Safety Analyses (DSAs) for these facilities have gone through a process of simplification, from individual operating Safety Analysis Reports (SARs) to a single site-wide Authorization Basis containing nuclear facility Bases for Interim Operations (BIOs) to individual project Auditable Safety Records (ASRs). The final stage in DSA simplification consists of project-specific Integrated Health and Safety Plans (I-HASPs) and Nuclear Health and Safety Plans (N-HASPs) that address all aspects of safety, from the worker in the field to the safety basis requirements preserving the facility/activity hazard categorization. This paper addresses the evolution of Safety Basis Documentation (SBD), as DSAs, from production through site closure.

  18. Order Module--DOE-STD-1104-2009, REVIEW AND APPROVAL OF NUCLEAR FACILITY SAFETY BASIS AND SAFETY DESIGN BASIS DOCUMENTS

    Broader source: Energy.gov [DOE]

    The familiar level of this module is divided into two sections that are intended to provide only an overview of the material contained in DOE-STD-1104-2009, which should be consulted for complete...

  19. Agricultural pathogen decontamination technology-reducing the threat of infectious agent spread.

    SciTech Connect (OSTI)

    Betty, Rita G.; Bieker, Jill Marie; Tucker, Mark David

    2005-10-01T23:59:59.000Z

    Outbreaks of infectious agricultural diseases, whether natural occurring or introduced intentionally, could have catastrophic impacts on the U.S. economy. Examples of such agricultural pathogens include foot and mouth disease (FMD), avian influenza (AI), citrus canker, wheat and soy rust, etc. Current approaches to mitigate the spread of agricultural pathogens include quarantine, development of vaccines for animal diseases, and development of pathogen resistant crop strains in the case of plant diseases. None of these approaches is rapid, and none address the potential persistence of the pathogen in the environment, which could lead to further spread of the agent and damage after quarantine is lifted. Pathogen spread in agricultural environments commonly occurs via transfer on agricultural equipment (transportation trailers, tractors, trucks, combines, etc.), having components made from a broad range of materials (galvanized and painted steel, rubber tires, glass and Plexiglas shields, etc), and under conditions of heavy organic load (mud, soil, feces, litter, etc). A key element of stemming the spread of an outbreak is to ensure complete inactivation of the pathogens in the agricultural environment and on the equipment used in those environments. Through the combination of enhanced agricultural pathogen decontamination chemistry and a validated inactivation verification methodology, important technologies for incorporation as components of a robust response capability will be enabled. Because of the potentially devastating economic impact that could result from the spread of infectious agricultural diseases, the proposed capability components will promote critical infrastructure protection and greater border and food supply security. We investigated and developed agricultural pathogen decontamination technologies to reduce the threat of infectious-agent spread, and thus enhance agricultural biosecurity. Specifically, enhanced detergency versions of the patented Sandia decontamination chemistry were developed and tested against a few surrogate pathogens under conditions of relatively heavy organic load. Tests were conducted on surfaces commonly found in agricultural environments. Wide spectrum decontamination efficacy, low corrosivity, and biodegradability issues were addressed in developing an enhanced detergency formulation. A method for rapid assessment of loss of pathogenic activity (inactivation) was also assessed. This enhanced technology will enable rapid assessment of contamination following an intentional event, and will also be extremely useful in routine assessment of agricultural environments. The primary effort during the second year was progress towards a demonstration of both decontamination and viral inactivation technologies of Foot and Mouth virus (FMDv) using the modified SNL chemistry developed through this project. Lab studies using a surrogate virus (bovine enterovirus) were conducted using DF200, modified DF200 chemistry, and decontaminants currently recommended for use in heavily loaded organic, agricultural environments (VirkonS, 10% bleach, sodium hydroxide and citric acid). Tests using actual FMD virus will be performed at the Department of Homeland Security's Plum Island facilities in the fall of 2005. Success and the insight gained from this project will lead to enhanced response capability, which will benefit agencies such as USDA, DHS, DOD, and the agricultural industry.

  20. Reactor protection system design alternatives for sodium fast reactors

    E-Print Network [OSTI]

    DeWitte, Jacob D. (Jacob Dominic)

    2011-01-01T23:59:59.000Z

    Historically, unprotected transients have been viewed as design basis events that can significantly challenge sodium-cooled fast reactors. The perceived potential consequences of a severe unprotected transient in a ...

  1. CRITICALITY SAFETY CONTROLS AND THE SAFETY BASIS AT PFP

    SciTech Connect (OSTI)

    Kessler, S

    2009-04-21T23:59:59.000Z

    With the implementation of DOE Order 420.1B, Facility Safety, and DOE-STD-3007-2007, 'Guidelines for Preparing Criticality Safety Evaluations at Department of Energy Non-Reactor Nuclear Facilities', a new requirement was imposed that all criticality safety controls be evaluated for inclusion in the facility Documented Safety Analysis (DSA) and that the evaluation process be documented in the site Criticality Safety Program Description Document (CSPDD). At the Hanford site in Washington State the CSPDD, HNF-31695, 'General Description of the FH Criticality Safety Program', requires each facility develop a linking document called a Criticality Control Review (CCR) to document performance of these evaluations. Chapter 5, Appendix 5B of HNF-7098, Criticality Safety Program, provided an example of a format for a CCR that could be used in lieu of each facility developing its own CCR. Since the Plutonium Finishing Plant (PFP) is presently undergoing Deactivation and Decommissioning (D&D), new procedures are being developed for cleanout of equipment and systems that have not been operated in years. Existing Criticality Safety Evaluations (CSE) are revised, or new ones written, to develop the controls required to support D&D activities. Other Hanford facilities, including PFP, had difficulty using the basic CCR out of HNF-7098 when first implemented. Interpretation of the new guidelines indicated that many of the controls needed to be elevated to TSR level controls. Criterion 2 of the standard, requiring that the consequence of a criticality be examined for establishing the classification of a control, was not addressed. Upon in-depth review by PFP Criticality Safety staff, it was not clear that the programmatic interpretation of criterion 8C could be applied at PFP. Therefore, the PFP Criticality Safety staff decided to write their own CCR. The PFP CCR provides additional guidance for the evaluation team to use by clarifying the evaluation criteria in DOE-STD-3007-2007. In reviewing documents used in classifying controls for Nuclear Safety, it was noted that DOE-HDBK-1188, 'Glossary of Environment, Health, and Safety Terms', defines an Administrative Control (AC) in terms that are different than typically used in Criticality Safety. As part of this CCR, a new term, Criticality Administrative Control (CAC) was defined to clarify the difference between an AC used for criticality safety and an AC used for nuclear safety. In Nuclear Safety terms, an AC is a provision relating to organization and management, procedures, recordkeeping, assessment, and reporting necessary to ensure safe operation of a facility. A CAC was defined as an administrative control derived in a criticality safety analysis that is implemented to ensure double contingency. According to criterion 2 of Section IV, 'Linkage to the Documented Safety Analysis', of DOESTD-3007-2007, the consequence of a criticality should be examined for the purposes of classifying the significance of a control or component. HNF-PRO-700, 'Safety Basis Development', provides control selection criteria based on consequence and risk that may be used in the development of a Criticality Safety Evaluation (CSE) to establish the classification of a component as a design feature, as safety class or safety significant, i.e., an Engineered Safety Feature (ESF), or as equipment important to safety; or merely provides defense-in-depth. Similar logic is applied to the CACs. Criterion 8C of DOE-STD-3007-2007, as written, added to the confusion of using the basic CCR from HNF-7098. The PFP CCR attempts to clarify this criterion by revising it to say 'Programmatic commitments or general references to control philosophy (e.g., mass control or spacing control or concentration control as an overall control strategy for the process without specific quantification of individual limits) is included in the PFP DSA'. Table 1 shows the PFP methodology for evaluating CACs. This evaluation process has been in use since February of 2008 and has proven to be simple and effective. Each control identified i

  2. Risk and Performance Based Fire Safety Design of Steel and Composite Structures 

    E-Print Network [OSTI]

    Lange, David

    2009-01-01T23:59:59.000Z

    For the development of performance based design on a proper scientific basis the use of the concept of risk is inevitable. However, the application of this concept to actual structural design is not simple because of the ...

  3. RELEASE OF DRIED RADIOACTIVE WASTE MATERIALS TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    KOZLOWSKI, S.D.

    2007-05-30T23:59:59.000Z

    This technical basis document was developed to support RPP-23429, Preliminary Documented Safety Analysis for the Demonstration Bulk Vitrification System (PDSA) and RPP-23479, Preliminary Documented Safety Analysis for the Contact-Handled Transuranic Mixed (CH-TRUM) Waste Facility. The main document describes the risk binning process and the technical basis for assigning risk bins to the representative accidents involving the release of dried radioactive waste materials from the Demonstration Bulk Vitrification System (DBVS) and to the associated represented hazardous conditions. Appendices D through F provide the technical basis for assigning risk bins to the representative dried waste release accident and associated represented hazardous conditions for the Contact-Handled Transuranic Mixed (CH-TRUM) Waste Packaging Unit (WPU). The risk binning process uses an evaluation of the frequency and consequence of a given representative accident or represented hazardous condition to determine the need for safety structures, systems, and components (SSC) and technical safety requirement (TSR)-level controls. A representative accident or a represented hazardous condition is assigned to a risk bin based on the potential radiological and toxicological consequences to the public and the collocated worker. Note that the risk binning process is not applied to facility workers because credible hazardous conditions with the potential for significant facility worker consequences are considered for safety-significant SSCs and/or TSR-level controls regardless of their estimated frequency. The controls for protection of the facility workers are described in RPP-23429 and RPP-23479. Determination of the need for safety-class SSCs was performed in accordance with DOE-STD-3009-94, Preparation Guide for US. Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses, as described below.

  4. Human System Simulation in Support of Human Performance Technical Basis at NPPs

    SciTech Connect (OSTI)

    David Gertman; Katya Le Blanc; alan mecham; william phoenix; Magdy Tawfik; Jeffrey Joe

    2010-06-01T23:59:59.000Z

    This paper focuses on strategies and progress toward establishing the Idaho National Laboratory’s (INL’s) Human Systems Simulator Laboratory at the Center for Advanced Energy Studies (CAES), a consortium of Idaho State Universities. The INL is one of the National Laboratories of the US Department of Energy. One of the first planned applications for the Human Systems Simulator Laboratory is implementation of a dynamic nuclear power plant simulation (NPP) where studies of operator workload, situation awareness, performance and preference will be carried out in simulated control rooms including nuclear power plant control rooms. Simulation offers a means by which to review operational concepts, improve design practices and provide a technical basis for licensing decisions. In preparation for the next generation power plant and current government and industry efforts in support of light water reactor sustainability, human operators will be attached to a suite of physiological measurement instruments and, in combination with traditional Human Factors Measurement techniques, carry out control room tasks in simulated advanced digital and hybrid analog/digital control rooms. The current focus of the Human Systems Simulator Laboratory is building core competence in quantitative and qualitative measurements of situation awareness and workload. Of particular interest is whether introduction of digital systems including automated procedures has the potential to reduce workload and enhance safety while improving situation awareness or whether workload is merely shifted and situation awareness is modified in yet to be determined ways. Data analysis is carried out by engineers and scientists and includes measures of the physical and neurological correlates of human performance. The current approach supports a user-centered design philosophy (see ISO 13407 “Human Centered Design Process for Interactive Systems, 1999) wherein the context for task performance along with the requirements of the end-user are taken into account during the design process and the validity of design is determined through testing of real end users

  5. Human-system Interfaces to Automatic Systems: Review Guidance and Technical Basis

    SciTech Connect (OSTI)

    OHara, J.M.; Higgins, J.C.

    2010-01-31T23:59:59.000Z

    Automation has become ubiquitous in modern complex systems and commercial nuclear power plants are no exception. Beyond the control of plant functions and systems, automation is applied to a wide range of additional functions including monitoring and detection, situation assessment, response planning, response implementation, and interface management. Automation has become a 'team player' supporting plant personnel in nearly all aspects of plant operation. In light of the increasing use and importance of automation in new and future plants, guidance is needed to enable the NRC staff to conduct safety reviews of the human factors engineering (HFE) aspects of modern automation. The objective of the research described in this report was to develop guidance for reviewing the operator's interface with automation. We first developed a characterization of the important HFE aspects of automation based on how it is implemented in current systems. The characterization included five dimensions: Level of automation, function of automation, modes of automation, flexibility of allocation, and reliability of automation. Next, we reviewed literature pertaining to the effects of these aspects of automation on human performance and the design of human-system interfaces (HSIs) for automation. Then, we used the technical basis established by the literature to develop design review guidance. The guidance is divided into the following seven topics: Automation displays, interaction and control, automation modes, automation levels, adaptive automation, error tolerance and failure management, and HSI integration. In addition, we identified insights into the automaton design process, operator training, and operations.

  6. Interim safety basis for fuel supply shutdown facility

    SciTech Connect (OSTI)

    Brehm, J.R.; Deobald, T.L.; Benecke, M.W.; Remaize, J.A.

    1995-05-23T23:59:59.000Z

    This ISB in conjunction with the new TSRs, will provide the required basis for interim operation or restrictions on interim operations and administrative controls for the Facility until a SAR is prepared in accordance with the new requirements. It is concluded that the risk associated with the current operational mode of the Facility, uranium closure, clean up, and transition activities required for permanent closure, are within Risk Acceptance Guidelines. The Facility is classified as a Moderate Hazard Facility because of the potential for an unmitigated fire associated with the uranium storage buildings.

  7. SRS FTF Section 3116 Basis for Determination | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSARDevelopmental AssignmentApril 2, 2015AwardsOctoberBasis for

  8. High integrity software for nuclear power plants: Candidate guidelines, technical basis and research needs. Main report, Volume 2

    SciTech Connect (OSTI)

    Seth, S.; Bail, W.; Cleaves, D.; Cohen, H.; Hybertson, D.; Schaefer, C.; Stark, G.; Ta, A.; Ulery, B. [Mitre Corp., McLean, VA (United States)

    1995-06-01T23:59:59.000Z

    The work documented in this report was performed in support of the US Nuclear Regulatory Commission to examine the technical basis for candidate guidelines that could be considered in reviewing and evaluating high integrity computer e following software development and assurance activities: Requirements specification; design; coding; verification and validation, inclukding static analysis and dynamic testing; safety analysis; operation and maintenance; configuration management; quality assurance; and planning and management. Each activity (framework element) was subdivided into technical areas (framework subelements). The report describes the development of approximately 200 candidate guidelines that span the entire ran e identification, categorization and prioritization of technical basis for those candidate guidelines; and the identification, categorization and prioritization of research needs for improving the technical basis. The report has two volumes: Volume 1, Executive Summary includes an overview of the framwork and of each framework element, the complete set of candidate guidelines, the results of the assessment of the technical basis for each candidate guideline, and a discussion of research needs that support the regulatory function; this document, Volume 2, is the main report.

  9. Structural basis of CX-4945 binding to human protein kinase CK2

    SciTech Connect (OSTI)

    Ferguson, Andrew D.; Sheth, Payal R.; Basso, Andrea D.; Paliwal, Sunil; Gray, Kimberly; Fischmann, Thierry O.; Le, Hung V. (Merck)

    2012-02-07T23:59:59.000Z

    Protein kinase CK2 (CK2), a constitutively active serine/threonine kinase, is involved in a variety of roles essential to the maintenance of cellular homeostasis. Elevated levels of CK2 expression results in the dysregulation of key signaling pathways that regulate transcription, and has been implicated in cancer. The adenosine-5'-triphosphate-competitive inhibitor CX-4945 has been reported to show broad spectrum anti-proliferative activity in multiple cancer cell lines. Although the enzymatic IC{sub 50} of CX-4945 has been reported, the thermodynamics and structural basis of binding to CK2{alpha} remained elusive. Presented here are the crystal structures of human CK2{alpha} in complex with CX-4945 and adenylyl phosphoramidate at 2.7 and 1.3 {angstrom}, respectively. Biophysical analysis of CX-4945 binding is also described. This data provides the structural rationale for the design of more potent inhibitors against this emerging cancer target.

  10. Low-Cost, Robust, Threat-Aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure

    SciTech Connect (OSTI)

    Carols H. Rentel

    2007-03-31T23:59:59.000Z

    Eaton, in partnership with Oak Ridge National Laboratory and the Electric Power Research Institute (EPRI) has completed a project that applies a combination of wireless sensor network (WSN) technology, anticipatory theory, and a near-term value proposition based on diagnostics and process uptime to ensure the security and reliability of critical electrical power infrastructure. Representatives of several Eaton business units have been engaged to ensure a viable commercialization plan. Tennessee Valley Authority (TVA), American Electric Power (AEP), PEPCO, and Commonwealth Edison were recruited as partners to confirm and refine the requirements definition from the perspective of the utilities that actually operate the facilities to be protected. Those utilities have cooperated with on-site field tests as the project proceeds. Accomplishments of this project included: (1) the design, modeling, and simulation of the anticipatory wireless sensor network (A-WSN) that will be used to gather field information for the anticipatory application, (2) the design and implementation of hardware and software prototypes for laboratory and field experimentation, (3) stack and application integration, (4) develop installation and test plan, and (5) refinement of the commercialization plan.

  11. Electronic structure basis for the titanic magnetoresistance in WTe?

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Pletikosic, I.; Ali, Mazhar N.; Fedorov, A. V.; Cava, R. J.; Valla, T.

    2014-11-01T23:59:59.000Z

    The electronic structure basis of the extremely large magnetoresistance in layered non-magnetic tungsten ditelluride has been investigated by angle-resolved photoelectron spectroscopy. Hole and electron pockets of approximately the same size were found at the Fermi level, suggesting that carrier compensation should be considered the primary source of the effect. The material exhibits a highly anisotropic, quasi one-dimensional Fermi surface from which the pronounced anisotropy of the magnetoresistance follows. A change in the Fermi surface with temperature was found and a high-density-of-states band that may take over conduction at higher temperatures and cause the observed turn-on behavior of the magnetoresistance inmore »WTe? was identified.« less

  12. Electronic structure basis for the titanic magnetoresistance in WTe?

    SciTech Connect (OSTI)

    Pletikosic, I. [Princeton Univ., NJ (United States); Brookhaven National Lab. (BNL), Upton, NY (United States); Ali, Mazhar N. [Princeton Univ., NJ (United States); Fedorov, A. V. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Cava, R. J. [Princeton Univ., NJ (United States); Valla, T. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-11-01T23:59:59.000Z

    The electronic structure basis of the extremely large magnetoresistance in layered non-magnetic tungsten ditelluride has been investigated by angle-resolved photoelectron spectroscopy. Hole and electron pockets of approximately the same size were found at the Fermi level, suggesting that carrier compensation should be considered the primary source of the effect. The material exhibits a highly anisotropic, quasi one-dimensional Fermi surface from which the pronounced anisotropy of the magnetoresistance follows. A change in the Fermi surface with temperature was found and a high-density-of-states band that may take over conduction at higher temperatures and cause the observed turn-on behavior of the magnetoresistance in WTe? was identified.

  13. The Gaussian Radial Basis Function Method for Plasma Kinetic Theory

    E-Print Network [OSTI]

    Hirvijoki, Eero; Belli, Emily; Embréus, Ola

    2015-01-01T23:59:59.000Z

    A fundamental macroscopic description of a magnetized plasma is the Vlasov equation supplemented by the nonlinear inverse-square force Fokker-Planck collision operator [Rosenbluth et al., Phys. Rev., 107, 1957]. The Vlasov part describes advection in a six-dimensional phase space whereas the collision operator involves friction and diffusion coefficients that are weighted velocity-space integrals of the particle distribution function. The Fokker-Planck collision operator is an integro-differential, bilinear operator, and numerical discretization of the operator is far from trivial. In this letter, we describe a new approach to discretize the entire kinetic system based on an expansion in Gaussian Radial Basis functions (RBFs). This approach is particularly well-suited to treat the collision operator because the friction and diffusion coefficients can be analytically calculated. Although the RBF method is known to be a powerful scheme for the interpolation of scattered multidimensional data, Gaussian RBFs also...

  14. Order Module--NNSA Orders Self-Study Program Safety Basis Documentatio...

    Broader source: Energy.gov (indexed) [DOE]

    NNSA Orders Self-Study Program Safety Basis Documentation Order Module--NNSA Orders Self-Study Program Safety Basis Documentation The familiar level of this module is divided into...

  15. A Note on the Finite Element Method with Singular Basis Functions

    E-Print Network [OSTI]

    Kaneko, Hideaki

    finite element analysis that incorporates singular element functions. A need for introducing * *some singular elements as part of basis functions in certain finite element analysis arises o* *ut A Note on the Finite Element Method with Singular Basis

  16. Technical basis for the aboveground structure failure and associated represented hazardous conditions

    SciTech Connect (OSTI)

    GOETZ, T.G.

    2003-07-25T23:59:59.000Z

    This technical basis document describes the risk binning process and the technical basis for assigning risk bins for the aboveground structure failure representative accident and associated represented hazardous conditions. This document was developed to support the documented safety analysis.

  17. Attitudes and perceptions of urban households in sub-Saharan Africa on water sources, threats and sustainability: A study in Bondo, Kenya

    E-Print Network [OSTI]

    Hall, Sharon J.

    , threats and sustainability: A study in Bondo, Kenya Daniel M Nzengya School of Sustainability, Arizona growth is already happening in most of Kenya's cities and towns. In the Lake Victoria region, increasing the danger of water- and sanitation-related diseases. A survey was conducted in Bondo town, Kenya

  18. Abstract --Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely

    E-Print Network [OSTI]

    Lee, Ruby B.

    Abstract -- Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely on manual detection of DDoS attacks after which offline fine- grain traffic-evolving characteristics of the attacking packets. Recently, we have proposed a DDoS defense architecture that supports

  19. Is New Zealand's food supply under threat? What have we learned from the escape of genetically modified (GM) corn throughout New

    E-Print Network [OSTI]

    Hickman, Mark

    Is New Zealand's food supply under threat? What have we learned from the escape of genetically. This realization undermines claims that uses of genetically modified organisms (GMOs) outside of the laboratory can modified (GM) corn throughout New Zealand? The most alarming outcome of the recently concluded

  20. Carbon Tax and 100% Dividend No Alligator Shoes! The charts for my talk (Climate Threat to the Planet: Implications for Energy Policy) on 3

    E-Print Network [OSTI]

    Hansen, James E.

    Carbon Tax and 100% Dividend ­ No Alligator Shoes! The charts for my talk (Climate ThreatPACON_20080603.ppt The "Carbon Tax and 100% Dividend" chart warrants discussion. Tax and dividend is the policy complement that must accompany recognition of fossil carbon reservoir sizes for strategic solution of global