Powered by Deep Web Technologies
Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

design basis threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

design basis threat | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

2

Design Basis Threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Design Basis Threat | National Nuclear Security Administration Design Basis Threat | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Design Basis Threat Home > About Us > Our Programs > Nuclear Security > Design Basis Threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM)

3

Design Basis Threat Policy (U)  

Directives, Delegations, and Requirements

This Order is classified and will not be available on the Directives Portal. For distribution, NA employees should contact Jon Todd, 202-586-2579; all other DOE employees should contact Ron Francis, 301-903-6874. Does not cancel other directives.

2004-10-01T23:59:59.000Z

4

Design Basis Threat Policy (U)  

Directives, Delegations, and Requirements

This Order is classified and will not be available on the Directives Portal. For distribution, contact John Fitzgibbons, 301-903-1361, john.fitzgibbons@hq.doe.gov. Cancels: DOE O 470.3

2005-11-29T23:59:59.000Z

5

Beyond Design Basis Events  

NLE Websites -- All DOE Office Websites (Extended Search)

Beyond Design Basis Events Beyond Design Basis Events Following the March 2011 Fukushima Daiichi nuclear plant accident in Japan, DOE embarked upon several initiatives to investigate the safety posture of its nuclear facilities relative to beyond design basis events (BDBEs). These initiatives included issuing Safety Bulletin 2011-01, Events Beyond Design Safety Basis Analysis, and conducting two DOE nuclear safety workshops. DOE also issued two reports documenting the results of these initiatives: Review of Requirements and Capabilities for Analyzing and Responding to BDBEs, August 2011, and Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities, January 2013.

6

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik  

E-Print Network (OSTI)

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

7

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network (OSTI)

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

8

Threats, design limits and design windows for laser IFE dry wall chambers  

E-Print Network (OSTI)

Threats, design limits and design windows for laser IFE dry wall chambers A. Rene´ Raffray-drive targets and a dry wall chamber. The dry wall must accommodate the ion and photon threat spectra from. The neutron energy is deposited deeper in the first wall and blanket and does not represent a major threat

Raffray, A. René

9

Beyond Design Basis Events | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Beyond Design Basis Events Beyond Design Basis Events Beyond Design Basis Events Beyond Design Basis Events Following the March 2011 Fukushima Daiichi nuclear plant accident in Japan, DOE embarked upon several initiatives to investigate the safety posture of its nuclear facilities relative to beyond design basis events (BDBEs). These initiatives included issuing Safety Bulletin 2011-01, Events Beyond Design Safety Basis Analysis, and conducting two DOE nuclear safety workshops. DOE also issued two reports documenting the results of these initiatives: Review of Requirements and Capabilities for Analyzing and Responding to BDBEs, August 2011, and Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities,

10

Events Beyond Design Safety Basis Analysis | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Events Beyond Design Safety Basis Analysis Events Beyond Design Safety Basis Analysis March 23, 2011 Safety Bulletin 2011-01, Events Beyond Design Safety Basis Analysis This Safety...

11

PRELIMINARY SELECTION OF MGR DESIGN BASIS EVENTS  

SciTech Connect

The purpose of this analysis is to identify the preliminary design basis events (DBEs) for consideration in the design of the Monitored Geologic Repository (MGR). For external events and natural phenomena (e.g., earthquake), the objective is to identify those initiating events that the MGR will be designed to withstand. Design criteria will ensure that radiological release scenarios resulting from these initiating events are beyond design basis (i.e., have a scenario frequency less than once per million years). For internal (i.e., human-induced and random equipment failures) events, the objective is to identify credible event sequences that result in bounding radiological releases. These sequences will be used to establish the design basis criteria for MGR structures, systems, and components (SSCs) design basis criteria in order to prevent or mitigate radiological releases. The safety strategy presented in this analysis for preventing or mitigating DBEs is based on the preclosure safety strategy outlined in ''Strategy to Mitigate Preclosure Offsite Exposure'' (CRWMS M&O 1998f). DBE analysis is necessary to provide feedback and requirements to the design process, and also to demonstrate compliance with proposed 10 CFR 63 (Dyer 1999b) requirements. DBE analysis is also required to identify and classify the SSCs that are important to safety (ITS).

J.A. Kappes

1999-09-16T23:59:59.000Z

12

System Design and the Safety Basis  

SciTech Connect

The objective of this paper is to present the Bechtel Jacobs Company, LLC (BJC) Lessons Learned for system design as it relates to safety basis documentation. BJC has had to reconcile incomplete or outdated system description information with current facility safety basis for a number of situations in recent months. This paper has relevance in multiple topical areas including documented safety analysis, decontamination & decommissioning (D&D), safety basis (SB) implementation, safety and design integration, potential inadequacy of the safety analysis (PISA), technical safety requirements (TSR), and unreviewed safety questions. BJC learned that nuclear safety compliance relies on adequate and well documented system design information. A number of PIS As and TSR violations occurred due to inadequate or erroneous system design information. As a corrective action, BJC assessed the occurrences caused by systems design-safety basis interface problems. Safety systems reviewed included the Molten Salt Reactor Experiment (MSRE) Fluorination System, K-1065 fire alarm system, and the K-25 Radiation Criticality Accident Alarm System. The conclusion was that an inadequate knowledge of system design could result in continuous non-compliance issues relating to nuclear safety. This was especially true with older facilities that lacked current as-built drawings coupled with the loss of 'historical knowledge' as personnel retired or moved on in their careers. Walkdown of systems and the updating of drawings are imperative for nuclear safety compliance. System design integration with safety basis has relevance in the Department of Energy (DOE) complex. This paper presents the BJC Lessons Learned in this area. It will be of benefit to DOE contractors that manage and operate an aging population of nuclear facilities.

Ellingson, Darrel

2008-05-06T23:59:59.000Z

13

Results from Beyond Design Basis Event Pilots | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Results from Beyond Design Basis Event Pilots Results from Beyond Design Basis Event Pilots September 19, 2012 Presenter: Mike Hillman, Program Manager, Office of Health, Safety...

14

CRAD, Engineering Design and Safety Basis - December 22, 2009...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Engineering Design and Safety Basis Inspection Criteria, Inspection Activities, and Lines of Inquiry (HSS CRAD 64-19, Rev. 0) The engineering design and safety basis inspection...

15

Threat assessment design for driver assistance system at intersections  

E-Print Network (OSTI)

This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

Aoude, Georges

16

Assessing Beyond Design Basis Seismic Events and Implications on Seismic  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessing Beyond Design Basis Seismic Events and Implications on Assessing Beyond Design Basis Seismic Events and Implications on Seismic Risk Assessing Beyond Design Basis Seismic Events and Implications on Seismic Risk September 19, 2012 Presenter: Jeffrey Kimball, Technical Specialist (Seismologist) Defense Nuclear Facilities Safety Board Topics Covered: Department of Energy Approach to Natural Phenomena Hazards Analysis and Design (Seismic) Design Basis and Beyond Design Basis Seismic Events Seismic Risk Implications - Key Parameters and Insights Conclusions Assessing Beyond Design Basis Seismic Events and Implications on Seismic Risk More Documents & Publications DOE's Approach to Nuclear Facility Safety Analysis and Management Results from Beyond Design Basis Event Pilots Idaho National Laboratory Advanced Test Reactor Probabilistic Risk

17

Office of Nuclear Safety Basis and Facility Design  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Nuclear Safety Basis & Facility Design establishes safety basis and facility design requirements and expectations related to analysis and design of nuclear facilities to ensure protection of workers and the public from the hazards associated with nuclear operations.

18

Beyond Design Basis Events | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Basis Analysis, and conducting two DOE nuclear safety workshops. DOE also issued two reports documenting the results of these initiatives: Review of Requirements and Capabilities...

19

Beyond Design Basis Events Analysis and Response Information | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Beyond Design Basis Events Analysis Beyond Design Basis Events Analysis and Response Information Beyond Design Basis Events Analysis and Response Information September 19-20, 2012 Beyond Design Basis Events Analysis and Response Information DOE's Safety Bulletin No. 2011-01, Events Beyond Design Safety Basis Analysis, March 2011 DOE's Nuclear Safety Workshop Newsletter, June 2011 2011 Nuclear Safety Workshop Presentations, June 2011 Transmittal Memorandum, Report on Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events, September 2011 Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events, August 2011 NRC Report - Recommendations for Enhancing Reactor Safety in the 21st Century; The Near-Term Task Force Review of Insights from the

20

CRAD, Engineering Design and Safety Basis - December 22, 2009 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Engineering Design and Safety Basis - December 22, 2009 Engineering Design and Safety Basis - December 22, 2009 CRAD, Engineering Design and Safety Basis - December 22, 2009 December 22, 2009 Engineering Design and Safety Basis Inspection Criteria, Inspection Activities, and Lines of Inquiry (HSS CRAD 64-19, Rev. 0) The engineering design and safety basis inspection will evaluate the effectiveness of programs and processes for the design and safety basis of selected safety structures, systems, and components (SSCs) of a nuclear facility. The nuclear facility may be an existing facility, a major modification to an existing facility, or a new facility under construction. Accordingly, the safety basis for the facility, for example, a documented safety analysis (DSA) or a preliminary documented safety analysis (PDSA),

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

CRAD, Engineering Design and Safety Basis - December 22, 2009 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Engineering Design and Safety Basis - December 22, 2009 Engineering Design and Safety Basis - December 22, 2009 CRAD, Engineering Design and Safety Basis - December 22, 2009 December 22, 2009 Engineering Design and Safety Basis Inspection Criteria, Inspection Activities, and Lines of Inquiry (HSS CRAD 64-19, Rev. 0) The engineering design and safety basis inspection will evaluate the effectiveness of programs and processes for the design and safety basis of selected safety structures, systems, and components (SSCs) of a nuclear facility. The nuclear facility may be an existing facility, a major modification to an existing facility, or a new facility under construction. Accordingly, the safety basis for the facility, for example, a documented safety analysis (DSA) or a preliminary documented safety analysis (PDSA),

22

Results from Beyond Design Basis Event Pilots | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Results from Beyond Design Basis Event Pilots Results from Beyond Design Basis Event Pilots Results from Beyond Design Basis Event Pilots September 19, 2012 Presenter: Mike Hillman, Program Manager, Office of Health, Safety and Security, US Department of Energy Topics covered: Update DOE safety analysis and emergency management requirements/guidance and perform pilot applications Perform system walkdowns and evaluations at several Cat 1 and 2 DOE nuclear facilities to assess potential susceptibilities to natural phenomena hazards and external BDBEs Conduct emergency drills and exercises at DOE sites with nuclear facilities, focusing on BDBEs Results from Beyond Design Basis Event Pilots More Documents & Publications Development of Guidance for Analysis of Beyond Design Basis Events Report to the Secretary of Energy on Beyond Design Basis Event Pilot

23

Advanced Test Reactor Safety Basis Upgrade Lessons Learned Relative to Design Basis Verification and Safety Basis Management  

SciTech Connect

The Advanced Test Reactor (ATR) is a pressurized light-water reactor with a design thermal power of 250 MW. The principal function of the ATR is to provide a high neutron flux for testing reactor fuels and other materials. The reactor also provides other irradiation services such as radioisotope production. The ATR and its support facilities are located at the Test Reactor Area of the Idaho National Engineering and Environmental Laboratory (INEEL). An audit conducted by the Department of Energy's Office of Independent Oversight and Performance Assurance (DOE OA) raised concerns that design conditions at the ATR were not adequately analyzed in the safety analysis and that legacy design basis management practices had the potential to further impact safe operation of the facility.1 The concerns identified by the audit team, and issues raised during additional reviews performed by ATR safety analysts, were evaluated through the unreviewed safety question process resulting in shutdown of the ATR for more than three months while these concerns were resolved. Past management of the ATR safety basis, relative to facility design basis management and change control, led to concerns that discrepancies in the safety basis may have developed. Although not required by DOE orders or regulations, not performing design basis verification in conjunction with development of the 10 CFR 830 Subpart B upgraded safety basis allowed these potential weaknesses to be carried forward. Configuration management and a clear definition of the existing facility design basis have a direct relation to developing and maintaining a high quality safety basis which properly identifies and mitigates all hazards and postulated accident conditions. These relations and the impact of past safety basis management practices have been reviewed in order to identify lessons learned from the safety basis upgrade process and appropriate actions to resolve possible concerns with respect to the current ATR safety basis. The need for a design basis reconstitution program for the ATR has been identified along with the use of sound configuration management principles in order to support safe and efficient facility operation.

G. L. Sharp; R. T. McCracken

2004-05-01T23:59:59.000Z

24

Perspective on Beyond Design Basis Event Analysis and Response | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Perspective on Beyond Design Basis Event Analysis and Response Perspective on Beyond Design Basis Event Analysis and Response Perspective on Beyond Design Basis Event Analysis and Response September 20, 2012 Presenter: John Schwenker, Nuclear Safety Manager for Liquid Operations, Savannah River Remediation, LLC, Savannah River Site Topics Covered: Waste Tanks can contain up to 1.3 Millions Gallons of highly radioactive waste (sludge, salt, supernate). Type III/IIIA Waste Tank Structures and berms are PC-3 Qualified. Tanks may fail in a Beyond Design Basis Seismic Event. Waste could flow above ground to streams and rivers. Unmitigated Tank Explosion exceeds offsite Evaluation Guidelines Hydrogen gas can be trapped in the sludge and saltcake structure. Seismic Event can cause a prompt release of trapped hydrogen. It is not physically practical to install a ventilation system that

25

Development of Guidance for Analysis of Beyond Design Basis Events |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development of Guidance for Analysis of Beyond Design Basis Events Development of Guidance for Analysis of Beyond Design Basis Events Development of Guidance for Analysis of Beyond Design Basis Events Wednesday, September 19 Presenter: Dr. James O'Brien, Director, Office of Nuclear Safety, Office of Health, Safety and Security, US Department of Energy Topics covered: Types of DOE Facilities ◦ Research Reactors; ◦ Weapons disassembly, maintenance, and testing facilities; ◦ Nuclear material storage facilities; ◦ Processing facilities; and waste disposal facilities. Safety Analysis Framework ◦ DOE Nuclear Safety Policy ◦ Nuclear Safety Rule ◦ Nuclear Safety Analysis Standards ◦ Documented Safety Analysis Guide Development of Guidance for Analysis of Beyond Design Basis Events More Documents & Publications DOE's Approach to Nuclear Facility Safety Analysis and Management

26

Engineering Design and Safety Basis Inspection Criteria, Inspection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Engineering Design and Safety Basis Inspection Criteria, Inspection Activities, and Lines of Inquiry for internal use, which we are also making available on the Office of ES&H...

27

Review and Approval of Nuclear Facility Safety Basis and Safety Design Basis Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SENSITIVE DOE-STD-1104-2009 May 2009 Superseding DOE-STD-1104-96 DOE STANDARD REVIEW AND APPROVAL OF NUCLEAR FACILITY SAFETY BASIS AND SAFETY DESIGN BASIS DOCUMENTS U.S. Department of Energy AREA SAFT Washington, DC 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1104-2009 ii Available on the Department of Energy Technical Standards web page at http://www.hss.energy.gov/nuclearsafety/ns/techstds/ DOE-STD-1104-2009 iii CONTENTS FOREWORD .................................................................................................................................. v INTRODUCTION ..........................................................................................................................

28

Breeder Spent Fuel Handling Program multipurpose cask design basis document  

SciTech Connect

The Breeder Spent Fuel Handling (BSFH) Program multipurpose cask Design Basis Document defines the performance requirements essential to the development of a legal weight truck cask to transport FFTF spent fuel from reactor to a reprocessing facility and the resultant High Level Waste (HLW) to a repository. 1 ref.

Duckett, A.J.; Sorenson, K.B.

1985-09-01T23:59:59.000Z

29

Homicidal Threats  

Science Journals Connector (OSTI)

Every day in the media we hear about death threats. Death threats are often made against individuals, i.e ... e. Death to America. Often these threats are accompanied by shouts, specific gestures,...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

30

Ris-R-Report Grid fault and design-basis for wind turbines -  

E-Print Network (OSTI)

Risø-R-Report Grid fault and design-basis for wind turbines - Final report Anca D. Hansen, Nicolaos and design-basis for wind turbines - Final report Division: Wind Energy Division Risø-R-1714(EN) January 2010-basis for wind turbines". The objective of this project has been to assess and analyze the consequences

31

2014 Threats  

Science Journals Connector (OSTI)

......Society Winter 2013 research-article Information Security 2014 Threats Gareth Niblett Gareth Niblett, Chairman of the BCS Information...www.bcs.org/securitycommunity FURTHERINFORMATION 2014 THREATS doi:10.1093/itnow/bwt073 2013 The British Computer......

Gareth Niblett

2013-01-01T23:59:59.000Z

32

Threat Characterization  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Michalski Michalski SNL Department 5621 Threat Characterization Summary Slide: Threat Characterization Outcomes: Develop a network analysis toolset to allow an analyst to efficiently "crawl" large data sets to discover relevant threat information. Road Map Challenges:"The ability to discover & understand emerging threats and vulnerabilities is a prerequisite to developing effective countermeasures" Major Successes: * Implemented prototype front end crawler and semantic analysis engine (Sandia National Labs). * Transition Development work to the Institute for Complex Additive System Analysis (ICASA) Center (NMTech) * Quarterly threat reports being produced  Schedule: Improvements to both the analyst process and GUI Interface, 4Q 2009; Transition maintenance and development to

33

Improving Department of Energy Capabilities for Mitigating Beyond Design Basis Events  

Energy.gov (U.S. Department of Energy (DOE))

This is a level 1 operating experience document providing direction for Improving Department of Energy Capabilities for Mitigating Beyond Design Basis Events. [OE-1: 2013-01

34

Microsoft Word - 3b - Basis for Reactor Design comments 081710...  

NLE Websites -- All DOE Office Websites (Extended Search)

on the demonstration power plant core design developed earlier by PBMR (Ltd) of South Africa, includes a direct Brayton cycle gas turbine for electricity production. The...

35

A BASIS FOR MODIFYING THE TANK 12 COMPOSITE SAMPLING DESIGN  

SciTech Connect

The SRR sampling campaign to obtain residual solids material from the Savannah River Site (SRS) Tank Farm Tank 12 primary vessel resulted in obtaining appreciable material in all 6 planned source samples from the mound strata but only in 5 of the 6 planned source samples from the floor stratum. Consequently, the design of the compositing scheme presented in the Tank 12 Sampling and Analysis Plan, Pavletich (2014a), must be revised. Analytical Development of SRNL statistically evaluated the sampling uncertainty associated with using various compositing arrays and splitting one or more samples for compositing. The variance of the simple mean of composite sample concentrations is a reasonable standard to investigate the impact of the following sampling options. Composite Sample Design Option (a). Assign only 1 source sample from the floor stratum and 1 source sample from each of the mound strata to each of the composite samples. Each source sample contributes material to only 1 composite sample. Two source samples from the floor stratum would not be used. Composite Sample Design Option (b). Assign 2 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that one source sample from the floor must be used twice, with 2 composite samples sharing material from this particular source sample. All five source samples from the floor would be used. Composite Sample Design Option (c). Assign 3 source samples from the floor stratum and 1 source sample from each of the mound strata to each composite sample. This infers that several of the source samples from the floor stratum must be assigned to more than one composite sample. All 5 source samples from the floor would be used. Using fewer than 12 source samples will increase the sampling variability over that of the Basic Composite Sample Design, Pavletich (2013). Considering the impact to the variance of the simple mean of the composite sample concentrations, the recommendation is to construct each sample composite using four or five source samples. Although the variance using 5 source samples per composite sample (Composite Sample Design Option (c)) was slightly less than the variance using 4 source samples per composite sample (Composite Sample Design Option (b)), there is no practical difference between those variances. This does not consider that the measurement error variance, which is the same for all composite sample design options considered in this report, will further dilute any differences. Composite Sample Design Option (a) had the largest variance for the mean concentration in the three composite samples and should be avoided. These results are consistent with Pavletich (2014b) which utilizes a low elevation and a high elevation mound source sample and two floor source samples for each composite sample. Utilizing the four source samples per composite design, Pavletich (2014b) utilizes aliquots of Floor Sample 4 for two composite samples.

Shine, G.

2014-11-25T23:59:59.000Z

36

Laser design basis for the National Ignition Facility  

SciTech Connect

Controlled nuclear fusion initiated by highly intense laser beams has been the subject of experiment for many years. The National Ignition Facility (NIF) represents the culmination of design efforts to provide a laser facility that will successfully demonstrate fusion ignition in the laboratory. In this so-called inertial confinement approach, energetic driver beams (laser, X-ray, or charged particle) heat the outer surface of a spherical capsule containing deuterium and tritium (DT) fuel. As the capsule surface explosively evaporates, reaction pressure compresses the DT fuel causing the central core of the fuel to reach extreme density and temperature. When the central temperature is high enough, DT fusion reactions occur. The energy released from these reactions further heats the compressed fuel, and fusion burn propagates outward through the colder regions of the capsule much more rapidly than the inertially confined capsule can expand. The resulting fusion reactions yield many times more energy than was absorbed from the driver beams.

Hunt, J.T.; Manes, K.R.; Murray, J.R.; Renard, P.A.; Sawicki, R.; Trenholme, J.B.; Williams, W.

1994-06-01T23:59:59.000Z

37

Opportunities and Threats of Green Building Design for ABC Engineers, Kansas City  

E-Print Network (OSTI)

,000 organizations that are working to build environmentally responsible, profitable, and healthy buildings. Members includes building owners and end-users, real estate developers, facility managers, architects, designers, engineers, general contractors...

Wikoff, Brandon D.

2008-12-19T23:59:59.000Z

38

Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary  

SciTech Connect

A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

2007-01-01T23:59:59.000Z

39

Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage  

SciTech Connect

Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

2011-10-05T23:59:59.000Z

40

A Report to the Secretary of Energy, Beyond Design Basis Event Pilot Evaluations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Beyond Design Basis Event Beyond Design Basis Event Pilot Evaluations Results and Recommendations for Improvements to Enhance Nuclear Safety at Department of Energy Nuclear Facilities Office of Nuclear Safety Office of Health, Safety and Security U.S. Department of Energy January 2013 Beyond Design Basis Event Pilot Evaluations TABLE OF CONTENTS Executive Summary i Acronyms iv 1.0 Introduction and Purpose 1 2.0 Background 2 3.0 Pilot Evaluations of Safety Analysis, NPH, and Emergency Management Guidance 2 4.0 Insights Gained from NRC and the Nuclear Community 11 5.0 Summary of Results and Recommendations 12 6.0 Conclusions 14 Appendix A - Pilot Evaluation Team Members 15 Beyond Design Basis Event Pilot Evaluations * i

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DOE M&O Contractor Perspectives on Beyond Design Basis Event Analysis and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE M&O Contractor Perspectives on Beyond Design Basis Event DOE M&O Contractor Perspectives on Beyond Design Basis Event Analysis and Response DOE M&O Contractor Perspectives on Beyond Design Basis Event Analysis and Response September 20, 2013 Presenter: Ron Crone, Director Research Reactors Division UT-Battelle, LLC Oak Ridge National Laboratory HFIR serves a broad range of science and technology communities and will need to operate to at least 2040 until replacement capabiltiies are available DOE M&O Contractor Perspectives on Beyond Design Basis Event Analysis and Response More Documents & Publications Independent Oversight Review, Oak Ridge National Laboratory - January 2013 Preliminary Notice of Violation, Lockheed Martin Energy Research Corporation - EA-98-13 EIS-0373: Draft Environmental Impact Statement, Summary

42

Identification of Genomic Signatures for the Design of Assays for the Detection and Monitoring of Anthrax Threats  

E-Print Network (OSTI)

of Anthrax Threats S. Draghici, P. Khatri, Y. Liu, K.J. Chase, E.A. Bode, D.A. Kulesh, L.P. Wasieloski, D OF ASSAYS FOR THE DETECTION AND MONITORING OF ANTHRAX THREATS SORIN DRAGHICI1, , PURVESH KHATRI1

43

Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01  

Energy.gov (U.S. Department of Energy (DOE))

Protocol for Enhanced Evaluations of Beyond Design Basis Events Supporting Implementation of Operating Experience Report 2013-01

44

Object Model as the Basis of the Information Technology of Designing Complex Socio-Economic Systems  

Science Journals Connector (OSTI)

A method of modeling complex socio-economic systems based on the object-oriented approach is considered. The method is the basis for the information technology of design and allows creating a hierarchical model of a complex system. The results of applying ... Keywords: functional relations, hierarchy of components, object-oriented model, technology of design

M. P. Silich

2005-09-01T23:59:59.000Z

45

The Mixed Waste Management Facility. Design basis integrated operations plan (Title I design)  

SciTech Connect

The Mixed Waste Management Facility (MWMF) will be a fully integrated, pilotscale facility for the demonstration of low-level, organic-matrix mixed waste treatment technologies. It will provide the bridge from bench-scale demonstrated technologies to the deployment and operation of full-scale treatment facilities. The MWMF is a key element in reducing the risk in deployment of effective and environmentally acceptable treatment processes for organic mixed-waste streams. The MWMF will provide the engineering test data, formal evaluation, and operating experience that will be required for these demonstration systems to become accepted by EPA and deployable in waste treatment facilities. The deployment will also demonstrate how to approach the permitting process with the regulatory agencies and how to operate and maintain the processes in a safe manner. This document describes, at a high level, how the facility will be designed and operated to achieve this mission. It frequently refers the reader to additional documentation that provides more detail in specific areas. Effective evaluation of a technology consists of a variety of informal and formal demonstrations involving individual technology systems or subsystems, integrated technology system combinations, or complete integrated treatment trains. Informal demonstrations will typically be used to gather general operating information and to establish a basis for development of formal demonstration plans. Formal demonstrations consist of a specific series of tests that are used to rigorously demonstrate the operation or performance of a specific system configuration.

NONE

1994-12-01T23:59:59.000Z

46

Safety Bulletin 2011-01, Events Beyond Design Safety Basis Analysis |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bulletin 2011-01, Events Beyond Design Safety Basis Analysis Bulletin 2011-01, Events Beyond Design Safety Basis Analysis Safety Bulletin 2011-01, Events Beyond Design Safety Basis Analysis PURPOSE This Safety Alert provides information on a safety concern related to the identification and mitigation of events that may fall outside those analyzed in the documented safety analysis. BACKGROUND On March 11 , 2011 , the Fukushima Daiichi nuclear power station in Japan was damaged by a magnitude 9.0 earthquake and the subsequent tsunami. While there is still a lot to be learned from the accident · about the adequacy of design specifications and the equipment failure modes, reports from the Nuclear Regulatory Commission (NRC) have identified some key aspects of the operational emergency at the Fukushima Daiichi nuclear power station.

47

The power of simplification: Operator interface with the AP1000{sup R} during design-basis and beyond design-basis events  

SciTech Connect

The AP1000{sup R} plant is an 1100-MWe pressurized water reactor with passive safety features and extensive plant simplifications that enhance construction, operation, maintenance, safety and cost. The passive safety features are designed to function without safety-grade support systems such as component cooling water, service water, compressed air or HVAC. The AP1000 passive safety features achieve and maintain safe shutdown in case of a design-basis accident for 72 hours without need for operator action, meeting the expectations provided in the European Utility Requirements and the Utility Requirement Document for passive plants. Limited operator actions may be required to maintain safe conditions in the spent fuel pool (SFP) via passive means. This safety approach therefore minimizes the reliance on operator action for accident mitigation, and this paper examines the operator interaction with the Human-System Interface (HSI) as the severity of an accident increases from an anticipated transient to a design basis accident and finally, to a beyond-design-basis event. The AP1000 Control Room design provides an extremely effective environment for addressing the first 72 hours of design-basis events and transients, providing ease of information dissemination and minimal reliance upon operator actions. Symptom-based procedures including Emergency Operating Procedures (EOPs), Abnormal Operating Procedures (AOPs) and Alarm Response Procedures (ARPs) are used to mitigate design basis transients and accidents. Use of the Computerized Procedure System (CPS) aids the operators during mitigation of the event. The CPS provides cues and direction to the operators as the event progresses. If the event becomes progressively worse or lasts longer than 72 hours, and depending upon the nature of failures that may have occurred, minimal operator actions may be required outside of the control room in areas that have been designed to be accessible using components that have been designed to be reliable in these conditions. The primary goal of any such actions is to maintain or refill the passive inventory available to cool the core, containment and spent fuel pool in the safety-related and seismically qualified Passive Containment Cooling Water Storage Tank (PCCWST). The seismically-qualified, ground-mounted Passive Containment Cooling Ancillary Water Storage Tank (PCCAWST) is also available for this function as appropriate. The primary effect of these actions would be to increase the coping time for the AP1000 during design basis events, as well as events such as those described above, from 72 hours without operator intervention to 7 days with minimal operator actions. These Operator actions necessary to protect the health and safety of the public are addressed in the Post-72 Hour procedures, as well as some EOPs, AOPs, ARPs and the Severe Accident Management Guidelines (SAMGs). Should the event continue to become more severe and plant conditions degrade further with indications of inadequate core cooling, the SAMGs provide guidance for strategies to address these hypothetical severe accident conditions. The AP1000 SAMG diagnoses and actions are prioritized to first utilize the AP1000 features that are expected to retain a damaged core inside the reactor vessel. Only one strategy is undertaken at any time. This strategy will be followed and its effectiveness evaluated before other strategies are undertaken. This is a key feature of both the symptom-oriented AP1000 EOPs and the AP1000 SAMGs which maximizes the probability of retaining a damaged core inside the reactor vessel and containment while minimizing the chances for confusion and human errors during implementation. The AP1000 SAMGs are simple and straight-forward and have been developed with considerable input from human factors and plant operations experts. Most importantly, and different from severe accident management strategies for other plants, the AP1000 SAMGs do not require diagnosis of the location of the core (i.e., whether reactor vessel failure has occurred). This is a fun

Williams, M. G.; Mouser, M. R.; Simon, J. B. [Westinghouse Electric Company, 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

2012-07-01T23:59:59.000Z

48

Operating Experience Level 1 - Improving Department of Energy Capabilities for Mitigating Beyond Design Basis Events  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OE-1: 2013-01 April 2013 OE-1: 2013-01 April 2013 Improving Department of Energy Capabilities for Mitigating Beyond Design Basis Events PURPOSE: The purpose of this Operating Experience (OE) document is to (1) provide results from U.S. Department of Energy (DOE), including the National Nuclear Security Administration , initiatives related to beyond design basis events (BDBEs) , and (2) provide direction for enhancing capabilities for mitigating BDBEs at DOE sites . BACKGROUND: After the March 2011 Fukushima Daiich i nuclear plant accident in Japan , DOE embarked upon several initiatives to investigate the safety posture of its nuclear facilities relative to BDBEs. These initiatives included issuing Safety Bulletin 2011-01 , Events Beyond Design Safety Basis Analysis, conducting pilots to refine possible

49

Report to the Secretary of Energy on Beyond Design Basis Event Pilot  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities, January 2013 Facilities, January 2013 Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities, January 2013 In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its nuclear facilities and identify situations where near-term improvements could be made. These actions and recommendations were addressed in an August 2011 report to the Secretary of Energy, Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events. BDBE_Report_final.pdf More Documents & Publications Report to the Secretary of Energy on Beyond Design Basis Event Pilot

50

Report to the Secretary of Energy on Beyond Design Basis Event Pilot  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities, January 2013 Facilities, January 2013 Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities, January 2013 In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its nuclear facilities and identify situations where near-term improvements could be made. These actions and recommendations were addressed in an August 2011 report to the Secretary of Energy, Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events. BDBE_Report_final.pdf More Documents & Publications Report to the Secretary of Energy on Beyond Design Basis Event Pilot

51

Categorizing threat : building and using a generic threat matrix.  

SciTech Connect

The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

2007-09-01T23:59:59.000Z

52

Conceptual design basis and temperature predictions in a simulated instrumented LMFBR blanket subassembly  

SciTech Connect

The purpose of this paper is to: (1) present the conceptual design basis for an unfueled simulated LMFBR blanket subassembly, and (2) compare the predicted steady-state coolant temperatures for this subassembly with the measured coolant temperatures. This subassembly was designated as XX10 and was irradiated in the Experimental Breeder Reactor-II (EBR-II) during reactor run 129 at essentially full power and flow conditions. Because in-core data on LMFBR subassemblies are scarce, it is hoped that these data will further verify computer-codes and reduce uncertainties in the thermal-hydraulic design and analysis of LMFBR subassemblies. 2 refs., 1 fig.

Betten, P.R.; Singer, R.M.; Lee, M.J.; Feldman, E.E.; Chang, L.K.; Mohr, D.; Planchon, H.P.

1985-01-01T23:59:59.000Z

53

Report to the Secretary of Energy on Beyond Design Basis Event Pilot  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities Facilities Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its nuclear facilities and identify situations where near-term improvements could be made. These actions and recommendations were addressed in an August 2011 report to the Secretary of Energy, Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events. Based on recommendations in the August 2011 report, DOE embarked on a project to develop and refine guidance that supports improvements in DOE's processes for analyzing and

54

Report to the Secretary of Energy on Beyond Design Basis Event Pilot  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Facilities Facilities Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its nuclear facilities and identify situations where near-term improvements could be made. These actions and recommendations were addressed in an August 2011 report to the Secretary of Energy, Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events. Based on recommendations in the August 2011 report, DOE embarked on a project to develop and refine guidance that supports improvements in DOE's processes for analyzing and

55

BOMB THREAT CALL PROCEDURES  

E-Print Network (OSTI)

THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

Guo, Ting

56

Research Article Signaling Threat  

E-Print Network (OSTI)

Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

Gross, James J.

57

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett Gareth...Specialist Group, takes a look at upcoming threats and countermeasures. Follow @bcsbooks...for the user's email account. This threat is not going to recede, so everyone should......

Gareth Niblett

2012-01-01T23:59:59.000Z

58

Vacuoles: a hollow threat?  

E-Print Network (OSTI)

2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda lesprit : Vacuoles: a hollow threat? Ces vacuoles acides

Yaksh, Tony L.

2010-01-01T23:59:59.000Z

59

Insider Threat Program  

Directives, Delegations, and Requirements

To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

2014-06-02T23:59:59.000Z

60

Decentralized Semantic Threat Graphs Simon N. Foley1  

E-Print Network (OSTI)

Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

Foley, Simon

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Review of Requirements and Capabilities For Analyzing and Responding to Beyond Design Basis Events  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Review of Requirements Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events Office of Nuclear Safety Office of Health, Safety and Security U.S. Department of Energy August 2011 2011 Safety Bulletin Report TABLE OF CONTENTS Acronyms i Executive Summary ii 1. Introduction 1 2. Report Overview 1 3. Overview of DOE Nuclear Facilities and Operations 2 4. Analysis of Safety Bulletin Submittals 2 5. Review of DOE and Commercial Nuclear Power Industry Requirements and 5 Guidance for BDBEs 6. Results from the Nuclear Safety Workshop 9 7. Summary of Insights and Opportunities for Improvement 10 8. Summary of Recommendations 12 9. Conclusions 14 Appendix A - DOE's Nuclear Safety Approach 15

62

Review of Requirements and Capabilities For Analyzing and Responding to Beyond Design Basis Events  

NLE Websites -- All DOE Office Websites (Extended Search)

to the to the Secretary of Energy Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events Office of Nuclear Safety Office of Health, Safety and Security U.S. Department of Energy August 2011 2011 Safety Bulletin Report TABLE OF CONTENTS Acronyms i Executive Summary ii 1. Introduction 1 2. Report Overview 1 3. Overview of DOE Nuclear Facilities and Operations 2 4. Analysis of Safety Bulletin Submittals 2 5. Review of DOE and Commercial Nuclear Power Industry Requirements and 5 Guidance for BDBEs 6. Results from the Nuclear Safety Workshop 9 7. Summary of Insights and Opportunities for Improvement 10 8. Summary of Recommendations 12 9. Conclusions 14

63

Application of the MELCOR code to design basis PWR large dry containment analysis.  

SciTech Connect

The MELCOR computer code has been developed by Sandia National Laboratories under USNRC sponsorship to provide capability for independently auditing analyses submitted by reactor manufactures and utilities. MELCOR is a fully integrated code (encompassing the reactor coolant system and the containment building) that models the progression of postulated accidents in light water reactor power plants. To assess the adequacy of containment thermal-hydraulic modeling incorporated in the MELCOR code for application to PWR large dry containments, several selected demonstration designs were analyzed. This report documents MELCOR code demonstration calculations performed for postulated design basis accident (DBA) analysis (LOCA and MSLB) inside containment, which are compared to other code results. The key processes when analyzing the containment loads inside PWR large dry containments are (1) expansion and transport of high mass/energy releases, (2) heat and mass transfer to structural passive heat sinks, and (3) containment pressure reduction due to engineered safety features. A code-to-code benchmarking for DBA events showed that MELCOR predictions of maximum containment loads were equivalent to similar predictions using a qualified containment code known as CONTAIN. This equivalency was found to apply for both single- and multi-cell containment models.

Phillips, Jesse; Notafrancesco, Allen (USNRC, Office of Nuclear Regulatory Research, Rockville, MD); Tills, Jack Lee (Jack Tills & Associates, Inc., Sandia Park, NM)

2009-05-01T23:59:59.000Z

64

Military Expenditure, Threats, and Growth  

E-Print Network (OSTI)

a country's external military threat; lgdp is the log ofMilitary Expenditure, Threats, and Growth * September 2003expenditure, external threats, corruption, and other

Aizenman, Joshua; Glick, Reuven

2003-01-01T23:59:59.000Z

65

BOMB THREAT CALL PROCEDURES  

E-Print Network (OSTI)

BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

Boyce, Richard L.

66

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett *Risk...into the future* to see what emerging threats we might have to contend with. doi...into the future* to see what emerging threats we might have to contend with. *Risk......

Gareth Niblett

2012-01-01T23:59:59.000Z

67

Five of the Threats  

Science Journals Connector (OSTI)

......research-article Information Security Five of the Threats Graeme Nash Today, social networking...Here are the top five social networking threats to which organisations may be exposed...probably infected themselves). Whilst the threat from this particular malware has now FIVE......

Graeme Nash

2013-01-01T23:59:59.000Z

68

Combating Future Threats  

Science Journals Connector (OSTI)

......research-article Future Combating Future Threats Andy Clark On 21 September BCS, The Chartered...leadership debate about future security threats. Andy Clark, Head of Forensics at Detica...and where are they? These are different threats. Smartphones are powerful, connected......

Andy Clark

2011-01-01T23:59:59.000Z

69

Open literature review of threats including sabotage and theft of fissile material transport in Japan.  

SciTech Connect

This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

2005-06-01T23:59:59.000Z

70

Source prestige and target reactions to threats  

Science Journals Connector (OSTI)

A 3 by 2 design was employed to study the effects of source capability and of punishment magnitude on the compliance of target individuals to contingent threats intermittently sent by a simulated source in...

Thomas V. Bonoma; Barry R. Schlenker; R. Bob Smith

1970-08-01T23:59:59.000Z

71

Using a 3D Needle Tissue Interaction Loading basis to optimize the design of an instrumented needle  

E-Print Network (OSTI)

Using a 3D Needle ­Tissue Interaction Loading basis to optimize the design of an instrumented-IMAG UMR5525, Grenoble, France Keywords: Needle deformation; Load distribution; Instrumented needle of the needle which does not follow the planned trajectory. Furthermore, the amount of irradiation during

Paris-Sud XI, Université de

72

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal to warn of the threat to minimize personal injuries or property damage. The caller may be the person

Fernandez, Eduardo

73

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS  

E-Print Network (OSTI)

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

Edinburgh, University of

74

Bomb threat There are two types of Bomb Threats  

E-Print Network (OSTI)

v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

Hickman, Mark

75

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal of the threat to minimize personal injuries or property damage. The caller may be the person placing the bomb

Fernandez, Eduardo

76

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat · The Hoax Caller and goals for making a bomb threat usually comes from one of two goals: · The Credible Caller: The caller or she wants to warn of the threat to minimize personal injuries or property damage. The caller may

Fernandez, Eduardo

77

Categorizing Threat Building and Using a Generic Threat Matrix | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general

78

MEMORANDUM FOR DISTRIBUTION - Report on Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events  

NLE Websites -- All DOE Office Websites (Extended Search)

September 16, 2011 September 16, 2011 MEMORANDUM FOR DISTRIBUTION FROM: SUBJECT: DANIEL B. PONEMA Report on Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events Following the March 2011 accident at the Fukushima Daiichi nuclear power plant, the Department of Energy (DOE) took several actions to review the safety of its nuclear facilities. These actions focused on learning how DOE can better prepare to manage potential beyond design basis events. A summary of these actions and the resulting insights, and recommended opportunities and actions to improve nuclear safety at DOE> are included in the attached report. I have directed the Office of Health, Safety and Security (HSS) to work with DOE's Nuclear Safety and Security Coordinating Council, and the Program and Field Offices of

79

MEMORANDUM FOR DISTRIBUTION - Report on Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 16, 2011 September 16, 2011 MEMORANDUM FOR DISTRIBUTION FROM: SUBJECT: DANIEL B. PONEMA Report on Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events Following the March 2011 accident at the Fukushima Daiichi nuclear power plant, the Department of Energy (DOE) took several actions to review the safety of its nuclear facilities. These actions focused on learning how DOE can better prepare to manage potential beyond design basis events. A summary of these actions and the resulting insights, and recommended opportunities and actions to improve nuclear safety at DOE> are included in the attached report. I have directed the Office of Health, Safety and Security (HSS) to work with DOE's Nuclear Safety and Security Coordinating Council, and the Program and Field Offices of

80

Review of the Savannah River Site Salt Waste Processing Facility Safety Basis and Design Development, August 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Savannah River Site Savannah River Site Salt Waste Processing Facility Safety Basis and Design Development May 2011 August 2013 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy Table of Contents 1.0 Purpose.................................................................................................................................................... 1 2.0 Background ............................................................................................................................................. 1 3.0 Scope and Methodology ......................................................................................................................... 2 4.0 Results .................................................................................................................................................... 3

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

COUNTERING MICROBIAL THREATS  

Science Journals Connector (OSTI)

COUNTERING MICROBIAL THREATS ... The highly contagious disease dubbed severe acute respiratory syndrome, first seen in Asia but now diagnosed in several other countries, underscores the report's key point: More must be done to improve the public health and medical communities' ability to prevent, detect, and control emerging and resurging health threats posed by wily microbes. ... Because we all live on the same global microbial real estate, "one nation's problem soon can become every nation's problem," warns Margaret A. Hamburg, cochair of the panel that produced the report, "Microbial Threats to Health: Emergence, Detection & Response." ...

LOIS EMBER

2003-03-24T23:59:59.000Z

82

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network (OSTI)

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

83

Physics basis for an axicell design for the end plugs of MFTF-B  

SciTech Connect

The primary motivation for conversion of MFTF-B to an axicell configuration lies in its engineering promise as a reactor geometry based on circular high-magnetic-field coils. In comparing this configuration to the previous A-cell geometry, we find a number of differences that might significantly affect the physics performance. The purpose of the present document is to examine those features and to assess their impact on the performance of the axicell, as compared to the A-cell configuration, for MFTF-B. In so doing, we address only those issues thought to be affected by the change in geometry and refer to the original report Physics Basis for MFTF-B, for discussion of those issues thought not to be affected. In Sec. 1, we summarize these physics issues. In Sec. 2, we describe operating scenarios in the new configuration. In the Appendices, we discuss those physics issues that require more detailed treatment.

Baldwin, D.E.; Logan, B.G. (eds.)

1982-04-21T23:59:59.000Z

84

Threat Insight Quarterly Wireless Technology  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

85

BIODIVERSITY Geographical linkages between threats  

E-Print Network (OSTI)

BIODIVERSITY RESEARCH Geographical linkages between threats and imperilment in freshwater fish and species declines can be the result of different threats or combinations of threats, such as habitat, deter- mining whether the effects of any specific threat is related to the level of imperilment

Kark, Salit

86

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

87

Insider Threat.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

Mitigating the Insider Threat Mitigating the Insider Threat (and Other Security Issues) Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory http://www.ne.anl.gov/capabilities/vat Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security devices, systems, & programs. Vulnerability Assessment Team (VAT) The greatest of faults, I should say, is to be conscious of none.

88

The basis for design of a DSP-based coincidence spectrometer  

E-Print Network (OSTI)

Coincidence technique and the coincidence measurement systems have been developed and applied for over 40 years. Most of popular coincidence measurement systems were based on analog electronics techniques such as time to amplitude conversion (TAC) or logic selecting coincidence unit. The above-mentioned systems are relatively cumbersome and complicated to use. With the strong growth of digital electronics techniques and computational science, the coincidence measurement systems will be constructed simpler but more efficient with the sake of application. This article presents the design principle and signal processing of a simple two-channel coincidence system by a new technique called Digital Signal Processing (DSP) using Field Programmable Gate Arrays (FPGA) devices at Nuclear Research Institute (NRI), Dalat.

Khang, Pham Dinh; Dien, Nguyen Nhi; Tuan, Pham Ngoc; Lanh, Dang; Hoa, Nguyen Duc; Son, Nguyen An

2013-01-01T23:59:59.000Z

89

The basis for design and manufacture of a dsp-based coincidence spectrometer  

E-Print Network (OSTI)

The coincidence technique and the coincidence spectroscopy have been developed and applied for over 40 years. Most of popular coincidence measurement systems were based on analog electronics techniques such as time to amplitude conversion (TAC) or logic selecting coincidence unit. The above-mentioned systems are relatively cumbersome and complicated to use. With the strong growth of digital electronics techniques and computational science, the coincidence measurement systems will be constructed simpler but more efficient with the sake of application. This article presents the design principle and signal processing of a simple two-channel coincidence system by a technique of Digital Signal Processing (DSP) using Field Programmable Gate Arrays (FPGA) devices at Nuclear Research Institute (NRI), Dalat.

Hai, N X; Dien, N N; Lanh, D; Huong, T T T; Khang, P D

2013-01-01T23:59:59.000Z

90

Early Site Permit Demonstration Program: Guidelines for determining design basis ground motions. Volume 2, Appendices  

SciTech Connect

This report develops and applies a methodology for estimating strong earthquake ground motion. The motivation was to develop a much needed tool for use in developing the seismic requirements for structural designs. An earthquake`s ground motion is a function of the earthquake`s magnitude, and the physical properties of the earth through which the seismic waves travel from the earthquake fault to the site of interest. The emphasis of this study is on ground motion estimation in Eastern North America (east of the Rocky Mountains), with particular emphasis on the Eastern United States and southeastern Canada. Eastern North America is a stable continental region, having sparse earthquake activity with rare occurrences of large earthquakes. While large earthquakes are of interest for assessing seismic hazard, little data exists from the region to empirically quantify their effects. The focus of the report is on the attributes of ground motion in Eastern North America that are of interest for the design of facilities such as nuclear power plants. This document, Volume II, contains Appendices 2, 3, 5, 6, and 7 covering the following topics: Eastern North American Empirical Ground Motion Data; Examination of Variance of Seismographic Network Data; Soil Amplification and Vertical-to-Horizontal Ratios from Analysis of Strong Motion Data From Active Tectonic Regions; Revision and Calibration of Ou and Herrmann Method; Generalized Ray Procedure for Modeling Ground Motion Attenuation; Crustal Models for Velocity Regionalization; Depth Distribution Models; Development of Generic Site Effects Model; Validation and Comparison of One-Dimensional Site Response Methodologies; Plots of Amplification Factors; Assessment of Coupling Between Vertical & Horizontal Motions in Nonlinear Site Response Analysis; and Modeling of Dynamic Soil Properties.

Not Available

1993-03-18T23:59:59.000Z

91

Long-term passive CANDU containment response after a design-basis accident  

SciTech Connect

A {open_quotes}passive{close_quotes} CANDU{reg_sign} containment system, currently being developed, is aimed at limiting the consequences of a postulated accident, by ensuring the structural integrity of the containment building and limiting fission-product release to within siting dose limits, without operator action or reliance on ac power for up to 3 d. All main functions of the containment system, i.e. energy removal, hydrogen mitigation, and fission-product retention, are to be accomplished passively. The passive CANDU containment relies on the passive emergency water system (PEWS) for energy removal after an accident and on passive autocatalytic recombiners (PAR) for hydrogen removal. The key feature of this concept, is a recirculating, buoyancy-driven flow through the recombiners and the tube banks of the PEWS. This paper presents preliminary design calculations for the PEWS tank and tube banks and a simulation of the long-term passive containment response, based on the current CANDU-6 containment, to a large loss-of-coolant/loss-of- emergency coolant injection (LOCA/LOECI) using the GOTHIC code. It is shown that a 1500-M{sup 3} PEWS tank, connected to tube banks with a total surface area of 1800 m{sup 2}, can limit the second pressure peak to about 300 kPa(a) if a recirculating flow is established in the containment building. The PEWS tank water is boiling in the long term, and the peak containment temperature is 114{degrees}C. 6 refs., 4 figs.

Krause, M.; Mathew, P.M.; Spinks, N.J.; Chin, Y.S. [Atomic Energy of Canada Ltd., Pinawa (Canada)

1997-12-01T23:59:59.000Z

92

BomB ThreaT Assume threat is real  

E-Print Network (OSTI)

Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

Alpay, S. Pamir

93

Threat Analysis Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be...

94

Threat Insight Quarterly Vulnerability Management  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

95

Threat Insight Quarterly Regulatory Compliance  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

96

Threat Insight Quarterly Browser Exploitation  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

97

Testing Basis of Design  

NLE Websites -- All DOE Office Websites (Extended Search)

phases of the project. In next phase (Phase II) the JIP completed the project's first offshore drilling expedition in 2005 (Leg I) consisting of drilling, logging, and coring...

98

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats  

Science Journals Connector (OSTI)

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats ...

. U S D A

1954-01-01T23:59:59.000Z

99

Threat Characterization: Trajectory Dynamics  

E-Print Network (OSTI)

Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

2006-08-15T23:59:59.000Z

100

Risk Management for Trrorist Threats  

Science Journals Connector (OSTI)

Risk management for Homeland and National Security involves the calculus of funding preventative systems andd procedures based upon potential threat likelihood and consequences. ...

Zimet, Elihu

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

102

Analysis of main steam isolation valve leakage in design basis accidents using MELCOR 1.8.6 and RADTRAD.  

SciTech Connect

Analyses were performed using MELCOR and RADTRAD to investigate main steam isolation valve (MSIV) leakage behavior under design basis accident (DBA) loss-of-coolant (LOCA) conditions that are presumed to have led to a significant core melt accident. Dose to the control room, site boundary and LPZ are examined using both approaches described in current regulatory guidelines as well as analyses based on best estimate source term and system response. At issue is the current practice of using containment airborne aerosol concentrations as a surrogate for the in-vessel aerosol concentration that exists in the near vicinity of the MSIVs. This study finds current practice using the AST-based containment aerosol concentrations for assessing MSIV leakage is non-conservative and conceptually in error. A methodology is proposed that scales the containment aerosol concentration to the expected vessel concentration in order to preserve the simplified use of the AST in assessing containment performance under assumed DBA conditions. This correction is required during the first two hours of the accident while the gap and early in-vessel source terms are present. It is general practice to assume that at {approx}2hrs, recovery actions to reflood the core will have been successful and that further core damage can be avoided. The analyses performed in this study determine that, after two hours, assuming vessel reflooding has taken place, the containment aerosol concentration can then conservatively be used as the effective source to the leaking MSIV's. Recommendations are provided concerning typical aerosol removal coefficients that can be used in the RADTRAD code to predict source attenuation in the steam lines, and on robust methods of predicting MSIV leakage flows based on measured MSIV leakage performance.

Salay, Michael (United States Nuclear Regulatory Commission, Washington, D.C.); Kalinich, Donald A.; Gauntt, Randall O.; Radel, Tracy E.

2008-10-01T23:59:59.000Z

103

Bio-threat microparticle simulants  

SciTech Connect

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald

2014-09-16T23:59:59.000Z

104

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Reduction Initiative An overview of the Global Threat Reduction Initiative, U.S.-Origin Nuclear Fuel Removals. Global Threat Reduction Initiative More Documents &...

105

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Initiative Global Threat Reduction Initiative The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011. Global Threat Reduction Initiative More Documents &...

106

Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex, May 2013  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal of the Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex May 2011 May 2013 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U. S. Department of Energy Table of Contents 1.0 Purpose ................................................................................................................................................. 1 2.0 Background........................................................................................................................................... 1 3.0 Scope..................................................................................................................................................... 2

107

Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex, May 2013  

NLE Websites -- All DOE Office Websites (Extended Search)

Appraisal of the Appraisal of the Uranium Processing Facility Safety Basis Preliminary Safety Design Report Process at the Y-12 National Security Complex May 2011 May 2013 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U. S. Department of Energy Table of Contents 1.0 Purpose ................................................................................................................................................. 1 2.0 Background........................................................................................................................................... 1 3.0 Scope..................................................................................................................................................... 2

108

Report to the Secretary of Energy on Beyond Design Basis Event Pilot Evaluations, Results and Recommendations for Improvements to Enhance Nuclear Safety at DOE Nuclear Facilities, January 2013  

Energy.gov (U.S. Department of Energy (DOE))

In the six months after the March 2011 Fukushima Daiichi nuclear power plant accident in Japan, the U.S. Department of Energy (DOE) took several actions to review the safety of its nuclear facilities and identify situations where near-term improvements could be made. These actions and recommendations were addressed in an August 2011 report to the Secretary of Energy, Review of Requirements and Capabilities for Analyzing and Responding to Beyond Design Basis Events.

109

IBM Software Data Sheet IBM adaptive threat  

E-Print Network (OSTI)

IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

110

Promises and Threats with Conditionals and Disjunctions  

E-Print Network (OSTI)

Promises and Threats with Conditionals and Disjunctions Robert van Rooij and Michael Franke Version promises and threats. But with a disjunction "You do . . . , or I'll do . . . " we can only make threats is trying to influence the behavior of the hearer by conditional promises and threats: whereas

van Rooij, Robert

111

Dependency models as a basis for analyzing software product platform modularity : a case study in strategic software design rationalization  

E-Print Network (OSTI)

It is broadly accepted among software managers and architects that maintaining the integrity of software designs is important for the long-term health and viability of software product platforms. The use of modular, ...

LaMantia, Matthew J. (Matthew John)

2006-01-01T23:59:59.000Z

112

Identifying Chemicals That Are Planetary Boundary Threats  

Science Journals Connector (OSTI)

Identifying Chemicals That Are Planetary Boundary Threats ... Our point of departure to develop profiles for chemicals that are potential planetary boundary threats is to identify scenarios in which a chemical could fulfill each of the three conditions for being a planetary boundary threat. ... Note that chemicals named as examples do not necessarily represent planetary boundary threats since at least one scenario from each of the three conditions must be fulfilled for a chemical to pose a planetary boundary threat. ...

Matthew MacLeod; Magnus Breitholtz; Ian T. Cousins; Cynthia A. de Wit; Linn M. Persson; Christina Rudn; Michael S. McLachlan

2014-09-02T23:59:59.000Z

113

Livestock Basis  

E-Print Network (OSTI)

Knowledge of historical basis patterns can be useful when estimating expected sale or purchase prices at the conclusion of a futures or options hedge, when evaluating a current cash market quote, and when forecasting cash prices. This publication...

Mintert, James R.; Davis, Ernest E.; Dhuyvetter, Kevin C.; Bevers, Stan

1999-06-23T23:59:59.000Z

114

Chinese Workers: Under Threat or a Threat to American Workers?  

E-Print Network (OSTI)

. At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

Harper Ho, Virginia E.; Zhang, Lu

2010-07-01T23:59:59.000Z

115

Design Security and Cyber-Physical Threats  

Science Journals Connector (OSTI)

The trustworthiness of reconfigurable hardware, such as FPGAs is defined by the mechanisms protecting the configuration data. The field programmability of an FPGA is a distinct feature enabling various possibi...

Thomas Feller

2014-01-01T23:59:59.000Z

116

Threats from space: 20 years of progress  

E-Print Network (OSTI)

It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

Remo, J L

2014-01-01T23:59:59.000Z

117

The CSUF Center for Entrepreneurship and CSUF Center for Family Business present: "Patent Trolls and Other IP-Related Threats  

E-Print Network (OSTI)

and Other IP-Related Threats: How to Protect Your Business from a New Kind of Predator" Mihaylo College trolls, with threats of lawsuits and litigation. At this seminar, panelists Roger N. Behle (IP litigator Other intellectual property threats Current and pending legislation designed to address patent trolling

de Lijser, Peter

118

Probabilistic risk assessment for salt repository conceptual design of subsurface facilities: A techical basis for Q-list determination  

SciTech Connect

Subpart G ''Quality Assurance'' of 10 CFR Part 60 requires that the US Department of Energy (DOE) apply a quality assurance program to ''all systems, structures, and components important to safety'' and to ''design and characterization of barriers important to waste isolation.'' In April 1986, DOE's Office of Geologic Repositories (OGR) issued general guidance for formulating a list of such systems, structures, and components---the Q-list. This guidance called for the use of probabilistic risk assessment (PRA) techniques to identify Q-list items. In this report, PRA techniques are applied to the underground facilities and systems described in the conceptual design report for the Salt Repository Project (SRP) in Deaf Smith County, Texas. Based on probability and dose consequence calculations, no specific items were identified for the Q-list. However, evaluation of the analyses indicated that two functions are important in precluding off-site releases of radioactivity: disposal container integrity; and isolation of the underground facility by the heating, ventilation, and air conditioning (HVAC) systems. Items related to these functions are recommended for further evaluation as the repository design progresses. 13 refs., 20 figs.

Chen, C.P.; Mayberry, J.J.; Shepherd, J.; Koza, H.; Rahmani, H.; Sinsky, J.

1987-12-01T23:59:59.000Z

119

Global Threat Reduction Initiative | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

120

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Safety Basis Report  

SciTech Connect

As part of the internal Integrated Safety Management Assessment verification process, it was determined that there was a lack of documentation that summarizes the safety basis of the current Yucca Mountain Project (YMP) site characterization activities. It was noted that a safety basis would make it possible to establish a technically justifiable graded approach to the implementation of the requirements identified in the Standards/Requirements Identification Document. The Standards/Requirements Identification Documents commit a facility to compliance with specific requirements and, together with the hazard baseline documentation, provide a technical basis for ensuring that the public and workers are protected. This Safety Basis Report has been developed to establish and document the safety basis of the current site characterization activities, establish and document the hazard baseline, and provide the technical basis for identifying structures, systems, and components (SSCs) that perform functions necessary to protect the public, the worker, and the environment from hazards unique to the YMP site characterization activities. This technical basis for identifying SSCs serves as a grading process for the implementation of programs such as Conduct of Operations (DOE Order 5480.19) and the Suspect/Counterfeit Items Program. In addition, this report provides a consolidated summary of the hazards analyses processes developed to support the design, construction, and operation of the YMP site characterization facilities and, therefore, provides a tool for evaluating the safety impacts of changes to the design and operation of the YMP site characterization activities.

R.J. Garrett

2002-01-14T23:59:59.000Z

122

Electronic publishing: strengths, weaknesses and threats  

Science Journals Connector (OSTI)

...April 1998 news News Electronic publishing: strengths, weaknesses and threats Derek McNally Treasurer of the RAS 2.7 April 1998 Vol 39 NEWS Both Monthly...Treasurer of the RAS. Electronic publishing: strengths, weaknesses and threats...

Derek McNally

1998-04-01T23:59:59.000Z

123

Vetting Threats To Safe Drug Supplies  

Science Journals Connector (OSTI)

Vetting Threats To Safe Drug Supplies ... Representatives from government, drug companies, and national and international law enforcement agencies struggled to characterize what all agree is a large, growing, and frustratingly nebulous threat to public health and safety. ...

RICK MULLIN

2012-04-01T23:59:59.000Z

124

340 waste handling facility interim safety basis  

SciTech Connect

This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

VAIL, T.S.

1999-04-01T23:59:59.000Z

125

340 Waste handling facility interim safety basis  

SciTech Connect

This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

Stordeur, R.T.

1996-10-04T23:59:59.000Z

126

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Radiological Threat Task Force Established | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

127

Physical Degradation of Soils, Risks and Threats  

Science Journals Connector (OSTI)

Physical soil degradation...is one of the eight main risks and threats defined by the European Thematic Strategy for...

Winfried E. H. Blum

2014-08-01T23:59:59.000Z

128

nuclear threat science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

threat science | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

129

Responding to WMD Terrorism Threats: The Role of Insurance Markets  

E-Print Network (OSTI)

the Biological Weapons and Bioterrorism Threat SSI http://Responding to WMD Terrorism Threats: The Role of InsuranceNeed for Comprehensive Threat and Risk Assessments of

Jaffee, Dwight M.; Russell, Thomas

2007-01-01T23:59:59.000Z

130

A Risk Management Approach to the 'Insider Threat'  

E-Print Network (OSTI)

Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

2010-01-01T23:59:59.000Z

131

BOMB THREAT CHECKLIST QUESTIONS TO ASK  

E-Print Network (OSTI)

BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

Cui, Yan

132

REVIEW/SYNTHSE Threat display in birds  

E-Print Network (OSTI)

REVIEW/SYNTH?SE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

Hurd, Peter L.

133

Unauthorized Collaboration on Facebook: Threats and Responses  

E-Print Network (OSTI)

Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered a threat to academic integrity that might be flying under the radar of most instructors. This resource can help you understand and respond to this threat, while providing positive forums for student interaction

McQuade, D. Tyler

134

Survey on Security Threats and Protection Mechanisms  

E-Print Network (OSTI)

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

135

Developmental Changes in Responsivity to Threat are  

E-Print Network (OSTI)

Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

Barr, Gordon A.

136

Neural Mechanisms Underlying Selective Attention to Threat  

E-Print Network (OSTI)

Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

Bishop, Sonia

137

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors  

E-Print Network (OSTI)

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

Mather, Mara

138

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act  

E-Print Network (OSTI)

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on this card. BOMB THREAT CALL PROCEDURE If a bomb threat is received by phone: Remain calm. Keep the caller on the line for as long

Slatton, Clint

139

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection  

E-Print Network (OSTI)

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

Sarinopoulos, Issidoros

140

Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space  

E-Print Network (OSTI)

1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

Stanford University

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS  

E-Print Network (OSTI)

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

Paris-Sud XI, Université de

142

Sensor-guided threat countermeasure system  

DOE Patents (OSTI)

A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

2012-12-25T23:59:59.000Z

143

Countering the Nuclear Terrorist Threat  

SciTech Connect

The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

Vantine, H C

2002-10-04T23:59:59.000Z

144

Autonomous Realtime Threat-Hunting Robot (ARTHR  

SciTech Connect

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2008-05-29T23:59:59.000Z

145

Autonomous Realtime Threat-Hunting Robot (ARTHR  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2009-09-01T23:59:59.000Z

146

CHEMICAL TERRORISM: THREATS TO WATER SUPPLIES  

Science Journals Connector (OSTI)

Although for practical reasons, terrorist attacks on water systems are considered less likely than on other targets, threats to drinking water cannot be ignored. A...

ALFRED BERNARD; CLAIRE DE BURBURE

2006-01-01T23:59:59.000Z

147

Addressing the cybersecurity Malicious Insider threat.  

E-Print Network (OSTI)

?? Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's (more)

Schluderberg, Larry E.

2015-01-01T23:59:59.000Z

148

The Nature of the Bioterrorism Threat  

SciTech Connect

This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

Regens, J. L.

2003-02-25T23:59:59.000Z

149

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network (OSTI)

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

150

The Law of Duress and the Economics of Credible Threats  

E-Print Network (OSTI)

seller has a credible threat, it is in the buyers interestand the more credible is the threat to breach it. C.existence of a credible threat, may be difficult to verify.

Bar-Gill, Oren; Ben-Shahar, Omri

2003-01-01T23:59:59.000Z

151

An Intelligent Threat Prevention Framework with Heterogeneous Information  

E-Print Network (OSTI)

An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

Liu, Weiru

152

Now or Later?--Endogenous Timing of Threats  

Science Journals Connector (OSTI)

Whereas early threats are chosen before bargaining, late threats are determined after bargaining ended in conflict. Instead of exogenously imposing the timing of threats, these are derived endogenously as in indi...

Siegfried K. Berninghaus; Werner Guth

2003-11-01T23:59:59.000Z

153

PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY  

E-Print Network (OSTI)

Page 1 PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY Policy, and prohibits the use of University Electronic Resources for threats, harassment, and pornography. Reason threats, engaging in harassing behavior, and viewing, downloading, or communicating pornography. Table

Shahriar, Selim

154

Manager, International Chemical Threat Reduction Department, Sandia  

NLE Websites -- All DOE Office Websites (Extended Search)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

155

Manager, International Chemical Threat Reduction Department, Sandia  

National Nuclear Security Administration (NNSA)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

156

Insider threat to secure facilities: data analysis  

SciTech Connect

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

157

Death Threats and Violence at Schools and Colleges  

Science Journals Connector (OSTI)

This chapter examines the nature of death threats and other violence against schools and universities. Death threats and violence against schools and universities reflect...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

158

Comprehensive Vulnerability and Threat Analysis | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Vulnerability and Threat Analysis Our world is characterized by ever-changing threats to critical facilities, national assets and international interests. Understanding...

159

Seeking out silent threats to simulation integrity | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Seeking out silent threats to simulation integrity Seeking out silent threats to simulation integrity Controlling the impact of soft errors on optimization algorithm results NULL A...

160

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

162

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2010-01-08T23:59:59.000Z

163

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

SciTech Connect

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2008-05-29T23:59:59.000Z

164

Non-Military Threats to the Alliance  

Science Journals Connector (OSTI)

I have been given the opportunity to say a few words on what could become a dialogue between the EU and the U.S. concerning the rather difficult questions of non-military threats, also called global or transnatio...

Eric Danon

2000-01-01T23:59:59.000Z

165

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

166

Survey of Threats and Assaults by Patients on Psychiatry Residents  

Science Journals Connector (OSTI)

The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents,...

Yael Dvir M.D.; Emiko Moniwa M.D.; Holly Crisp-Han M.D.

2012-01-01T23:59:59.000Z

167

Invited Paper New Frontiers of Network Security: The Threat Within  

E-Print Network (OSTI)

Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

Sanyal, Sugata

168

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007  

E-Print Network (OSTI)

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

Aycock, John

169

An Approach to Security Policy Configuration Using Semantic Threat Graphs  

E-Print Network (OSTI)

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

Foley, Simon

170

A threat-based definition of IA and IA-enabled products.  

SciTech Connect

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-09-01T23:59:59.000Z

171

A threat-based definition of IA- and IA-enabled products.  

SciTech Connect

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-07-01T23:59:59.000Z

172

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory  

E-Print Network (OSTI)

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

Mather, Mara

173

A margin-based approach to vehicle threat assessment in a homotopy framework for semi-autonomous highway navigation  

E-Print Network (OSTI)

This thesis describes the design of an unified framework for threat assessment and the shared control between a human driver and the onboard controller, based on the notion of fields of safe travel. It allows to perform ...

Constantin, Alexandre, S.M. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

174

Left-Wing Extremism: The Current Threat  

SciTech Connect

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

175

Technical basis for performance goals, design requirements, and material recommendations for the NNWSI [Nevada Nuclear Waste Storage Investigations] Repository Sealing Program  

SciTech Connect

The objectives are to develop performance goals, to assess the need for seals, to define design requirements, and to recommend potential sealing materials for the sealing system. Performance goals are the allowable amounts of water that can enter the waste disposal areas directly from the rock mass above the repository and indirectly from shafts and ramps connecting to the underground facility. These goals are developed using a numerical model that calculates radionuclide releases. To determine the need for sealing, estimates of water flow into shafts, ramps, and the underground facility under anticipated conditions are developed and are compared with the performance goals. It is concluded that limited sealing measures, such as emplacement of shaft fill, are sufficient to properly isolate the radioactive waste in the repository. A broad range of sealing design options and associated hydrologic design requirements are proposed to provide a greater degree of assurance that the hydrologic performance goals can be met even if unanticipated hydrologic flows enter the waste disposal areas. The hydrologic design requirements are specific, hydraulic conductivity values selected for specific, seal design options to achieve the performance goals. Using these hydrologic design requirements and additional design requirements, preferred materials are identified for continued design and laboratory analyses. In arriving at these preferred materials, results from previous laboratory testing are briefly discussed. 96 refs., 48 figs., 28 tabs.

Fernandez, J.A.; Kelsall, P.C.; Case, J.B.; Meyer, D.

1987-09-01T23:59:59.000Z

176

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network (OSTI)

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

177

Bomb threats hit Texas petrochemical plants  

Science Journals Connector (OSTI)

A recent rash of bomb threats has plagued petrochemical plants and refineries in the Houston area.No real bombs have been found. But plant managers are concerned that if law enforcement officials do not soon find those involved and discourage others, ...

ANN THAYER

1996-04-29T23:59:59.000Z

178

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

179

Introduction to Administrative Programs that Mitigate the Insider Threat  

SciTech Connect

This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

2012-09-01T23:59:59.000Z

180

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Environment-Driven Threats Elicitation for Web Applications  

Science Journals Connector (OSTI)

The popularity and complexity of web application present challenges to the security implementation for web engineering. Threat elicitation is an indispensable step for developers to identify the possible threats ...

Hui Guan; Weiru Chen; Lin Liu; Hongji Yang

2011-01-01T23:59:59.000Z

182

Classification of Threats Via a Multi-sensor Security Portal  

Science Journals Connector (OSTI)

Classification of threats has always been a major security decision ... walks through a security portal. To classify threat by combining data from multiple sensors like ... metal detectors. We wish to identify th...

Amar Singh; Lawrence Holder

2006-01-01T23:59:59.000Z

183

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats)  

Science Journals Connector (OSTI)

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) ... An overall goal of environmental metabolomics is to understand what is metabolomically normal or adaptive and what constitutes a threat to human health and the environment. ...

Marion G. Miller

2007-01-04T23:59:59.000Z

184

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

185

Securing Infrastructure from High Explosive Threats  

SciTech Connect

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

186

The same, only different: Threat management systems as homologues in the tree of life  

E-Print Network (OSTI)

T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

Holbrook, Colin; Fessler, Daniel M.T.

2015-01-01T23:59:59.000Z

187

Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions  

E-Print Network (OSTI)

and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

Kray, Laura J.; Shirako, Aiwa

2009-01-01T23:59:59.000Z

188

Rethinking the Threats to Scientific Balance in Contexts of Litigation and Regulation  

E-Print Network (OSTI)

Monograph Rethinking the Threats to Scienti?c Balance inc factors such as threats or dollars. Environmental Healthwatched for/resisted Threats; overt pressure to slant ?

Freudenburg, William R.

2008-01-01T23:59:59.000Z

189

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network (OSTI)

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

190

Confronting Ego Threats with Reappraisal versus Rumination  

E-Print Network (OSTI)

of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Brandon Schmeichel Committee Members, Eddie Harmon-Jones Jeffrey Ackerman Head of Department, Les Morey May 2009 Major Subject: Psychology iii ABSTRACT... Confronting Ego Threats with Reappraisal versus Rumination. (May 2009) Ryan Caskey, B.A., University of Arizona Chair of Advisory Committee: Dr. Brandon Schmeichel Two experiments compared the effects of two cognitive responses (i.e., rumination...

Caskey, Ryan

2010-01-16T23:59:59.000Z

191

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

192

Handsets Malware Threats and Facing Techniques  

E-Print Network (OSTI)

Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

Elfattah, Marwa M A; Sarhan, Ebada

2012-01-01T23:59:59.000Z

193

The multi-sensor nuclear threat detection Dorit S. Hochbaum  

E-Print Network (OSTI)

an efficient graph algorithm that solves the problem in polynomial time. Detecting nuclear threatsThe multi-sensor nuclear threat detection problem Dorit S. Hochbaum Abstract One way of reducing sources. We address here the problem of detecting nuclear threats by using multiple detectors mounted

Hochbaum, Dorit S.

194

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking  

E-Print Network (OSTI)

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

195

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1  

E-Print Network (OSTI)

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

Gupta, Kalyan Moy

196

Insider Threat Detection using Stream Mining and Graph Mining  

E-Print Network (OSTI)

Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

Hamlen, Kevin W.

197

Mitigating the Risk of Insider Threats When Sharing  

E-Print Network (OSTI)

Mitigating the Risk of Insider Threats When Sharing Credentials by Muntaha NourEddin Qasem Alawneh requirement. Achieving secure content sharing requires a deep analy- sis and understanding of security threats affecting such a fundamental requirement. We study and analyze one of the major threats which affect secure

Sheldon, Nathan D.

198

European Commission DG ENV Soil biodiversity: functions, threats and  

E-Print Network (OSTI)

European Commission DG ENV Soil biodiversity: functions, threats and tools for policy makers.turbe@biois.com In association with #12;2 European Commission - DG ENV Soil biodiversity: functions, threats and tools for policy Putten, Eric Labouze, and Shailendra Mudgal. Soil biodiversity: functions, threats and tools for policy

Paris-Sud XI, Université de

199

Rapid evolutionary dynamics and disease threats to biodiversity  

E-Print Network (OSTI)

Rapid evolutionary dynamics and disease threats to biodiversity Sonia Altizer1 , Drew Harvell2 should enable hosts to respond better to future disease threats. Infectious diseases are recognized populations, or have been implicated as threats to already declining species [4­6]. Although infectious

200

Maritime Threat Detection using Plan Recognition Bryan Auslander1  

E-Print Network (OSTI)

Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

Gupta, Kalyan Moy

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE  

E-Print Network (OSTI)

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

Slatton, Clint

202

FACTS about threat Possible INTERVENTIONS Strong domain identification  

E-Print Network (OSTI)

FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

Chisholm, Rex L.

203

Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations  

E-Print Network (OSTI)

1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

Stanford University

204

Predictors of Threat and Error Management: Identification of Core  

E-Print Network (OSTI)

Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

205

Not All Threats are Created Equal: How Implicitness and Timing Affect the Effectiveness of Threats in Negotiations  

Science Journals Connector (OSTI)

The effectiveness of threats in negotiations was examined by exploring two ... implicitness, or the extent to which the threat mentions what action the perpetrator would take ... and timing, or the time when the

Marwan Sinaceur; Margaret A. Neale

2005-01-01T23:59:59.000Z

206

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

207

Office of Nuclear Threat Science | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Threat Science | National Nuclear Security Administration Nuclear Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

208

Office of Nuclear Threat Science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Threat Science | National Nuclear Security Administration Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

209

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

210

Resilient Control Systems Practical Metrics Basis for Defining Mission Impact  

SciTech Connect

"Resilience describes how systems operate at an acceptable level of normalcy despite disturbances or threats. In this paper we first consider the cognitive, cyber-physical interdependencies inherent in critical infrastructure systems and how resilience differs from reliability to mitigate these risks. Terminology and metrics basis are provided to integrate the cognitive, cyber-physical aspects that should be considered when defining solutions for resilience. A practical approach is taken to roll this metrics basis up to system integrity and business case metrics that establish proper operation and impact. A notional chemical processing plant is the use case for demonstrating how the system integrity metrics can be applied to establish performance, and

Craig G. Rieger

2014-08-01T23:59:59.000Z

211

An Overview of Non-traditional Nuclear Threats  

SciTech Connect

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

212

An Overview of Non-Traditional Nuclear Threats  

SciTech Connect

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or dirty bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

213

Knowing and Managing Grain Basis  

E-Print Network (OSTI)

Understanding trends and/or tendencies in basis movement can help a producer make good decisions for minimizing basis risk. This publication discusses the basis itself, its variability, how to track it, and how to manage basis risk....

Amosson, Stephen H.; Mintert, James R.; Tierney Jr., William I.; Waller, Mark L.

1999-06-23T23:59:59.000Z

214

Nuclear Facility Safety Basis  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety Basis Safety Basis FUNCTIONAL AREA GOAL: A fully compliant Nuclear Facility Safety Basis. Program is implemented and maintained across the site. REQUIREMENTS:  10 CFR 830 Subpart B Guidance:  DOE STD 3009  DOE STD 1104  DOE STD  DOE G 421.1-2 Implementation Guide For Use in Developing Documented Safety Analyses To Meet Subpart B Of 10 CFR 830  DOE G 423.1-1 Implementation Guide For Use In Developing Technical Safety Requirements  DOE G 424.1-1 Implementation Guide For Use In Addressing Unreviewed Safety Question Requirements Performance Objective 1: Contractor Program Documentation The site contractor has developed an up-to-date, comprehensive, compliant, documented nuclear facility safety basis and associated implementing mechanisms and procedures for all required nuclear facilities and activities (10 CFR

215

Technical Planning Basis  

Directives, Delegations, and Requirements

The Guide assists DOE/NNSA field elements and operating contractors in identifying and analyzing hazards at facilities and sites to provide the technical planning basis for emergency management programs. Cancels DOE G 151.1-1, Volume 2.

2007-07-11T23:59:59.000Z

216

Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon  

E-Print Network (OSTI)

biological, and chemical weapons of warfare and terrorism.Threat and Unconventional Weapon Robert Jones, MD Brandonand as a terrorist weapon. This review will summarize recent

Jones, Robert; Wills, Brandon; Kang, Christopher

2010-01-01T23:59:59.000Z

217

COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

MBG Auditorium COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear Weapons Dr. Alan Robock Rutgers University A nuclear war between India and Pakistan, with...

218

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

219

ORISE: Securing the Golden State from threats foreign and domestic  

NLE Websites -- All DOE Office Websites (Extended Search)

Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

220

NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...  

National Nuclear Security Administration (NNSA)

terrorism around the world. Converting or replacing isotopic devices with non-isotopic alternative technology achieves permanent threat reduction by decreasing the availability...

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Working to keep us safe: Sara Brambilla, Postdoc creates threat...  

NLE Websites -- All DOE Office Websites (Extended Search)

to keep us safe: Sara Brambilla, Postdoc creates threat reduction tools Chemical engineer postdoc experiences a foreign culture while working on resources that respond to...

222

3.System Design Basis 2) MODELING  

E-Print Network (OSTI)

BOG compressors with butane storage system is modelled for this report. 4) Modelling have been storage system except heat load and this level of detail was not required for dynamic simulation.(Refe to table 4.3.1) #12;9) One butane separator, pump and control system for many butane tanks boil off

Hong, Deog Ki

223

Evaluating and managing the integrity of computerized accountability systems against insider threats  

SciTech Connect

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased software knowledge and skills help heighten the concern about insider threats. A question arises as follows. How can managers and policy makers logically and pragmatically analyze the myriad customization and design options for accountability applications with respect to the insider threat. In this paper, we describe a methodology for addressing this question, along with insights from its application to local area network (LAN) material accountability systems.

Jones, E.; Sicherman, A.

1996-06-01T23:59:59.000Z

224

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

225

Nuclear Radiological Threat Task Force Established | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Threat Task Force Established | National Nuclear Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Nuclear Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established

226

Global Threat Reduction Initiative | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

227

GTRI: Reducing Nuclear Threats | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reducing Nuclear Threats | National Nuclear Security Administration Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Reducing Nuclear Threats Fact Sheet GTRI: Reducing Nuclear Threats Apr 12, 2013 Mission In 2004, NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

228

Free Algebra with Countable Basis  

E-Print Network (OSTI)

In this book I treat the structure of D-module which has countable basis. If we do not care for topology of D-module, then we consider Hamel basis. If norm is defined in D-module, then we consider Schauder basis. In case of Schauder basis, we consider vectors whose expansion in the basis converges normally.

Aleks Kleyn

2012-11-27T23:59:59.000Z

229

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive to the academic, research and operational functions of  

E-Print Network (OSTI)

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive. Policy Any bomb threat or incident of a suspected explosive device shall be considered as valid by all advised that the situation is no longer considered a threat. Every effort must be made to protect

Collins, Gary S.

230

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

231

The Brain Basis of Emotions 1 BRAIN BASIS OF EMOTION  

E-Print Network (OSTI)

The Brain Basis of Emotions 1 BRAIN BASIS OF EMOTION The brain basis of emotion: A meta, Building 149 Charlestown, MA 02129 lindqukr@nmr.mgh.harvard.edu #12;The Brain Basis of Emotions 2 Abstract Researchers have wondered how the brain creates emotions since the early days of psychological science

Barrett, Lisa Feldman

232

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 Rev.: 4  

E-Print Network (OSTI)

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 __________________________________________________________________________________ Subject: Response to Bomb Threats ............................................................................................................................................................1 3.1 Telephoned Threat

Virginia Tech

233

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network (OSTI)

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

Abi-Antoun, Marwan

234

THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT  

E-Print Network (OSTI)

FLAVISSIMA)TODETERMINETHREAT JESSICA POST Integrativebeusedbyfishtoassessthreat,andindicatewhenitiswere importantinassessingthreat. Multiplecueswere

Post, Jessica

2012-01-01T23:59:59.000Z

235

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk  

E-Print Network (OSTI)

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

Patel, Aniruddh D.

236

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

237

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network (OSTI)

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

238

Nuclear power's threat to health, safety, and freedom  

Science Journals Connector (OSTI)

Nuclear power's threat to health, safety, and freedom ... In particular, they may differ on whether the nuclear power plants that are the result of the 1953 Atoms for Peace movement help or hinder the control of nuclear weapons. ...

1980-10-13T23:59:59.000Z

239

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

240

Chapter 2 - Threats and Hazards at Educational Institutions  

Science Journals Connector (OSTI)

Abstract This chapter describes the threats and hazards currently facing school administrators. It separately covers school districts (K-12) and higher education (colleges and universities), and includes information about legislation and protection measures.

Philip Purpura

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

EWAS: Modeling Application for Early Detection of Terrorist Threats  

Science Journals Connector (OSTI)

This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state ... of generation of early warnings to predict terrorist

Pir Abdul Rasool Qureshi; Nasrullah Memon

2010-01-01T23:59:59.000Z

242

Threat-aware Path Planning in Uncertain Urban Environments  

E-Print Network (OSTI)

This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

Aoude, Georges

243

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake  

E-Print Network (OSTI)

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake Sockeye MART R. GROSS of Economics, University of Toronto, 150 St. George Street, Toronto, Canada M5S 3G7. Email

Gross, Mart

244

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National  

National Nuclear Security Administration (NNSA)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Insider Threat to Nuclear and Radiological Materials: ... Fact Sheet Insider Threat to Nuclear and Radiological Materials: Fact Sheet

245

A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations  

SciTech Connect

Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

2010-01-01T23:59:59.000Z

246

Preliminary thoughts concerning potential US Army threats/roles  

SciTech Connect

The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

Greene, R.A.; Solomon, K.A.; Miles, J.T.

1991-06-01T23:59:59.000Z

247

EM threat analysis for wireless systems.  

SciTech Connect

Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

2006-06-01T23:59:59.000Z

248

A situational awareness framework for securing the smart grid using monitoring sensors and threat models  

Science Journals Connector (OSTI)

Security, access control and risk mitigation in the smart grid are matters of great impact for this important sector of the critical infrastructure. Situational awareness requires a means of aggregating information and presenting that information in a manner conducive to assessing risk. While major components of the electric power grid were traditionally deployed in physically isolated networks, they are now utilising IP-based, open, interconnected networks to transmit and manage the supervisory control and data acquisition (SCADA) messages. Unfortunately, SCADA protocols used for communications and the systems that implement those protocols were not originally designed with security in mind. Therefore, in order to enhance security and detect potential malicious behaviour, smart grid operators need detailed and accurate information about the status, integrity, configuration and network topology of SCADA devices as well as information about any threats that may impact the grid. This paper describes a comprehensive framework that provides situational awareness (SA) for SCADA devices and their operations in a smart grid environment. Situational awareness is achieved by processing information collected by monitoring sensors and understanding threats that may affect operations. The proposed framework employs a threat modelling methodology to support this mission.

Anastasia Mavridou; Victor Zhou; Jerald Dawkins; Mauricio Papa

2012-01-01T23:59:59.000Z

249

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2  

E-Print Network (OSTI)

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2 , Feng Wu2 , Lincheng Shen1 information is distributed alongside threats. The informa- tion and threat at each location are respectively by an agent. While agents obtain information at a location, they may suffer attacks from the threat

Yeoh, William

250

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci  

E-Print Network (OSTI)

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

Chisci, Luigi

251

Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University  

E-Print Network (OSTI)

Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

Stanford University

252

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy  

E-Print Network (OSTI)

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy IBM Internet Security Systems #12;Table of Contents Threat Lifecycle 1 Malware Threat Lifecycle 2 Vulnerability Lifecycle 2 Conclusions 12 #12;Old Threats Never Die Page 1 With year-on-year increases in vulnerabilities, malware

253

Design  

NLE Websites -- All DOE Office Websites (Extended Search)

Design Design of a Multithreaded Barnes-Hut Algorithm for Multicore Clusters Technical Report Junchao Zhang and Babak Behzad Department of Computer Science, University of Illinois at Urbana-Champaign {jczhang, bbehza2}@illinois.edu Marc Snir Department of Computer Science, University of Illinois at Urbana-Champaign and MCS Division, Argonne National Laboratory snir@anl.gov Abstract We describe in this paper an implementation of the Barnes-Hut al- gorithm on multicore clusters. Based on a partitioned global ad- dress space (PGAS) library, the design integrates intranode mul- tithreading and internode one-sided communication, exemplifying a PGAS + X programming style. Within a node, the computation is decomposed into tasks (subtasks), and multitasking is used to hide network latency. We study the tradeoffs between locality in private caches and locality in shared caches

254

On threats analysis approach applied to a Mediterranean remnant wetland: Is the assessment of human-induced threats related to different level of expertise of respondents?  

Science Journals Connector (OSTI)

Naming, listing and measuring human-induced threats in protected areas are crucial in conservation. ... , we defined a check-list of direct threats in a Mediterranean remnant wetland (central Italy ... students a...

Corrado Battisti; Luca Luiselli; Daniele Pantano

2008-06-01T23:59:59.000Z

255

A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques  

E-Print Network (OSTI)

Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

2009-01-01T23:59:59.000Z

256

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

257

NNSA's Global Threat Reduction Initiative launches mobile app | National  

National Nuclear Security Administration (NNSA)

launches mobile app | National launches mobile app | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative launches mobile app NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a

258

NNSA's Global Threat Reduction Initiative food face-off | National  

NLE Websites -- All DOE Office Websites (Extended Search)

food face-off | National food face-off | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative food face-off NNSA's Global Threat Reduction Initiative food face-off Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative holds a Feds Feeds Family face-off

259

Effects of intentional threats to power substation control systems  

Science Journals Connector (OSTI)

Power station control and management systems represent key elements for guaranteeing the security of the power grid infrastructure. Intrinsically conceived to support the continuous provision of power in secure conditions, those systems today make intensive use of information and communication systems and are therefore exposed to related accidental and intentional cyber threats. This paper describes a simulation of cyber attacks conducted in the CESI RICERCA laboratory testbed on a prototypical substation control infrastructure with the purpose of testing their feasibility and illustrating their impact on the control system services. A set of attack scenarios targeting several subsystems has been experimented, with different simulated threat motivations and different degrees of impact on the global substation service. The paper reports some considerations about the consequences of the implemented attacks, focusing on different facets of the problem, in an effort to elucidate the full significance of the potential cyber threats.

Giovanna Dondossola; Judit Szanto; Marcelo Masera; Igor Nai Fovino

2008-01-01T23:59:59.000Z

260

NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished  

NLE Websites -- All DOE Office Websites (Extended Search)

Receives 2010 Distinguished Receives 2010 Distinguished Project Award from PMI | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA's Global Threat Reduction Initiative Receives 2010 ... Press Release NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Geospatiotemporal Data Mining in an Early Warning System for Forest Threats in the United States  

SciTech Connect

We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250~m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster analysis of this massive data set, using high-performance computing, provides a basis for several possible approaches to defining the bounds of ``normal'' phenological patterns, indicating healthy vegetation in a given geographic location. We demonstrate the applicability of such an approach, using it to identify areas in Colorado, USA, where an ongoing mountain pine beetle outbreak has caused significant tree mortality.

Hoffman, Forrest M [ORNL; Mills, Richard T [ORNL; Kumar, Jitendra [ORNL; Vulli, Srinivasa S [ORNL; HargroveJr., William Walter [United States Department of Agriculture (USDA), United States Forest Service (USFS)

2010-01-01T23:59:59.000Z

262

Threats and Challenges in Reconfigurable Hardware Security Ryan Kastner  

E-Print Network (OSTI)

Reconfigurable Hardware Life Cycle Before we discuss specific security problems, attacks and solutions, we: The life cycle of reconfigurable hardware, from manufacturing to application development to deploymentThreats and Challenges in Reconfigurable Hardware Security Ryan Kastner Dept. of Computer Science

263

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network (OSTI)

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

Baldick, Ross

264

How to determine threat probabilities using ontologies and Bayesian networks  

E-Print Network (OSTI)

are capable to reduce the risk to an acceptable level at the lowest possible costs. Risk is defined. The elaborated concepts enable risk managers to comprehensibly quantify the current security status Terms Security Keywords threat probability determination, risk management, infor- mation security 1

265

Constructing Ionospheric Irregularity Threat Model for Korean SBAS  

E-Print Network (OSTI)

GNSS augmentation system and space weather forecasting for GNSS application. Jiyun Lee is an Assistant metrics which measure the density and uniformity of IPP distribution in a region. Thus, the threat model metrics, which characterize threatening undersampled geometries including the density of IPP distribution

Stanford University

266

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President  

E-Print Network (OSTI)

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

267

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

268

Ecological factors and human threats both drive wildfowl population declines  

E-Print Network (OSTI)

; human population density. Correspondence Peter R. Long, Department of Biology and Biochemistry, Africa and Asia. Second, we use phylogenetic comparative analyses to test whether population size, globalEcological factors and human threats both drive wildfowl population declines P. R. Long1 , T. Sz

269

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION  

E-Print Network (OSTI)

-rated and IFE target supply processes and target related systems Electrically steer targets Making foam or fastPERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION Overview of the Fusion) for the Pedestal Developed and Tested · Formation of an edge barrier or "pedestal" allows high performance

270

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network (OSTI)

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

271

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

272

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network (OSTI)

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

273

DDE Design Status Report Nov 2011  

SciTech Connect

The National Nuclear Security Agency Global Threat Reduction Initiative employs the Reduced Enrichment for Research and Test Reactors (RERTR) Fuel Development program to facilitate maturation of Low Enriched Uranium (LEU) fuel technology in order to enable conversion of High Power Research Reactors (HPRR) to LEU fuels. The RERTR Fuel Development program has overseen design, fabrication, irradiation, and examination of numerous tests on small to medium sized specimens containing LEU fuels. To enable the three nearest term HPRR conversions, including the Massachusetts Institutes of Technology Reactor (MITR), University of Missouri Research Reactor (MURR), and National Bureau of Standard Reactor (NBSR), the FD pillar is currently focused on qualification of the 'Base Monolithic Design'. The Base Monolithic Design consists of uranium-10 wt% molybdenum alloy (U-10Mo) in the form of a monolithic foil, with thin zirconium interlayers, clad in aluminum by hot isostatic press. The licensing basis of the aforementioned HPRR's restricts them from testing lead test elements of their respective LEU fuel element designs. In order to provide the equivalent of a lead test assembly, one Design Demonstration Experiment (DDE) is planned for each of the three NRC licensed reactors.

N.E. Woolstenhulme; R.B. Nielson

2011-11-01T23:59:59.000Z

274

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

National Nuclear Security Administration (NNSA)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

275

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

NLE Websites -- All DOE Office Websites (Extended Search)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

276

Threats and human influence on coastal ecosystem of Southern India  

Science Journals Connector (OSTI)

Populations of the majority of fish species showed drastic reduction over the past five decades in west coast of India. We conducted an intensive study of Aghanashini estuary for water quality and fish diversity in west coast of India. Coastal ecosystems are impacted by many stressors and are continually subjected to threats from multiple stresses imposed mostly by human activities predominantly as a result of increased population growth in India. The most significant categories of threats derive from water pollution from numerous sources including thermal effluents, heavy metals, oil, sewage, pesticides, pulp mills, habitat loss and degradation, overexploitation, eutrophication and misguided human perceptions. Wide array of prohibited fishing methods are rampant by using of insecticides as poisons, destruction and modification of habitats, dynamiting, using chemical and herbal poisons. Due to deteriorated water, quality from anthropogenic activities fish diversity has drastically reduced. In complex coastal ecosystems, strategies for restoration can become equally complicated.

D. Sannadurgappa

2010-01-01T23:59:59.000Z

277

Chapter 3 - Building Skills with Basics: Learning to Identify Threats  

Science Journals Connector (OSTI)

Abstract The karate student builds skills in a variety of ways, but one of the fundamental ways to practice is through repetition of the basics: blocks, punches, and kicks. A student learns to respond to real attacks from any direction, through continual training on the right way to defend and to eliminate an opponent. This is the starting point where a student develops proper techniques to attack and counterattack against a variety of violent threats. Organizations must recognize harmful hazards. Hazards may be obvious, such as risks from hurricanes, or may be less evident, such as the risks from a chemical spill on a nearby roadway. Threats to your organization can come in many formats, from natural to accidental to deliberate. To successfully prepare for problems, the next step in the assessment process calls for identifying potential risks and using available sources to identify what things you really should worry about.

Eric N. Smith

2014-01-01T23:59:59.000Z

278

Safety Basis Information System | Department of Energy  

Office of Environmental Management (EM)

basis type. Safety Basis Login Click on the above link to log in to the Safety Basis web interface. "RESTRICTED; access only to DOE and DOE contractors" Safety Basis Account...

279

Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat  

E-Print Network (OSTI)

dissonance, and stereotype threat A Spencers talk, Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

Hooker, Courtney

2011-01-01T23:59:59.000Z

280

Assets at Risk: Menstrual Cycle Variation in the Envisioned Formidability of a Potential Sexual Assailant Reveals a Component of Threat Assessment  

E-Print Network (OSTI)

M. T. (2013). Sizing up the threat: The envisioned physicalconceptual links between threat, social status, and physicalReveals a Component of Threat Assessment Daniel M.T.

Fessler, Daniel M.T.; Holbrook, Colin; Fleischman, Diana S.

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A Study on Biological Threats to Texas Freshwater Resources  

E-Print Network (OSTI)

A STUDY ON BIOLOGICAL THREATS TO TEXAS FRESHWATER RESOURCES A Thesis by MICHAEL TYLER NEISCH Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements.... Roelke and Dr. Masser, and my committee member, Dr. Rogers, for their guidance and support throughout the course of this research. Special thanks also to Dr. Gatlin, Brian Ray and all the Texas A&M Aquaculture and Research Facility staff, John Johnson...

Neisch, Michael

2014-01-15T23:59:59.000Z

282

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats Application of Machine Learning and Crowdsourcing  

E-Print Network (OSTI)

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats 1 Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats February 2011 Eugene of Cybersecurity Threats 2 Abstract We are applying machine learning and crowdsourcing to cybersecurity

Fink, Eugene

283

Quantifying threats in a Mediterranean wetland: are there any changes in their evaluation during a training course?  

Science Journals Connector (OSTI)

Threats analysis is a conservation discipline directed to ... , quantify, rank, map the human-induced threats occurring in a specific study area, assessing ... of central Italy, where 15 human-induced threats w...

Corrado Battisti; Luca Luiselli; Corrado Teofili

2009-10-01T23:59:59.000Z

284

Countering Hybrid Eco-threats to Global Security Under International Law: The Need for an Comprehensive Legal Approach  

Science Journals Connector (OSTI)

Threats to environmental security (eco-threats) face not only shortcomings of environmental ... of Armed Conflict. Considering the new Hybrid Threat concept, which had recently been discussed ... for adopting...

Joachim Sanden; Sascha-Dominik Bachmann

2013-11-01T23:59:59.000Z

285

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION  

E-Print Network (OSTI)

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION SUBMITTED threats to user safety if left unmitigated. This work identifies when such disturbances may occur using indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area

Stanford University

286

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability  

E-Print Network (OSTI)

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

How, Jonathan P.

287

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision  

E-Print Network (OSTI)

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision system reliability has become an area of increasing importance. Medical system threats, which include system operation. To address these problems, we build upon our previous threat cataloging methodology

Thornton, Mitchell

288

Threat to the point: improving the value of comparative extinction risk analysis for conservation action  

E-Print Network (OSTI)

Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

Davidson, Ana

289

Moderate threat causes longer lasting disruption to processing in anxious individuals  

E-Print Network (OSTI)

Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

Bishop, Sonia

290

umankind faces a wide range of threats to its security and safety, from ter-  

E-Print Network (OSTI)

H umankind faces a wide range of threats to its security and safety, from ter- rorist groups and cybercriminals to disease pandemics and climate change. All these threats share one characteristic threats. Two years ago we suggested in our book Natural Security: A Darwinian Approach to a Dangerous

Grether, Gregory

291

Responses to Ecological and Human Threats to a California Water Basin Governance System  

E-Print Network (OSTI)

W06-41 Responses to Ecological and Human Threats to a California Water Basin Governance System to the management regime as well. This paper describes the threats to water management arrangements in the San increasingly robust to certain disturbances (or threats), the complex social ecological system has remained

Janssen, Marco

292

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S. Rosenschein  

E-Print Network (OSTI)

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S systems work considered the notion of threats during negotiation, but in order to do so introduced additional assumptions on the domain. This paper presents a new model of threats among negotiating agents

Rosenschein, Jeff

293

Learning about social threats in RS Learning biases underlying individual differences in sensitivity to social rejection  

E-Print Network (OSTI)

Learning about social threats in RS 1 Learning biases underlying individual differences. Ochsner, Department of Psychology, Columbia University Running Head: Learning about social threats in RS University, Northwest Science Bldg 290, Cambridge, MA 0213. #12;Learning about social threats in RS 2

Ochsner, Kevin

294

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network (OSTI)

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

295

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems  

E-Print Network (OSTI)

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

Stanford University

296

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of  

E-Print Network (OSTI)

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat price homogeneity as a mechanism to reduce the threat of regulatory intervention in locally monopolistic to retaliations from local elected officials. When investor-owned monopolies are exposed to this threat

Paris-Sud XI, Université de

297

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta-Barua, and Juan Blanch  

E-Print Network (OSTI)

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta features. Therefore, it is essential to understand the magnitude of such threats given the gaps in our observations. The methodology used to study these features is to start with well-observed threats from previous

Stanford University

298

MTRG/Ascension Management Plan 2002 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT  

E-Print Network (OSTI)

MTRG/Ascension Management Plan 2002 14 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT and control of pet cats 8) Continuation of ban on harvest of turtle products We give an account of all threats.1 General Habitat Degradation 5.1.1. Mining of Beach Sand 5.1.2. Light Pollution 5.1.3 Threat of Fuel Spill

Exeter, University of

299

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network (OSTI)

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF MANPADS, OTHER BALLISTIC WEAPONS RISKS, FUTURE THREATS, AND POSSIBLE COUNTERMEASURES POLICIES O'Sullivan, T. CREATE REPORT Threats to Civilian Airliners: A Summary Risk Analysis of MANPADS, Other Ballistic Weapons Risks, Future

Wang, Hai

300

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems  

E-Print Network (OSTI)

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

Stanford University

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Validity Threats in Empirical Software Engineering Research -An Initial Survey Robert Feldt, Ana Magazinius  

E-Print Network (OSTI)

Validity Threats in Empirical Software Engineering Research - An Initial Survey Robert Feldt, Ana important to consider threats to the validity of the study and the results. This is particularly important for empirical research where there is often a multitude of possible threats. With a growing focus on empirical

Feldt, Robert

302

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in  

E-Print Network (OSTI)

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

Zhang, Yan

303

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network (OSTI)

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

304

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN  

E-Print Network (OSTI)

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

Zhu, Chen

305

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces  

E-Print Network (OSTI)

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

Witkowski, Mark

306

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat  

E-Print Network (OSTI)

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

Toronto, University of

307

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous or emergency  

E-Print Network (OSTI)

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous and staff, employees, students and visitors. Violent behavior, threats of violence, or physical intimidation of threatening or violent conduct in the workplace, or who observes such behavior or believes a credible threat

Goldberg, Bennett

308

The Effects of Age and Experience on Drivers Ability to Identify Threats  

E-Print Network (OSTI)

The Effects of Age and Experience on Drivers Ability to Identify Threats Ethan Fisher Professor The purpose of this study was to determine how long it takes for a driver to identify if a threat exists and where the threat is located in a static image. It is known that both older experienced and younger

Mountziaris, T. J.

309

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly  

E-Print Network (OSTI)

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly September 15, 2004 assume certainty regarding the likelihood of the regulatory threat. We examine industry voluntary self and credible regulatory threat is needed to induce industry to take voluntary self-regulatory actions. 1

Lyon, Thomas P.

310

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems  

E-Print Network (OSTI)

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

Menascé, Daniel A.

311

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

312

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau  

E-Print Network (OSTI)

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau School of Computer Science be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats

Barbeau, Michel

313

Milk Futures, Options and Basis  

E-Print Network (OSTI)

The milk futures and options market enables producers and processors to manage price risk. This publication explains hedging, margin accounts, basis and how to track it, and other fundamentals of the futures and options market....

Haigh, Michael; Stockton, Matthew; Anderson, David P.; Schwart Jr., Robert B.

2001-10-12T23:59:59.000Z

314

Basis  

NLE Websites -- All DOE Office Websites (Extended Search)

inhomogeneous systems such as the ones with curvature or zonal flows, and ability to use data from experimental diagnostics with limited spatial resolution. In this method, the...

315

Risks and threats to civilization, humankind, and the earth  

Science Journals Connector (OSTI)

This paper is a brief look at a wide range of risks that are said to present great threats to humankind. It was stimulated by several interacting factors. First, too many books and articles about astrophysical catastrophes, in the scientific and semi-scientific press, give relatively little attention to their timeframe or the measures to anticipate and prepare for them. Second, and most important, is that the overblown effects of 9/11 have distorted the United States of America's perspective and agenda on catastrophes. The result is that billions of dollars have been wasted and attention turned away from threats that could be truly catastrophic for the United States and, in many cases, for the rest of the world. Third, are books that have become popular by raising the threat that what will happen to us will be similar to what happened to earlier societies such as the Maya and the Easter Islanders. Most notably among these is Jared Diamond's Collapse [Jared Diamond, Collapse: How Societies Choose to Fail or Succeed, Penguin Group, 2005]. The failure in these doomsday arguments is to overlook the greater sophistication, knowledge, awareness, monitoring and preparation currently in the United States and in other parts of the globe. The institutional structure and scientific knowledge today would either prevent or deal with the kind of socio-economic decline anticipated by the collapse arguments. In contrast several geophysical and celestial risks do imply global catastrophe. The value of this paper is as broad background to the specific scenario papers that follow. While it leans heavily on the work of others, it offers three new features for the analysis of any extreme risk. First is a scale of devastation, based on deaths. Second is a comprehensive time framenow to the end of the Earth. Third is an outline of general questions that must be addressed for any risk, however large or small, if it is to provide insight into policy choices and promote systemic thinking.

Joseph F. Coates

2009-01-01T23:59:59.000Z

316

Identification of threats using linguistics-based knowledge extraction.  

SciTech Connect

One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

Chew, Peter A.

2008-09-01T23:59:59.000Z

317

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

318

Summary of Audit Report: OAS-L-09-02 | Department of Energy  

Office of Environmental Management (EM)

developed the Design Basis Threat policy (DBT), which identified the most credible threats posed by potential adversaries to Departmental assets and operations. Since the...

319

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Kranakis, Evangelos

320

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Garcia-Alfaro, Joaquin

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Environmental threats to children's health a global problem  

Science Journals Connector (OSTI)

Today's children are exposed to a wide range of environmental threats, whose consequences on health and development may appear early in life, throughout their youth and even later, in adulthood. Health problems linked to environmental hazards are multiplying and becoming more visible due to a rapidly changing environment, rapid population growth, overcrowding, fast industrialisation and uncontrolled pollution from many anthropogenic and also natural sources, and as a result of the effects of climate change. A World Health Organization report on the global burden of disease estimated that nearly a quarter of the global disease burden is related to environmental causes. These environmental-mediated diseases cause more than three million deaths in children under five every year. Such a large burden is unacceptable. Both industrialised and developing countries should reinforce their capacities to assess the environmental burden of paediatric diseases and characterise their impact on children's health. This will enable all responsible sectors to distinguish the main environmental threats affecting children's health and identify their specific roles in improving children's environments. Implementing these activities and turning efforts into prevention, education, policy-making and other actions will reduce the burden of disease affecting children globally, therefore contributing towards achieving the Millennium Development Goals (MDGs).

Maria Neira; Fiona Gore; Marie-Noel Brune; Tom Hudson; Jenny Pronczuk de Garbino

2008-01-01T23:59:59.000Z

322

A Risk Management Approach to the "Insider Threat"  

SciTech Connect

Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

2010-09-01T23:59:59.000Z

323

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

324

2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office  

Energy.gov (U.S. Department of Energy (DOE))

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2014 and 2015 within the NNSA Global Threat Reduction Initiative Office.

325

How ORISE is Making a Difference: Preparing for the Threat of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Amber Waves ORISE coordinates tabletop exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are...

326

Chapter Five - Hazards and Threats to a Pipeline System  

Science Journals Connector (OSTI)

Abstract It is important to understand what the threats are that raise the risk probability in a pipeline system and how to assess them. External corrosion on a pipeline could be from microbiological (MIC), galvanic action or electrochemical reaction, where the steel pipe becomes an anode in an electrochemical cell. External corrosion direct assessment (ECDA) is a structured process that is intended to improve safety by assessing and reducing the impact of external corrosion on a pipeline. Other tools for assessing external corrosion are direct current voltage gradient (DCVG), CIP, ILI using intelligent pigging, and pressure testing. Use of guided wave ultrasonic testing (GWUT) as an alternative tool for ECDA has been promoted and sometimes used.

Ramesh Singh

2014-01-01T23:59:59.000Z

327

High tech criminal threats to the national information infrastructure  

Science Journals Connector (OSTI)

National information infrastructure (NII), vital to the nation's security and economic stability, comprises both physical and electronic infrastructures. Information and communications technologies (ICT) form the backbone of many aspects of the NII and reliance on ICT has created many new risks. Cyberthreats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. This paper examines the technology-related risks associated with the NII and provides examples of existing incidents and areas in which new threats might emerge. To be able to mitigate these risks, it remains crucial to understand infrastructure interdependencies and to establish public-private partnerships to ensure that weaknesses in systems are not able to be exploited.

Kim-Kwang Raymond Choo

2010-01-01T23:59:59.000Z

328

Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats  

SciTech Connect

We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

Mills, Richard T [ORNL] [ORNL; Hoffman, Forrest M [ORNL] [ORNL; Kumar, Jitendra [ORNL] [ORNL; HargroveJr., William Walter [USDA Forest Service

2011-01-01T23:59:59.000Z

329

AP1000 Design for Security  

SciTech Connect

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

330

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid  

E-Print Network (OSTI)

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

Wang, Wenye

331

Climate change is one of the greatest threats facing us today. CICERO's mission  

E-Print Network (OSTI)

Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

Johansen, Tom Henning

332

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to  

E-Print Network (OSTI)

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve threats to marine turtles, NMFS and the U.S. Fish and Wildlife Service have developed recovery plans you see turtles and/or jellyfish at the surface, slow down and ma¡nta¡n a ded¡cated lookout. 0 Wear

333

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, 1st edition  

Science Journals Connector (OSTI)

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue ...

Eric Cole

2012-12-01T23:59:59.000Z

334

A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society  

E-Print Network (OSTI)

A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and Society and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called mHealth that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges

335

An outcome-based learning model to identify emerging threats : experimental and simulation results.  

SciTech Connect

The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment, decision making, and learning theories to provide an integrated framework for the behavioral study of emerging threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F.; Decision and Information Sciences; SNL; Univ. at Albany

2007-01-01T23:59:59.000Z

336

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network (OSTI)

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

337

BASIS Equipment | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

Equipment Equipment BASIS Schematic Schematic of the SNS Backscattering Spectrometer. Helium dewer cooling a sample Helium dewer cooling a sample (bird's eye view). The heart of the work in a typical experiment is setting up the sample in the desired environment. A typical neutron sample ranging from a millimeter to a few centimeters is placed in a specialized cylindrical can and sealed. For liquids, the backscattering instrument often uses an annular can, created by placing a smaller can within a larger can and inserting the liquid sample between the two cans. This picture shows a helium dewer cooling the environment encompassing the sample can, which has been lowered into the beam from the top of the scattering tank. Crystals Crystals. The backscattering spectrometer is defined by the reflection of specific

338

BASIS Set Exchange (BSE): Chemistry Basis Sets from the William R. Wiley Environmental Molecular Sciences Laboratory (EMSL) Basis Set Library  

DOE Data Explorer (OSTI)

The Basis Set Exchange (BSE) provides a web-based user interface for downloading and uploading Gaussian-type (GTO) basis sets, including effective core potentials (ECPs), from the EMSL Basis Set Library. It provides an improved user interface and capabilities over its predecessor, the EMSL Basis Set Order Form, for exploring the contents of the EMSL Basis Set Library. The popular Basis Set Order Form and underlying Basis Set Library were originally developed by Dr. David Feller and have been available from the EMSL webpages since 1994. BSE not only allows downloading of the more than 200 Basis sets in various formats; it allows users to annotate existing sets and to upload new sets. (Specialized Interface)

Feller, D; Schuchardt, Karen L.; Didier, Brett T.; Elsethagen, Todd; Sun, Lisong; Gurumoorthi, Vidhya; Chase, Jared; Li, Jun

339

Perspective on Beyond Design Basis Event Analysis and Response  

Energy.gov (U.S. Department of Energy (DOE))

Presenter: John Schwenker, Nuclear Safety Manager for Liquid Operations, Savannah River Remediation, LLC, Savannah River Site

340

Engineering-economic design basis of pumped-storage stations  

Science Journals Connector (OSTI)

Peak-load pumped-storage stations are or should be a component of each well-developed power system, even with a considerable proportion of hydroelectric...

T. Bernatski

1972-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?  

E-Print Network (OSTI)

or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google

New Hampshire, University of

342

Consumer Choice and Dempster-Shafer Models of Threat Prioritization for Emerging Dual-Use Technologies: Their Application to Synthetic Biology  

SciTech Connect

Identification and prioritization of risks to international security associated with emerging dual-use technologies presents numerous challenges. First, it demands prediction of the evolving states-of-the-art in various technological fields and, second, it requires a comprehension of the motivations and prospective selection criteria that illicit users might adopt in choosing among new technologies and their means of deployment. Nevertheless, the identification and prioritization of such threats is critical in establishing the appropriate focal points for proactive, nonproliferation policy-making. This paper addresses the question of how the threats associated with alternative means of deploying an emerging technology might be prioritized. The method revolves around systematic identification of the technological barriers to an illicit user in deploying a new technology. Evaluation of the resources necessary to overcome the barriers - such acquisition of the necessary intellectual capital and laboratory assets - then provides the basis for assessing the relative likelihoods or plausibilities of various deployment scenarios. Two optional bases are outlined for quantification of the model. One is a choice model that has found application in the analysis of consumer behavior, where the illicit user is modeled essentially as a consumer of new technology. The other employs a Dempster-Shafer framework for priority characterization. The paper describes application of the methodology to emerging life science technologies; in particular, to synthetic biology - the means of engineering biological systems. The prospect of a terrorist being able to synthesize natural pathogens or, perhaps worse still, to engineer pathogens not present in nature, creates an unprecedented threat to international security. Use of the proposed methodology to identify and prioritize threats associated with the engineering of pathogens is described.

Unwin, Stephen D.; Fecht, Barbara A.

2009-03-01T23:59:59.000Z

343

Structural basis of spectrin elasticity  

SciTech Connect

A new model of human erythrocyte {alpha}-spectrin is proposed. The secondary structure of human erythrocyte {alpha}-spectrin and its folding into a condensed structure that can convert reversibly in situ, into an elongated configuration is predicted from its deduced protein sequence. Results from conformational and amphipathicity analyses suggest that {alpha}-spectrin consists mainly of short amphipathicity helices interconnected by flexible turns and/or coils. The distribution of charges and amphipathicity of the helices can facilitate their folding into stable domains of 4 and 3 helices surrounding a hydrophobic core. The association between adjacent four- and three-helix domains further organize them into recurring seven-helix motifs that might constitute the basic structural units of the extended {alpha}-spectrin. The elongated spectrin molecule packs, in a sinusoidal fashion, through interactions between neighboring motifs into a compact structure. We suggest that the reversible extension and contraction of this sigmoidally packed structure is the molecular basis of the mechanism by which spectrin contributes to the elasticity of the red cell membrane.

Shen, B.W.; Stevens, F.J.; Luthi, U. [Argonne National Lab., IL (United States); Goldin, S.B. [Illinois Univ., Chicago, IL (United States). Dept. of Biological Chemistry

1991-10-17T23:59:59.000Z

344

Human-UAV Coordinated Flight Path Planning of UAV Low-Altitude Penetration on Pop-Up Threats  

Science Journals Connector (OSTI)

Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats is a key technology achieving manned and ... of the flight path planning on pop-up threats. A lot of simulation studies...

Peng Ren; Xiao-guang Gao; Jun Chen

2014-01-01T23:59:59.000Z

345

Annex A -Potential threats in EU Organism(s) Means of spread Control measures Control approaches being used in  

E-Print Network (OSTI)

Annex A - Potential threats in EU Organism(s) Means of spread Control measures Control approaches options Potential threats in EU keep out, knowledge of trade routes, awareness on nurseries, foresters

346

INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the  

E-Print Network (OSTI)

pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

Meyers, Steven D.

347

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance  

E-Print Network (OSTI)

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

Parasuraman, Raja

348

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domnguez Lozano a,e,  

E-Print Network (OSTI)

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domínguez Conservation assessments Red List Spain Threat analysis Threatened plants IUCN categories Western Australia a b s t r a c t Step changes in threat category can be quantified and analyzed in relation to reasons

Moreno Saiz, Juan Carlos

349

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,  

E-Print Network (OSTI)

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

McMains, Sara

350

Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa  

E-Print Network (OSTI)

Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

Pessoa, Luiz

351

Distributed Localization of Threats using Sensor PI: I. Schizas (schizas@uta.edu)/ 817 272-3467  

E-Print Network (OSTI)

Distributed Localization of Threats using Sensor Nets PI: I. Schizas (schizas@uta.edu)/ 817 272 AT ARLINGTON Technical barriers/problems: · Utilize sensor networks to locate threats · Develop distributed algorithms · Limited power resources in sensors · Threats unpredictable both spatially and temporally

Texas at Arlington, University of

352

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor  

E-Print Network (OSTI)

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor: exploring a mixed framework for threat communication Kathryn E. Sieving-based' alarms encode graded or ranked threat-levels by varying the production patterns of the same call types

Sieving, Kathryn E.

353

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin  

E-Print Network (OSTI)

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

Maddox, W. Todd

354

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network (OSTI)

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously. 2. ADDITIONAL NOTIFICATION AND EVALUATION 2.1 Upon receipt of a bomb threat to a particular building

355

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

356

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats  

Science Journals Connector (OSTI)

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats ... Emerging environmental threats such as novel chemical compounds, biological agents, and nanomaterials present serious challenges to traditional models of risk analysis and regulatory risk management processes. ... The recent emergence of new materials, technologies, and other environmental stressors in both the marketplace and the public consciousness coincides with increased recognition of the importance of an integrated systems approach to environmental health and safety that includes life-cycle thinking, public participation, and adaptive management of risks associated with emerging threats. ...

Igor Linkov; Thomas P. Seager

2011-04-27T23:59:59.000Z

357

Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan  

SciTech Connect

The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNLs support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

Pereira, Mario M.; Slonecker, Bruce D.

2012-06-01T23:59:59.000Z

358

Microsoft Word - Final Cover.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security National Nuclear Security Administration's Implementation of the 2003 Design Basis Threat DOE/IG-0705 October 2005 SPECIAL REPORT ON THE NATIONAL NUCLEAR SECURITY ADMINISTRATION'S IMPLEMENTATION OF THE 2003 DESIGN BASIS THREAT TABLE OF CONTENTS Implementation of the Design Basis Threat Details of Finding ...........................................................................................1 Recommendations...........................................................................................9 Comments .....................................................................................................10 Appendices 1. Objective, Scope, and Methodology........................................................11

359

Open PCS Security Architecture For Interoperable Design (OPSAID...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open PCS Security Architecture For Interoperable Design (OPSAID) Open PCS Security Architecture For Interoperable Design (OPSAID) The OPSAID program provides a design basis for...

360

The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Global Threat Reduction Global Threat Reduction Initiative's Molybdenum-99 Program OAS-L-12-07 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR FOR GLOBAL THREAT REDUCTION, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo, Director Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The Global Threat Reduction Initiative's Molybdenum-99 Program" BACKGROUND Molybdenum-99 (Mo-99) is used in the production of technetium-99m (Tc-99m), the most commonly used medical radioisotope in the world. The United States accounts for approximately half of the global demand for Mo-99 at approximately 6,000 units per week. Because Mo-99's short half-life of 66 hours prevents it from being stockpiled, consistent

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Detecting Nuclear Threats | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Detecting Nuclear Threats Detecting Nuclear Threats Stories of Discovery & Innovation Detecting Nuclear Threats Enlarge Photo Photo: Denise Applewhite The MINDS device was invented by a team of engineers at the Princeton Plasma Physics Laboratory, including, from left: Kenny Silber, Henry Carnevale, Charles Gentile, Dana Mastrovito, and Bill Davis. Enlarge Photo 03.28.11 Detecting Nuclear Threats Plasma physics challenge yields portable nuclear detector for homeland security. In 1999, faced with the task of decommissioning the legendary Tokamak Fusion Test Reactor (TFTR), officials at the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL) realized they needed something that didn't yet exist-a non-destructive, real time device to detect certain "hot" elements lacing the inner vessel of the doughnut-

362

Integrating species traits with extrinsic threats: closing the gap between predicting and preventing species declines  

Science Journals Connector (OSTI)

...Centre for Plant Biodiversity...the Amphibian Disease Ecology Group...this pandemic disease [13]. Nevertheless...key threats (disease, invasive...to powerful prediction of species...the field of machine learning [29], for...

2011-01-01T23:59:59.000Z

363

Natural and Human Threats to Biodiversity in the Marine Ecosystem of Coastal Pakistan  

Science Journals Connector (OSTI)

There exist several natural and made-made threats to biodiversity along the coast of Pakistan. Natural stresses include high wave action, high temperatures and salinity, and seasonal spread of oxygen-poor wate...

Muzammil Ahmad

1997-01-01T23:59:59.000Z

364

Agriculture, Ecosystems and Environment 84 (2001) 120 Economic and environmental threats of alien plant,  

E-Print Network (OSTI)

Agriculture, Ecosystems and Environment 84 (2001) 1­20 Economic and environmental threats of alien. Precise economic costs associated with some of the most ecologically damaging alien species; Animals; Alien; Economic; Ecology; Environment; Agriculture; Non-indigenous 1. Introduction Quantifying

California at Berkeley, University of

365

Threats to observers, keepers, visitors, and others by zoo mangabeys (Cercocebus galeritus chrysogaster)  

Science Journals Connector (OSTI)

The facial threats of ten captive golden-bellied mangabeys (Cercocebus galeritus chrysogaster...) were categorized by object threatened. Adult males threatened more than did females except when the object was a n...

G. Mitchell; Stephanie D. Obradovich; Fred H. Herring; Brad Dowd

1991-10-01T23:59:59.000Z

366

Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats  

Science Journals Connector (OSTI)

...ePOOLICE aims at developing an efficient and effective strategic early warning system that utilises environmental scanning for the early warning and detection of current, emergent and future organised crime threats

Ben Brewster; Simon Andrews; Simon Polovina

2014-01-01T23:59:59.000Z

367

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures  

Science Journals Connector (OSTI)

The large-scale cross border virtualization infrastructures can be seen as a federation of heterogeneous clouds. We present pragmatic analysis of the potential threats posed to the emerging large-scale cross...in...

Philippe Massonet; Syed Naqvi; Francesco Tusa; Massimo Villari

2010-01-01T23:59:59.000Z

368

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

369

Assessing security threat scenarios for utility-based reputation model in grids  

Science Journals Connector (OSTI)

Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats.

Olga Kussul; Nataliia Kussul; Sergii Skakun

2013-01-01T23:59:59.000Z

370

Effects of Threats to Self-Esteem and Goal Orientation on Asking for Help.  

E-Print Network (OSTI)

??This paper studied whether threats to self-esteem and goal orientation affected an individual?s propensity to ask for help. Eighty-two undergraduate students from the University of (more)

Chung, Andrew

2006-01-01T23:59:59.000Z

371

Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.  

SciTech Connect

Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

Cohen, Israel Dov; Mengesha, Wondwosen

2011-09-01T23:59:59.000Z

372

Postural threat during walking: effects on energy cost and accompanying gait changes  

Science Journals Connector (OSTI)

Balance control during walking has been shown to involve a metabolic cost in healthy subjects, but it is unclear how this cost changes as a function of postural threat. ... determine the influence of postural thr...

Trienke IJmker; Claudine J Lamoth

2014-04-01T23:59:59.000Z

373

NSS 18.3 Verification of Authorization Basis Documentation 12/8/03 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NSS 18.3 Verification of Authorization Basis Documentation 12/8/03 NSS 18.3 Verification of Authorization Basis Documentation 12/8/03 NSS 18.3 Verification of Authorization Basis Documentation 12/8/03 The objective of this surveillance is for the Facility Representative to verify that the facility's configuration and operations remain consistent with the authorization basis. As defined in DOE Notice 411.1-1B, the authorization basis consists of those aspects of the facility design basis and operational requirements relied upon by DOE to authorize operation. These aspects are considered to be important to the safety of the facility operations. The authorization basis is described in documents such as the facility safety analysis report and other documented safety analyses; hazard classification documents, and the Technical Safety Requirements,

374

Universal basis sets for electronic structure calculations  

Science Journals Connector (OSTI)

The concept of a universal basis set for electronic structure calculations is explored by presenting energy results obtained when basis sets are transferred from one atom to another. The calculations are performed using the diagrammatic techniques of many?body perturbation theory. A single universal basis set is shown to give uniformly accurate descriptions of the matrix HartreeFock and correlation energies of the He Be and Ne atoms.

David M. Silver; Stephen Wilson

1978-01-01T23:59:59.000Z

375

Exergy Loss: A Basis for Energy Taxing  

Science Journals Connector (OSTI)

The paper introduces exergy loss or entropy added as a basis for energy taxing. Exergy loss will be shown to account objectively...

Gerard Hirs

1993-01-01T23:59:59.000Z

376

Lawrence Livermore National Laborotory Safety Basis Assessment...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in the WSF safety basis. The comprehensive review used a criteria and review approach document to guide the reviewers and examined documentation of controls and their...

377

Gaussian radial basis function neural network controller of a synchronous reluctance motor in electric motorcycle applications  

Science Journals Connector (OSTI)

In this article, a sliding mode control (SMC) design based on a Gaussian radial basis function neural network (GRBFNN) is proposed for the synchronous reluctance motor (SynRM) system in electrical motorcycle a...

Chien-An Chen; Huann-Keng Chiang; Wen-Bin Lin

2010-12-01T23:59:59.000Z

378

Property:ExplorationBasis | Open Energy Information  

Open Energy Info (EERE)

ExplorationBasis ExplorationBasis Jump to: navigation, search Property Name ExplorationBasis Property Type Text Description Exploration Basis Why was exploration work conducted in this area (e.g., USGS report of a geothermal resource, hot springs with geothemmetry indicating electrical generation capacity, etc.) Subproperties This property has the following 1 subproperty: M Mercury Vapor At Salt Wells Area (Henkle, Et Al., 2005) Pages using the property "ExplorationBasis" Showing 25 pages using this property. (previous 25) (next 25) 2 2-M Probe Survey At Coso Geothermal Area (1977) + Compare directly shallow temperature results with standard geothermal exploration techniques. 2-M Probe Survey At Coso Geothermal Area (1979) + Correct previously analyzed 2-m probe data

379

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

380

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is  

E-Print Network (OSTI)

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

Rusu, Adrian

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Project of the underwater system for chemical threat detection  

E-Print Network (OSTI)

In this article we describe a novel method for the detection of explosives and other hazardous substances in the marine environment using neutron activation. Unlike the other considered methods based on this technique we propose to use guides forneutron and gamma quanta which speeds up and simplifies identification. Moreover, it may provide a determination of the density distribution of a dangerous substance. First preliminary results of Monte Carlo simulations dedicated for design of a device exploiting this method are also presented.

Silarski, M; Moskal, P; Smolis, M; Tadeja, S

2015-01-01T23:59:59.000Z

382

Surveillance Guide - NSS 18.3 Verification of Authorization Basis Documentation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VERIFICATION OF AUTHORIZATION BASIS DOCUMENTATION VERIFICATION OF AUTHORIZATION BASIS DOCUMENTATION 1.0 Objective The objective of this surveillance is for the Facility Representative to verify that the facility's configuration and operations remain consistent with the authorization basis. As defined in DOE Notice 411.1-1B, the authorization basis consists of those aspects of the facility design basis and operational requirements relied upon by DOE to authorize operation. These aspects are considered to be important to the safety of the facility operations. The authorization basis is described in documents such as the facility safety analysis report and other documented safety analyses; hazard classification documents, and the Technical Safety Requirements, DOE- issued safety evaluation reports, and facility-specific commitments made in

383

Safety Basis Criteria & Review Approach Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety Basis Criteria & Review Approach Documents Safety Basis Criteria & Review Approach Documents Safety Basis Criteria & Review Approach Documents Documents Available for Download CRAD, Safety Basis - Idaho MF-628 Drum Treatment Facility CRAD, Safety Basis - Idaho Accelerated Retrieval Project Phase II CRAD, Safety Basis - Los Alamos National Laboratory TA 55 SST Facility CRAD, Safety Basis - Los Alamos National Laboratory Waste Characterization, Reduction, and Repackaging Facility CRAD, Safety Basis - Oak Ridge National Laboratory High Flux Isotope Reactor CRAD, Safety Basis - Oak Ridge National Laboratory High Flux Isotope Reactor Contractor ORR CRAD, Safety Basis - Oak Ridge National Laboratory TRU ALPHA LLWT Project CRAD, Safety Basis - Y-12 Enriched Uranium Operations Oxide Conversion Facility

384

Basis for UCNI | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Basis for UCNI Basis for UCNI Basis for UCNI What documents contain the legal and policy foundations for the UCNI program? Section 148 of the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.), is the statutory basis for the UCNI program. 10 CFR Part 1017, Identification and Protection of Unclassified Controlled Nuclear Information specifies many detailed policies and requirements concerning the UCNI program. DOE O 471.1B, Identification and Protection of Unclassified Controlled Nuclear Information, specifies additional policies and requirements concerning the Department of Energy (DOE) UCNI program. UCNI General Guideline, GG-5, is a record of decisions made by the Director, OC, as to what general subject areas are UCNI. Note: GG-5 may only be used by the Director, OC, to make determinations as to whether

385

Basis for OUO | Department of Energy  

Office of Environmental Management (EM)

OUO Basis for OUO What documents contain the policy foundation for the OUO program? DOE O 471.3 Admin Chg 1, Identifying and Protecting Official Use Only Information. DOE M 471.3-1...

386

Assessing the integrity of local area network materials accountability systems against insider threats  

SciTech Connect

DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems.

Jones, E.; Sicherman, A.

1996-07-01T23:59:59.000Z

387

Screening Cargo Containers to Remove a Terrorist Threat  

SciTech Connect

Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S.

Hazi, A

2005-09-20T23:59:59.000Z

388

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network (OSTI)

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures Federico Maggi, and to what extent these abuses can impact the end users. With these questions in mind, we first analyzed and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

California at Santa Barbara, University of

389

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network (OSTI)

DRAFT COPY Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures URLs, and to what extent these abuses can impact the end users. With these questions in mind, we first and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

Vigna, Giovanni

390

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and Service Environments  

E-Print Network (OSTI)

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and revenue assurance in future telecommunication network and service environments. 1. Introduction, usually, to obtain property or services from him or her unjustly [1]. The Telecommunications (Fraud) Act

Haddadi, Hamed

391

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats  

E-Print Network (OSTI)

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

Wang, Wenye

392

What You Need to Know about the Threat to Forests in Colorado  

E-Print Network (OSTI)

locations throughout the western U.S., including Colorado. Detecting GM GM traps in a tree9 (leftGypsy Moth What You Need to Know about the Threat to Forests in Colorado Controlling GM Quarantines to become established in Colorado a response plan would be executed by state and federal agencies

393

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions  

E-Print Network (OSTI)

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

Halgamuge, Malka N.

394

Marine biodiversity in the Caribbean UK overseas territories: Perceived threats and constraints to environmental management  

Science Journals Connector (OSTI)

Islands are often considered to be a priority for conservation, because of their relatively high levels of biodiversity and their vulnerability to a range of natural and anthropogenic threats. However, the capacity of islands to conserve and manage biodiversity may depend upon their governance structures. Many island states are affiliated to other countries through an overseas territory status, which may provide them with access to resources and support mechanisms, but which may also influence the capacity for local-scale management of environmental issues. The United Kingdom has 12 island Overseas Territories (UKOTs), most of which support biodiversity of high conservation concern. This study investigates perceptions of current and future threats to marine ecosystems and constraints to environmental protection on the six Caribbean UKOTs, through semi-structured interviews with officials from UK and UKOT government departments and non-governmental organisations. Coastal development, pollution and over-fishing were perceived as threats of most concern for the next decade, but climate change was perceived as by far the greatest future threat to the islands' marine ecosystems. However, a series of common institutional limitations that currently constrain mitigation and conservation efforts were also identified, including insufficient personnel and financial support, a lack of long-term, sustainable projects for persistent environmental problems and inadequate environmental legislation. These findings highlight the need for regional cooperation and capacity-building throughout the Caribbean and a more concerted approach to an UKOT environmental management by the UK and UKOTs' governments.

J. Forster; I.R. Lake; A.R. Watkinson; J.A. Gill

2011-01-01T23:59:59.000Z

395

Recent advances to address European Union Health Security from cross border chemical health threats  

Science Journals Connector (OSTI)

Abstract The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development.

R. Duarte-Davidson; R. Orford; S. Wyke; M. Griffiths; R. Amlt; R. Chilcott

2014-01-01T23:59:59.000Z

396

Reducing the Wildland Fire Threat to Homes: Where and How Much?1  

E-Print Network (OSTI)

Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract Understanding how ignitions occur is critical for effectively mitigating home fire losses during wildland fires, and local agencies that have responsibilities involving homes within and adjacent to wildlands. Agencies

Standiford, Richard B.

397

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

398

Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions  

E-Print Network (OSTI)

population density, and the extinction risk of species. This threat index is positively correlated with all the ecoregions of Africa and its islands Neil D. Burgessa,b, *, Jennifer D'Amico Halesa , Taylor H. Rickettsa I N F O Article history: Received 3 September 2004 Available online 11 October 2005 Keywords: Africa

Vermont, University of

399

Threat-based evaluation for context-aware multimedia surveillance system  

Science Journals Connector (OSTI)

Multimedia surveillance has become commonplace and getting increasingly intelligent in recent years. The technological advances in computer-vision techniques help to detect suspicious movement and identify objects. Meanwhile, as surveillance system is ... Keywords: context-aware, cost, multimedia surveillance, privacy, security, threat evaluation

Yuan Tian; Biao Song; Mznah Al-Rodhaan; Abdullah Al-Dhelaan; Eui-Nam Huh

2014-01-01T23:59:59.000Z

400

INL FCF Basis Review Follow-up  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 Independent Review Report Idaho National Laboratory Fuel Conditioning Facility Safety Basis Review Follow-up PURPOSE The purpose of this follow-up review was to verify how and to what extent Idaho National Laboratory (INL) addressed the Significant Issues that were identified in the April 2010 Independent Oversight report on the INL Fuel Conditioning Facility (FCF) safety basis review, as well as the consideration given to the recommendations that were made. Significant Issues were defined in that report as problems or concerns that affected the validity of the FCF safety basis documentation. The Office of Health, Safety and Security (HSS) fulfilled this objective by reviewing the draft Safety Analysis Report (SAR) for the FCF,

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Basis for OUO | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Classification » Official Use Only Information » Services » Classification » Official Use Only Information » Basis for OUO Basis for OUO What documents contain the policy foundation for the OUO program? DOE O 471.3 Admin Chg 1, Identifying and Protecting Official Use Only Information. DOE M 471.3-1 Admin Chg 1, Manual for Identifying and Protecting Official Use Only Information. Training & Reference Materials Basis for OUO OUO Review Requirement Access to OUO Protection of OUO Questions about Making OUO Determinations - OUO and the FOIA Exemptions How is a Document Containing OUO Marked? Controlled Unclassified Information and E.O. 13556 Resources for OUO Enforcement Guidance Oversight Reporting Security Classification Classification Training Institute Official Use Only Information Unclassified Controlled Nuclear Information (UCNI)

402

TMD PDFs in the Laguerre polynomial basis  

E-Print Network (OSTI)

We suggest the modified matching procedure for TMD PDF to the integrated PDF aimed to increase the amount of perturbative information in the TMD PDF expression. The procedure consists in the selection and usage of the non-minimal operator basis, which restricts the expansion to desired general behavior. The implication of OPE allows to systematic account of the higher order corrections. In the case of TMD PDF we assume the Gaussian behavior, which suggests Laguerre polynomial basis as the best for the convergence of OPE. We present the leading and next-to-leading expression of TMD PDF in this basis. The obtained perturbative expression for the TMD PDF is valid in the wide region of $b_T$ (we estimate this region as $b_T\\lesssim 2-3$ GeV$^{-1}$ depending on $x$).

A. A. Vladimirov

2014-02-13T23:59:59.000Z

403

Earth Mover's Distance Based Local Discriminant Basis  

E-Print Network (OSTI)

Earth Mover's Distance Based Local Discriminant Basis Bradley Marchand and Naoki Saito Abstract in time and frequency. Its goal, given Bradley Marchand Naval Surface Warfare Center, Panama City Division, e-mail: bradley.marchand@navy.mil Naoki Saito Department of Mathematics, University of California

Saito, Naoki

404

CRAD, Facility Safety- Nuclear Facility Safety Basis  

Energy.gov (U.S. Department of Energy (DOE))

A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) that can be used for assessment of a contractor's Nuclear Facility Safety Basis.

405

Coupled-channel continuum eigenchannel basis  

E-Print Network (OSTI)

The goal of this paper is to calculate bound, resonant and scattering states in the coupled-channel formalism without relying on the boundary conditions at large distances. The coupled-channel solution is expanded in eigenchannel bases i.e. in eigenfunctions of diagonal Hamiltonians. Each eigenchannel basis may include discrete and discretized continuum (real or complex energy) single particle states. The coupled-channel solutions are computed through diagonalization in these bases. The method is applied to a few two-channels problems. The exact bound spectrum of the Poeschl-Teller potential is well described by using a basis of real energy continuum states. For deuteron described by Reid potential, the experimental energy and the S and D contents of the wave function are reproduced in the asymptotic limit of the cutoff energy. For the Noro-Taylor potential resonant state energy is well reproduced by using the complex energy Berggren basis. It is found that the expansion of the coupled-channel wave function in these eigenchannel bases require less computational efforts than the use of any other basis. The solutions are stable and converge as the cutoff energy increases.

R. M. Id Betan

2013-11-18T23:59:59.000Z

406

Hanford External Dosimetry Technical Basis Manual PNL-MA-842  

SciTech Connect

The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at Hanford. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with 10 CFR 835, DOELAP, DOE-RL, ORP, PNSO, and Hanford contractor requirements. The dosimetry system is operated by PNNLs Hanford External Dosimetry Program (HEDP) which provides dosimetry services to all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee (HPDAC) which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNLs Electronic Records & Information Capture Architecture (ERICA) database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document.

Rathbone, Bruce A.

2009-08-28T23:59:59.000Z

407

On the physical basis of cosmic time  

E-Print Network (OSTI)

In this manuscript we initiate a systematic examination of the physical basis for the time concept in cosmology. We discuss and defend the idea that the physical basis of the time concept is necessarily related to physical processes which could conceivably take place among the material constituents available in the universe. It is common practice to link the concept of cosmic time with a space-time metric set up to describe the universe at large scales, and then define a cosmic time $t$ as what is measured by a comoving standard clock. We want to examine, however, the physical basis for setting up a comoving reference frame and, in particular, what could be meant by a standard clock. For this purpose we introduce the concept of a `core' of a clock (which, for a standard clock in cosmology, is a scale-setting physical process) and we ask if such a core can--in principle--be found in the available physics contemplated in the various `stages' of the early universe. We find that a first problem arises above the quark-gluon phase transition (which roughly occurs when the cosmological model is extrapolated back to $\\sim 10^{-5}$ seconds) where there might be no bound systems left, and the concept of a physical length scale to a certain extent disappears. A more serious problem appears above the electroweak phase transition believed to occur at $\\sim 10^{-11}$ seconds. At this point the property of mass (almost) disappears and it becomes difficult to identify a physical basis for concepts like length scale, energy scale and temperature -- which are all intimately linked to the concept of time in modern cosmology. This situation suggests that the concept of a time scale in `very early' universe cosmology lacks a physical basis or, at least, that the time scale will have to be based on speculative new physics.

Svend Erik Rugh; Henrik Zinkernagel

2008-05-13T23:59:59.000Z

408

RNEDE: Resilient Network Design Environment  

SciTech Connect

Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

2010-08-01T23:59:59.000Z

409

CRAD, Safety Basis - Oak Ridge National Laboratory TRU ALPHA...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety Basis - Oak Ridge National Laboratory TRU ALPHA LLWT Project CRAD, Safety Basis - Oak Ridge National Laboratory TRU ALPHA LLWT Project November 2003 A section of Appendix C...

410

Unextendible Product Basis for Fermionic Systems  

E-Print Network (OSTI)

We discuss the concept of unextendible product basis (UPB) and generalized UPB for fermionic systems, using Slater determinants as an analogue of product states, in the antisymmetric subspace $\\wedge^ N \\bC^M$. We construct an explicit example of generalized fermionic unextendible product basis (FUPB) of minimum cardinality $N(M-N)+1$ for any $N\\ge2,M\\ge4$. We also show that any bipartite antisymmetric space $\\wedge^ 2 \\bC^M$ of codimension two is spanned by Slater determinants, and the spaces of higher codimension may not be spanned by Slater determinants. Furthermore, we construct an example of complex FUPB of $N=2,M=4$ with minimum cardinality $5$. In contrast, we show that a real FUPB does not exist for $N=2,M=4$ . Finally we provide a systematic construction for FUPBs of higher dimensions using FUPBs and UPBs of lower dimensions.

Jianxin Chen; Lin Chen; Bei Zeng

2013-12-16T23:59:59.000Z

411

Chopped random-basis quantum optimization  

E-Print Network (OSTI)

In this work we describe in detail the "Chopped RAndom Basis" (CRAB) optimal control technique recently introduced to optimize t-DMRG simulations [arXiv:1003.3750]. Here we study the efficiency of this control technique in optimizing different quantum processes and we show that in the considered cases we obtain results equivalent to those obtained via different optimal control methods while using less resources. We propose the CRAB optimization as a general and versatile optimal control technique.

Tommaso Caneva; Tommaso Calarco; Simone Montangero

2011-08-22T23:59:59.000Z

412

Perturbative Effective Theory in an Oscillator Basis?  

Science Journals Connector (OSTI)

The effective interaction problem in nuclear physics is believed to be highly nonperturbative, requiring extended high-momentum spaces for accurate solution. We trace this to difficulties that arise at both short and long distances when the included space is defined in terms of a basis of harmonic oscillator Slater determinants. We show, in the simplest case of the deuteron, that both difficulties can be circumvented, yielding highly perturbative results in the potential even for modest (?4??) included spaces.

W. C. Haxton and T. Luu

2002-10-11T23:59:59.000Z

413

Structural Basis for Activation of Cholera Toxin  

NLE Websites -- All DOE Office Websites (Extended Search)

Structural Basis for Activation Structural Basis for Activation of Cholera Toxin Structural Basis for Activation of Cholera Toxin Print Wednesday, 30 November 2005 00:00 Cholera is a serious disease that claims thousands of victims each year in third-world, war-torn, and disaster-stricken nations. The culprit is the bacterium Vibrio cholerae, which can be ingested through contaminated food or water and colonizes the mucous membrane of the human small intestine. There, it secretes cholera toxin (CT), a protein whose A1 subunit (CTA1) triggers a series of events culminating in the massive efflux of electrolytes and water into the intestinal cavity, causing the watery diarrhea characteristic of cholera that can lead to severe dehydration and death. Crystal structures of the CTA1 subunit in complex with its activator molecule (ARF6) reveal that binding of the ARF6 "switch" elicits dramatic changes in CTA1 loop regions, exposing the toxin's active site. The extensive CTA1-ARF6 interface mimics recognition of ARF6's normal cellular protein partners, which suggests that the toxin has evolved to exploit the molecular switch's promiscuous binding properties.

414

On the physical basis of cosmic time  

E-Print Network (OSTI)

In this manuscript we initiate a systematic examination of the physical basis for the time concept in cosmology. We discuss and defend the idea that the physical basis of the time concept is necessarily related to physical processes which could conceivably take place among the material constituents available in the universe. It is common practice to link the concept of cosmic time with a space-time metric set up to describe the universe at large scales, and then define a cosmic time $t$ as what is measured by a comoving standard clock. We want to examine, however, the physical basis for setting up a comoving reference frame and, in particular, what could be meant by a standard clock. For this purpose we introduce the concept of a `core' of a clock (which, for a standard clock in cosmology, is a scale-setting physical process) and we ask if such a core can--in principle--be found in the available physics contemplated in the various `stages' of the early universe. We find that a first problem arises above the q...

Rugh, Svend Erik

2008-01-01T23:59:59.000Z

415

NNSA's Global Threat Reduction Initiative Removes More Than One Ton of  

NLE Websites -- All DOE Office Websites (Extended Search)

Removes More Than One Ton of Removes More Than One Ton of Food | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Removes More ... NNSA's Global Threat Reduction Initiative Removes More Than One Ton of Food Posted By Office of Public Affairs Contributing to DOE/NNSA's efforts to support the Office of Personnel

416

Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5792 5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Threat Analysis Framework 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

417

Hydrogen economy in China: Strengthsweaknessesopportunitiesthreats analysis and strategies prioritization  

Science Journals Connector (OSTI)

Abstract The objective of this paper is to analyze the internal and external environment of hydrogen economy in China using strengthsweaknessesopportunitiesthreats (SWOT) analytical method, and then to prioritize the strategies for promoting the development of hydrogen economy in China. After the key strengths, weaknesses, opportunities and threats of the hydrogen economy in China were identified and nine effective strategies were proposed, a multi-criteria decision-making method by integrating goal programming and fuzzy theory has been developed for prioritizing these strategies, which can help the stakeholders/decision-makers to implement these strategies appropriately, The proposed method is not limited to China, and it is a generic method that can also be used to study the hydrogen economy of other regions.

Jingzheng Ren; Suzhao Gao; Shiyu Tan; Lichun Dong

2015-01-01T23:59:59.000Z

418

Review of July 2013 Nuclear Security Insider Threat Exercise November 2013  

SciTech Connect

This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

2013-11-01T23:59:59.000Z

419

Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking  

E-Print Network (OSTI)

Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

Vahlenkamp, Matthias Whlisch Thomas C Schmidt Markus

2012-01-01T23:59:59.000Z

420

Basis for seismic provisions of DOE-STD-1020  

SciTech Connect

DOE-STD-1020 provides for a graded approach for the seismic design and evaluation of DOE structures, systems, and components (SSC). Each SSC is assigned to a Performance Category (PC) with a performance description and an approximate annual probability of seismic-induced unacceptable performance, P{sub F}. The seismic annual probability performance goals for PC 1 through 4 for which specific seismic design and evaluation criteria are presented. DOE-STD-1020 also provides a seismic design and evaluation procedure applicable to achieve any seismic performance goal annual probability of unacceptable performance specified by the user. The desired seismic performance goal is achieved by defining the seismic hazard in terms of a site-specified design/evaluation response spectrum (called herein, the Design/Evaluation Basis Earthquake, DBE). Probabilistic seismic hazard estimates are used to establish the DBE. The resulting seismic hazard curves define the amplitude of the ground motion as a function of the annual probability of exceedance P{sub H} of the specified seismic hazard. Once the DBE is defined, the SSC is designed or evaluated for this DBE using adequately conservative deterministic acceptance criteria. To be adequately conservative, the acceptance criteria must introduce an additional reduction in the risk of unacceptable performance below the annual risk of exceeding the DBE. The ratio of the seismic hazard exceedance probability P{sub H} to the performance goal probability P{sub F} is defined herein as the risk reduction ratio. The required degree of conservatism in the deterministic acceptance criteria is a function of the specified risk reduction ratio.

Kennedy, R.C. [RPK Structural Mechanics Consulting, Yorba Linda, CA (United States); Short, S.A. [EQE International, Inc., San Francisco, CA (United States)

1994-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Anti-Chinese Sentiment in Russia: Threats of "Chinese Invasion" or Fears of Russian Xenophobia  

E-Print Network (OSTI)

Ruoxi Du Laird Essay Competition 2012 Anti-Chinese Sentiment in Russia: Threats of Chinese Invasion or Fears of Russian Xenophobia Try googling the keywords Russian Far East and China (Dalnii vostok and Kitai), and you... East (Express Gazeta). Results from English sources are similar, where typical titles include China Looms over the Russian Far East (The Diplomat) and Russias Far East Turning Chinese (ABC News). Indeed, Russia has all kinds of reasons...

Du, Ruoxi

2014-08-25T23:59:59.000Z

422

Attitudes and perceptions of urban households in sub-Saharan Africa on water sources, threats and sustainability: A study in Bondo, Kenya  

E-Print Network (OSTI)

, threats and sustainability: A study in Bondo, Kenya Daniel M Nzengya School of Sustainability, Arizona to clean water in Bondo township. 2. To describe what urban residents perceive as threats to households, during June 2011 to examine how attitudes and perceptions of urban residents on water sources, threats

Hall, Sharon J.

423

Abstract--Grazing incidence metal mirrors in laser-driven IFE power plants are subject to a variety of threats that result  

E-Print Network (OSTI)

of threats that result in damages leading to increased laser absorption, beam quality degradation and reduced of threats, including prompt neutron and gamma fluxes, x-ray and ionic emissions, and contamination from in the ARIES study. II. MIRROR DEFECTS AND ANALYSIS APPROACHES Depending on the type of threat, the mirror can

Tillack, Mark

424

The City University of New York Medical Withdrawal and Re-entry Policy and Procedures Governing Student Behavior that Presents a Direct Threat of  

E-Print Network (OSTI)

Student Behavior that Presents a Direct Threat of Harm to Self or Others or Substantially Disrupts of a medical condition, engage in behavior that presents a direct threat of harm to themselves or to others 911 or taking other immediate action in case of imminent threat to life or limb. In addition to taking

Qiu, Weigang

425

34.07.99.M0.01 Prevention of Workplace Violence, Threats of Page 1 of 4 Violence, and Response to Trauma  

E-Print Network (OSTI)

34.07.99.M0.01 Prevention of Workplace Violence, Threats of Page 1 of 4 Violence, and Response to Trauma STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0.01 Prevention of Workplace Violence, Threats&M administration will not tolerate violence or threats of violence. To foster a safe and supportive work

426

An Overview of the New USGS Environmental Health Mission Area The health of aquatic and terrestrial organisms and people is under continuing threats from  

E-Print Network (OSTI)

and terrestrial organisms and people is under continuing threats from pathogenic diseases and exposure to a diverse array of chemical contaminants. The emergence of new health threats and changing patterns of established threats are affected by land use changes, habitat degradation, climatic trends, air and water

Fleskes, Joe

427

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

428

Terror Threats Life Cycles Controlling Using Crisis Management during Environmental Metamorphoses  

Science Journals Connector (OSTI)

Abstract The appearance of new terror threats is a reality. They manifest themselves as perils which can be replicated as the new use cases on terrorist attack events in surprising sceneries and arenas. In this paper, the behaviour of the relevant entities is blazonry explained, modelled, analysed, evaluated and simulated using the DYVELOP method within the pertinent threat/peril life cycles. They are modelled on looping terrorist attack scenes in pertinent environments and their metamorphoses, operating at real threat/peril scenes. This article helps to clarify and identify the roles and processes of these scene entities, domains, actors, participants, interfaces and users. The DYVELOP method is a fundamental instrument for the objective analysis, understanding, evaluation, interpretation, development and computerized modelling & simulation of emergency/ societal security awareness, performance, continual planning, management, training and intervention. Base upon qualitative research it deduces within a process the necessity for operational cooperation among all participants, collaborating to fulfil the requirements of crisis management stakeholders, controlling the crisis scene in many environments using process systems and use cases.

David Kral; Jiri F. Urbanek

2014-01-01T23:59:59.000Z

429

Sensor Data Processing for Tracking Underwater Threats Using Terascale Optical Core Devices  

SciTech Connect

A critical aspect of littoral surveillance (including port protection) involves the localization and tracking of underwater threats such as manned or unmanned autonomous underwater vehicles. In this article, we present a methodology for locating underwater threat sources from uncertain sensor network data, and illustrate the threat tracking aspects using active sonars in a matched filter framework. The novelty of the latter paradigm lies in its implementation on a tera-scale optical core processor, EnLight , recently introduced by Lenslet Laboratories. This processor is optimized for array operations, which it performs in a fixed point arithmetic architecture at tera-scale throughput. Using the EnLight 64 prototype processor, our results (i) illustrate the ability to reach a robust tracking accuracy, and (ii) demonstrate that a considerable speed-up (a factor of over 13,000) can be achieved when compared to an Intel XeonTM processor in the computation of sets of 80K-sample complex Fourier transforms that are associated with our matched filter techniques.

Barhen, Jacob [ORNL; Imam, Neena [ORNL

2009-01-01T23:59:59.000Z

430

Marketing Texas Wool on a Quality Basis.  

E-Print Network (OSTI)

length of staple and clean content in scouring tests made on 49 bags of graded and ungraded wool. Fine Staple yielded 2 percent more clean wool than the average of the lot, while Fine French Combing, Fine Clothing and "orig- inal bag" yielded 2.3, 7... properties of wool are necessary to determine quality. Such infor- mation is essential to efficient production, mar- keting and utilization. The feasibility of grad- ing wool at the shearing pens and selling it on the basis of grade in the local market...

Wooten, Alvin B.; Gabbard, L. P.; Davis, Stanley P.

1955-01-01T23:59:59.000Z

431

Technical basis for internal dosimetry at Hanford  

SciTech Connect

The Hanford Internal Dosimetry Program, administered by Pacific Northwest Laboratory for the US Department of Energy, provides routine bioassay monitoring for employees who are potentially exposed to radionuclides in the workplace. This report presents the technical basis for routine bioassay monitoring and the assessment of internal dose at Hanford. The radionuclides of concern include tritium, corrosion products ({sup 58}Co, {sup 60}Co, {sup 54}Mn, and {sup 59}Fe), strontium, cesium, iodine, europium, uranium, plutonium, and americium,. Sections on each of these radionuclides discuss the sources and characteristics; dosimetry; bioassay measurements and monitoring; dose measurement, assessment, and mitigation and bioassay follow-up treatment. 78 refs., 35 figs., 115 tabs.

Sula, M.J.; Carbaugh, E.H.; Bihl, D.E.

1991-07-01T23:59:59.000Z

432

CRAD, Review of Safety Basis Development - January 31, 2013 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 31, 2013 January 31, 2013 CRAD, Review of Safety Basis Development - January 31, 2013 January 31, 2013 Review of Safety Basis Development for the Savannah River Site Salt Waste Processing Facility - Inspection Criteria, Approach, and Lines of Inquiry (HSS CRAD 45-57, Rev. 0) The review will consider selected aspects of the development of safety basis for the Salt Waste Processing Facility (SWPF) to assess the extent to which safety is integrated into the design of the SWPF in accordance with DOE directives; in particular, DOE Order 420.1 B, DOE-STD-1189, and DOE-STD3009. The review will focus on a few selected safety systems, such as the Process Vessel Ventilation System (PVVS) and the Air Dilution System (ADS), and associated supporting/interfacing systems. CRAD, Review of Safety Basis Development - January 31, 2013

433

What are the security threats to further development of nuclear power plants in the U.S.? .  

E-Print Network (OSTI)

??What are the security threats to further development of nuclear power plants in the U.S.? The U.S. stands alone today in terms of the vast (more)

Nottestad, Tammie L.

2010-01-01T23:59:59.000Z

434

GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according  

E-Print Network (OSTI)

GLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used listening agent. A favored method of stealing passwords. Malware · a general term and malware in order to infiltrate, compromise, exploit and disable any device

Brinkmann, Peter

435

To Catch a Thief: Practical Methods of Using Social Networks as a Mechanism for Identifying Corporate Insider Threats  

Science Journals Connector (OSTI)

Is it possible to utilize psychological profiling through social network analysis to identify potential corporate insider threats? This research will aim to provide corporate ... capable of recognizing the signs ...

Martyn Styles

2014-01-01T23:59:59.000Z

436

Structural Basis for Activation of Cholera Toxin  

NLE Websites -- All DOE Office Websites (Extended Search)

Structural Basis for Activation of Cholera Toxin Print Structural Basis for Activation of Cholera Toxin Print Cholera is a serious disease that claims thousands of victims each year in third-world, war-torn, and disaster-stricken nations. The culprit is the bacterium Vibrio cholerae, which can be ingested through contaminated food or water and colonizes the mucous membrane of the human small intestine. There, it secretes cholera toxin (CT), a protein whose A1 subunit (CTA1) triggers a series of events culminating in the massive efflux of electrolytes and water into the intestinal cavity, causing the watery diarrhea characteristic of cholera that can lead to severe dehydration and death. Crystal structures of the CTA1 subunit in complex with its activator molecule (ARF6) reveal that binding of the ARF6 "switch" elicits dramatic changes in CTA1 loop regions, exposing the toxin's active site. The extensive CTA1-ARF6 interface mimics recognition of ARF6's normal cellular protein partners, which suggests that the toxin has evolved to exploit the molecular switch's promiscuous binding properties.

437

Structural Basis for Activation of Cholera Toxin  

NLE Websites -- All DOE Office Websites (Extended Search)

Structural Basis for Activation of Cholera Toxin Print Structural Basis for Activation of Cholera Toxin Print Cholera is a serious disease that claims thousands of victims each year in third-world, war-torn, and disaster-stricken nations. The culprit is the bacterium Vibrio cholerae, which can be ingested through contaminated food or water and colonizes the mucous membrane of the human small intestine. There, it secretes cholera toxin (CT), a protein whose A1 subunit (CTA1) triggers a series of events culminating in the massive efflux of electrolytes and water into the intestinal cavity, causing the watery diarrhea characteristic of cholera that can lead to severe dehydration and death. Crystal structures of the CTA1 subunit in complex with its activator molecule (ARF6) reveal that binding of the ARF6 "switch" elicits dramatic changes in CTA1 loop regions, exposing the toxin's active site. The extensive CTA1-ARF6 interface mimics recognition of ARF6's normal cellular protein partners, which suggests that the toxin has evolved to exploit the molecular switch's promiscuous binding properties.

438

Technical Basis for PNNL Beryllium Inventory  

SciTech Connect

The Department of Energy (DOE) issued Title 10 of the Code of Federal Regulations Part 850, Chronic Beryllium Disease Prevention Program (the Beryllium Rule) in 1999 and required full compliance by no later than January 7, 2002. The Beryllium Rule requires the development of a baseline beryllium inventory of the locations of beryllium operations and other locations of potential beryllium contamination at DOE facilities. The baseline beryllium inventory is also required to identify workers exposed or potentially exposed to beryllium at those locations. Prior to DOE issuing 10 CFR 850, Pacific Northwest Nuclear Laboratory (PNNL) had documented the beryllium characterization and worker exposure potential for multiple facilities in compliance with DOEs 1997 Notice 440.1, Interim Chronic Beryllium Disease. After DOEs issuance of 10 CFR 850, PNNL developed an implementation plan to be compliant by 2002. In 2014, an internal self-assessment (ITS #E-00748) of PNNLs Chronic Beryllium Disease Prevention Program (CBDPP) identified several deficiencies. One deficiency is that the technical basis for establishing the baseline beryllium inventory when the Beryllium Rule was implemented was either not documented or not retrievable. In addition, the beryllium inventory itself had not been adequately documented and maintained since PNNL established its own CBDPP, separate from Hanford Sites program. This document reconstructs PNNLs baseline beryllium inventory as it would have existed when it achieved compliance with the Beryllium Rule in 2001 and provides the technical basis for the baseline beryllium inventory.

Johnson, Michelle Lynn

2014-07-09T23:59:59.000Z

439

Structural Basis for Activation of Cholera Toxin  

NLE Websites -- All DOE Office Websites (Extended Search)

Structural Basis for Activation of Cholera Toxin Print Structural Basis for Activation of Cholera Toxin Print Cholera is a serious disease that claims thousands of victims each year in third-world, war-torn, and disaster-stricken nations. The culprit is the bacterium Vibrio cholerae, which can be ingested through contaminated food or water and colonizes the mucous membrane of the human small intestine. There, it secretes cholera toxin (CT), a protein whose A1 subunit (CTA1) triggers a series of events culminating in the massive efflux of electrolytes and water into the intestinal cavity, causing the watery diarrhea characteristic of cholera that can lead to severe dehydration and death. Crystal structures of the CTA1 subunit in complex with its activator molecule (ARF6) reveal that binding of the ARF6 "switch" elicits dramatic changes in CTA1 loop regions, exposing the toxin's active site. The extensive CTA1-ARF6 interface mimics recognition of ARF6's normal cellular protein partners, which suggests that the toxin has evolved to exploit the molecular switch's promiscuous binding properties.

440

Theoretical Basis for the EDA Concept  

Science Journals Connector (OSTI)

Efficient Data Analysis (EDA) was designed specifically to address quality control (QC) decisions with respect to the CI-measured APSD from an OIP. The general goal of QC testing is ... this testing is intended t...

Terrence P. Tougas; Jolyon P. Mitchell

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Hanford External Dosimetry Technical Basis Manual PNL-MA-842  

SciTech Connect

The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at the U.S. Department of Energy (DOE) Hanford site. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with requirements of 10 CFR 835, the DOE Laboratory Accreditation Program, the DOE Richland Operations Office, DOE Office of River Protection, DOE Pacific Northwest Office of Science, and Hanfords DOE contractors. The dosimetry system is operated by the Pacific Northwest National Laboratory (PNNL) Hanford External Dosimetry Program which provides dosimetry services to PNNL and all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since its inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNLs Electronic Records & Information Capture Architecture database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving significant changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Maintenance and distribution of controlled hard copies of the manual by PNNL was discontinued beginning with Revision 0.2.

Rathbone, Bruce A.

2011-04-04T23:59:59.000Z

442

Hanford External Dosimetry Technical Basis Manual PNL-MA-842  

SciTech Connect

The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at the U.S. Department of Energy (DOE) Hanford site. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with requirements of 10 CFR 835, the DOE Laboratory Accreditation Program, the DOE Richland Operations Office, DOE Office of River Protection, DOE Pacific Northwest Office of Science, and Hanfords DOE contractors. The dosimetry system is operated by the Pacific Northwest National Laboratory (PNNL) Hanford External Dosimetry Program which provides dosimetry services to PNNL and all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since its inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. The first revision to be released through PNNLs Electronic Records & Information Capture Architecture database was designated Revision 0. Revision numbers that are whole numbers reflect major revisions typically involving significant changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Maintenance and distribution of controlled hard copies of the manual by PNNL was discontinued beginning with Revision 0.2.

Rathbone, Bruce A.

2010-04-01T23:59:59.000Z

443

Radioactive Waste Management BasisSept 2001  

SciTech Connect

This Radioactive Waste Management Basis (RWMB) documents radioactive waste management practices adopted at Lawrence Livermore National Laboratory (LLNL) pursuant to Department of Energy (DOE) Order 435.1, Radioactive Waste Management. The purpose of this RWMB is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

Goodwin, S S

2011-08-31T23:59:59.000Z

444

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a dirty bomb. In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRIs Russia Orphan Source Recovery Project, managed at the Nevada National Security Sites North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company Isotope has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

445

Radioactive Threat Detection with Scattering Physics: A Model-Based Application  

SciTech Connect

The detection of radioactive contraband is a critical problem in maintaining national security for any country. Emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. The development of a model-based sequential Bayesian processor that captures both the underlying transport physics including scattering offers a physics-based approach to attack this challenging problem. It is shown that this processor can be used to develop an effective detection technique.

Candy, J V; Chambers, D H; Breitfeller, E F; Guidry, B L; Verbeke, J M; Axelrod, M A; Sale, K E; Meyer, A M

2010-01-21T23:59:59.000Z

446

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect

The U.S. Department of Energys National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

447

INTERNATIONAL THERMONUCLEAR EXPERIMENTAL REACTOR TECHNICAL BASIS  

E-Print Network (OSTI)

Analysis (FDR)1 (the 1998 ITER design), supported by a body of scientific and technological data which both - to demonstrate the scientific and technological feasibility of fusion energy for peaceful purposes - and complied and Thermal Shields II.4 Fuel Cycle II.5 Water Cooling System II.6 Plasma Diagnostic System II.7 Heating

448

Hanford External Dosimetry Technical Basis Manual PNL-MA-842  

SciTech Connect

The Hanford External Dosimetry Technical Basis Manual PNL-MA-842 documents the design and implementation of the external dosimetry system used at Hanford. The manual describes the dosimeter design, processing protocols, dose calculation methodology, radiation fields encountered, dosimeter response characteristics, limitations of dosimeter design under field conditions, and makes recommendations for effective use of the dosimeters in the field. The manual describes the technical basis for the dosimetry system in a manner intended to help ensure defensibility of the dose of record at Hanford and to demonstrate compliance with 10 CFR 835, DOELAP, DOE-RL, ORP, PNSO, and Hanford contractor requirements. The dosimetry system is operated by PNNLs Hanford External Dosimetry Program (HEDP) which provides dosimetry services to all Hanford contractors. The primary users of this manual are DOE and DOE contractors at Hanford using the dosimetry services of PNNL. Development and maintenance of this manual is funded directly by DOE and DOE contractors. Its contents have been reviewed and approved by DOE and DOE contractors at Hanford through the Hanford Personnel Dosimetry Advisory Committee (HPDAC) which is chartered and chaired by DOE-RL and serves as means of coordinating dosimetry practices across contractors at Hanford. This manual was established in 1996. Since inception, it has been revised many times and maintained by PNNL as a controlled document with controlled distribution. Rev. 0 marks the first revision to be released through PNNLs Electronic Records & Information Capture Architecture (ERICA) database. Revision numbers that are whole numbers reflect major revisions typically involving changes to all chapters in the document. Revision numbers that include a decimal fraction reflect minor revisions, usually restricted to selected chapters or selected pages in the document. Revision Log: Rev. 0 (2/25/2005) Major revision and expansion. Rev. 0.1 (3/12/2007) Minor revision. Updated Chapters 5, 6 and 9 to reflect change in default ring calibration factor used in HEDP dose calculation software. Factor changed from 1.5 to 2.0 beginning January 1, 2007. Pages on which changes were made are as follows: 5.23, 5.69, 5.78, 5.80, 5.82, 6.3, 6.5, 6.29, 9.2.

Rathbone, Bruce A.

2007-03-12T23:59:59.000Z

449

Nonlinear adaptive control using radial basis function approximants  

E-Print Network (OSTI)

The purpose of this research is to present an adaptive control strategy using the radial basis function approximation method. Surface approximation methods using radial basis function approximants will first be discussed. The Hamiltonian dynamical...

Petersen, Jerry Lee

1993-01-01T23:59:59.000Z

450

CRAD, Review of Safety Basis Development - May 6, 2013 | Department...  

Office of Environmental Management (EM)

May 6, 2013 CRAD, Review of Safety Basis Development - May 6, 2013 May 6, 2013 Review of Safety Basis Development for the Los Alamos National Laboratory Transuranic Waste Facility...

451

Authorization basis status report (miscellaneous TWRS facilities, tanks and components)  

SciTech Connect

This report presents the results of a systematic evaluation conducted to identify miscellaneous TWRS facilities, tanks and components with potential needed authorization basis upgrades. It provides the Authorization Basis upgrade plan for those miscellaneous TWRS facilities, tanks and components identified.

Stickney, R.G.

1998-04-29T23:59:59.000Z

452

Scientific American: Threats of War, Chances for Peace http://www.sciam.com/print_version.cfm?articleID=C7412A92-E7F2-... 1 of 2 4/24/2007 11:34 AM  

E-Print Network (OSTI)

Scientific American: Threats of War, Chances for Peace http://www.sciam.com/print_version.cfm?articleID=C7412A92-E7F2-... 1 of 2 4/24/2007 11:34 AM February 18, 2007 Threats of War, Chances for Peace threats to sustainable development, the biggest threat to future well-being remains the specter of war

453

Climate Change 2001: The Scientific Basis  

Office of Scientific and Technical Information (OSTI)

Climate Change 2001: Climate Change 2001: Working Group I: The Scientific Basis Get Javascript Other reports in this collection 4. Atmospheric Chemistry and Greenhouse Gases Contents Executive Summary 4.1 Introduction 4.1.1 Sources of Greenhouse Gases 4.1.2 Atmospheric Chemistry and Feedbacks 4.1.3 Trace Gas Budgets and Trends 4.1.4 Atmospheric Lifetimes and Time-Scales 4.2 Trace Gases: Current Observations, Trends and Budgets 4.2.1 Non-CO2 Kyoto Gases 4.2.1.1 Methane (CH4) 4.2.1.2 Nitrous oxide (N2O) 4.2.1.3 Hydrofluorocarbons (HFCs) 4.2.1.4 Perfluorocarbons (PFCs) and sulphur hexafluoride (SF6) 4.2.2 Montreal Protocol Gases and Stratospheric Ozone (O3) 4.2.3 Reactive Gases 4.2.3.1 Carbon monoxide (CO) and hydrogen (H2) 4.2.3.2 Volatile organic compounds (VOC) 4.2.3.3 Nitrogen oxides (NOx)

454

Compton and Jansen "A philosophical basis for knowledge acquisition" 1/17 A philosophical basis for knowledge acquisition  

E-Print Network (OSTI)

Compton and Jansen "A philosophical basis for knowledge acquisition" 1/17 A philosophical basis. Compton and R. Jansen Garvan Institute of Medical Research, St. Vincent's Hospital Sydney 2010, Australia better solutions to be developed. #12;Compton and Jansen "A philosophical basis for knowledge acquisition

Compton, Paul

455

Audit Report: IG-0749 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Energy uses the "Design Basis Threat" (DBT) process to guide and manage its safeguards and security program throughout the complex. The DBT identifies the most credible...

456

Basis for Identification of Disposal Options for R and D for Spent Nuclear  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Basis for Identification of Disposal Options for R and D for Spent Basis for Identification of Disposal Options for R and D for Spent Nuclear Fuel and High-Level Waste Basis for Identification of Disposal Options for R and D for Spent Nuclear Fuel and High-Level Waste The Used Fuel Disposition campaign (UFD) is selecting a set of geologic media for further study that spans a suite of behavior characteristics that impose a broad range of potential conditions on the design of the repository, the engineered barrier, and the waste. Salt, clay/shale, and granitic rocks represent a reasonable cross-section of behavior. Granitic rocks are also the primary basement rock to consider for deep borehole disposal. UFD is developing generic system analysis capability and general experimental data related to mined geologic disposal in the three

457

News Briefs: The U.S. chemical industry's Responsible Care program "has not encouraged pollution prevention or greater public access to information about toxic threats,"  

Science Journals Connector (OSTI)

News Briefs: The U.S. chemical industry's Responsible Care program "has not encouraged pollution prevention or greater public access to information about toxic threats," ...

2011-06-08T23:59:59.000Z

458

Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats  

SciTech Connect

In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee's behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. To test the model's agreement with human resources and management professionals, we conducted an experiment with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.; Hohimer, Ryan E.

2012-01-04T23:59:59.000Z

459

Combining Radiography and Passive Measurements for Radiological Threat Detection in Cargo  

SciTech Connect

Abstract Radiography is widely understood to provide information complimentary to passive detection: while not directly sensitive to radiological materials, radiography can reveal highly shielded regions which may mask a passive radiological signal. We present a method for combining radiographic and passive data which uses the radiograph to provide an estimate of scatter and attenuation for possible sources. This approach allows quantitative use of radiographic images without relying on image interpretation, and results in a probabilistic description of likely source locations and strengths. We present first results for this method for a simple modeled test case of a cargo container driving through a PVT portal. With this inversion approach, we address criteria for an integrated passive and radiographic screening system and how detection of SNM threats might be improved in such a system.

Miller, Erin A.; White, Timothy A.; Jarman, Kenneth D.; Kouzes, Richard T.; Kulisek, Jonathan A.; Robinson, Sean M.; Scherrer, Charles; Wittman, Richard S.

2012-12-01T23:59:59.000Z

460

Nuclear threat on the Korean peninsula: The present and the future. Final report  

SciTech Connect

Forty years after they were divided by the Cold War, South and North Korea are closer to reunification than ever before. However, North Korea's nuclear weapons program might cause South Koreans to be much less sure about reunification. Today the Cold War is over, but the Korean peninsula is still divided into two Koreas despite the new era of reconciliation. Since December 1991 when a non-aggression pact was signed barring nuclear weapons, North Korea has pursued its nuclear weapon development. In March 1993, North Korea declared its intention to withdraw from the Nuclear Non-Proliferation Treaty, and has been refusing a full inspection of its nuclear program. North Korea's nuclear issue is an international issue today. This paper discusses 'what threat we have today' and 'what should be done in the future.'.

Kang, S.

1994-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Propane Market Outlook Assessment of Key Market Trends, Threats, and Opportunities Facing  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

0 0 Propane Market Outlook Assessment of Key Market Trends, Threats, and Opportunities Facing the Propane Industry Through 2020 P r e s e n T e d B y : Declining Sales in the Recent Past and Near-Term Future After peaking in 2003, nationwide propane consumption fell by more than 10 percent through 2006. Although propane demand rebounded somewhat in 2007 and 2008 due to colder weather, propane demand appears to have declined again in 2009. The collapse of the new housing market, combined with decreases in fuel use per customer resulting from efficiency upgrades in homes and equipment, resulted in a decline in residential propane sales. The recession also reduced demand in the industrial and commercial sectors. Colder weather in the last half of 2009 and in January

462

Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.  

SciTech Connect

The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

Boslough, Mark B.; Crawford, David A.

2007-12-01T23:59:59.000Z

463

Regulatory basis for the Waste Isolation Pilot Plant performance assessment  

SciTech Connect

The Waste Isolation Pilot Plant (WIPP) is the first operational repository designed for the safe disposal of transuranic (TRU) radioactive waste from the defense programs of the US Department of Energy (DOE). The US Environmental Protection Agency (EPA) is responsible for certifications and regulation of the WIPP facility for the radioactive components of the waste. The EPA has promulgated general radioactive waste disposal standards at 40 CFR Part 191. and WIPP-specific criteria to implement and interpret the generic disposal standards at 40 CFR Part 194. In October 1996. the DOE submitted its Compliance Certification Application (CCA) to the EPA to demonstrate compliance with the disposal standards at Subparts B and C of 40 CFR Part 191. This paper summarizes the development of the overall legal framework for radioactive waste disposal at the WIPP, the parallel development of the WIPP performance assessment (PA), and how the EPA disposal standards and implementing criteria formed the basis for the CCA WIPP PA. The CCA resulted in a certification in May 1998 by the EPA of the WIPP'S compliance with the EPA's disposal standard, thus enabling the WIPP to begin radioactive waste disposal.

HOWARD,BRYAN A.; CRAWFORD,M.B.; GALSON,D.A.; MARIETTA,MELVIN G.

2000-05-22T23:59:59.000Z

464

FATIGUE DESIGN CURVES FOR  

Office of Scientific and Technical Information (OSTI)

FATIGUE DESIGN CURVES FATIGUE DESIGN CURVES FOR 6061-T6 ALUMINUM* G . T . Yahr Engineering Technology Division Oak Ridge National Laboratory Oak Ridge, Tennessee 37831-8051 ABSTRACT A request has been made to the ASME Boiler and Pressure Vessel Committee that 6061-T6 aluminum be approved for use in the construction of Class 1 welded nuclear vessels so it can be used for the pressure vessel of the Advanced Neutron Source research reactor. Fatigue design curves with and without mean stress effects have been proposed. A knock-down factor of two is applied to the design curve for evaluation of welds. The basis of the curves is explained. The fatigue design curves are compared to fatigue data from base metal and weldments. DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States

465

A Probabilistic-Based Design Model for Achieving Flexibility in Design  

E-Print Network (OSTI)

A Probabilistic-Based Design Model for Achieving Flexibility in Design Wei Chen* Assistant manuscript for publication in the ASME Journal of Mechanical Design, September 28, 1998 #12;2 ABSTRACT In this paper we propose the use of a probabilistic-based design model as a basis for providing the flexibility

Chen, Wei

466

SRS FTF Section 3116 Basis for Determination | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FTF Section 3116 Basis for Determination FTF Section 3116 Basis for Determination SRS FTF Section 3116 Basis for Determination Basis for Section 3116 Determination for Closure of F-Tank Farm at the Savannah River Site. In accordance with NDAA Section 3116, certain waste from reprocessing of spent nuclear fuel is not high-level waste if the Secretary of Energy, in consultation with the NRC, determines that the criteria in NDAA Section 3116(a) are met. This FTF 3116 Basis Document shows that those criteria are satisfied, to support a determination that the Secretary may make pursuant to NDAA Section 3116. This FTF 3116 Basis Document concerns the stabilized residuals in waste tanks and ancillary structures, those waste tanks, and the ancillary structures (including integral equipment) at the SRS FTF at the time of closure.

467

CP-odd weak basis invariants and texture zeros  

Science Journals Connector (OSTI)

We construct the CP-odd weak basis invariants from the neutrino mass matrix in a weak basis, in which the charged lepton mass matrix is diagonal, and find the necessary and sufficient conditions for CP conservation. We study the interrelationships between different CP-odd weak basis invariants to examine their implications for the Dirac- and Majorana-type CP violating phases for the phenomenologically allowed Frampton-Glashow-Marfatia texture zero structures of the neutrino mass matrix.

S. Dev; Sanjeev Kumar; Surender Verma

2009-02-20T23:59:59.000Z

468

The numerical reproduction of chaotic maps using radial basis function interpolants  

E-Print Network (OSTI)

University Chair of Advisory Committee: Dr. Francis J. Narcowich This thesis discusses the possibility of numerically approximating a chaotic system from experimental data using radial basis functions (RBFs). Tiling (gridded) data methods were compared... to single-tiled (nongridded) methods. A method to overcome edge effects in interpolations is presented along with design criteria for implementation. Numerical studies of three such modifications of a technique originally developed by Junkins...

Bakich, Michael Peter

2012-06-07T23:59:59.000Z

469

Evaluation of Authorization Basis Management Systems and Processes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

explosive operations in AAO and MHC. This realignment of responsibilities can improve the efficiency of authorization basis document development, review, and approval. AAO has been...

470

CRAD, Safety Basis - Oak Ridge National Laboratory High Flux...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oak Ridge National Laboratory High Flux Isotope Reactor Contractor ORR CRAD, Safety Basis - Oak Ridge National Laboratory High Flux Isotope Reactor Contractor ORR February 2007 A...

471

Appendices for the Basis Document | Department of Energy  

Office of Environmental Management (EM)

of the Tank Farm Facility (TFF) closure, inventory tables were generated for all tanks that have been cleaned up to this point. Appendices for the Basis Document More...

472

200 Area Effluent Treatment Facility set-values selection basis  

SciTech Connect

This document identifies the set-values and selection basis to support operation of the 200 Area ETF and 200 Area TEDF.

Crane, A.F., Westinghouse Hanford

1996-08-07T23:59:59.000Z

473

CH3: VECTOR SPACES 3.5 Change of Basis  

E-Print Network (OSTI)

? There are three cases: (a) Given x = c1u1 + c2u2, find the coordinates with respect to the standard basis [e1, e2

Gera, Ralucca

474

Darstellung aromatischer Monomere auf Basis von 5-Hydroxymethylfurfural.  

E-Print Network (OSTI)

??Auf Grund der Endlichkeit fossiler Rohstoffe, ist ein Wechsel von der Petrochemie hin zu einer Chemie auf Basis nachwachsender Rohstoffe letztlich unvermeidlich. Eine der Hauptaufgaben (more)

Neumann, Christopher Nol Dietmar

2010-01-01T23:59:59.000Z

475

Technical Cost Modeling - Life Cycle Analysis Basis for Program...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Cost Modeling - Life Cycle Analysis Basis for Program Focus 2012 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer...

476

CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. Environmental Health  

E-Print Network (OSTI)

in Fukushima, Japan underscored the need to maintain CDC's expertise in radiation. · · · Pl CDC's RadiationCS238593 Radiation CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money of every dollar entrusted to the agency. Radiation exists all around us. People are exposed to varying

477

CDC's Core Environmental Health Services CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention.  

E-Print Network (OSTI)

healthy. But when your environment exposes you to hazardous substances or dangerous events, your healthCS237904 CDC's Core Environmental Health Services CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. Your environment is everything around you -- the air you

478

CDC's National Asthma Control Program CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money Through Prevention.  

E-Print Network (OSTI)

Health Threats. Saving Money Through Prevention. Environmental Health Your environment is everything, you are more likely to stay healthy. But when your environment exposes you to dangerous events or toxic substances, your health can be negatively affected. CDC is committed to saving lives

479

CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. National Center for Environmental Health  

E-Print Network (OSTI)

. But when your environment exposes you to hazardous substances or dangerous events, your health canCS239266-A CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. National Center for Environmental Health Agency for Toxic Substances and Disease Registry CDC

480

Hydrodynamics-based floating wind turbine support platform optimization: A basis function approach  

Science Journals Connector (OSTI)

Abstract The floating wind turbine support structure design problem is complicated by conflicting technical objectives and innumerable platform geometry options. Previous support structure optimization studies have been limited in their ability to evaluate the full design space due to their adherence to certain assumptions about the physical platform configuration. The present work is an effort toward developing an alternative form of the support platform optimization problem one that abstracts details of the platform geometry and deals instead with hydrodynamic performance coefficients in order to provide a more complete and intuitive exploration of the design space. A basis function approach, which represents the design space by linearly combining the hydrodynamic performance coefficients of a diverse set of basis platform geometries, was taken as the most straightforward way of physically constraining the platform hydrodynamic performance. Candidate designs are evaluated in the frequency domain using linearized coefficients for the wind turbine, platform, and mooring system dynamics. The platform hydrodynamic coefficients are calculated according to linear hydrodynamic theory. The optimization objective is to minimize the nacelle acceleration under several operating conditions. Optimization results for a slack catenary mooring system indicate the benefits of combining submerged volume with a widely dispersed water plane area. Results for a tension leg mooring system are consistent with conventional TLP designs. The intent is to use these results as starting points for more traditional platform parameter optimization. Examination of the possible physical interpretations of linearly combining basis platform coefficients reveals that certain aspects of this approach may have poor physicality. This points to the need to expand this first attempt with more sophisticated ways of representing the constrained hydrodynamic performance variables.

Matthew Hall; Brad Buckham; Curran Crawford

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "design basis threat" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Modest carbon price could save Borneo forests: study Reuters, 4 June 2009 -Tropical forests in Borneo under threat of conversion to palm oil  

E-Print Network (OSTI)

in Borneo under threat of conversion to palm oil plantations could be more profitable left standing threat of being converted to oil palm plantations. "They are not meant to be clearing forest for palm oil development. It's pretty clear that forests are being felled for oil palm," said Venter, a conservation

482

Wireless link design using a patch antenna  

SciTech Connect

A wireless link was designed using a patch antenna. In the process, several different models were tested. Testing proved a patch antenna was a viable solution for building a wireless link within the design specifications. Also, this experimentation provided a basis for future patch antenna design.

Hall, E

2000-08-11T23:59:59.000Z

483

Algorithms to Compute Minimum Cycle Basis in Directed Graphs #  

E-Print Network (OSTI)

, . . . ,C d whose incidence vectors permit a unique linear combination of the incidence vector of any cycleAlgorithms to Compute Minimum Cycle Basis in Directed Graphs # Telikepalli Kavitha + Kurt Mehlhorn # Abstract We consider the problem of computing a minimum cycle basis in a di­ rected graph G with m arcs

Mehlhorn, Kurt

484

Implementing Minimum Cycle Basis algorithms Kurt Mehlhorn and Dimitrios Michail  

E-Print Network (OSTI)

Implementing Minimum Cycle Basis algorithms Kurt Mehlhorn and Dimitrios Michail Max consider the problem of computing a mini- mum cycle basis of an undirected graph G = (V, E) with n vertices in a significant speedup. Based on our experimental observations, we combine the two fundamen- tally different

Mehlhorn, Kurt

485

CRAD, Facility Safety - Nuclear Facility Safety Basis | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRAD, Facility Safety - Nuclear Facility Safety Basis CRAD, Facility Safety - Nuclear Facility Safety Basis CRAD, Facility Safety - Nuclear Facility Safety Basis A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) that can be used for assessment of a contractor's Nuclear Facility Safety Basis. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs. CRAD, Facility Safety - Nuclear Facility Safety Basis More Documents & Publications CRAD, Facility Safety - Unreviewed Safety Question Requirements Site Visit Report, Livermore Site Office - February 2011 FAQS Job Task Analyses - Nuclear Safety Specialist

486

CRAD, Safety Basis - Los Alamos National Laboratory Waste Characterization,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Basis - Los Alamos National Laboratory Waste Basis - Los Alamos National Laboratory Waste Characterization, Reduction, and Repackaging Facility CRAD, Safety Basis - Los Alamos National Laboratory Waste Characterization, Reduction, and Repackaging Facility A section of Appendix C to DOE G 226.1-2 "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of Criteria Review and Approach Documents (CRADs) used for an assessment of the Safety Basis portion of an Operational Readiness Review at the Los Alamos National Laboratory Waste Characterization, Reduction, and Repackaging Facility. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs. CRAD, Safety Basis - Los Alamos National Laboratory Waste Characterization,

487

Design for manufacturability Design verification  

E-Print Network (OSTI)

ITRS Design #12;Design · Design for manufacturability · Design verification #12;Design for Manufacturability · Architecture challenges · Logic and circuit challenges · Layout and physical design challenges · Expected to be the source of multiple DFM challenges · Invest in variability reduction or design

Patel, Chintan

488

Achieving competitive excellence in nuclear energy: The threat of proliferation; the challenge of inertial confinement fusion  

SciTech Connect

Nuclear energy will have an expanding role in meeting the twenty-first-century challenges of population and economic growth, energy demand, and global warming. These great challenges are non-linearly coupled and incompletely understood. In the complex global system, achieving competitive excellence for nuclear energy is a multi-dimensional challenge. The growth of nuclear energy will be driven by its margin of economic advantage, as well as by threats to energy security and by growing evidence of global warming. At the same time, the deployment of nuclear energy will be inhibited by concerns about nuclear weapons proliferation, nuclear waste and nuclear reactor safety. These drivers and inhibitors are coupled: for example, in the foreseeable future, proliferation in the Middle East may undermine energy security and increase demand for nuclear energy. The Department of Energy`s nuclear weapons laboratories are addressing many of these challenges, including nuclear weapons builddown and nonproliferation, nuclear waste storage and burnup, reactor safety and fuel enrichment, global warming, and the long-range development of fusion energy. Today I will focus on two major program areas at the Lawrence Livermore National Laboratory (LLNL): the proliferation of nuclear weapons and the development of inertial confinement fusion (ICF) energy.

Nuckolls, J.H.

1994-06-01T23:59:59.000Z

489

A comparison of threats, vulnerabilities and management approaches in global seagrass bioregions  

Science Journals Connector (OSTI)

Global seagrass habitats are threatened by multiple anthropogenic factors. Effective management of seagrasses requires information on the relative impacts of threats; however, this information is rarely available. Our goal was to use the knowledge of experts to assess the relative impacts of anthropogenic activities in six global seagrass bioregions. The activities that threaten seagrasses were identified at an international seagrass workshop and followed with a web-based survey to collect seagrass vulnerability information. There was a global consensus that urban/industrial runoff, urban/port infrastructure development, agricultural runoff and dredging had the greatest impact on seagrasses, though the order of relative impacts varied by bioregion. These activities are largely terrestrially based, highlighting the need for marine planning initiatives to be co-ordinated with adjacent watershed planning. Sea level rise and increases in the severity of cyclones were ranked highest relative to other climate change related activities, but overall the five climate change activities were ranked low and experts were uncertain of their effects on seagrasses. The experts' preferred mechanism of delivering management outcomes were processes such as policy development, planning and consultation rather than prescriptive management tools. Our approach to collecting expert opinion provides the required data to prioritize seagrass management actions at bioregional scales.

Alana Grech; Katie Chartrand-Miller; Paul Erftemeijer; Mark Fonseca; Len McKenzie; Michael Rasheed; Helen Taylor; Rob Coles

2012-01-01T23:59:59.000Z

490

The need for carbon dioxide disposal: A threat and an opportunity  

SciTech Connect

Ready energy is a cornerstone of modern society. The policies outlined at the recent Kyoto conference have put in question the largest, most readily available and most cost-effective energy resource available. Even if a doubling of atmospheric CO{sub 2} is deemed acceptable, emission reductions worldwide would have to be drastic. For 10 billion people to share equally into the 1990 emission level would allow a per capita emission of 10% of the current US level. Substantial reductions in CO{sub 2} emissions to the atmosphere are unavoidable. Uncertain is the time available to accomplish this reduction. There are also reasons to be optimistic about the future of coal and other fossil fuels. Barring a surprise technological breakthrough in alternative energies, fossil energy consumption is bound to grow. Political and economic drivers even stronger than the threat of climate change favor economic growth and therefore increased energy consumption. To resolve this apparent contradiction requires new technologies that prevent CO{sub 2} generated by combustion from entering the atmosphere. The authors will outline available technologies and show how the coal industry can adapt to them.

Lackner, K.S.; Butt, D.P.; Wendt, C.H.

1998-08-01T23:59:59.000Z

491

Microsoft Word - Final_SRS_FTF_WD_Basis_March_2012  

NLE Websites -- All DOE Office Websites (Extended Search)

2-001 2-001 Revision 0 Basis for Section 3116 Determination for Closure of F-Tank Farm at the Savannah River Site March 2012 Basis for Section 3116 Determination DOE/SRS-WD-2012-001 for Closure of F-Tank Farm Revision 0 at the Savannah River Site March 2012 Page ii REVISION SUMMARY REV. # DESCRIPTION DATE OF ISSUE 0 Initial Issue March 2012 Basis for Section 3116 Determination DOE/SRS-WD-2012-001 for Closure of F-Tank Farm Revision 0 at the Savannah River Site March 2012 Page iii TABLE OF CONTENTS Page REVISION SUMMARY ................................................................................................................................. ii LIST OF TABLES ........................................................................................................................................ vi

492

Technical Cost Modeling - Life Cycle Analysis Basis for Program...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2010 -- Washington D.C. lm001das2010o.pdf More Documents & Publications Technical Cost Modeling - Life Cycle Analysis Basis for Program Focus Technical Cost Modeling - Life...

493

CRAD, Safety Basis - Oak Ridge National Laboratory High Flux...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oak Ridge National Laboratory High Flux Isotope Reactor CRAD, Safety Basis - Oak Ridge National Laboratory High Flux Isotope Reactor February 2007 A section of Appendix C to DOE G...

494

The Social Brain: Neural Basis of Social Knowledge  

E-Print Network (OSTI)

The Social Brain: Neural Basis of Social Knowledge Ralph Adolphs California Institute of Technology FurtherANNUAL REVIEWS #12;Contents KNOWLEDGE OF MINDS . . . . . . . . . 694 Comparative Studies . . . . . . . . . . . . . . . 694 Knowledge of the Minds of Others . . . . . . . . . . . . . . . . . . . . . . . 694 Knowledge

Dickerson, Brad

495

Brueckner calculations in harmonic-oscillator basis I. The method  

Science Journals Connector (OSTI)

The problem of solving the reaction matrix equation in harmonic-oscillator basis is studied. A general approximation of the Pauli operator, diagonal with respect to the centre-of-mass quantum numbers, is deriv...

J. Blank

1979-01-01T23:59:59.000Z

496

5th International REAC/TS Symposium: The Medical Basis for Radiation  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Statement Privacy/Security Statement 5th International REAC/TS Symposium: The Medical Basis for Radiation Accident Preparedness Skip site navigation and move to main content of page. Home Schedule Speakers Registration Directions and Acommodations Contact 5th International REAC/TS Symposium: The Medical Basis for Radiation Accident Preparedness Sept. 27-29, 2011 Hilton Miami Downtown Miami, Florida United States Introduction This symposium brings together international experts to discuss the advances in the diagnosis and management of radiation emergencies and illnesses. The Oak Ridge Institute for Science and Education (ORISE) designates this live activity for a maximum of 19.25 AMA PRA Category 1 Credit(s)(tm). Physicians should claim only the credit commensurate with the extent of

497

Engineering Design and Safety Basis Inspection Criteria, Inspection Activities, and Lines of Inquiry  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of U.S. Department of Energy Office of Independent Oversight Criteria Review and Approach Document 1.0 PURPOSE Within the Office of Independent Oversight, the Office of Environment, Safety and Health (ES&H) Evaluations' mission is to assess the effectiveness of environment, safety, and health systems and practices used by line and contractor organizations in implementing Integrated Safety Management and to provide clear, concise, and independent evaluations of performance in protecting our workers, the public, and the environment from the hazards associated with Department of Energy (DOE) activities and sites. A key to success is the rigor and comprehensiveness of our process; and as with any process, we continually strive to improve and provide additional value and insight to field operations. Integral to this is our commitment to

498

Design for Energy Efficiency as a Basis for Innovations in Kitchen Appliances  

Science Journals Connector (OSTI)

The energy consumption of consumer products receives increasing attention in the product development of consumer and professional products. More and more products receive an energy label, often forced by EU le...

Bas Flipsen Msc; Jasper Koot Msc

2001-01-01T23:59:59.000Z

499

Americium-Curium Stabilization - 5'' Cylindrical Induction Melter System Design Basis  

SciTech Connect

Approximately 11,000 liters (3,600) gallons of solution containing isotopes of Am and Cm are currently stored in F-Canyon Tank 17.1. These isotopes were recovered during plutonium-242 production campaigns in the mid- and late-1970s. Experimental work for the project began in 1995 by the Savannah River Technology Center (SRTC). Details of the process are given in the various sections of this document.

Witt, D.C.

1999-11-08T23:59:59.000Z

500

DOE's Safety Bulletin No. 2011-01, Events Beyond Design Safety Basis Analysis, March 2011  

Energy.gov (U.S. Department of Energy (DOE))

This Safety Alert provides information on a safety concern related to the identification and mitigation of events that may fall outside those analyzed in the documented safety analysis.