National Library of Energy BETA

Sample records for device hid vulnerability

  1. T-547: Microsoft Windows Human Interface Device (HID) Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer.

  2. HID Laboratories Inc | Open Energy Information

    Open Energy Info (EERE)

    Park, California Zip: 94025 Product: HID Laboratories develops commercial-grade, high intensity lighting products that manage lighting demand and reduce energy use. References:...

  3. Hanford Identification (HID) PIA, Richland Operations Office | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Identification (HID) PIA, Richland Operations Office Hanford Identification (HID) PIA, Richland Operations Office Hanford Identification (HID) PIA, Richland Operations Office PDF icon Hanford Identification (HID) PIA, Richland Operations Office More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Manchester Software 1099 Reporting PIA, Idaho National

  4. RAPID/Roadmap/3-HI-d | Open Energy Information

    Open Energy Info (EERE)

    Geothermal Hydropower Solar Tools Contribute Contact Us Use and Occupancy Permit (3-HI-d) A developer needs a Use and Occupancy Permit from the Hawaii Department of...

  5. RAPID/Roadmap/6-HI-d | Open Energy Information

    Open Energy Info (EERE)

    Tools Contribute Contact Us Oversize andor Overweight Vehicles and Loads Permit (6-HI-d) 06HIDOversizeOverweightVehiclesAndLoadsPermit.pdf Error creating thumbnail: Page...

  6. RAPID/Roadmap/18-HI-d | Open Energy Information

    Open Energy Info (EERE)

    Geothermal Hydropower Solar Tools Contribute Contact Us Variance from Pollution Control (18-HI-d) A variance is required to discharge water pollutant in excess of applicable...

  7. RAPID/Roadmap/14-HI-d | Open Energy Information

    Open Energy Info (EERE)

    Permitting Information Desktop Toolkit BETA About Bulk Transmission Geothermal Hydropower Solar Tools Contribute Contact Us 401 Water Quality Certification (14-HI-d) Under Section...

  8. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  9. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  10. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  11. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  12. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  13. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device.

  14. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  15. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  16. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  17. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  18. Climate Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  19. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the

  20. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  1. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Energy Savers [EERE]

    Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

  2. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future ...

  3. Nuclear Fuel Cycle & Vulnerabilities

    SciTech Connect (OSTI)

    Boyer, Brian D.

    2012-06-18

    The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

  4. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  5. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  6. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Environmental Management (EM)

    NSTB Summarizes Vulnerable Areas NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered some common areas of vulnerability in the energy control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. PDF icon NSTB Summarizes Vulnerable Areas More Documents & Publications Lessons Learned from Cyber Security Assessments of SCADA and Energy

  7. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  8. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  9. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  10. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  11. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  12. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  13. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  14. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  15. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  16. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  17. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  18. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  19. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  20. U-198: IBM Lotus Expeditor Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system..

  1. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  2. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  3. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  4. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  5. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  6. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  7. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  8. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  9. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  10. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  11. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  12. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  13. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  14. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  15. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  16. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  17. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  18. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  19. Photovoltaic device

    DOE Patents [OSTI]

    Reese, Jason A.; Keenihan, James R.; Gaston, Ryan S.; Kauffmann, Keith L.; Langmaid, Joseph A.; Lopez, Leonardo C.; Maak, Kevin D.; Mills, Michael E.; Ramesh, Narayan; Teli, Samar R.

    2015-09-01

    The present invention is premised upon an improved photovoltaic device ("PV device"), more particularly to an improved photovoltaic device (10) with a multilayered photovoltaic cell assembly (100) and a body portion (200) joined at an interface region (410) and including an intermediate layer (500), at least one interconnecting structural member (1500), relieving feature (2500), unique component geometry, or any combination thereof.

  20. Photovoltaic device

    DOE Patents [OSTI]

    Reese, Jason A.; Keenihan, James R.; Gaston, Ryan S.; Kauffmann, Keith L.; Langmaid, Joseph A.; Lopez, Leonardo C.; Maak, Kevin D.; Mills, Michael E.; Ramesh, Narayan; Teli, Samar R.

    2015-06-02

    The present invention is premised upon an improved photovoltaic device ("PV device"), more particularly to an improved photovoltaic device with a multilayered photovoltaic cell assembly and a body portion joined at an interface region and including an intermediate layer, at least one interconnecting structural member, relieving feature, unique component geometry, or any combination thereof.

  1. Hanford Identification (HID) PIA, Richland Operations Office...

    Energy Savers [EERE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory Manchester Software 1099 Reporting PIA,...

  2. Sealing device

    DOE Patents [OSTI]

    Garcia-Crespo, Andres Jose

    2013-12-10

    A sealing device for sealing a gap between a dovetail of a bucket assembly and a rotor wheel is disclosed. The sealing device includes a cover plate configured to cover the gap and a retention member protruding from the cover plate and configured to engage the dovetail. The sealing device provides a seal against the gap when the bucket assemply is subjected to a centrifugal force.

  3. Radiography Device

    Broader source: Energy.gov [DOE]

    This scenario provides the planning instructions, guidance, and evaluation forms necessary to conduct an exercise involving a highway shipment of a radiography device (Class 7 - Radioactive). This...

  4. Electrochromic devices

    DOE Patents [OSTI]

    Allemand, Pierre M. (Tucson, AZ); Grimes, Randall F. (Ann Arbor, MI); Ingle, Andrew R. (Tucson, AZ); Cronin, John P. (Tucson, AZ); Kennedy, Steve R. (Tuscon, AZ); Agrawal, Anoop (Tucson, AZ); Boulton, Jonathan M. (Tucson, AZ)

    2001-01-01

    An electrochromic device is disclosed having a selective ion transport layer which separates an electrochemically active material from an electrolyte containing a redox active material. The devices are particularly useful as large area architectural and automotive glazings due to there reduced back reaction.

  5. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  6. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  7. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  8. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  9. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  10. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  11. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  12. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  13. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  14. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  15. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 15, 2012 - 7:00am Addthis PROBLEM: Sympa Multiple Security Bypass Vulnerabilities PLATFORM: Sympa in versions prior to 6.1.11 ABSTRACT: Multiple vulnerabilities have been...

  16. Regional Climate Vulnerabilities and Resilience Solutions | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser.

  17. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  18. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. PDF icon Vulnerability Analysis of Energy Delivery Control Systems (September 2011) More

  19. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  20. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  1. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  2. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  3. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  4. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  5. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  6. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  7. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks.

  8. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  9. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  10. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Energy Savers [EERE]

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  11. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  12. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  13. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  14. Detection device

    DOE Patents [OSTI]

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  15. Detection device

    DOE Patents [OSTI]

    Smith, Jay E.

    1984-01-01

    The present invention is directed to a detection device comprising: (1) an entrance chamber, (2) a central chamber, and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  16. Electrochemical device

    DOE Patents [OSTI]

    Grimes, Patrick G. (Westfield, NJ); Einstein, Harry (Springfield, NJ); Bellows, Richard J. (Westfield, NJ)

    1988-01-12

    A tunnel protected electrochemical device features channels fluidically communicating between manifold, tunnels and cells. The channels are designed to provide the most efficient use of auxiliary power. The channels have a greater hydraulic pressure drop and electrical resistance than the manifold. This will provide a design with the optimum auxiliary energy requirements.

  17. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  18. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  19. Laser device

    DOE Patents [OSTI]

    Scott, Jill R. (Idaho Falls, ID); Tremblay, Paul L. (Idaho Falls, ID)

    2008-08-19

    A laser device includes a virtual source configured to aim laser energy that originates from a true source. The virtual source has a vertical rotational axis during vertical motion of the virtual source and the vertical axis passes through an exit point from which the laser energy emanates independent of virtual source position. The emanating laser energy is collinear with an orientation line. The laser device includes a virtual source manipulation mechanism that positions the virtual source. The manipulation mechanism has a center of lateral pivot approximately coincident with a lateral index and a center of vertical pivot approximately coincident with a vertical index. The vertical index and lateral index intersect at an index origin. The virtual source and manipulation mechanism auto align the orientation line through the index origin during virtual source motion.

  20. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  1. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  2. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR

  3. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  4. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  5. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  6. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  7. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  8. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  9. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  11. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  12. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  14. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  15. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  16. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  17. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy Lee ... vulnerabilities include balancing the risk of system compromise by an intruder with ...

  18. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  19. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Energy Savers [EERE]

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  20. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  3. Diversionary device

    DOE Patents [OSTI]

    Grubelich, Mark C. (Albuquerque, NM)

    2001-01-01

    A diversionary device has a housing having at least one opening and containing a non-explosive propellant and a quantity of fine powder packed within the housing, with the powder being located between the propellant and the opening. When the propellant is activated, it has sufficient energy to propel the powder through the opening to produce a cloud of powder outside the housing. An igniter is also provided for igniting the cloud of powder to create a diversionary flash and bang, but at a low enough pressure to avoid injuring nearby people.

  4. OLED devices

    DOE Patents [OSTI]

    Sapochak, Linda Susan [Arlington, VA; Burrows, Paul Edward [Kennewick, WA; Bimalchandra, Asanga [Richland, WA

    2011-02-22

    An OLED device having an emission layer formed of an ambipolar phosphine oxide host material and a dopant, a hole transport layer in electrical communication with an anode, an electron transport layer in communication with a cathode, wherein the HOMO energy of the hole transport layer is substantially the same as the HOMO energy of the ambipolar host in the emission layer, and the LUMO energy of the electron transport layer is substantially the same as the LUMO energy of the ambipolar host in the emission layer.

  5. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  6. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  7. Optoelectronic device

    DOE Patents [OSTI]

    Bonekamp, Jeffrey E.; Boven, Michelle L.; Gaston, Ryan S.

    2014-09-09

    The invention is an optoelectronic device comprising an active portion which converts light to electricity or converts electricity to light, the active portion having a front side for the transmittal of the light and a back side opposite from the front side, at least two electrical leads to the active portion to convey electricity to or from the active portion, an enclosure surrounding the active portion and through which the at least two electrical leads pass wherein the hermetically sealed enclosure comprises at the front side of the active portion a barrier material which allows for transmittal of light, one or more getter materials disposed so as to not impede the transmission of light to or from the active portion, and a contiguous gap pathway to the getter material which pathway is disposed between the active portion and the barrier material.

  8. CLOSURE DEVICE

    DOE Patents [OSTI]

    Linzell, S.M.; Dorcy, D.J.

    1958-08-26

    A quick opening type of stuffing box employing two banks of rotatable shoes, each of which has a caraming action that forces a neoprene sealing surface against a pipe or rod where it passes through a wall is presented. A ring having a handle or wrench attached is placed eccentric to and between the two banks of shoes. Head bolts from the shoes fit into slots in this ring, which are so arranged that when the ring is rotated a quarter turn in one direction the shoes are thrust inwardly to cramp the neopnrene about the pipe, malting a tight seal. Moving the ring in the reverse direction moves the shoes outwardly and frees the pipe which then may be readily removed from the stuffing box. This device has particular application as a closure for the end of a coolant tube of a neutronic reactor.

  9. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  10. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  11. Mobile Devices (phones and tablets)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Devices (phones and tablets)

  12. Integrated device architectures for electrochromic devices

    DOE Patents [OSTI]

    Frey, Jonathan Mack; Berland, Brian Spencer

    2015-04-21

    This disclosure describes systems and methods for creating monolithically integrated electrochromic devices which may be a flexible electrochromic device. Monolithic integration of thin film electrochromic devices may involve the electrical interconnection of multiple individual electrochromic devices through the creation of specific structures such as conductive pathway or insulating isolation trenches.

  13. Laser device

    DOE Patents [OSTI]

    Scott, Jill R.; Tremblay, Paul L.

    2004-11-23

    A laser device includes a target position, an optical component separated a distance J from the target position, and a laser energy source separated a distance H from the optical component, distance H being greater than distance J. A laser source manipulation mechanism exhibits a mechanical resolution of positioning the laser source. The mechanical resolution is less than a spatial resolution of laser energy at the target position as directed through the optical component. A vertical and a lateral index that intersect at an origin can be defined for the optical component. The manipulation mechanism can auto align laser aim through the origin during laser source motion. The laser source manipulation mechanism can include a mechanical index. The mechanical index can include a pivot point for laser source lateral motion and a reference point for laser source vertical motion. The target position can be located within an adverse environment including at least one of a high magnetic field, a vacuum system, a high pressure system, and a hazardous zone. The laser source and an electro-mechanical part of the manipulation mechanism can be located outside the adverse environment. The manipulation mechanism can include a Peaucellier linkage.

  14. Laser device

    DOE Patents [OSTI]

    Scott, Jill R.; Tremblay, Paul L.

    2007-07-10

    A laser device includes a target position, an optical component separated a distance J from the target position, and a laser energy source separated a distance H from the optical component, distance H being greater than distance J. A laser source manipulation mechanism exhibits a mechanical resolution of positioning the laser source. The mechanical resolution is less than a spatial resolution of laser energy at the target position as directed through the optical component. A vertical and a lateral index that intersect at an origin can be defined for the optical component. The manipulation mechanism can auto align laser aim through the origin during laser source motion. The laser source manipulation mechanism can include a mechanical index. The mechanical index can include a pivot point for laser source lateral motion and a reference point for laser source vertical motion. The target position can be located within an adverse environment including at least one of a high magnetic field, a vacuum system, a high pressure system, and a hazardous zone. The laser source and an electro-mechanical part of the manipulation mechanism can be located outside the adverse environment. The manipulation mechanism can include a Peaucellier linkage.

  15. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  16. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  17. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  18. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Energy Savers [EERE]

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  19. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  20. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions ...

  1. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  2. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  3. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  4. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  5. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  6. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  7. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  8. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  9. Potential Vulnerability of US Petroleum Refineries to Increasing Water

    Energy Savers [EERE]

    Temperature and/or Reduced Water Availability | Department of Energy Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability This report discusses potential impacts of increased water temperature and reductions in water availability on petroleum refining and presents case studies related to refinery water use. Report

  10. Common Cyber Security Vulnerabilities Observed in Control System

    Energy Savers [EERE]

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  11. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Energy Savers [EERE]

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  12. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  13. Connector device for building integrated photovoltaic device

    DOE Patents [OSTI]

    Keenihan, James R.; Langmaid, Joe A.; Eurich, Gerald K.; Lesniak, Michael J.; Mazor, Michael H.; Cleerman, Robert J.; Gaston, Ryan S.

    2015-11-10

    The present invention is premised upon a connector device and method that can more easily electrically connect a plurality of PV devices or photovoltaic system components and/or locate these devices/components upon a building structure. It also may optionally provide some additional sub-components (e.g. at least one bypass diode and/or an indicator means) and may enhance the serviceability of the device.

  14. Connector device for building integrated photovoltaic device

    DOE Patents [OSTI]

    Keenihan, James R.; Langmaid, Joseph A.; Eurich, Gerald K.; Lesniak, Michael J.; Mazor, Michael H.; Cleereman, Robert J.; Gaston, Ryan S.

    2014-06-03

    The present invention is premised upon a connector device and method that can more easily electrically connect a plurality of PV devices or photovoltaic system components and/or locate these devices/components upon a building structure. It also may optionally provide some additional sub-components (e.g. at least one bypass diode and/or an indicator means) and may enhance the serviceability of the device.

  15. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  16. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  17. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  18. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  19. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior

  20. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  1. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  2. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  3. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  4. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  5. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  6. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Removing Vulnerable Civilian Nuclear and Radiological Material | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  7. Pulse detecting device

    DOE Patents [OSTI]

    Riggan, W.C.

    1984-01-01

    A device for measuring particle flux comprises first and second photodiode detectors for receiving flux from a source and first and second outputs for producing first and second signals representing the flux incident to the detectors. The device is capable of reducing the first output signal by a portion of the second output signal, thereby enhancing the accuracy of the device. Devices in accordance with the invention may measure distinct components of flux from a single source or fluxes from several sources.

  8. Organic photosensitive devices

    DOE Patents [OSTI]

    Rand, Barry P; Forrest, Stephen R

    2013-11-26

    The present invention generally relates to organic photosensitive optoelectronic devices. More specifically, it is directed to organic photosensitive optoelectronic devices having a photoactive organic region containing encapsulated nanoparticles that exhibit plasmon resonances. An enhancement of the incident optical field is achieved via surface plasmon polariton resonances. This enhancement increases the absorption of incident light, leading to a more efficient device.

  9. Articulating feedstock delivery device

    DOE Patents [OSTI]

    Jordan, Kevin

    2013-11-05

    A fully articulable feedstock delivery device that is designed to operate at pressure and temperature extremes. The device incorporates an articulating ball assembly which allows for more accurate delivery of the feedstock to a target location. The device is suitable for a variety of applications including, but not limited to, delivery of feedstock to a high-pressure reaction chamber or process zone.

  10. Photovoltaic device and method

    DOE Patents [OSTI]

    Cleereman, Robert; Lesniak, Michael J.; Keenihan, James R.; Langmaid, Joe A.; Gaston, Ryan; Eurich, Gerald K.; Boven, Michelle L.

    2015-11-24

    The present invention is premised upon an improved photovoltaic device ("PVD") and method of use, more particularly to an improved photovoltaic device with an integral locator and electrical terminal mechanism for transferring current to or from the improved photovoltaic device and the use as a system.

  11. Photovoltaic device and method

    DOE Patents [OSTI]

    Cleereman, Robert J; Lesniak, Michael J; Keenihan, James R; Langmaid, Joe A; Gaston, Ryan; Eurich, Gerald K; Boven, Michelle L

    2015-01-27

    The present invention is premised upon an improved photovoltaic device ("PVD") and method of use, more particularly to an improved photovoltaic device with an integral locator and electrical terminal mechanism for transferring current to or from the improved photovoltaic device and the use as a system.

  12. Amorphous silicon photovoltaic devices

    DOE Patents [OSTI]

    Carlson, David E.; Lin, Guang H.; Ganguly, Gautam

    2004-08-31

    This invention is a photovoltaic device comprising an intrinsic or i-layer of amorphous silicon and where the photovoltaic device is more efficient at converting light energy to electric energy at high operating temperatures than at low operating temperatures. The photovoltaic devices of this invention are suitable for use in high temperature operating environments.

  13. Unitary lens semiconductor device

    DOE Patents [OSTI]

    Lear, K.L.

    1997-05-27

    A unitary lens semiconductor device and method are disclosed. The unitary lens semiconductor device is provided with at least one semiconductor layer having a composition varying in the growth direction for unitarily forming one or more lenses in the semiconductor layer. Unitary lens semiconductor devices may be formed as light-processing devices such as microlenses, and as light-active devices such as light-emitting diodes, photodetectors, resonant-cavity light-emitting diodes, vertical-cavity surface-emitting lasers, and resonant cavity photodetectors. 9 figs.

  14. Portable data collection device

    DOE Patents [OSTI]

    French, Patrick D. (Aurora, CO)

    1996-01-01

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time.

  15. Portable data collection device

    DOE Patents [OSTI]

    French, P.D.

    1996-06-11

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time. 7 figs.

  16. Unitary lens semiconductor device

    DOE Patents [OSTI]

    Lear, Kevin L. (Albuquerque, NM)

    1997-01-01

    A unitary lens semiconductor device and method. The unitary lens semiconductor device is provided with at least one semiconductor layer having a composition varying in the growth direction for unitarily forming one or more lenses in the semiconductor layer. Unitary lens semiconductor devices may be formed as light-processing devices such as microlenses, and as light-active devices such as light-emitting diodes, photodetectors, resonant-cavity light-emitting diodes, vertical-cavity surface-emitting lasers, and resonant cavity photodetectors.

  17. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  18. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  19. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  20. RL-2007HanfordIdentification(HID)PIA.pdf

    Energy Savers [EERE]

  1. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  2. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions

  3. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  4. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  5. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  6. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  7. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  8. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  9. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  10. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  11. Vulnerability Analysis of Energy Delivery Control Systems - 2011 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy delivery systems has emerged as one of the Nation's most serious grid modernization and infrastructure protection issues. Cyber adversaries are becoming increasingly targeted, sophisticated, and better financed. The energy sector must research, develop and deploy new cybersecurity capabilities faster than the adversary can launch new attack tools and techniques. The

  12. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use

  13. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  14. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  15. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Environmental Management (EM)

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  16. DEVICE CONTROLLER, CAMERA CONTROL

    Energy Science and Technology Software Center (OSTI)

    1998-07-20

    This is a C++ application that is the server for the cameral control system. Devserv drives serial devices, such as cameras and videoswitchers used in a videoconference, upon request from a client such as the camxfgbfbx ccint program. cc Deverv listens on UPD ports for clients to make network contractions. After a client connects and sends a request to control a device (such as to pan,tilt, or zooma camera or do picture-in-picture with a videoswitcher),more » devserv formats the request into an RS232 message appropriate for the device and sends this message over the serial port to which the device is connected. Devserv then reads the reply from the device from the serial port to which the device is connected. Devserv then reads the reply from the device from the serial port and then formats and sends via multicast a status message. In addition, devserv periodically multicasts status or description messages so that all clients connected to the multicast channel know what devices are supported and their ranges of motion and the current position. The software design employs a class hierarchy such that an abstract base class for devices can be subclassed into classes for various device categories(e.g. sonyevid30, cononvco4, panasonicwjmx50, etc.). which are further subclassed into classes for various device categories. The devices currently supported are the Sony evi-D30, Canon, VCC1, Canon VCC3, and Canon VCC4 cameras and the Panasonic WJ-MX50 videoswitcher. However, developers can extend the class hierarchy to support other devices.« less

  17. Physical security and tamper-indicating devices

    SciTech Connect (OSTI)

    Johnston, R.G.; Garcia, A.R.E.

    1997-02-01

    Computer systems, electronic communications, digital data, and computer storage media are often highly vulnerable to physical tampering. Tamper-indicating devices, also called security seals, are widely used to detect physical tampering or unauthorized access. We studied 94 different security seals, both passive and electronic, developed either commercially or by the US government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low-tech methods. Cost was not a good predictor of seal security. It appears to us that many of these seals can be dramatically improved with minor, low-cost modifications to either the seal or the use protocol.

  18. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  19. Device Simulation Tool - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PAZ0036_v2.jpg Device Simulation Tool Research Why Solar Fuels Goals & Objectives Thrust 1 Thrust 2 Thrust 3 Thrust 4 Publications Research Highlights Videos Innovations User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device Simulation

  20. Barrier breaching device

    DOE Patents [OSTI]

    Honodel, C.A.

    1983-06-01

    A barrier breaching device that is designed primarily for opening holes in interior walls of buildings uses detonating fuse for explosive force. The fuse acts as the ribs or spokes of an umbrella-like device that may be opened up to form a cone. The cone is placed against the wall so that detonating fuse that rings the base of the device and which is ignited by the spoke-like fuses serves to cut a circular hole in the wall.

  1. Barrier breaching device

    DOE Patents [OSTI]

    Honodel, Charles A. (Tracy, CA)

    1985-01-01

    A barrier breaching device that is designed primarily for opening holes in interior walls of buildings uses detonating fuse for explosive force. The fuse acts as the ribs or spokes of an umbrella-like device that may be opened up to form a cone. The cone is placed against the wall so that detonating fuse that rings the base of the device and which is ignited by the spoke-like fuses serves to cut a circular hole in the wall.

  2. Abrasion Testing of Critical Components of Hydrokinetic Devices

    SciTech Connect (OSTI)

    Worthington, Monty; Ali, Muhammad; Ravens, Tom

    2013-12-06

    The objective of the Abrasion Testing of Critical Components of Hydrokinetic Devices (Project) was to test critical components of hydrokinetic devices in waters with high levels of suspended sediment – information that is widely applicable to the hydrokinetic industry. Tidal and river sites in Alaska typically have high suspended sediment concentrations. High suspended sediment also occurs in major rivers and estuaries throughout the world and throughout high latitude locations where glacial inputs introduce silt into water bodies. In assessing the vulnerability of technology components to sediment induced abrasion, one of the greatest concerns is the impact that the sediment may have on device components such as bearings and seals, failures of which could lead to both efficiency loss and catastrophic system failures.

  3. High efficiency photovoltaic device

    DOE Patents [OSTI]

    Guha, Subhendu (Troy, MI); Yang, Chi C. (Troy, MI); Xu, Xi Xiang (Findlay, OH)

    1999-11-02

    An N-I-P type photovoltaic device includes a multi-layered body of N-doped semiconductor material which has an amorphous, N doped layer in contact with the amorphous body of intrinsic semiconductor material, and a microcrystalline, N doped layer overlying the amorphous, N doped material. A tandem device comprising stacked N-I-P cells may further include a second amorphous, N doped layer interposed between the microcrystalline, N doped layer and a microcrystalline P doped layer. Photovoltaic devices thus configured manifest improved performance, particularly when configured as tandem devices.

  4. Interconnected semiconductor devices

    DOE Patents [OSTI]

    Grimmer, Derrick P. (White Bear Lake, MN); Paulson, Kenneth R. (North St. Paul, MN); Gilbert, James R. (St. Paul, MN)

    1990-10-23

    Semiconductor layer and conductive layer formed on a flexible substrate, divided into individual devices and interconnected with one another in series by interconnection layers and penetrating terminals.

  5. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  6. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  7. Solar tracking device

    SciTech Connect (OSTI)

    Wyland, R.R.

    1981-01-20

    A solar tracking device having a plurality of reflector banks for reflecting the sun rays onto collector tubes and heating a fluid circulated therethrough. The reflector banks synchronized to follow the sun during the daily and yearly cycle of the earth as the earth orbits around the sun. The device by accurately following the sun provides a more efficient means of collecting solar energy.

  8. Microfabricated particle focusing device

    DOE Patents [OSTI]

    Ravula, Surendra K.; Arrington, Christian L.; Sigman, Jennifer K.; Branch, Darren W.; Brener, Igal; Clem, Paul G.; James, Conrad D.; Hill, Martyn; Boltryk, Rosemary June

    2013-04-23

    A microfabricated particle focusing device comprises an acoustic portion to preconcentrate particles over large spatial dimensions into particle streams and a dielectrophoretic portion for finer particle focusing into single-file columns. The device can be used for high throughput assays for which it is necessary to isolate and investigate small bundles of particles and single particles.

  9. Capillary interconnect device

    SciTech Connect (OSTI)

    Renzi, Ronald F

    2013-11-19

    An interconnecting device for connecting a plurality of first fluid-bearing conduits to a corresponding plurality of second fluid-bearing conduits thereby providing fluid communication between the first fluid-bearing conduits and the second fluid-bearing conduits. The device includes a manifold and one or two ferrule plates that are held by compressive axial forces.

  10. Device for removing blackheads

    DOE Patents [OSTI]

    Berkovich, Tamara (116 N. Wetherly Dr., Suite 115, Los Angeles, CA)

    1995-03-07

    A device for removing blackheads from pores in the skin having a elongated handle with a spoon shaped portion mounted on one end thereof, the spoon having multiple small holes piercing therethrough. Also covered is method for using the device to remove blackheads.

  11. Self-actuated device

    DOE Patents [OSTI]

    Hecht, Samuel L. (Richland, WA)

    1984-01-01

    A self-actuated device, of particular use as a valve or an orifice for nuclear reactor fuel and blanket assemblies, in which a gas produced by a neutron induced nuclear reaction gradually accumulates as a function of neutron fluence. The gas pressure increase occasioned by such accumulation of gas is used to actuate the device.

  12. Planar electrochemical device assembly

    DOE Patents [OSTI]

    Jacobson; Craig P. (Lafayette, CA), Visco; Steven J. (Berkeley, CA), De Jonghe; Lutgard C. (Lafayette, CA)

    2010-11-09

    A pre-fabricated electrochemical device having a dense electrolyte disposed between an anode and a cathode preferably deposited as thin films is bonded to a porous electrically conductive support. A second porous electrically conductive support may be bonded to a counter electrode of the electrochemical device. Multiple electrochemical devices may be bonded in parallel to a single porous support, such as a perforated sheet to provide a planar array. Planar arrays may be arranged in a stacked interconnected array. A method of making a supported electrochemical device is disclosed wherein the method includes a step of bonding a pre-fabricated electrochemical device layer to an existing porous metal or porous metal alloy layer.

  13. Planar electrochemical device assembly

    DOE Patents [OSTI]

    Jacobson, Craig P. (Lafayette, CA); Visco, Steven J. (Berkeley, CA); De Jonghe, Lutgard C. (Lafayette, CA)

    2007-06-19

    A pre-fabricated electrochemical device having a dense electrolyte disposed between an anode and a cathode preferably deposited as thin films is bonded to a porous electrically conductive support. A second porous electrically conductive support may be bonded to a counter electrode of the electrochemical device. Multiple electrochemical devices may be bonded in parallel to a single porous support, such as a perforated sheet to provide a planar array. Planar arrays may be arranged in a stacked interconnected array. A method of making a supported electrochemical device is disclosed wherein the method includes a step of bonding a pre-fabricated electrochemical device layer to an existing porous metal or porous metal alloy layer.

  14. Device for cutting protrusions

    DOE Patents [OSTI]

    Bzorgi, Fariborz M. (Knoxville, TN)

    2011-07-05

    An apparatus for clipping a protrusion of material is provided. The protrusion may, for example, be a bolt head, a nut, a rivet, a weld bead, or a temporary assembly alignment tab protruding from a substrate surface of assembled components. The apparatus typically includes a cleaver having a cleaving edge and a cutting blade having a cutting edge. Generally, a mounting structure configured to confine the cleaver and the cutting blade and permit a range of relative movement between the cleaving edge and the cutting edge is provided. Also typically included is a power device coupled to the cutting blade. The power device is configured to move the cutting edge toward the cleaving edge. In some embodiments the power device is activated by a momentary switch. A retraction device is also generally provided, where the retraction device is configured to move the cutting edge away from the cleaving edge.

  15. Fluidic nanotubes and devices

    DOE Patents [OSTI]

    Yang, Peidong (El Cerrito, CA); He, Rongrui (El Cerrito, CA); Goldberger, Joshua (Berkeley, CA); Fan, Rong (El Cerrito, CA); Wu, Yiying (Albany, CA); Li, Deyu (Albany, CA); Majumdar, Arun (Orinda, CA)

    2010-01-10

    Fluidic nanotube devices are described in which a hydrophilic, non-carbon nanotube, has its ends fluidly coupled to reservoirs. Source and drain contacts are connected to opposing ends of the nanotube, or within each reservoir near the opening of the nanotube. The passage of molecular species can be sensed by measuring current flow (source-drain, ionic, or combination). The tube interior can be functionalized by joining binding molecules so that different molecular species can be sensed by detecting current changes. The nanotube may be a semiconductor, wherein a tubular transistor is formed. A gate electrode can be attached between source and drain to control current flow and ionic flow. By way of example an electrophoretic array embodiment is described, integrating MEMs switches. A variety of applications are described, such as: nanopores, nanocapillary devices, nanoelectrophoretic, DNA sequence detectors, immunosensors, thermoelectric devices, photonic devices, nanoscale fluidic bioseparators, imaging devices, and so forth.

  16. Fluidic nanotubes and devices

    DOE Patents [OSTI]

    Yang, Peidong (Berkeley, CA); He, Rongrui (El Cerrito, CA); Goldberger, Joshua (Berkeley, CA); Fan, Rong (El Cerrito, CA); Wu, Yiying (Albany, CA); Li, Deyu (Albany, CA); Majumdar, Arun (Orinda, CA)

    2008-04-08

    Fluidic nanotube devices are described in which a hydrophilic, non-carbon nanotube, has its ends fluidly coupled to reservoirs. Source and drain contacts are connected to opposing ends of the nanotube, or within each reservoir near the opening of the nanotube. The passage of molecular species can be sensed by measuring current flow (source-drain, ionic, or combination). The tube interior can be functionalized by joining binding molecules so that different molecular species can be sensed by detecting current changes. The nanotube may be a semiconductor, wherein a tubular transistor is formed. A gate electrode can be attached between source and drain to control current flow and ionic flow. By way of example an electrophoretic array embodiment is described, integrating MEMs switches. A variety of applications are described, such as: nanopores, nanocapillary devices, nanoelectrophoretic, DNA sequence detectors, immunosensors, thermoelectric devices, photonic devices, nanoscale fluidic bioseparators, imaging devices, and so forth.

  17. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  18. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  19. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considered subject to demand concerns, supply concerns, or both demand and supply concerns.

  20. Rain sampling device

    DOE Patents [OSTI]

    Nelson, D.A.; Tomich, S.D.; Glover, D.W.; Allen, E.V.; Hales, J.M.; Dana, M.T.

    1991-05-14

    The present invention constitutes a rain sampling device adapted for independent operation at locations remote from the user which allows rainfall to be sampled in accordance with any schedule desired by the user. The rain sampling device includes a mechanism for directing wet precipitation into a chamber, a chamber for temporarily holding the precipitation during the process of collection, a valve mechanism for controllably releasing samples of the precipitation from the chamber, a means for distributing the samples released from the holding chamber into vessels adapted for permanently retaining these samples, and an electrical mechanism for regulating the operation of the device. 11 figures.

  1. Rain sampling device

    DOE Patents [OSTI]

    Nelson, Danny A. (Richland, WA); Tomich, Stanley D. (Richland, WA); Glover, Donald W. (Prosser, WA); Allen, Errol V. (Benton City, WA); Hales, Jeremy M. (Kennewick, WA); Dana, Marshall T. (Richland, WA)

    1991-01-01

    The present invention constitutes a rain sampling device adapted for independent operation at locations remote from the user which allows rainfall to be sampled in accordance with any schedule desired by the user. The rain sampling device includes a mechanism for directing wet precipitation into a chamber, a chamber for temporarily holding the precipitation during the process of collection, a valve mechanism for controllably releasing samples of said precipitation from said chamber, a means for distributing the samples released from the holding chamber into vessels adapted for permanently retaining these samples, and an electrical mechanism for regulating the operation of the device.

  2. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  3. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  4. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  5. Bring Your Own Device

    Broader source: Energy.gov [DOE]

    Bring your own Device, or BYOD, has been a popular topic for some time now. While government organizations and private companies continue to struggle with how to enjoy the business and economic...

  6. High temperature measuring device

    DOE Patents [OSTI]

    Tokarz, Richard D.

    1983-01-01

    A temperature measuring device for very high design temperatures (to 2,000.degree. C.). The device comprises a homogenous base structure preferably in the form of a sphere or cylinder. The base structure contains a large number of individual walled cells. The base structure has a decreasing coefficient of elasticity within the temperature range being monitored. A predetermined quantity of inert gas is confined within each cell. The cells are dimensionally stable at the normal working temperature of the device. Increases in gaseous pressure within the cells will permanently deform the cell walls at temperatures within the high temperature range to be measured. Such deformation can be correlated to temperature by calibrating similarly constructed devices under known time and temperature conditions.

  7. Inverted organic photosensitive device

    DOE Patents [OSTI]

    Forrest, Stephen R.; Tong, Xiaoran; Lee, Jun Yeob; Cho, Yong Joo

    2015-09-08

    There is disclosed a method for preparing the surface of a metal substrate. The present disclosure also relates to an organic photovoltaic device including a metal substrate made by such method. Also disclosed herein is an inverted photosensitive device including a stainless steel foil reflective electrode, an organic donor-acceptor heterojunction over the reflective electrode, and a transparent electrode over the donor-acceptor heterojunction.

  8. Wireless device monitoring systems and monitoring devices, and associated methods

    DOE Patents [OSTI]

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  9. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  10. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  11. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  12. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  13. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  14. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  15. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  16. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  17. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  18. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  19. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  20. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  1. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  2. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  3. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  4. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  5. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  6. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  7. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  8. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT:

  9. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks.

  10. U-181: IBM WebSphere Application Server Information Disclosure Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information.

  11. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  12. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  13. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  14. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  15. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  16. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  17. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 96: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  18. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  20. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  1. Electrical apparatus lockout device

    DOE Patents [OSTI]

    Gonzales, Rick (Chesapeake, VA)

    1999-01-01

    A simple lockout device for electrical equipment equipped with recessed power blades is described. The device comprises a face-plate (12) having a threaded member (14) attached thereto and apertures suitable for accommodating the power blades of a piece of electrical equipment, an elastomeric nose (16) abutting the face-plate having a hole for passage of the threaded member therethrough and power blade apertures in registration with those of the face-plate, a block (20) having a recess (34) in its forward face for receiving at least a portion of the hose, a hole therein for receiving the threaded member and an integral extension (26) extending from its rear face. A thumb screw (22) suitable for turning with the hands and having internal threads suitable for engaging the threaded member attached to the face-plate is inserted into a passage in the integral extension to engage the threaded member in such a fashion that when the device is inserted over the recessed power blades of a piece of electrical equipment and the thumb screw (22) tightened, the elastomeric nose (16) is compressed between the face-plate (12) and the block (20) forcing it to expand laterally thereby securing the device in the recess and precluding the accidental or intentional energization of the piece of equipment by attachment of a power cord to the recessed power blades. Means are provided in the interval extension and the thumb screw for the attachment of a locking device (46) which will satisfy OSHA standards.

  2. Spectral tailoring device

    DOE Patents [OSTI]

    Brager, H.R.; Schenter, R.E.; Carter, L.L.; Karnesky, R.A.

    1987-08-05

    A spectral tailoring device for altering the neutron energy spectra and flux of neutrons in a fast reactor thereby selectively to enhance or inhibit the transmutation rate of a target metrical to form a product isotope. Neutron moderators, neutron filters, neutron absorbers and neutron reflectors may be used as spectral tailoring devices. Depending on the intended use for the device, a member from each of these four classes of materials could be used singularly, or in combination, to provide a preferred neutron energy spectra and flux of the neutrons in the region of the target material. In one embodiment of the invention, an assembly is provided for enhancing the production of isotopes, such as cobalt 60 and gadolinium 153. In another embodiment of the invention, a spectral tailoring device is disposed adjacent a target material which comprises long lived or volatile fission products and the device is used to shift the neutron energy spectra and flux of neutrons in the region of the fission products to preferentially transmute them to produce a less volatile fission product inventory. 6 figs.

  3. Regenerative combustion device

    DOE Patents [OSTI]

    West, Phillip B.

    2004-03-16

    A regenerative combustion device having a combustion zone, and chemicals contained within the combustion zone, such as water, having a first equilibrium state, and a second combustible state. Means for transforming the chemicals from the first equilibrium state to the second combustible state, such as electrodes, are disposed within the chemicals. An igniter, such as a spark plug or similar device, is disposed within the combustion zone for igniting combustion of the chemicals in the second combustible state. The combustion products are contained within the combustion zone, and the chemicals are selected such that the combustion products naturally chemically revert into the chemicals in the first equilibrium state following combustion. The combustion device may thus be repeatedly reused, requiring only a brief wait after each ignition to allow the regeneration of combustible gasses within the head space.

  4. Biochip scanner device

    DOE Patents [OSTI]

    Perov, Alexander (Troitsk, RU); Belgovskiy, Alexander I. (Mayfield Heights, OH); Mirzabekov, Andrei D. (Darien, IL)

    2001-01-01

    A biochip scanner device used to detect and acquire fluorescence signal data from biological microchips or biochips and method of use are provided. The biochip scanner device includes a laser for emitting a laser beam. A modulator, such as an optical chopper modulates the laser beam. A scanning head receives the modulated laser beam and a scanning mechanics coupled to the scanning head moves the scanning head relative to the biochip. An optical fiber delivers the modulated laser beam to the scanning head. The scanning head collects the fluorescence light from the biochip, launches it into the same optical fiber, which delivers the fluorescence into a photodetector, such as a photodiode. The biochip scanner device is used in a row scanning method to scan selected rows of the biochip with the laser beam size matching the size of the immobilization site.

  5. Nonimaging radiant energy device

    DOE Patents [OSTI]

    Winston, Roland; Ning, Xiaohui

    1993-01-01

    A nonimaging radiant energy device may include a hyperbolically shaped reflective element with a radiant energy inlet and a radiant energy outlet. A convex lens is provided at the radiant energy inlet and a concave lens is provided at the radiant energy outlet. Due to the provision of the lenses and the shape of the walls of the reflective element, the radiant energy incident at the radiant energy inlet within a predetermined angle of acceptance is emitted from the radiant energy outlet exclusively within an acute exit angle. In another embodiment, the radiant energy device may include two interconnected hyperbolically shaped reflective elements with a respective convex lens being provided at each aperture of the device.

  6. Nonimaging radiant energy device

    DOE Patents [OSTI]

    Winston, Roland; Ning, Xiaohui

    1996-01-01

    A nonimaging radiant energy device may include a hyperbolically shaped reflective element with a radiant energy inlet and a radiant energy outlet. A convex lens is provided at the radiant energy inlet and a concave lens is provided at the radiant energy outlet. Due to the provision of the lenses and the shape of the walls of the reflective element, the radiant energy incident at the radiant energy inlet within a predetermined angle of acceptance is emitted from the radiant energy outlet exclusively within an acute exit angle. In another embodiment, the radiant energy device may include two interconnected hyperbolically shaped reflective elements with a respective convex lens being provided at each aperture of the device.

  7. Electrochromic optical switching device

    DOE Patents [OSTI]

    Lampert, C.M.; Visco, S.J.

    1992-08-25

    An electrochromic cell is disclosed which comprises an electrochromic layer, a polymerizable organo-sulfur layer which comprises the counter electrode of the structure, and an ionically conductive electronically insulating material which comprises the separator between the electrodes. In a preferred embodiment, both the separator and the organo-sulfur electrode (in both its charged and uncharged states) are transparent either to visible light or to the entire solar spectrum. An electrochromic device is disclosed which comprises such electrodes and separator encased in glass plates on the inner surface of each of which is formed a transparent electrically conductive film in respective electrical contact with the electrodes which facilitates formation of an external electrical connection or contact to the electrodes of the device to permit electrical connection of the device to an external potential source. 3 figs.

  8. Electrochromic optical switching device

    DOE Patents [OSTI]

    Lampert, Carl M. (El Sobrante, CA); Visco, Steven J. (Berkeley, CA)

    1992-01-01

    An electrochromic cell is disclosed which comprises an electrochromic layer, a polymerizable organo-sulfur layer which comprises the counter electrode of the structure, and an ionically conductive electronically insulating material which comprises the separator between the electrodes. In a preferred embodiment, both the separator and the organo-sulfur electrode (in both its charged and uncharged states) are transparent either to visible light or to the entire solar spectrum. An electrochromic device is disclosed which comprises such electrodes and separator encased in glass plates on the inner surface of each of which is formed a transparent electrically conductive film in respective electrical contact with the electrodes which facilitates formation of an external electrical connection or contact to the electrodes of the device to permit electrical connection of the device to an external potential source.

  9. Nonaqueous Electrical Storage Device

    DOE Patents [OSTI]

    McEwen, Alan B. (Melrose, MA); Evans, David A. (Seekonk, MA); Blakley, Thomas J. (Woburn, MA); Goldman, Jay L. (Mansfield, MA)

    1999-10-26

    An electrochemical capacitor is disclosed that features two, separated, high surface area carbon cloth electrodes sandwiched between two current collectors fabricated of a conductive polymer having a flow temperature greater than 130.degree. C., the perimeter of the electrochemical capacitor being sealed with a high temperature gasket to form a single cell device. The gasket material is a thermoplastic stable at temperatures greater than 100.degree. C., preferably a polyester or a polyurethane, and having a reflow temperature above 130.degree. C. but below the softening temperature of the current collector material. The capacitor packaging has good mechanical integrity over a wide temperature range, contributes little to the device equivalent series resistance (ESR), and is stable at high potentials. In addition, the packaging is designed to be easily manufacturable by assembly line methods. The individual cells can be stacked in parallel or series configuration to reach the desired device voltage and capacitance.

  10. Fragment capture device

    DOE Patents [OSTI]

    Payne, Lloyd R. (Los Lunas, NM); Cole, David L. (Albuquerque, NM)

    2010-03-30

    A fragment capture device for use in explosive containment. The device comprises an assembly of at least two rows of bars positioned to eliminate line-of-sight trajectories between the generation point of fragments and a surrounding containment vessel or asset. The device comprises an array of at least two rows of bars, wherein each row is staggered with respect to the adjacent row, and wherein a lateral dimension of each bar and a relative position of each bar in combination provides blockage of a straight-line passage of a solid fragment through the adjacent rows of bars, wherein a generation point of the solid fragment is located within a cavity at least partially enclosed by the array of bars.

  11. Pendulum detector testing device

    DOE Patents [OSTI]

    Gonsalves, J.M.

    1997-09-30

    A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.

  12. Pendulum detector testing device

    DOE Patents [OSTI]

    Gonsalves, John M.

    1997-01-01

    A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.

  13. Ion manipulation device

    DOE Patents [OSTI]

    Anderson, Gordon A; Smith, Richard D; Ibrahim, Yehia M; Baker, Erin M

    2014-09-16

    An ion manipulation method and device is disclosed. The device includes a pair of substantially parallel surfaces. An array of inner electrodes is contained within, and extends substantially along the length of, each parallel surface. The device includes a first outer array of electrodes and a second outer array of electrodes. Each outer array of electrodes is positioned on either side of the inner electrodes, and is contained within and extends substantially along the length of each parallel surface. A DC voltage is applied to the first and second outer array of electrodes. A RF voltage, with a superimposed electric field, is applied to the inner electrodes by applying the DC voltages to each electrode. Ions either move between the parallel surfaces within an ion confinement area or along paths in the direction of the electric field, or can be trapped in the ion confinement area.

  14. Precision alignment device

    DOE Patents [OSTI]

    Jones, N.E.

    1988-03-10

    Apparatus for providing automatic alignment of beam devices having an associated structure for directing, collimating, focusing, reflecting, or otherwise modifying the main beam. A reference laser is attached to the structure enclosing the main beam producing apparatus and produces a reference beam substantially parallel to the main beam. Detector modules containing optical switching devices and optical detectors are positioned in the path of the reference beam and are effective to produce an electrical output indicative of the alignment of the main beam. This electrical output drives servomotor operated adjustment screws to adjust the position of elements of the structure associated with the main beam to maintain alignment of the main beam. 5 figs.

  15. Dielectrophoretic columnar focusing device

    DOE Patents [OSTI]

    James, Conrad D. (Albuquerque, NM); Galambos, Paul C. (Albuquerque, NM); Derzon, Mark S. (Tijeras, NM)

    2010-05-11

    A dielectrophoretic columnar focusing device uses interdigitated microelectrodes to provide a spatially non-uniform electric field in a fluid that generates a dipole within particles in the fluid. The electric field causes the particles to either be attracted to or repelled from regions where the electric field gradient is large, depending on whether the particles are more or less polarizable than the fluid. The particles can thereby be forced into well defined stable paths along the interdigitated microelectrodes. The device can be used for flow cytometry, particle control, and other process applications, including cell counting or other types of particle counting, and for separations in material control.

  16. Precision alignment device

    DOE Patents [OSTI]

    Jones, Nelson E. (Huntington Beach, CA)

    1990-01-01

    Apparatus for providing automatic alignment of beam devices having an associated structure for directing, collimating, focusing, reflecting, or otherwise modifying the main beam. A reference laser is attached to the structure enclosing the main beam producing apparatus and produces a reference beam substantially parallel to the main beam. Detector modules containing optical switching devices and optical detectors are positioned in the path of the reference beam and are effective to produce an electrical output indicative of the alignment of the main beam. This electrical output drives servomotor operated adjustment screws to adjust the position of elements of the structure associated with the main beam to maintain alignment of the main beam.

  17. Precision positioning device

    DOE Patents [OSTI]

    McInroy, John E.

    2005-01-18

    A precision positioning device is provided. The precision positioning device comprises a precision measuring/vibration isolation mechanism. A first plate is provided with the precision measuring mean secured to the first plate. A second plate is secured to the first plate. A third plate is secured to the second plate with the first plate being positioned between the second plate and the third plate. A fourth plate is secured to the third plate with the second plate being positioned between the third plate and the fourth plate. An adjusting mechanism for adjusting the position of the first plate, the second plate, the third plate, and the fourth plate relative to each other.

  18. Phononic crystal devices

    DOE Patents [OSTI]

    El-Kady, Ihab F. (Albuquerque, NM); Olsson, Roy H. (Albuquerque, NM)

    2012-01-10

    Phononic crystals that have the ability to modify and control the thermal black body phonon distribution and the phonon component of heat transport in a solid. In particular, the thermal conductivity and heat capacity can be modified by altering the phonon density of states in a phononic crystal. The present invention is directed to phononic crystal devices and materials such as radio frequency (RF) tags powered from ambient heat, dielectrics with extremely low thermal conductivity, thermoelectric materials with a higher ratio of electrical-to-thermal conductivity, materials with phononically engineered heat capacity, phononic crystal waveguides that enable accelerated cooling, and a variety of low temperature application devices.

  19. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  20. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  1. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  2. LOADING AND UNLOADING DEVICE

    DOE Patents [OSTI]

    Treshow, M.

    1960-08-16

    A device for loading and unloading fuel rods into and from a reactor tank through an access hole includes parallel links carrying a gripper. These links enable the gripper to go through the access hole and then to be moved laterally from the axis of the access hole to the various locations of the fuel rods in the reactor tank.

  3. Solar Innovator | Alta Devices

    ScienceCinema (OSTI)

    Mattos, Laila; Le, Minh

    2013-05-29

    Selected to participate in the Energy Department's SunShot Initiative, Alta Devices produces solar cells that convert sunlight into electricity at world record-breaking levels of efficiency. Through its innovative solar technology Alta is helping bring down the cost of solar. Learn more about the Energy Department's efforts to advance solar technology at energy.gov/solar .

  4. Cascaded thermoacoustic devices

    DOE Patents [OSTI]

    Swift, Gregory W.; Backhaus, Scott N.; Gardner, David L.

    2003-12-09

    A thermoacoustic device is formed with a resonator system defining at least one region of high specific acoustic impedance in an acoustic wave within the resonator system. A plurality of thermoacoustic units are cascaded together within the region of high specific acoustic impedance, where at least one of the thermoacoustic units is a regenerator unit.

  5. Condensate removal device

    DOE Patents [OSTI]

    Maddox, James W.; Berger, David D.

    1984-01-01

    A condensate removal device is disclosed which incorporates a strainer in unit with an orifice. The strainer is cylindrical with its longitudinal axis transverse to that of the vapor conduit in which it is mounted. The orifice is positioned inside the strainer proximate the end which is remoter from the vapor conduit.

  6. Multiple gap photovoltaic device

    DOE Patents [OSTI]

    Dalal, Vikram L. (Newark, DE)

    1981-01-01

    A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

  7. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  8. Dielectrokinetic chromatography devices

    DOE Patents [OSTI]

    Chirica, Gabriela S; Fiechtner, Gregory J; Singh, Anup K

    2014-12-16

    Disclosed herein are methods and devices for dielectrokinetic chromatography. As disclosed, the devices comprise microchannels having at least one perturber which produces a non-uniformity in a field spanning the width of the microchannel. The interaction of the field non-uniformity with a perturber produces a secondary flow which competes with a primary flow. By decreasing the size of the perturber the secondary flow becomes significant for particles/analytes in the nanometer-size range. Depending on the nature of a particle/analyte present in the fluid and its interaction with the primary flow and the secondary flow, the analyte may be retained or redirected. The composition of the primary flow can be varied to affect the magnitude of primary and/or secondary flows on the particles/analytes and thereby separate and concentrate it from other particles/analytes.

  9. Nuclear reactor safety device

    DOE Patents [OSTI]

    Hutter, Ernest (Wilmette, IL)

    1986-01-01

    A safety device is disclosed for use in a nuclear reactor for axially repositioning a control rod with respect to the reactor core in the event of an upward thermal excursion. Such safety device comprises a laminated helical ribbon configured as a tube-like helical coil having contiguous helical turns with slidably abutting edges. The helical coil is disclosed as a portion of a drive member connected axially to the control rod. The laminated ribbon is formed of outer and inner laminae. The material of the outer lamina has a greater thermal coefficient of expansion than the material of the inner lamina. In the event of an upward thermal excursion, the laminated helical coil curls inwardly to a smaller diameter. Such inward curling causes the total length of the helical coil to increase by a substantial increment, so that the control rod is axially repositioned by a corresponding amount to reduce the power output of the reactor.

  10. Portable biochip scanner device

    DOE Patents [OSTI]

    Perov, Alexander (Troitsk, RU); Sharonov, Alexei (Moscow, RU); Mirzabekov, Andrei D. (Darien, IL)

    2002-01-01

    A portable biochip scanner device used to detect and acquire fluorescence signal data from biological microchips (biochips) is provided. The portable biochip scanner device employs a laser for emitting an excitation beam. An optical fiber delivers the laser beam to a portable biochip scanner. A lens collimates the laser beam, the collimated laser beam is deflected by a dichroic mirror and focused by an objective lens onto a biochip. The fluorescence light from the biochip is collected and collimated by the objective lens. The fluorescence light is delivered to a photomultiplier tube (PMT) via an emission filter and a focusing lens. The focusing lens focuses the fluorescence light into a pinhole. A signal output of the PMT is processed and displayed.

  11. Organic photosensitive devices

    DOE Patents [OSTI]

    Peumans, Peter; Forrest, Stephen R.

    2013-01-22

    A photoactive device is provided. The device includes a first electrode, a second electrode, and a photoactive region disposed between and electrically connected to the first and second electrodes. The photoactive region further includes an organic donor layer and an organic acceptor layer that form a donor-acceptor heterojunction. The mobility of holes in the organic donor region and the mobility of electrons in the organic acceptor region are different by a factor of at least 100, and more preferably a factor of at least 1000. At least one of the mobility of holes in the organic donor region and the mobility of electrons in the organic acceptor region is greater than 0.001 cm.sup.2/V-sec, and more preferably greater than 1 cm.sup.2/V-sec. The heterojunction may be of various types, including a planar heterojunction, a bulk heterojunction, a mixed heterojunction, and a hybrid planar-mixed heterojunction.

  12. Wire brush fastening device

    DOE Patents [OSTI]

    Meigs, Richard A. (East Concord, NY)

    1995-01-01

    A fastening device is provided which is a variation on the conventional nut and bolt. The bolt has a longitudinal axis and threading helically affixed thereon along the longitudinal axis. A nut having a bore extending therethrough is provided. The bore of the nut has a greater diameter than the diameter of the bolt so the bolt can extend through the bore. An array of wire bristles are affixed within the bore so as to form a brush. The wire bristles extend inwardly from the bore and are constructed and arranged of the correct size, length and stiffness to guide the bolt within the bore and to restrain the bolt within the bore as required. A variety of applications of the wire brush nut are disclosed, including a bolt capture device and a test rig apparatus.

  13. Wire brush fastening device

    DOE Patents [OSTI]

    Meigs, R.A.

    1995-09-19

    A fastening device is provided which is a variation on the conventional nut and bolt. The bolt has a longitudinal axis and threading helically affixed thereon along the longitudinal axis. A nut having a bore extending therethrough is provided. The bore of the nut has a greater diameter than the diameter of the bolt so the bolt can extend through the bore. An array of wire bristles are affixed within the bore so as to form a brush. The wire bristles extend inwardly from the bore and are constructed and arranged of the correct size, length and stiffness to guide the bolt within the bore and to restrain the bolt within the bore as required. A variety of applications of the wire brush nut are disclosed, including a bolt capture device and a test rig apparatus. 13 figs.

  14. Light modulating device

    DOE Patents [OSTI]

    Rauh, R.D.; Goldner, R.B.

    1989-12-26

    In a device for transmitting light, means for controlling the transmissivity of the device, including a ceramic, reversibly electrochromic, crystalline element having a highly reflective state when injected with electrons and charge compensating ions and a highly transmissive state when the electrons and ions are removed, the crystalline element being characterized as having a reflectivity of at least 50% in the reflective state and not greater than 10% in the transmissive state, and means for modulating the crystalline element between the reflective and transmissive states by injecting ions into the crystalline element in response to an applied electrical current of a first polarity and removing the ions in response to an applied electrical current of a second polarity are disclosed. 1 fig.

  15. Microelectromechanical safe arm device

    DOE Patents [OSTI]

    Roesler, Alexander W. (Tijeras, NM)

    2012-06-05

    Microelectromechanical (MEM) apparatus and methods for operating, for preventing unintentional detonation of energetic components comprising pyrotechnic and explosive materials, such as air bag deployment systems, munitions and pyrotechnics. The MEM apparatus comprises an interrupting member that can be moved to block (interrupt) or complete (uninterrupt) an explosive train that is part of an energetic component. One or more latching members are provided that engage and prevent the movement of the interrupting member, until the one or more latching members are disengaged from the interrupting member. The MEM apparatus can be utilized as a safe and arm device (SAD) and electronic safe and arm device (ESAD) in preventing unintentional detonations. Methods for operating the MEM apparatus include independently applying drive signals to the actuators coupled to the latching members, and an actuator coupled to the interrupting member.

  16. Stacked organic photosensitive devices

    DOE Patents [OSTI]

    Forrest, Stephen; Xue, Jiangeng; Uchida, Soichi; Rand, Barry P.

    2007-03-27

    A device is provided having a first electrode, a second electrode, a first photoactive region having a characteristic absorption wavelength .lamda..sub.1 and a second photoactive region having a characteristic absorption wavelength .lamda..sub.2. The photoactive regions are disposed between the first and second electrodes, and further positioned on the same side of a reflective layer, such that the first photoactive region is closer to the reflective layer than the second photoactive region. The materials comprising the photoactive regions may be selected such that .lamda..sub.1 is at least about 10% different from .lamda..sub.2. The device may further comprise an exciton blocking layer disposed adjacent to and in direct contact with the organic acceptor material of each photoactive region, wherein the LUMO of each exciton blocking layer other than that closest to the cathode is not more than about 0.3 eV greater than the LUMO of the acceptor material.

  17. Support and maneuvering device

    DOE Patents [OSTI]

    Wood, R.L.

    1987-03-23

    A support and maneuvering device includes an elongated flexible inflatable enclosure having a fixed end and a movable end. The movable end is collapsible toward the fixed end to a contracted position when the enclosure is in a noninflated condition. Upon inflation, the movable end is movable away from the fixed end to an extended position. The movable end includes means for mounting an article such as a solar reflector thereon. The device also includes a plurality of position controlling means disposed about the movable end to effect adjusting movement of portions thereof by predetermined amounts and for controlling an angle at which the article disposed at the movable end is oriented. The plurality of position controlling means limits a suitable number degrees of freedom of the movable end for transmitting a steering motion thereto and for controlling the position thereof. 9 figs.

  18. Tire deflation device

    DOE Patents [OSTI]

    Barker, Stacey G. (Idaho Falls, ID) [Idaho Falls, ID

    2010-01-05

    A tire deflation device includes (1) a component having a plurality of bores, (2) a plurality of spikes removably insertable into the plurality of bores and (3) a keeper within each among the plurality of bores, the keeper being configured to contact a sidewall surface of a spike among the plurality of spikes and to exert force upon the sidewall surface. In an embodiment, the tire deflation device includes (a) a component including a bore in a material, the bore including a receiving region, a sidewall surface and a base surface, (b) a channel extending from the sidewall surface into the material, (c) a keeper having a first section housed within the channel and a second section which extends past the sidewall surface into the receiving region, and (d) a spike removably insertable into the bore.

  19. Regenerative braking device

    DOE Patents [OSTI]

    Hoppie, Lyle O. (Birmingham, MI)

    1982-01-12

    Disclosed are several embodiments of a regenerative braking device for an automotive vehicle. The device includes a plurality of rubber rollers (24, 26) mounted for rotation between an input shaft (14) connectable to the vehicle drivetrain and an output shaft (16) which is drivingly connected to the input shaft by a variable ratio transmission (20). When the transmission ratio is such that the input shaft rotates faster than the output shaft, the rubber rollers are torsionally stressed to accumulate energy, thereby slowing the vehicle. When the transmission ratio is such that the output shaft rotates faster than the input shaft, the rubber rollers are torsionally relaxed to deliver accumulated energy, thereby accelerating or driving the vehicle.

  20. Support and maneuvering device

    DOE Patents [OSTI]

    Wood, Richard L. (Arvada, CO)

    1988-01-01

    A support and maneuvering device includes an elongated flexible inflatable enclosure having a fixed end and a movable end. The movable end is collapsible toward the fixed end to a contracted position when the enclosure is in a noninflated condition. Upon inflation, the movable end is movable away from the fixed end to an extended position. The movable end includes means for mounting an article such as a solar reflector thereon. The device also includes a plurality of position controlling means disposed about the movable end to effect adjusting movement of portions thereof by predetermined amounts and for controlling an angle at which the article disposed at the movable end is oriented. The plurality of position controlling means limits a suitable number degrees of freedom of the movable end for transmitting a steering motion thereto and for controlling the position thereof.

  1. Quick stop device

    DOE Patents [OSTI]

    Hipwell, Roger L. (35 Hounds Ditch La., Duxbury, MA 02332); Hazelton, Andrew J. (3877 Army St., San Francisco, CA 94131)

    1996-01-01

    A quick stop device for abruptly interrupting the cutting of a workpiece by a cutter is disclosed. The quick stop device employs an outer housing connected to an inner workpiece holder by at least one shear pin. The outer housing includes an appropriate shank designed to be received in the spindle of a machine, such as a machine tool. A cutter, such as a drill bit, is mounted in a stationary position and the workpiece, mounted to the workpiece holder, is rotated during engagement with the cutter. A trigger system includes at least one spring loaded punch disposed for movement into engagement with the workpiece holder to abruptly stop rotation of the workpiece holder. This action shears the shear pin and permits continued rotation of the spindle and outer housing without substantially disturbing the chip root formed during cutting.

  2. Alignment reference device

    DOE Patents [OSTI]

    Patton, Gail Y. (Sunnyvale, CA); Torgerson, Darrel D. (Palo Alto, CA)

    1987-01-01

    An alignment reference device provides a collimated laser beam that minimizes angular deviations therein. A laser beam source outputs the beam into a single mode optical fiber. The output end of the optical fiber acts as a source of radiant energy and is positioned at the focal point of a lens system where the focal point is positioned within the lens. The output beam reflects off a mirror back to the lens that produces a collimated beam.

  3. Fiber optic monitoring device

    DOE Patents [OSTI]

    Samborsky, James K. (605 Groves Blvd., N. Augusta, SC 29841)

    1993-01-01

    A device for the purpose of monitoring light transmissions in optical fibers comprises a fiber optic tap that optically diverts a fraction of a transmitted optical signal without disrupting the integrity of the signal. The diverted signal is carried, preferably by the fiber optic tap, to a lens or lens system that disperses the light over a solid angle that facilitates viewing. The dispersed light indicates whether or not the monitored optical fiber or system of optical fibers is currently transmitting optical information.

  4. Temperature measuring device

    DOE Patents [OSTI]

    Lauf, Robert J. (Oak Ridge, TN); Bible, Don W. (Clinton, TN); Sohns, Carl W. (Oak Ridge, TN)

    1999-01-01

    Systems and methods are described for a wireless instrumented silicon wafer that can measure temperatures at various points and transmit those temperature readings to an external receiver. The device has particular utility in the processing of semiconductor wafers, where it can be used to map thermal uniformity on hot plates, cold plates, spin bowl chucks, etc. without the inconvenience of wires or the inevitable thermal perturbations attendant with them.

  5. Biomolecular detection device

    DOE Patents [OSTI]

    Huo, Qisheng (Albuquerque, NM); Liu, Jun (Albuquerque, NM)

    2008-10-21

    A device for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode.

  6. Residual gas analysis device

    DOE Patents [OSTI]

    Thornberg, Steven M. (Peralta, NM)

    2012-07-31

    A system is provided for testing the hermeticity of a package, such as a microelectromechanical systems package containing a sealed gas volume, with a sampling device that has the capability to isolate the package and breach the gas seal connected to a pulse valve that can controllably transmit small volumes down to 2 nanoliters to a gas chamber for analysis using gas chromatography/mass spectroscopy diagnostics.

  7. Hybrid electroluminescent devices

    DOE Patents [OSTI]

    Shiang, Joseph John (Niskayuna, NY); Duggal, Anil Raj (Niskayuna, NY); Michael, Joseph Darryl (Schenectady, NY)

    2010-08-03

    A hybrid electroluminescent (EL) device comprises at least one inorganic diode element and at least one organic EL element that are electrically connected in series. The absolute value of the breakdown voltage of the inorganic diode element is greater than the absolute value of the maximum reverse bias voltage across the series. The inorganic diode element can be a power diode, a Schottky barrier diode, or a light-emitting diode.

  8. Sectional device handling tool

    DOE Patents [OSTI]

    Candee, Clark B. (Monroeville, PA)

    1988-07-12

    Apparatus for remotely handling a device in an irradiated underwater environment includes a plurality of tubular sections interconnected end-to-end to form a handling structure, the bottom section being adapted for connection to the device. A support section is connected to the top tubular section and is adapted to be suspended from an overhead crane. Each section is flanged at its opposite ends. Axially retractable bolts in each bottom flange are threadedly engageable with holes in the top flange of an adjacent section, each bolt being biased to its retracted position and retained in place on the bottom flange. Guide pins on each top flange cooperate with mating holes on adjacent bottom flanges to guide movement of the parts to the proper interconnection orientation. Each section carries two hydraulic line segments provided with quick-connect/disconnect fittings at their opposite ends for connection to the segments of adjacent tubular sections upon interconnection thereof to form control lines which are connectable to the device and to an associated control console.

  9. Plasma jet ignition device

    DOE Patents [OSTI]

    McIlwain, Michael E.; Grant, Jonathan F.; Golenko, Zsolt; Wittstein, Alan D.

    1985-01-15

    An ignition device of the plasma jet type is disclosed. The device has a cylindrical cavity formed in insulating material with an electrode at one end. The other end of the cylindrical cavity is closed by a metal plate with a small orifice in the center which plate serves as a second electrode. An arc jumping between the first electrode and the orifice plate causes the formation of a highly-ionized plasma in the cavity which is ejected through the orifice into the engine cylinder area to ignite the main fuel mixture. Two improvements are disclosed to enhance the operation of the device and the length of the plasma plume. One improvement is a metal hydride ring which is inserted in the cavity next to the first electrode. During operation, the high temperature in the cavity and the highly excited nature of the plasma breaks down the metal hydride, liberating hydrogen which acts as an additional fuel to help plasma formation. A second improvement consists of a cavity insert containing a plurality of spaced, metal rings. The rings act as secondary spark gap electrodes reducing the voltage needed to maintain the initial arc in the cavity.

  10. Thermophotovoltaic energy conversion device

    DOE Patents [OSTI]

    Charache, Greg W. (Clifton Park, NY); Baldasaro, Paul F. (Clifton Park, NY); Egley, James L. (Burnt Hills, NY)

    1998-01-01

    A thermophotovoltaic device and a method for making the thermophotovoltaic device. The device includes an n-type semiconductor material substrate having top and bottom surfaces, a tunnel junction formed on the top surface of the substrate, a region of active layers formed on top of the tunnel junction and a back surface reflector (BSR). The tunnel junction includes a layer of heavily doped n-type semiconductor material that is formed on the top surface of the substrate and a layer of heavily doped p-type semiconductor material formed on the n-type layer. An optional pseudomorphic layer can be formed between the n-type and p-type layers. A region of active layers is formed on top of the tunnel junction. This region includes a base layer of p-type semiconductor material and an emitter layer of n-type semiconductor material. An optional front surface window layer can be formed on top of the emitter layer. An optional interference filter can be formed on top of the emitter layer or the front surface window layer when it is used.

  11. Thermophotovoltaic energy conversion device

    DOE Patents [OSTI]

    Charache, G.W.; Baldasaro, P.F.; Egley, J.L.

    1998-05-19

    A thermophotovoltaic device and a method for making the thermophotovoltaic device are disclosed. The device includes an n-type semiconductor material substrate having top and bottom surfaces, a tunnel junction formed on the top surface of the substrate, a region of active layers formed on top of the tunnel junction and a back surface reflector (BSR). The tunnel junction includes a layer of heavily doped n-type semiconductor material that is formed on the top surface of the substrate and a layer of heavily doped p-type semiconductor material formed on the n-type layer. An optional pseudomorphic layer can be formed between the n-type and p-type layers. A region of active layers is formed on top of the tunnel junction. This region includes a base layer of p-type semiconductor material and an emitter layer of n-type semiconductor material. An optional front surface window layer can be formed on top of the emitter layer. An optional interference filter can be formed on top of the emitter layer or the front surface window layer when it is used. 1 fig.

  12. Non- contacting capacitive diagnostic device

    DOE Patents [OSTI]

    Ellison, Timothy

    2005-07-12

    A non-contacting capacitive diagnostic device includes a pulsed light source for producing an electric field in a semiconductor or photovoltaic device or material to be evaluated and a circuit responsive to the electric field. The circuit is not in physical contact with the device or material being evaluated and produces an electrical signal characteristic of the electric field produced in the device or material. The diagnostic device permits quality control and evaluation of semiconductor or photovoltaic device properties in continuous manufacturing processes.

  13. Packaging of solid state devices

    DOE Patents [OSTI]

    Glidden, Steven C.; Sanders, Howard D.

    2006-01-03

    A package for one or more solid state devices in a single module that allows for operation at high voltage, high current, or both high voltage and high current. Low thermal resistance between the solid state devices and an exterior of the package and matched coefficient of thermal expansion between the solid state devices and the materials used in packaging enables high power operation. The solid state devices are soldered between two layers of ceramic with metal traces that interconnect the devices and external contacts. This approach provides a simple method for assembling and encapsulating high power solid state devices.

  14. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Energy Savers [EERE]

    | Department of Energy 51: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities February 7, 2011 - 7:56am Addthis PROBLEM: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities. PLATFORM: Cisco WebEx recording players. Microsoft Windows, Apple Mac OS X, and Linux versions of the player are all affected. Affected versions of the players are those prior to client builds T27LC SP22 and

  15. Nonimaging radiant energy direction device

    DOE Patents [OSTI]

    Winston, Roland

    1980-01-01

    A raidant energy nonimaging light direction device is provided. The device includes an energy transducer and a reflective wall whose contour is particularly determined with respect to the geometrical vector flux of a field associated with the transducer.

  16. Micro environmental sensing device

    DOE Patents [OSTI]

    Polosky, Marc A. (Tijeras, NM); Lukens, Laurance L. (Tijeras, NM)

    2006-05-02

    A microelectromechanical (MEM) acceleration switch is disclosed which includes a proof mass flexibly connected to a substrate, with the proof mass being moveable in a direction substantially perpendicular to the substrate in response to a sensed acceleration. An electrode on the proof mass contacts one or more electrodes located below the proof mass to provide a switch closure in response to the sensed acceleration. Electrical latching of the switch in the closed position is possible with an optional latching electrode. The MEM acceleration switch, which has applications for use as an environmental sensing device, can be fabricated using micromachining.

  17. Detached rock evaluation device

    DOE Patents [OSTI]

    Hanson, David R. (Golden, CO)

    1986-01-01

    A rock detachment evaluation device (10) having an energy transducer unit 1) for sensing vibrations imparted to a subject rock (172) for converting the sensed vibrations into electrical signals, a low band pass filter unit (12) for receiving the electrical signal and transmitting only a low frequency segment thereof, a high band pass filter unit (13) for receiving the electrical signals and for transmitting only a high frequency segment thereof, a comparison unit (14) for receiving the low frequency and high frequency signals and for determining the difference in power between the signals, and a display unit (16) for displaying indicia of the difference, which provides a quantitative measure of rock detachment.

  18. Nanotube resonator devices

    DOE Patents [OSTI]

    Jensen, Kenneth J; Zettl, Alexander K; Weldon, Jeffrey A

    2014-05-06

    A fully-functional radio receiver fabricated from a single nanotube is being disclosed. Simultaneously, a single nanotube can perform the functions of all major components of a radio: antenna, tunable band-pass filter, amplifier, and demodulator. A DC voltage source, as supplied by a battery, can power the radio. Using carrier waves in the commercially relevant 40-400 MHz range and both frequency and amplitude modulation techniques, successful music and voice reception has been demonstrated. Also disclosed are a radio transmitter and a mass sensor using a nanotube resonator device.

  19. Graphene device and method of using graphene device

    DOE Patents [OSTI]

    Bouchiat, Vincent; Girit, Caglar; Kessler, Brian; Zettl, Alexander K.

    2015-08-11

    An embodiment of a graphene device includes a layered structure, first and second electrodes, and a dopant island. The layered structure includes a conductive layer, an insulating layer, and a graphene layer. The electrodes are coupled to the graphene layer. The dopant island is coupled to an exposed surface of the graphene layer between the electrodes. An embodiment of a method of using a graphene device includes providing the graphene device. A voltage is applied to the conductive layer of the graphene device. Another embodiment of a method of using a graphene device includes providing the graphene device without the dopant island. A dopant island is placed on an exposed surface of the graphene layer between the electrodes. A voltage is applied to the conductive layer of the graphene device. A response of the dopant island to the voltage is observed.

  20. Improved Thermoelectric Devices: Advanced Semiconductor Materials for Thermoelectric Devices

    SciTech Connect (OSTI)

    2009-12-11

    Broad Funding Opportunity Announcement Project: Phononic Devices is working to recapture waste heat and convert it into usable electric power. To do this, the company is using thermoelectric devices, which are made from advanced semiconductor materials that convert heat into electricity or actively remove heat for refrigeration and cooling purposes. Thermoelectric devices resemble computer chips, and they manage heat by manipulating the direction of electrons at the nanoscale. These devices aren’t new, but they are currently too inefficient and expensive for widespread use. Phononic Devices is using a high-performance, cost-effective thermoelectric design that will improve the device’s efficiency and enable electronics manufacturers to more easily integrate them into their products.

  1. Fluid flow monitoring device

    DOE Patents [OSTI]

    McKay, Mark D. (1426 Socastee Dr., North Augusta, SC 29841); Sweeney, Chad E. (3600 Westhampton Dr., Martinez, GA 30907-3036); Spangler, Jr., B. Samuel (2715 Margate Dr., Augusta, GA 30909)

    1993-01-01

    A flow meter and temperature measuring device comprising a tube with a body centered therein for restricting flow and a sleeve at the upper end of the tube to carry several channels formed longitudinally in the sleeve to the appropriate axial location where they penetrate the tube to allow pressure measurements and temperature measurements with thermocouples. The high pressure measurement is made using a channel penetrating the tube away from the body and the low pressure measurement is made at a location at the widest part of the body. An end plug seals the end of the device and holes at its upper end allow fluid to pass from the interior of the tube into a plenum. The channels are made by cutting grooves in the sleeve, the grooves widened at the surface of the sleeve and then a strip of sleeve material is welded to the grooves closing the channels. Preferably the sleeve is packed with powdered graphite before cutting the grooves and welding the strips.

  2. Fluid flow monitoring device

    DOE Patents [OSTI]

    McKay, M.D.; Sweeney, C.E.; Spangler, B.S. Jr.

    1993-11-30

    A flow meter and temperature measuring device are described comprising a tube with a body centered therein for restricting flow and a sleeve at the upper end of the tube to carry several channels formed longitudinally in the sleeve to the appropriate axial location where they penetrate the tube to allow pressure measurements and temperature measurements with thermocouples. The high pressure measurement is made using a channel penetrating the tube away from the body and the low pressure measurement is made at a location at the widest part of the body. An end plug seals the end of the device and holes at its upper end allow fluid to pass from the interior of the tube into a plenum. The channels are made by cutting grooves in the sleeve, the grooves widened at the surface of the sleeve and then a strip of sleeve material is welded to the grooves closing the channels. Preferably the sleeve is packed with powdered graphite before cutting the grooves and welding the strips. 7 figures.

  3. Thermoplastic tape compaction device

    DOE Patents [OSTI]

    Campbell, V.W.

    1994-12-27

    A device is disclosed for bonding a thermoplastic tape to a substrate to form a fully consolidated composite. This device has an endless chain associated with a frame so as to rotate in a plane that is perpendicular to a long dimension of the tape, the chain having pivotally connected chain links with each of the links carrying a flexible foot member that extends outwardly from the chain. A selected number of the foot members contact the tape, after the heating thereof, to cause the heated tape to bond to the substrate. The foot members are each a thin band of metal oriented transversely to the chain, with a flexibility and width and length to contact the tape so as to cause the tape to conform to the substrate to achieve consolidation of the tape and the substrate. A biased leaf-type spring within the frame bears against an inner surface of the chain to provide the compliant pressure necessary to bond the tape to the substrate. The chain is supported by sprockets on shafts rotatably supported in the frame and, in one embodiment, one of the shafts has a drive unit to produce rotation such that the foot members in contact with the tape move at the same speed as the tape. Cooling jets are positioned along the frame to cool the resultant consolidated composite. 5 figures.

  4. Thermoplastic tape compaction device

    DOE Patents [OSTI]

    Campbell, Vincent W. (Oak Ridge, TN)

    1994-01-01

    A device for bonding a thermoplastic tape to a substrate to form a fully consolidated composite. This device has an endless chain associated with a frame so as to rotate in a plane that is perpendicular to a long dimension of the tape, the chain having pivotally connected chain links with each of the links carrying a flexible foot member that extends outwardly from the chain. A selected number of the foot members contact the tape, after the heating thereof, to cause the heated tape to bond to the substrate. The foot members are each a thin band of metal oriented transversely to the chain, with a flexibility and width and length to contact the tape so as to cause the tape to conform to the substrate to achieve consolidation of the tape and the substrate. A biased leaf-type spring within the frame bears against an inner surface of the chain to provide the compliant pressure necessary to bond the tape to the substrate. The chain is supported by sprockets on shafts rotatably supported in the frame and, in one embodiment, one of the shafts has a drive unit to produce rotation such that the foot members in contact with the tape move at the same speed as the tape. Cooling jets are positioned along the frame to cool the resultant consolidated composite.

  5. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  6. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  7. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  8. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  9. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  10. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability...

  11. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 2.3.0 or 1.2.19. Addthis Related Articles U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability V-062: Asterisk Two Denial of...

  12. V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability

    Broader source: Energy.gov [DOE]

    McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

  13. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  14. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload.

  15. Stretchable and foldable electronic devices

    DOE Patents [OSTI]

    Rogers, John A; Huang, Yonggang; Ko, Heung Cho; Stoykovich, Mark; Choi, Won Mook; Song, Jizhou; Ahn, Jong Hyun; Kim, Dae Hyeong

    2014-12-09

    Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers. Multilayer devices are constructed to position a neutral mechanical surface coincident or proximate to a functional layer having a material that is susceptible to strain-induced failure. Neutral mechanical surfaces are positioned by one or more layers having a property that is spatially inhomogeneous, such as by patterning any of the layers of the multilayer device.

  16. Stretchable and foldable electronic devices

    DOE Patents [OSTI]

    2013-10-08

    Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers. Multilayer devices are constructed to position a neutral mechanical surface coincident or proximate to a functional layer having a material that is susceptible to strain-induced failure. Neutral mechanical surfaces are positioned by one or more layers having a property that is spatially inhomogeneous, such as by patterning any of the layers of the multilayer device.

  17. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  18. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  19. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  20. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  1. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the Administration's efforts to support national climate change adaptation planning through the Interagency Climate Change Adaptation Task Force and Strategic Sustainability Planning process established under Executive Order 13514 and to advance the U.S. Department of Energy's goal of promoting energy

  2. False color viewing device

    DOE Patents [OSTI]

    Kronberg, J.W.

    1991-05-08

    This invention consists of a viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching, the user`s eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

  3. Nuclear reactor safety device

    DOE Patents [OSTI]

    Hutter, E.

    1983-08-15

    A safety device is described for use in a nuclear reactor for axially repositioning a control rod with respect to the reactor core in the event of a thermal excursion. It comprises a laminated strip helically configured to form a tube, said tube being in operative relation to said control rod. The laminated strip is formed of at least two materials having different thermal coefficients of expansion, and is helically configured such that the material forming the outer lamina of the tube has a greater thermal coefficient of expansion than the material forming the inner lamina of said tube. In the event of a thermal excursion the laminated strip will tend to curl inwardly so that said tube will increase in length, whereby as said tube increases in length it exerts a force on said control rod to axially reposition said control rod with respect to said core.

  4. Downhole thermoacoustic device

    SciTech Connect (OSTI)

    Kuznetsov, O. L.; Malchenok, V. O.; Maxutov, R. A.; Mordukhaev, K. M.; Ostrovsky, A. P.

    1985-12-17

    A downhole thermoacoustic device comprises a heater with a terminal chamber, connected to a source or radiator of acoustic oscillation, including a hollow housing having mounted therein a longitudinal shaft carrying coils with cores in the form of a plurality of flat rings of a magnetostrictive material, operable as the active elements adapted to generate acoustic oscillation. Accommodated intermediate the coils is a member for focusing the acoustic field, in the form of a sleeve, while the longitudinal shaft carries a tube-shaped reflector of acoustic oscillation internally of the core of each coil. The top and bottom portions of the hollow housing of the radiator of acoustic oscillation have mounted therein damping elements including sleeves of a resilient material, while a heat-insulating member including a sleeve with a fluted surface is provided intermediate the terminal chamber of the heater and the hollow housing of the radiator.

  5. Capacitance measuring device

    DOE Patents [OSTI]

    Andrews, W.H. Jr.

    1984-08-01

    A capacitance measuring circuit is provided in which an unknown capacitance is measured by comparing the charge stored in the unknown capacitor with that stored in a known capacitance. Equal and opposite voltages are repetitively simultaneously switched onto the capacitors through an electronic switch driven by a pulse generator to charge the capacitors during the ''on'' portion of the cycle. The stored charge is compared by summing discharge currents flowing through matched resistors at the input of a current sensor during the ''off'' portion of the switching cycle. The net current measured is thus proportional to the difference in value of the two capacitances. The circuit is capable of providing much needed accuracy and stability to a great variety of capacitance-based measurement devices at a relatively low cost.

  6. False color viewing device

    DOE Patents [OSTI]

    Kronberg, J.W.

    1992-10-20

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage. 7 figs.

  7. Personal annunciation device

    DOE Patents [OSTI]

    Angelo, Peter; Younkin, James; DeMint, Paul

    2011-01-25

    A personal annunciation device (PAD) providing, in an area of interest, compensatory annunciation of the presence of an abnormal condition in a hazardous area and accountability of the user of the PAD. Compensatory annunciation supplements primary annunciation provided by an emergency notification system (ENS). A detection system detects an abnormal condition, and a wireless transmission system transmits a wireless transmission to the PAD. The PAD has a housing enclosing the components of the PAD including a communication module for receiving the wireless transmission, a power supply, processor, memory, annunciation system, and RFID module. The RFID module has an RFID receiver that listens for an RFID transmission from an RFID reader disposed in a portal of an area of interest. The PAD identifies the transmission and changes its operating state based on the transmission. The RFID readers recognize, record, and transmit the state of the PAD to a base station providing accountability of the wearer.

  8. Capillary interconnect device

    SciTech Connect (OSTI)

    Renzi, Ronald F.

    2007-12-25

    A manifold for connecting external capillaries to the inlet and/or outlet ports of a microfluidic device for high pressure applications is provided. The fluid connector for coupling at least one fluid conduit to a corresponding port of a substrate that includes: (i) a manifold comprising one or more channels extending therethrough wherein each channel is at least partially threaded, (ii) one or more threaded ferrules each defining a bore extending therethrough with each ferrule supporting a fluid conduit wherein each ferrule is threaded into a channel of the manifold, (iii) a substrate having one or more ports on its upper surface wherein the substrate is positioned below the manifold so that the one or more ports is aligned with the one or more channels of the manifold, and (iv) means for applying an axial compressive force to the substrate to couple the one or more ports of the substrate to a corresponding proximal end of a fluid conduit.

  9. Light emitting ceramic device

    DOE Patents [OSTI]

    Valentine, Paul; Edwards, Doreen D.; Walker, Jr., William John; Slack, Lyle H.; Brown, Wayne Douglas; Osborne, Cathy; Norton, Michael; Begley, Richard

    2010-05-18

    A light-emitting ceramic based panel, hereafter termed "electroceramescent" panel, is herein claimed. The electroceramescent panel is formed on a substrate providing mechanical support as well as serving as the base electrode for the device. One or more semiconductive ceramic layers directly overlay the substrate, and electrical conductivity and ionic diffusion are controlled. Light emitting regions overlay the semiconductive ceramic layers, and said regions consist sequentially of a layer of a ceramic insulation layer and an electroluminescent layer, comprised of doped phosphors or the equivalent. One or more conductive top electrode layers having optically transmissive areas overlay the light emitting regions, and a multi-layered top barrier cover comprising one or more optically transmissive non-combustible insulation layers overlay said top electrode regions.

  10. Materials for optoelectronic devices

    DOE Patents [OSTI]

    Shiang, Joseph John; Smigelski, Jr., Paul Michael

    2015-01-27

    Energy efficient optoelectronic devices include an electroluminescent layer containing a polymer made up of structural units of formula I and II; ##STR00001## wherein R.sup.1 and R.sup.2 are independently C.sub.22-44 hydrocarbyl, C.sub.22-44 hydrocarbyl containing one or more S, N, O, P, or Si atoms, oxaalkylaryl, or a combination thereof; R.sup.3 and R.sup.4 are independently H, C.sub.1-44 hydrocarbyl or C.sub.1-44 hydrocarbyl containing one or more S, N, O, P, or Si atoms, or R.sup.3 and R.sup.4, taken together, form a C.sub.2-10 monocyclic or bicyclic ring containing up to three S, N, O, P, or Si heteroatoms; and X is S, Se, or a combination thereof.

  11. Module isolation devices

    DOE Patents [OSTI]

    Carolan, Michael Francis; Cooke, John Albert; Buzinski, Michael David

    2010-04-27

    A gas flow isolation device includes a gas flow isolation valve movable from an opened condition to a closed condition. The module isolation valve in one embodiment includes a rupture disk in flow communication with a flow of gas when the module isolation valve is in an opened condition. The rupture disk ruptures when a predetermined pressure differential occurs across it causing the isolation valve to close. In one embodiment the valve is mechanically linked to the rupture disk to maintain the valve in an opened condition when the rupture disk is intact, and which permits the valve to move into a closed condition when the rupture disk ruptures. In another embodiment a crushable member maintains the valve in an open condition, and the flow of gas passed the valve upon rupturing of the rupture disk compresses the crushable member to close the isolation valve.

  12. Multichannel optical sensing device

    DOE Patents [OSTI]

    Selkowitz, S.E.

    1985-08-16

    A multichannel optical sensing device is disclosed, for measuring the outdoor sky luminance or illuminance or the luminance or illuminance distribution in a room, comprising a plurality of light receptors, an optical shutter matrix including a plurality of liquid crystal optical shutter elements operable by electrical control signals between light transmitting and light stopping conditions, fiber optical elements connected between the receptors and the shutter elements, a microprocessor based programmable control unit for selectively supplying control signals to the optical shutter elements in a programmable sequence, a photodetector including an optical integrating spherical chamber having an input port for receiving the light from the shutter matrix and at least one detector element in the spherical chamber for producing output signals corresponding to the light, and output units for utilizing the output signals including a storage unit having a control connection to the microprocessor based programmable control unit for storing the output signals under the sequence control of the programmable control unit.

  13. Multichannel optical sensing device

    DOE Patents [OSTI]

    Selkowitz, Stephen E. (Piedmont, CA)

    1990-01-01

    A multichannel optical sensing device is disclosed, for measuring the outr sky luminance or illuminance or the luminance or illuminance distribution in a room, comprising a plurality of light receptors, an optical shutter matrix including a plurality of liquid crystal optical shutter elements operable by electrical control signals between light transmitting and light stopping conditions, fiber optic elements connected between the receptors and the shutter elements, a microprocessor based programmable control unit for selectively supplying control signals to the optical shutter elements in a programmable sequence, a photodetector including an optical integrating spherical chamber having an input port for receiving the light from the shutter matrix and at least one detector element in the spherical chamber for producing output signals corresponding to the light, and output units for utilizing the output signals including a storage unit having a control connection to the microprocessor based programmable control unit for storing the output signals under the sequence control of the programmable control unit.

  14. Air bag restraint device

    DOE Patents [OSTI]

    Marts, D.J.; Richardson, J.G.

    1995-10-17

    A rear-seat air bag restraint device is disclosed that prevents an individual, or individuals, from continuing violent actions while being transported in a patrol vehicle`s rear seat without requiring immediate physical contact by the law enforcement officer. The air bag is activated by a control switch in the front seat and inflates to independently restrict the amount of physical activity occurring in the rear seat of the vehicle while allowing the officer to safely stop the vehicle. The air bag can also provide the officer additional time to get backup personnel to aid him if the situation warrants it. The bag is inflated and maintains a constant pressure by an air pump. 8 figs.

  15. Air bag restraint device

    DOE Patents [OSTI]

    Marts, Donna J.; Richardson, John G.

    1995-01-01

    A rear-seat air bag restraint device is disclosed that prevents an individual, or individuals, from continuing violent actions while being transported in a patrol vehicle's rear seat without requiring immediate physical contact by the law enforcement officer. The air bag is activated by a control switch in the front seat and inflates to independently restrict the amount of physical activity occurring in the rear seat of the vehicle while allowing the officer to safely stop the vehicle. The air bag can also provide the officer additional time to get backup personnel to aid him if the situation warrants it. The bag is inflated and maintains a constant pressure by an air pump.

  16. Tunable surface plasmon devices

    DOE Patents [OSTI]

    Shaner, Eric A. (Rio Rancho, NM); Wasserman, Daniel (Lowell, MA)

    2011-08-30

    A tunable extraordinary optical transmission (EOT) device wherein the tunability derives from controlled variation of the dielectric constant of a semiconducting material (semiconductor) in evanescent-field contact with a metallic array of sub-wavelength apertures. The surface plasmon resonance wavelength can be changed by changing the dielectric constant of the dielectric material. In embodiments of this invention, the dielectric material is a semiconducting material. The dielectric constant of the semiconducting material in the metal/semiconductor interfacial region is controllably adjusted by adjusting one or more of the semiconductor plasma frequency, the concentration and effective mass of free carriers, and the background high-frequency dielectric constant in the interfacial region. Thermal heating and/or voltage-gated carrier-concentration changes may be used to variably adjust the value of the semiconductor dielectric constant.

  17. False color viewing device

    DOE Patents [OSTI]

    Kronberg, James W. (108 Independent Blvd., Aiken, SC 29801)

    1992-01-01

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

  18. Safe-haven locking device

    DOE Patents [OSTI]

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  19. Biomedical devices from ultraviolet LEDs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Team Leader Alberto Paleari University of Milano-Bicocca in Italy Such devices ... at the University of Milano-Bicocca in Italy describe a fabrication process that ...

  20. Microbiopsy/precision cutting devices

    DOE Patents [OSTI]

    Krulevitch, P.A.; Lee, A.P.; Northrup, M.A.; Benett, W.J.

    1999-07-27

    Devices are disclosed for performing tissue biopsy on a small scale (microbiopsy). By reducing the size of the biopsy tool and removing only a small amount of tissue or other material in a minimally invasive manner, the risks, costs, injury and patient discomfort associated with traditional biopsy procedures can be reduced. By using micromachining and precision machining capabilities, it is possible to fabricate small biopsy/cutting devices from silicon. These devices can be used in one of four ways (1) intravascularly, (2) extravascularly, (3) by vessel puncture, and (4) externally. Additionally, the devices may be used in precision surgical cutting. 6 figs.

  1. Structured wafer for device processing

    DOE Patents [OSTI]

    Okandan, Murat; Nielson, Gregory N

    2014-05-20

    A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

  2. Structured wafer for device processing

    DOE Patents [OSTI]

    Okandan, Murat; Nielson, Gregory N

    2014-11-25

    A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

  3. Microbiopsy/precision cutting devices

    DOE Patents [OSTI]

    Krulevitch, Peter A. (Pleasanton, CA); Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Benett, William J. (Livermore, CA)

    1999-01-01

    Devices for performing tissue biopsy on a small scale (microbiopsy). By reducing the size of the biopsy tool and removing only a small amount of tissue or other material in a minimally invasive manner, the risks, costs, injury and patient discomfort associated with traditional biopsy procedures can be reduced. By using micromachining and precision machining capabilities, it is possible to fabricate small biopsy/cutting devices from silicon. These devices can be used in one of four ways 1) intravascularly, 2) extravascularly, 3) by vessel puncture, and 4) externally. Additionally, the devices may be used in precision surgical cutting.

  4. Cable load sensing device

    DOE Patents [OSTI]

    Beus, Michael J. (Spokane, WA); McCoy, William G. (Spokane, WA)

    1998-01-01

    Apparatus for sensing the magnitude of a load on a cable as the cable is employed to support the load includes a beam structure clamped to the cable so that a length of the cable lies along the beam structure. A spacer associated with the beam structure forces a slight curvature in a portion of the length of cable under a cable "no-load" condition so that the portion of the length of cable is spaced from the beam structure to define a cable curved portion. A strain gauge circuit including strain gauges is secured to the beam structure by welding. As the cable is employed to support a load the load causes the cable curved portion to exert a force normal to the cable through the spacer and on the beam structure to deform the beam structure as the cable curved portion attempts to straighten under the load. As this deformation takes place, the resistance of the strain gauges is set to a value proportional to the magnitude of the normal strain on the beam structure during such deformation. The magnitude of the normal strain is manipulated in a control device to generate a value equal to the magnitude or weight of the load supported by the cable.

  5. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, P.M.

    1986-04-22

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions. 2 figs.

  6. Temperature differential detection device

    DOE Patents [OSTI]

    Girling, Peter M.

    1986-01-01

    A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions.

  7. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect (OSTI)

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  8. Electrical latching of microelectromechanical devices

    DOE Patents [OSTI]

    Garcia, Ernest J.; Sleefe, Gerard E.

    2004-11-02

    Methods are disclosed for row and column addressing of an array of microelectromechanical (MEM) devices. The methods of the present invention are applicable to MEM micromirrors or memory elements and allow the MEM array to be programmed and maintained latched in a programmed state with a voltage that is generally lower than the voltage required for electrostatically switching the MEM devices.

  9. OLED devices with internal outcoupling

    DOE Patents [OSTI]

    Liu, Jie Jerry; Sista, Srinivas Prasad; Shi, Xiaolei; Zhao, Ri-An; Chichak, Kelly Scott; Youmans, Jeffrey Michael; Janora, Kevin Henry; Turner, Larry Gene

    2015-03-03

    Optoelectronic devices that have enhanced internal outcoupling are disclosed. The devices include a substrate, an anode, a cathode, an electroluminescent layer, and a hole injecting layer. The hole injecting layer includes inorganic nanoparticles that have a bimodal particle size distribution and which are dispersed in an organic matrix.

  10. Triboluminescent tamper-indicating device

    DOE Patents [OSTI]

    Johnston, Roger G. (Los Alamos, NM); Garcia, Anthony R. E. (Espanola, NM)

    2002-01-01

    A tamper-indicating device is described. The device has a transparent or translucent cylindrical body that includes triboluminescent material, and an outer opaque layer that prevents ambient light from entering. A chamber in the body holds an undeveloped piece of photographic film bearing an image. The device is assembled from two body members. One of the body members includes a recess for storing film and an optical assembly that can be adjusted to prevent light from passing through the assembly and exposing the film. To use the device with a hasp, the body members are positioned on opposite sides of a hasp, inserted through the hasp, and attached. The optical assembly is then manipulated to allow any light generated from the triboluminescent materials during a tampering activity that damages the device to reach the film and destroy the image on the film.

  11. Ergonomic material-handling device

    DOE Patents [OSTI]

    Barsnick, Lance E.; Zalk, David M.; Perry, Catherine M.; Biggs, Terry; Tageson, Robert E.

    2004-08-24

    A hand-held ergonomic material-handling device capable of moving heavy objects, such as large waste containers and other large objects requiring mechanical assistance. The ergonomic material-handling device can be used with neutral postures of the back, shoulders, wrists and knees, thereby reducing potential injury to the user. The device involves two key features: 1) gives the user the ability to adjust the height of the handles of the device to ergonomically fit the needs of the user's back, wrists and shoulders; and 2) has a rounded handlebar shape, as well as the size and configuration of the handles which keep the user's wrists in a neutral posture during manipulation of the device.

  12. Automatic Mechetronic Wheel Light Device

    DOE Patents [OSTI]

    Khan, Mohammed John Fitzgerald

    2004-09-14

    A wheel lighting device for illuminating a wheel of a vehicle to increase safety and enhance aesthetics. The device produces the appearance of a "ring of light" on a vehicle's wheels as the vehicle moves. The "ring of light" can automatically change in color and/or brightness according to a vehicle's speed, acceleration, jerk, selection of transmission gears, and/or engine speed. The device provides auxiliary indicator lights by producing light in conjunction with a vehicle's turn signals, hazard lights, alarm systems, and etc. The device comprises a combination of mechanical and electronic components and can be placed on the outer or inner surface of a wheel or made integral to a wheel or wheel cover. The device can be configured for all vehicle types, and is electrically powered by a vehicle's electrical system and/or battery.

  13. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  14. U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks.

  15. High voltage MOSFET devices and methods of making the devices

    DOE Patents [OSTI]

    Banerjee, Sujit; Matocha, Kevin; Chatty, Kiran

    2015-12-15

    A SiC MOSFET device having low specific on resistance is described. The device has N+, P-well and JFET regions extended in one direction (Y-direction) and P+ and source contacts extended in an orthogonal direction (X-direction). The polysilicon gate of the device covers the JFET region and is terminated over the P-well region to minimize electric field at the polysilicon gate edge. In use, current flows vertically from the drain contact at the bottom of the structure into the JFET region and then laterally in the X direction through the accumulation region and through the MOSFET channels into the adjacent N+ region. The current flowing out of the channel then flows along the N+ region in the Y-direction and is collected by the source contacts and the final metal. Methods of making the device are also described.

  16. Split ring containment attachment device

    DOE Patents [OSTI]

    Sammel, Alfred G. (Pittsburgh, PA)

    1996-01-01

    A containment attachment device 10 for operatively connecting a glovebag 200 to plastic sheeting 100 covering hazardous material. The device 10 includes an inner split ring member 20 connected on one end 22 to a middle ring member 30 wherein the free end 21 of the split ring member 20 is inserted through a slit 101 in the plastic sheeting 100 to captively engage a generally circular portion of the plastic sheeting 100. A collar potion 41 having an outer ring portion 42 is provided with fastening means 51 for securing the device 10 together wherein the glovebag 200 is operatively connected to the collar portion 41.

  17. Polymer electronic devices and materials.

    SciTech Connect (OSTI)

    Schubert, William Kent; Baca, Paul Martin; Dirk, Shawn M.; Anderson, G. Ronald; Wheeler, David Roger

    2006-01-01

    Polymer electronic devices and materials have vast potential for future microsystems and could have many advantages over conventional inorganic semiconductor based systems, including ease of manufacturing, cost, weight, flexibility, and the ability to integrate a wide variety of functions on a single platform. Starting materials and substrates are relatively inexpensive and amenable to mass manufacturing methods. This project attempted to plant the seeds for a new core competency in polymer electronics at Sandia National Laboratories. As part of this effort a wide variety of polymer components and devices, ranging from simple resistors to infrared sensitive devices, were fabricated and characterized. Ink jet printing capabilities were established. In addition to promising results on prototype devices the project highlighted the directions where future investments must be made to establish a viable polymer electronics competency.

  18. High-temperature-measuring device

    DOE Patents [OSTI]

    Not Available

    1981-01-27

    A temperature measuring device for very high design temperatures (to 2000/sup 0/C) is described. The device comprises a homogenous base structure preferably in the form of a sphere or cylinder. The base structure contains a large number of individual walled cells. The base structure has a decreasing coefficient of elasticity within the temperature range being monitored. A predetermined quantity of inert gas is confined within each cell. The cells are dimensonally stable at the normal working temperature of the device. Increases in gaseous pressure within the cells will permanently deform the cell walls at temperatures within the high temperature range to be measured. Such deformation can be correlated to temperature by calibrating similarly constructed devices under known time and temperature conditions.

  19. OCDR guided laser ablation device

    DOE Patents [OSTI]

    Dasilva, Luiz B. (Danville, CA); Colston, Jr., Bill W. (Livermore, CA); James, Dale L. (Tracy, CA)

    2002-01-01

    A guided laser ablation device. The device includes a mulitmode laser ablation fiber that is surrounded by one or more single mode optical fibers that are used to image in the vicinity of the laser ablation area to prevent tissue damage. The laser ablation device is combined with an optical coherence domain reflectometry (OCDR) unit and with a control unit which initializes the OCDR unit and a high power laser of the ablation device. Data from the OCDR unit is analyzed by the control unit and used to control the high power laser. The OCDR images up to about 3 mm ahead of the ablation surface to enable a user to see sensitive tissue such as a nerve or artery before damaging it by the laser.

  20. Devices for collecting chemical compounds

    DOE Patents [OSTI]

    Scott, Jill R; Groenewold, Gary S

    2013-12-24

    A device for sampling chemical compounds from fixed surfaces and related methods are disclosed. The device may include a vacuum source, a chamber and a sorbent material. The device may utilize vacuum extraction to volatilize the chemical compounds from a fixed surface so that they may be sorbed by the sorbent material. The sorbent material may then be analyzed using conventional thermal desorption/gas chromatography/mass spectrometry (TD/GC/MS) instrumentation to determine presence of the chemical compounds. The methods may include detecting release and presence of one or more chemical compounds and determining the efficacy of decontamination. The device may be useful in collection and analysis of a variety of chemical compounds, such as residual chemical warfare agents, chemical attribution signatures and toxic industrial chemicals.

  1. Personal cooling air filtering device

    DOE Patents [OSTI]

    Klett, James (Knoxville, TN); Conway, Bret (Denver, NC)

    2002-08-13

    A temperature modification system for modifying the temperature of fluids includes at least one thermally conductive carbon foam element, the carbon foam element having at least one flow channel for the passage of fluids. At least one temperature modification device is provided, the temperature modification device thermally connected to the carbon foam element and adapted to modify the temperature of the carbon foam to modify the temperature of fluids flowing through the flow channels. Thermoelectric and/or thermoionic elements can preferably be used as the temperature modification device. A method for the reversible temperature modification of fluids includes the steps of providing a temperature modification system including at least one thermally conductive carbon foam element having flow channels and at least one temperature modification device, and flowing a fluid through the flow channels.

  2. Thermoelectric Materials, Devices and Systems:

    Energy Savers [EERE]

    DRAFT - PRE-DECISIONAL -DRAFT - FOR OFFICIAL USE ONLY - DRAFT Thermoelectric Materials, Devices and Systems: 1 Technology Assessment 2 Contents 3 1. Thermoelectric Generation ................................................................................................................... 2 4 2. Technology Assessment and Potential ................................................................................................. 3 5 2.1 Performance Advances

  3. Start Your Energy Conversion Devices

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Start Your Energy Conversion Devices "Start Your Energy Conversion Devices" Sunrayce 97 Begins Day 1 - Indianapolis to Terre Haute For more information contact: Patrick Booher, Program Manager Sunrayce 97 586-9275 Cathy Short 586-9302 Terre Haute, Ind., June 19, 1997 -- Manta GT, the Massachusetts Institute of Technology's entry in Sunrayce 97 made the quickest trip Thursday from the Indianapolis Motor Speedway to Terre Haute in the first leg North America's largest solar car event.

  4. Piezo-phototronic effect devices

    DOE Patents [OSTI]

    Wang, Zhong L.; Yang, Qing

    2013-09-10

    A semiconducting device includes a piezoelectric structure that has a first end and an opposite second end. A first conductor is in electrical communication with the first end and a second conductor is in electrical communication with the second end so as to form an interface therebetween. A force applying structure is configured to maintain an amount of strain in the piezoelectric member sufficient to generate a desired electrical characteristic in the semiconducting device.

  5. Lih thermal energy storage device

    DOE Patents [OSTI]

    Olszewski, Mitchell; Morris, David G.

    1994-01-01

    A thermal energy storage device for use in a pulsed power supply to store waste heat produced in a high-power burst operation utilizes lithium hydride as the phase change thermal energy storage material. The device includes an outer container encapsulating the lithium hydride and an inner container supporting a hydrogen sorbing sponge material such as activated carbon. The inner container is in communication with the interior of the outer container to receive hydrogen dissociated from the lithium hydride at elevated temperatures.

  6. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

    SciTech Connect (OSTI)

    Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

    2008-07-08

    The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

  7. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  8. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without compromising the underlying system. Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.

  9. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  10. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  11. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  12. SLAC All Access: Vacuum Microwave Device Department

    ScienceCinema (OSTI)

    Haase, Andy

    2014-06-13

    The Vacuum Microwave Device Department (VMDD) builds the devices that make SLAC's particle accelerators go. These devices, called klystrons, generate intense waves of microwave energy that rocket subatomic particles up to nearly the speed of light.

  13. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    DOE Patents [OSTI]

    McCown, Steven H. (Rigby, ID); Derr, Kurt W. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID)

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  14. Recent Device Developments with Advanced Bulk Thermoelectric...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Device Developments with Advanced Bulk Thermoelectric Materials at RTI Recent Device Developments with Advanced Bulk Thermoelectric Materials at RTI Reviews work in engineered ...

  15. Power Device Packaging | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Review and Peer Evaluation PDF icon ape023liang2011p.pdf More Documents & Publications Power Device Packaging Power Device Packaging Benchmarking of Competitive Technologies

  16. A nanophotonic solar thermophotovoltaic device (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    A nanophotonic solar thermophotovoltaic device Citation Details In-Document Search Title: A nanophotonic solar thermophotovoltaic device Authors: Lenert, A ; Bierman, D ; Nam, Y ;...

  17. Electronic Educational Devices EED | Open Energy Information

    Open Energy Info (EERE)

    search Name: Electronic Educational Devices (EED) Place: Colorado Product: Colorado-USA-based manufacturer of higher-end watt meters for plug-in devices. References:...

  18. Dual control active superconductive devices

    DOE Patents [OSTI]

    Martens, Jon S. (Albuquerque, NM); Beyer, James B. (Madison, WI); Nordman, James E. (Madison, WI); Hohenwarter, Gert K. G. (Madison, WI)

    1993-07-20

    A superconducting active device has dual control inputs and is constructed such that the output of the device is effectively a linear mix of the two input signals. The device is formed of a film of superconducting material on a substrate and has two main conduction channels, each of which includes a weak link region. A first control line extends adjacent to the weak link region in the first channel and a second control line extends adjacent to the weak link region in the second channel. The current flowing from the first channel flows through an internal control line which is also adjacent to the weak link region of the second channel. The weak link regions comprise small links of superconductor, separated by voids, through which the current flows in each channel. Current passed through the control lines causes magnetic flux vortices which propagate across the weak link regions and control the resistance of these regions. The output of the device taken across the input to the main channels and the output of the second main channel and the internal control line will constitute essentially a linear mix of the two input signals imposed on the two control lines. The device is especially suited to microwave applications since it has very low input capacitance, and is well suited to being formed of high temperature superconducting materials since all of the structures may be formed coplanar with one another on a substrate.

  19. Aerosol can waste disposal device

    DOE Patents [OSTI]

    O'Brien, M.D.; Klapperick, R.L.; Bell, C.

    1993-12-21

    Disclosed is a device for removing gases and liquid from containers. The device punctures the bottom of a container for purposes of exhausting gases and liquid from the container without their escaping into the atmosphere. The device includes an inner cup or cylinder having a top portion with an open end for receiving a container and a bottom portion which may be fastened to a disposal or waste container in a substantially leak-proof manner. A piercing device is mounted in the lower portion of the inner cylinder for puncturing the can bottom placed in the inner cylinder. An outer cylinder having an open end and a closed end fits over the top portion of the inner cylinder in telescoping engagement. A force exerted on the closed end of the outer cylinder urges the bottom of a can in the inner cylinder into engagement with the piercing device in the bottom of the inner cylinder to form an opening in the can bottom, thereby permitting the contents of the can to enter the disposal container. 7 figures.

  20. Radiation-tolerant imaging device

    DOE Patents [OSTI]

    Colella, Nicholas J. (Livermore, CA); Kimbrough, Joseph R. (Pleasanton, CA)

    1996-01-01

    A barrier at a uniform depth for an entire wafer is used to produce imaging devices less susceptible to noise pulses produced by the passage of ionizing radiation. The barrier prevents charge created in the bulk silicon of a CCD detector or a semiconductor logic or memory device from entering the collection volume of each pixel in the imaging device. The charge barrier is a physical barrier, a potential barrier, or a combination of both. The physical barrier is formed by an SiO.sub.2 insulator. The potential barrier is formed by increasing the concentration of majority carriers (holes) to combine with the electron's generated by the ionizing radiation. A manufacturer of CCD imaging devices can produce radiation-tolerant devices by merely changing the wafer type fed into his process stream from a standard wafer to one possessing a barrier beneath its surface, thus introducing a very small added cost to his production cost. An effective barrier type is an SiO.sub.2 layer.

  1. Radiation-tolerant imaging device

    DOE Patents [OSTI]

    Colella, N.J.; Kimbrough, J.R.

    1996-11-19

    A barrier at a uniform depth for an entire wafer is used to produce imaging devices less susceptible to noise pulses produced by the passage of ionizing radiation. The barrier prevents charge created in the bulk silicon of a CCD detector or a semiconductor logic or memory device from entering the collection volume of each pixel in the imaging device. The charge barrier is a physical barrier, a potential barrier, or a combination of both. The physical barrier is formed by an SiO{sub 2} insulator. The potential barrier is formed by increasing the concentration of majority carriers (holes) to combine with the electron`s generated by the ionizing radiation. A manufacturer of CCD imaging devices can produce radiation-tolerant devices by merely changing the wafer type fed into his process stream from a standard wafer to one possessing a barrier beneath its surface, thus introducing a very small added cost to his production cost. An effective barrier type is an SiO{sub 2} layer. 7 figs.

  2. Electrically tunable infrared metamaterial devices

    DOE Patents [OSTI]

    Brener, Igal; Jun, Young Chul

    2015-07-21

    A wavelength-tunable, depletion-type infrared metamaterial optical device is provided. The device includes a thin, highly doped epilayer whose electrical permittivity can become negative at some infrared wavelengths. This highly-doped buried layer optically couples with a metamaterial layer. Changes in the transmission spectrum of the device can be induced via the electrical control of this optical coupling. An embodiment includes a contact layer of semiconductor material that is sufficiently doped for operation as a contact layer and that is effectively transparent to an operating range of infrared wavelengths, a thin, highly doped buried layer of epitaxially grown semiconductor material that overlies the contact layer, and a metallized layer overlying the buried layer and patterned as a resonant metamaterial.

  3. Microelectroporation device for genomic screening

    SciTech Connect (OSTI)

    Perroud, Thomas D.; Renzi, Ronald F.; Negrete, Oscar; Claudnic, Mark R.

    2014-09-09

    We have developed an microelectroporation device that combines microarrays of oligonucleotides, microfluidic channels, and electroporation for cell transfection and high-throughput screening applications (e.g. RNA interference screens). Microarrays allow the deposition of thousands of different oligonucleotides in microscopic spots. Microfluidic channels and microwells enable efficient loading of cells into the device and prevent cross-contamination between different oligonucleotides spots. Electroporation allows optimal transfection of nucleic acids into cells (especially hard-to-transfect cells such as primary cells) by minimizing cell death while maximizing transfection efficiency. This invention has the advantage of a higher throughput and lower cost, while preventing cross-contamination compared to conventional screening technologies. Moreover, this device does not require bulky robotic liquid handling equipment and is inherently safer given that it is a closed system.

  4. Spectral utilization in thermophotovoltaic devices

    SciTech Connect (OSTI)

    Clevenger, M.B.; Murray, C.S.

    1997-12-31

    Multilayer assemblies of epitaxially-grown, III-V semiconductor materials are being investigated for use in thermophotovoltaic (TPV) energy conversion applications. It has been observed that thick, highly-doped semiconductor layers within cell architectures dominate the parasitic free-carrier absorption (FCA) of devices at wavelengths above the bandgap of the semiconductor material. In this work, the wavelength-dependent, free-carrier absorption of p- and n-type InGaAs layers grown epitaxially onto semi-insulating (SI) InP substrates has been measured and related to the total absorption of long-wavelength photons in thermophotovoltaic devices. The optical responses of the TPV cells are then used in the calculation of spectral utilization factors and device efficiencies.

  5. USB Mass Storage Device Manager

    Energy Science and Technology Software Center (OSTI)

    2004-06-17

    The USB probram is designed to give some level of control over the use of USB mass storage devices (MSDs). This program allows you to disable all USB MSDs from working on a machine or to configure specific devices for the machine as an administrator. For complete control over USB MSDs the user of the machine must belong to the 'User' group. If a MSD has already been configured on the machine it will continuemore »to function after using the 'Activate Administrator Control' function. The only way to disable previously configured devices is to use the 'Block' feature to block all MSDs from being used on the machine.« less

  6. Bad data packet capture device

    DOE Patents [OSTI]

    Chen, Dong; Gara, Alan; Heidelberger, Philip; Vranas, Pavlos

    2010-04-20

    An apparatus and method for capturing data packets for analysis on a network computing system includes a sending node and a receiving node connected by a bi-directional communication link. The sending node sends a data transmission to the receiving node on the bi-directional communication link, and the receiving node receives the data transmission and verifies the data transmission to determine valid data and invalid data and verify retransmissions of invalid data as corresponding valid data. A memory device communicates with the receiving node for storing the invalid data and the corresponding valid data. A computing node communicates with the memory device and receives and performs an analysis of the invalid data and the corresponding valid data received from the memory device.

  7. Inertial impaction air sampling device

    DOE Patents [OSTI]

    Dewhurst, K.H.

    1990-05-22

    An inertial impactor is designed which is to be used in an air sampling device for collection of respirable size particles in ambient air. The device may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry. 3 figs.

  8. Surface-micromachined microfluidic devices

    DOE Patents [OSTI]

    Galambos, Paul C. (Albuquerque, NM); Okandan, Murat (Albuquerque, NM); Montague, Stephen (Albuquerque, NM); Smith, James H. (Redmond, WA); Paul, Phillip H. (Livermore, CA); Krygowski, Thomas W. (Cortlandt Manor, NY); Allen, James J. (Albuquerque, NM); Nichols, Christopher A. (Hauppauge, NY); Jakubczak, II, Jerome F. (Rio Rancho, NM)

    2003-01-01

    Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators.

  9. Beta ray flux measuring device

    DOE Patents [OSTI]

    Impink, Jr., Albert J. (Murrysville, PA); Goldstein, Norman P. (Murrysville, PA)

    1990-01-01

    A beta ray flux measuring device in an activated member in-core instrumentation system for pressurized water reactors. The device includes collector rings positioned about an axis in the reactor's pressure boundary. Activated members such as hydroballs are positioned within respective ones of the collector rings. A response characteristic such as the current from or charge on a collector ring indicates the beta ray flux from the corresponding hydroball and is therefore a measure of the relative nuclear power level in the region of the reactor core corresponding to the specific exposed hydroball within the collector ring.

  10. Semiconductor-based, large-area, flexible, electronic devices

    DOE Patents [OSTI]

    Goyal, Amit (Knoxville, TN)

    2011-03-15

    Novel articles and methods to fabricate the same resulting in flexible, large-area, triaxially textured, single-crystal or single-crystal-like, semiconductor-based, electronic devices are disclosed. Potential applications of resulting articles are in areas of photovoltaic devices, flat-panel displays, thermophotovoltaic devices, ferroelectric devices, light emitting diode devices, computer hard disc drive devices, magnetoresistance based devices, photoluminescence based devices, non-volatile memory devices, dielectric devices, thermoelectric devices and quantum dot laser devices.

  11. Composite Thermoelectric Devices | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Thermoelectric Devices Composite Thermoelectric Devices Composite thermoelectric devices incorporating common conductors laminated between P- and N-type thermoelectric plates demonstrate internal ohmic loss reduction and enhanced performance PDF icon chyu.pdf More Documents & Publications Thermoelectric Developments for Vehicular Applications Proactive Strategies for Designing Thermoelectric Materials for Power Generation Materials strategies for improving the overall device ZT

  12. In situ biofilm coupon device

    DOE Patents [OSTI]

    Peyton, B.M.; Truex, M.J.

    1997-06-24

    An apparatus is disclosed for characterization of in-situ microbial biofilm populations in subsurface groundwater. The device permits biofilm-forming microorganisms to adhere to packing material while emplaced in a groundwater strata, so that the packing material can be later analyzed for quantity and type of microorganisms, growth rate, and nutrient requirements. 3 figs.

  13. In situ biofilm coupon device

    DOE Patents [OSTI]

    Peyton, Brent M. (Kennewick, WA); Truex, Michael J. (Richland, WA)

    1997-01-01

    An apparatus for characterization of in-situ microbial biofilm populations in subsurface groundwater. The device permits biofilm-forming microorganisms to adhere to packing material while emplaced in a groundwater strata, so that the packing material can be later analyzed for quantity and type of microorganisms, growth rate, and nutrient requirements.

  14. Photovoltaic device assembly and method

    DOE Patents [OSTI]

    Keenihan, James R.; Langmaid, Joseph A.; Cleereman, Robert J.; Graham, Andrew T.

    2015-09-29

    The present invention is premised upon a connector device and method that can more easily electrically connect a plurality of PV arrays and/or locate these arrays upon a building or structure. It also can optionally provide some additional components (e.g. a bypass diode and/or an indicator means) and can enhance the serviceability of the array.

  15. Mechanical scriber for semiconductor devices

    DOE Patents [OSTI]

    Lin, Peter T. (East Brunswick, NJ)

    1985-01-01

    A mechanical scriber using a scribing tip, such as a diamond, provides controlled scriber forces with a spring-loaded compound lever arrangement. The scribing force and range of scribing depth are adjusted by a pair of adjustable micrometer heads. A semiconductor device, such as a multilayer solar cell, can be formed into scribed strips at each layer.

  16. Interdigitated photovoltaic power conversion device

    DOE Patents [OSTI]

    Ward, James Scott (Englewood, CO); Wanlass, Mark Woodbury (Golden, CO); Gessert, Timothy Arthur (Conifer, CO)

    1999-01-01

    A photovoltaic power conversion device has a top surface adapted to receive impinging radiation. The device includes at least two adjacent, serially connected cells. Each cell includes a semi-insulating substrate and a lateral conductivity layer of a first doped electrical conductivity disposed on the substrate. A base layer is disposed on the lateral conductivity layer and has the same electrical charge conductivity thereof. An emitter layer of a second doped electrical conductivity of opposite electrical charge is disposed on the base layer and forms a p-n junction therebetween. A plurality of spaced channels are formed in the emitter and base layers to expose the lateral conductivity layer at the bottoms thereof. A front contact grid is positioned on the top surface of the emitter layer of each cell. A first current collector is positioned along one outside edge of at least one first cell. A back contact grid is positioned in the channels at the top surface of the device for engagement with the lateral conductivity layer. A second current collector is positioned along at least one outside edge of at least one oppositely disposed second cell. Finally, an interdigitation mechanism is provided for serially connecting the front contact grid of one cell to the back contact grid of an adjacent cell at the top surface of the device.

  17. High performance thermoelectric nanocomposite device

    DOE Patents [OSTI]

    Yang, Jihui; Snyder, Dexter D.

    2011-10-25

    A thermoelectric device includes a nanocomposite material with nanowires of at least one thermoelectric material having a predetermined figure of merit, the nanowires being formed in a porous substrate having a low thermal conductivity and having an average pore diameter ranging from about 4 nm to about 300 nm.

  18. Portable vacuum object handling device

    DOE Patents [OSTI]

    Anderson, Gordon H. (Los Alamos, NM)

    1983-08-09

    The disclosure relates to a portable device adapted to handle objects which are not to be touched by hand. A piston and bore wall form a vacuum chamber communicating with an adaptor sealably engageable with an object to be lifted. The piston is manually moved and set to establish vacuum. A valve is manually actuatable to apply the vacuum to lift the object.

  19. Mechanical scriber for semiconductor devices

    DOE Patents [OSTI]

    Lin, P.T.

    1985-03-05

    A mechanical scriber using a scribing tip, such as a diamond, provides controlled scriber forces with a spring-loaded compound lever arrangement. The scribing force and range of scribing depth are adjusted by a pair of adjustable micrometer heads. A semiconductor device, such as a multilayer solar cell, can be formed into scribed strips at each layer. 5 figs.

  20. Aerosol can waste disposal device

    DOE Patents [OSTI]

    O'Brien, Michael D.; Klapperick, Robert L.; Bell, Chris

    1993-01-01

    Disclosed is a device for removing gases and liquid from containers. The ice punctures the bottom of a container for purposes of exhausting gases and liquid from the container without their escaping into the atmosphere. The device includes an inner cup or cylinder having a top portion with an open end for receiving a container and a bottom portion which may be fastened to a disposal or waste container in a substantially leak-proof manner. A piercing device is mounted in the lower portion of the inner cylinder for puncturing the can bottom placed in the inner cylinder. An outer cylinder having an open end and a closed end fits over the top portion of the inner cylinder in telescoping engagement. A force exerted on the closed end of the outer cylinder urges the bottom of a can in the inner cylinder into engagement with the piercing device in the bottom of the inner cylinder to form an opening in the can bottom, thereby permitting the contents of the can to enter the disposal container.

  1. Surface-Micromachined Microfluidic Devices

    DOE Patents [OSTI]

    Galambos, Paul C.; Okandan, Murat; Montague, Stephen; Smith, James H.; Paul, Phillip H.; Krygowski, Thomas W.; Allen, James J.; Nichols, Christopher A.; Jakubczak, II, Jerome F.

    2004-09-28

    Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators. Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators.

  2. Interdigitated photovoltaic power conversion device

    DOE Patents [OSTI]

    Ward, J.S.; Wanlass, M.W.; Gessert, T.A.

    1999-04-27

    A photovoltaic power conversion device has a top surface adapted to receive impinging radiation. The device includes at least two adjacent, serially connected cells. Each cell includes a semi-insulating substrate and a lateral conductivity layer of a first doped electrical conductivity disposed on the substrate. A base layer is disposed on the lateral conductivity layer and has the same electrical charge conductivity thereof. An emitter layer of a second doped electrical conductivity of opposite electrical charge is disposed on the base layer and forms a p-n junction therebetween. A plurality of spaced channels are formed in the emitter and base layers to expose the lateral conductivity layer at the bottoms thereof. A front contact grid is positioned on the top surface of the emitter layer of each cell. A first current collector is positioned along one outside edge of at least one first cell. A back contact grid is positioned in the channels at the top surface of the device for engagement with the lateral conductivity layer. A second current collector is positioned along at least one outside edge of at least one oppositely disposed second cell. Finally, an interdigitation mechanism is provided for serially connecting the front contact grid of one cell to the back contact grid of an adjacent cell at the top surface of the device. 15 figs.

  3. Implantable biomedical devices on bioresorbable substrates

    DOE Patents [OSTI]

    Rogers, John A; Kim, Dae-Hyeong; Omenetto, Fiorenzo; Kaplan, David L; Litt, Brian; Viventi, Jonathan; Huang, Yonggang; Amsden, Jason

    2014-03-04

    Provided herein are implantable biomedical devices, methods of administering implantable biomedical devices, methods of making implantable biomedical devices, and methods of using implantable biomedical devices to actuate a target tissue or sense a parameter associated with the target tissue in a biological environment. Each implantable biomedical device comprises a bioresorbable substrate, an electronic device having a plurality of inorganic semiconductor components supported by the bioresorbable substrate, and a barrier layer encapsulating at least a portion of the inorganic semiconductor components. Upon contact with a biological environment the bioresorbable substrate is at least partially resorbed, thereby establishing conformal contact between the implantable biomedical device and the target tissue in the biological environment.

  4. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions

    Broader source: Energy.gov (indexed) [DOE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis Acknowledgements This report was produced by the U.S. Department of Energy's Office of Energy Policy and Systems Analysis (DOE-EPSA) under the direction of Craig Zamuda. Matt Antes, C.W. Gillespie, Anna Mosby, and Beth Zotter of Energetics Incorporated provided analysis, drafting support, and technical editing.

  5. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2010-08-25

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

  6. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  7. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  8. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore » to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  9. Vulnerability and adaptation to severe weather events in the American southwest

    SciTech Connect (OSTI)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptation to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.

  10. Encapsulation methods for organic electrical devices

    DOE Patents [OSTI]

    Blum, Yigal D.; Chu, William Siu-Keung; MacQueen, David Brent; Shi, Yijian

    2013-06-18

    The disclosure provides methods and materials suitable for use as encapsulation barriers in electronic devices. In one embodiment, for example, there is provided an electroluminescent device or other electronic device encapsulated by alternating layers of a silicon-containing bonding material and a ceramic material. The encapsulation methods provide, for example, electronic devices with increased stability and shelf-life. The invention is useful, for example, in the field of microelectronic devices.

  11. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  12. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  13. Dielectrokinetic chromatography and devices thereof

    DOE Patents [OSTI]

    Chirica, Gabriela S; Fiechtner, Gregory J; Singh, Anup K

    2014-04-22

    Disclosed herein are methods and devices for dielectrokinetic chromatography. As disclosed, the devices comprise microchannels having at least one perturber which produces a non-uniformity in a field spanning the width of the microchannel. The interaction of the field non-uniformity with a perturber produces a secondary flow which competes with a primary flow. By decreasing the size of the perturber the secondary flow becomes significant for particles/analytes in the nanometer-size range. Depending on the nature of a particle/analyte present in the fluid and its interaction with the primary flow and the secondary flow, the analyte may be retained or redirected. The composition of the primary flow can be varied to affect the magnitude of primary and/or secondary flows on the particles/analytes and thereby separate and concentrate it from other particles/analytes.

  14. Nanowire structures and electrical devices

    DOE Patents [OSTI]

    Bezryadin, Alexey (Champaign, IL); Remeika, Mikas (Urbana, IL)

    2010-07-06

    The present invention provides structures and devices comprising conductive segments and conductance constricting segments of a nanowire, such as metallic, superconducting or semiconducting nanowire. The present invention provides structures and devices comprising conductive nanowire segments and conductance constricting nanowire segments having accurately selected phases including crystalline and amorphous states, compositions, morphologies and physical dimensions, including selected cross sectional dimensions, shapes and lengths along the length of a nanowire. Further, the present invention provides methods of processing nanowires capable of patterning a nanowire to form a plurality of conductance constricting segments having selected positions along the length of a nanowire, including conductance constricting segments having reduced cross sectional dimensions and conductance constricting segments comprising one or more insulating materials such as metal oxides.

  15. RFQ device for accelerating particles

    DOE Patents [OSTI]

    Shepard, Kenneth W. (Park Ridge, IL); Delayen, Jean R. (Naperville, IL)

    1995-01-01

    A superconducting radio frequency quadrupole (RFQ) device includes four spaced elongated, linear, tubular rods disposed parallel to a charged particle beam axis, with each rod supported by two spaced tubular posts oriented radially with respect to the beam axis. The rod and post geometry of the device has four-fold rotation symmetry, lowers the frequency of the quadrupole mode below that of the dipole mode, and provides large dipole-quadrupole mode isolation to accommodate a range of mechanical tolerances. The simplicity of the geometry of the structure, which can be formed by joining eight simple T-sections, provides a high degree of mechanical stability, is insensitive to mechanical displacement, and is particularly adapted for fabrication with superconducting materials such as niobium.

  16. RFQ device for accelerating particles

    DOE Patents [OSTI]

    Shepard, K.W.; Delayen, J.R.

    1995-06-06

    A superconducting radio frequency quadrupole (RFQ) device includes four spaced elongated, linear, tubular rods disposed parallel to a charged particle beam axis, with each rod supported by two spaced tubular posts oriented radially with respect to the beam axis. The rod and post geometry of the device has four-fold rotation symmetry, lowers the frequency of the quadrupole mode below that of the dipole mode, and provides large dipole-quadrupole mode isolation to accommodate a range of mechanical tolerances. The simplicity of the geometry of the structure, which can be formed by joining eight simple T-sections, provides a high degree of mechanical stability, is insensitive to mechanical displacement, and is particularly adapted for fabrication with superconducting materials such as niobium. 5 figs.

  17. Recombination device for storage batteries

    DOE Patents [OSTI]

    Kraft, H.; Ledjeff, K.

    1984-01-01

    A recombination device including a gas-tight enclosure connected to receive the discharge gases from a rechargeable storage battery. Catalytic material for the recombination of hydrogen and oxygen to form water is supported within the enclosure. The enclosure is sealed from the atmosphere by a liquid seal including two vertical chambers interconnected with an inverted U-shaped overflow tube. The first chamber is connected at its upper portion to the enclosure and the second chamber communicates at its upper portion with the atmosphere. If the pressure within the enclosure differs as overpressure or vacuum by more than the liquid level, the liquid is forced into one of the two chambers and the overpressure is vented or the vacuum is relieved. The recombination device also includes means for returning recombined liquid to the battery and for absorbing metal hydrides.

  18. Recombination device for storage batteries

    DOE Patents [OSTI]

    Kraft, Helmut (Liederbach, DE); Ledjeff, Konstantin (Bad Krozingen, DE)

    1985-01-01

    A recombination device including a gas-tight enclosure connected to receive he discharge gases from a rechargeable storage battery. Catalytic material for the recombination of hydrogen and oxygen to form water is supported within the enclosure. The enclosure is sealed from the atmosphere by a liquid seal including two vertical chambers interconnected with an inverted U-shaped overflow tube. The first chamber is connected at its upper portion to the enclosure and the second chamber communicates at its upper portion with the atmosphere. If the pressure within the enclosure differs as overpressure or vacuum by more than the liquid level, the liquid is forced into one of the two chambers and the overpressure is vented or the vacuum is relieved. The recombination device also includes means for returning recombined liquid to the battery and for absorbing metal hydrides.

  19. Neutron-absorber release device

    DOE Patents [OSTI]

    VAN Erp, Jan B.; Kimont, Edward L.

    1976-01-01

    A resettable device is provided for supporting an object, sensing when an environment reaches a critical temperature and releasing the object when the critical temperature is reached. It includes a flexible container having a material inside with a melting point at the critical temperature. The object's weight is supported by the solid material which gives rigidity to the container until the critical temperature is reached at which point the material in the container melts. The flexible container with the now fluid material inside has insufficient strength to support the object which is thereby released. Biasing means forces the container back to its original shape so that when the temperature falls below the melting temperature the material again solidifies, and the object may again be supported by the device.

  20. Electro-refractive photonic device

    DOE Patents [OSTI]

    Zortman, William A.; Watts, Michael R.

    2015-06-09

    The various technologies presented herein relate to phase shifting light to facilitate any of light switching, modulation, amplification, etc. Structures are presented where a second layer is juxtaposed between a first layer and a third layer with respective doping facilitating formation of p-n junctions at the interface between the first layer and the second layer, and between the second layer and the third layer. Application of a bias causes a carrier concentration change to occur at the p-n junctions which causes a shift in the effective refractive index per incremental change in an applied bias voltage. The effective refractive index enhancement can occur in both reverse bias and forward bias. The structure can be incorporated into a waveguide, an optical resonator, a vertical junction device, a horizontal junction device, a Mach-Zehnder interferometer, a tuneable optical filter, etc.

  1. Variable ratio regenerative braking device

    DOE Patents [OSTI]

    Hoppie, Lyle O. (Birmingham, MI)

    1981-12-15

    Disclosed is a regenerative braking device (10) for an automotive vehicle. The device includes an energy storage assembly (12) having a plurality of rubber rollers (26, 28) mounted for rotation between an input shaft (36) and an output shaft (42), clutches (38, 46) and brakes (40, 48) associated with each shaft, and a continuously variable transmission (22) connectable to a vehicle drivetrain and to the input and output shafts by the respective clutches. The rubber rollers are torsionally stressed to accumulate energy from the vehicle when the input shaft is clutched to the transmission while the brake on the output shaft is applied, and are torsionally relaxed to deliver energy to the vehicle when the output shaft is clutched to the transmission while the brake on the input shaft is applied. The transmission ratio is varied to control the rate of energy accumulation and delivery for a given rotational speed of the vehicle drivetrain.

  2. Safety device for turbocharged engine

    SciTech Connect (OSTI)

    Kido, Y.

    1986-08-05

    A safety device is described for a turbocharged engine which is provided with a turbocharger comprising a turbine disposed in the exhaust passage and a blower disposed in the intake passage and connected with the turbine by way of a rotary shaft and in which the throttle valve is disposed in the intake passage downstream of the blower. The safety device consists of an engine protective means for controlling the maximum supercharging pressure in the intake passage, at least one pressure sensor for detecting the supercharging pressure downstream of the blower, and a control circuit which actuates the engine protective means when the supercharging pressure detected by the pressure sensor continues to be higher than a preset supercharging pressure for a predetermined time interval. The control circuit includes means for generating the predetermined time interval, the means for generating the predetermined time interval shortening the time interval as the difference between the detected supercharging pressure and the preset supercharging pressure increases.

  3. Radio frequency coaxial feedthrough device

    DOE Patents [OSTI]

    Owens, Thomas L.; Baity, Frederick W.; Hoffman, Daniel J.; Whealton, John H.

    1987-01-01

    A radio frequency coaxial vacuum feedthrough is provided which utilizes a cylindrical ceramic vacuum break formed of an alumina ceramic. The cylinder is coaxially disposed and brazed between tapered coaxial conductors to form a vacuum sealed connection between a pressurized upstream coaxial transmission line and a utilization device located within a vacuum container. The feedthrough provides 50 ohm matched impedance RF feedthrough up to about 500 MHz at power levels in the multimegawatt range.

  4. Ion plated electronic tube device

    DOE Patents [OSTI]

    Meek, T.T.

    1983-10-18

    An electronic tube and associated circuitry which is produced by ion plating techniques. The process is carried out in an automated process whereby both active and passive devices are produced at very low cost. The circuitry is extremely reliable and is capable of functioning in both high radiation and high temperature environments. The size of the electronic tubes produced are more than an order of magnitude smaller than conventional electronic tubes.

  5. Portable vacuum object handling device

    DOE Patents [OSTI]

    Anderson, G.H.

    1983-08-09

    The disclosure relates to a portable device adapted to handle objects which are not to be touched by hand. A piston and bore wall form a vacuum chamber communicating with an adaptor sealably engageable with an object to be lifted. The piston is manually moved and set to establish vacuum. A valve is manually actuatable to apply the vacuum to lift the object. 1 fig.

  6. Encapsulant materials and associated devices

    DOE Patents [OSTI]

    Kempe, Michael D (Littleton, CO); Thapa, Prem (Lima, OH)

    2011-03-08

    Compositions suitable for use as encapsulants are described. The inventive compositions include a high molecular weight polymeric material, a curing agent, an inorganic compound, and a coupling agent. Optional elements include adhesion promoting agents, colorants, antioxidants, and UV absorbers. The compositions have desirable diffusivity properties, making them suitable for use in devices in which a substantial blocking of moisture ingress is desired, such as photovoltaic (PV) modules.

  7. Encapsulant materials and associated devices

    DOE Patents [OSTI]

    Kempe, Michael D (Littleton, CO); Thapa, Prem (Lima, OH)

    2012-05-22

    Compositions suitable for use as encapsulants are described. The inventive compositions include a high molecular weight polymeric material, a curing agent, an inorganic compound, and a coupling agent. Optional elements include adhesion promoting agents, colorants, antioxidants, and UV absorbers. The compositions have desirable diffusivity properties, making them suitable for use in devices in which a substantial blocking of moisture ingress is desired, such as photovoltaic (PV) modules.

  8. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K.; Grey, Alan E.

    1994-04-05

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  9. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K. (Idaho Falls, ID); Grey, Alan E. (Idaho Falls, ID)

    1994-01-01

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  10. Materials Synthesis and Integrated Devices

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    11 Materials Synthesis and Integrated Devices We conduct basic and applied research in areas related to applied energy programs and a variety of problems relevant to the weapons program. Contact Us Group Leader Andrew Dattelbaum Email Deputy Group Leader George Goff Email Deputy Group Leader Jeff Willis Email Group Office (505) 665-9330 Dipen Sinha and team win Richard P. Feynman Innovation Prize Los Alamos researcher Dipen Sinha and team were recognized with the Richard P. Feynman Innovation

  11. Infrared emitting device and method

    DOE Patents [OSTI]

    Kurtz, Steven R.; Biefeld, Robert M.; Dawson, L. Ralph; Howard, Arnold J.; Baucom, Kevin C.

    1997-01-01

    An infrared emitting device and method. The infrared emitting device comprises a III-V compound semiconductor substrate upon which are grown a quantum-well active region having a plurality of quantum-well layers formed of a ternary alloy comprising InAsSb sandwiched between barrier layers formed of a ternary alloy having a smaller lattice constant and a larger energy bandgap than the quantum-well layers. The quantum-well layers are preferably compressively strained to increase the threshold energy for Auger recombination; and a method is provided for determining the preferred thickness for the quantum-well layers. Embodiments of the present invention are described having at least one cladding layer to increase the optical and carrier confinement in the active region, and to provide for waveguiding of the light generated within the active region. Examples have been set forth showing embodiments of the present invention as surface- and edge-emitting light emitting diodes (LEDs), an optically-pumped semiconductor laser, and an electrically-injected semiconductor diode laser. The light emission from each of the infrared emitting devices of the present invention is in the midwave infrared region of the spectrum from about 2 to 6 microns.

  12. Patent: Method for forming polymerized microfluidic devices | DOEpatents

    Office of Scientific and Technical Information (OSTI)

    Method for forming polymerized microfluidic devices Citation Details Title: Method for forming polymerized microfluidic devices

  13. Release strategies for making transferable semiconductor structures, devices and device components

    DOE Patents [OSTI]

    Rogers, John A. (Champaign, IL); Nuzzo, Ralph G. (Champaign, IL); Meitl, Matthew (Raleigh, NC); Ko, Heung Cho (Urbana, IL); Yoon, Jongseung (Urbana, IL); Menard, Etienne (Durham, NC); Baca, Alfred J. (Urbana, IL)

    2011-04-26

    Provided are methods for making a device or device component by providing a multilayer structure having a plurality of functional layers and a plurality of release layers and releasing the functional layers from the multilayer structure by separating one or more of the release layers to generate a plurality of transferable structures. The transferable structures are printed onto a device substrate or device component supported by a device substrate. The methods and systems provide means for making high-quality and low-cost photovoltaic devices, transferable semiconductor structures, (opto-)electronic devices and device components.

  14. Release strategies for making transferable semiconductor structures, devices and device components

    DOE Patents [OSTI]

    Rogers, John A; Nuzzo, Ralph G; Meitl, Matthew; Ko, Heung Cho; Yoon, Jongseung; Menard, Etienne; Baca, Alfred J

    2014-11-25

    Provided are methods for making a device or device component by providing a multilayer structure having a plurality of functional layers and a plurality of release layers and releasing the functional layers from the multilayer structure by separating one or more of the release layers to generate a plurality of transferable structures. The transferable structures are printed onto a device substrate or device component supported by a device substrate. The methods and systems provide means for making high-quality and low-cost photovoltaic devices, transferable semiconductor structures, (opto-)electronic devices and device components.

  15. Property:DeviceType | Open Energy Information

    Open Energy Info (EERE)

    DeviceType Property Type String Description Used for MHK ISDB Allows Values Instrument;Sensor Pages using the property "DeviceType" Showing 25 pages using this property. (previous...

  16. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  17. Remote possibly hazardous content container sampling device

    DOE Patents [OSTI]

    Volz, David L. (59 La Paloma, Los Alamos, NM 87544)

    1998-01-01

    The present invention relates to an apparatus capable of sampling enclosed containers, where the contents of the container is unknown. The invention includes a compressed air device capable of supplying air pressure, device for controlling the amount of air pressure applied, a pneumatic valve, a sampling device having a hollow, sampling insertion needle suspended therein and device to communicate fluid flow between the container and a containment vessel, pump or direct reading instrument.

  18. Acoustic enhancement for photo detecting devices

    DOE Patents [OSTI]

    Thundat, Thomas G; Senesac, Lawrence R; Van Neste, Charles W

    2013-02-19

    Provided are improvements to photo detecting devices and methods for enhancing the sensitivity of photo detecting devices. A photo detecting device generates an electronic signal in response to a received light pulse. An electro-mechanical acoustic resonator, electrically coupled to the photo detecting device, damps the electronic signal and increases the signal noise ratio (SNR) of the electronic signal. Increased photo detector standoff distances and sensitivities will result.

  19. Tunable Graphene Electronic Devices - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and the dopant used enable measurement of device properties for applications such as photoelectric characteristics, chemical specificity, spintronics and superconductivity. ...

  20. Inertial impaction air sampling device

    DOE Patents [OSTI]

    Dewhurst, K.H.

    1987-12-10

    An inertial impactor to be used in an air sampling device for collection of respirable size particles in ambient air which may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry. 3 figs.

  1. Electrostatically actuatable light modulating device

    DOE Patents [OSTI]

    Koehler, Dale R. (1332 Wagontrain Dr., Albuquerque, NM 87123)

    1991-01-01

    The electrostatically actuatable light modulator utilizes an opaque substrate plate patterned with an array of aperture cells, the cells comprised of physically positionable dielectric shutters and electrostatic actuators. With incorporation of a light source and a viewing screen, a projection display system is effected. Inclusion of a color filter array aligned with the aperture cells accomplishes a color display. The system is realized in terms of a silicon based manufacturing technology allowing fabrication of a high resolution capability in a physically small device which with the utilization of included magnification optics allows both large and small projection displays.

  2. Inertial impaction air sampling device

    DOE Patents [OSTI]

    Dewhurst, Katharine H. (13150 Wenonah SE. Apt. 727, Albuquerque, NM 87123)

    1990-01-01

    An inertial impactor to be used in an air sampling device for collection of respirable size particles in ambient air which may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry.

  3. Inductive storage pulse circuit device

    DOE Patents [OSTI]

    Parsons, William M. (Los Alamos, NM); Honig, Emanuel M. (Los Alamos, NM)

    1984-01-01

    Inductive storage pulse circuit device which is capable of delivering a series of electrical pulses to a load in a sequential manner. Silicon controlled rectifiers as well as spark gap switches can be utilized in accordance with the present invention. A commutation switching array is utilized to produce a reverse current to turn-off the main opening switch. A commutation capacitor produces the reverse current and is initially charged to a predetermined voltage and subsequently charged in alternating directions by the inductive storage current.

  4. Protective laser beam viewing device

    DOE Patents [OSTI]

    Neil, George R.; Jordan, Kevin Carl

    2012-12-18

    A protective laser beam viewing system or device including a camera selectively sensitive to laser light wavelengths and a viewing screen receiving images from the laser sensitive camera. According to a preferred embodiment of the invention, the camera is worn on the head of the user or incorporated into a goggle-type viewing display so that it is always aimed at the area of viewing interest to the user and the viewing screen is incorporated into a video display worn as goggles over the eyes of the user.

  5. Multi-reflective acoustic wave device

    DOE Patents [OSTI]

    Andle, Jeffrey C.

    2006-02-21

    An acoustic wave device, which utilizes multiple localized reflections of acoustic wave for achieving an infinite impulse response while maintaining high tolerance for dampening effects, is disclosed. The device utilized a plurality of electromechanically significant electrodes disposed on most of the active surface. A plurality of sensors utilizing the disclosed acoustic wave mode device are also described.

  6. Tunable circuit for tunable capacitor devices

    DOE Patents [OSTI]

    Rivkina, Tatiana; Ginley, David S.

    2006-09-19

    A tunable circuit (10) for a capacitively tunable capacitor device (12) is provided. The tunable circuit (10) comprises a tunable circuit element (14) and a non-tunable dielectric element (16) coupled to the tunable circuit element (16). A tunable capacitor device (12) and a method for increasing the figure of merit in a tunable capacitor device (12) are also provided.

  7. Sensor device and methods for using same

    DOE Patents [OSTI]

    Rothgeb, Timothy Michael; Gansle, Kristina Marie Rohal; Joyce, Jonathan Livingston; Jordan, James Madison; Rohwer, Tedd Addison; Lockhart, Randal Ray; Smith, Christopher Lawrence; Trinh, Toan; Cipollone, Mark Gary

    2005-10-25

    A sensor device and method of employment is provided. More specifically, a sensor device adapted to detect, identify and/or measure a chemical and/or physical characteristic upon placement of the device into an environment, especially a liquid medium for which monitoring is sought is provided.

  8. Organic electrophosphorescence device having interfacial layers

    DOE Patents [OSTI]

    Choulis, Stelios A. (San Jose, CA); Mathai, Mathew (Santa Clara, CA); Choong, Vi-En (San Jose, CA); So, Franky (Gainesville, FL)

    2010-08-10

    Techniques are described for forming an organic light emitting diode device with improved device efficiency. Materials having at least one energy level that is similar to those of a phosphorescent light emitting material in the diode are incorporated into the device to directly inject holes or electrons to the light emitting material.

  9. Electrostatic MEMS devices with high reliability

    DOE Patents [OSTI]

    Goldsmith, Charles L; Auciello, Orlando H; Sumant, Anirudha V; Mancini, Derrick C; Gudeman, Chris; Sampath, Suresh; Carlilse, John A; Carpick, Robert W; Hwang, James

    2015-02-24

    The present invention provides for an electrostatic microelectromechanical (MEMS) device comprising a dielectric layer separating a first conductor and a second conductor. The first conductor is moveable towards the second conductor, when a voltage is applied to the MEMS device. The dielectric layer recovers from dielectric charging failure almost immediately upon removal of the voltage from the MEMS device.

  10. Portable control device for networked mobile robots

    DOE Patents [OSTI]

    Feddema, John T. (Albuquerque, NM); Byrne, Raymond H. (Albuquerque, NM); Bryan, Jon R. (Edgewood, NM); Harrington, John J. (Albuquerque, NM); Gladwell, T. Scott (Albuquerque, NM)

    2002-01-01

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  11. Device for absorbing mechanical shock

    DOE Patents [OSTI]

    Newlon, Charles E. (Knoxville, TN)

    1980-01-01

    This invention is a comparatively inexpensive but efficient shock-absorbing device having special application to the protection of shipping and storage cylinders. In a typical application, two of the devices are strapped to a cylinder to serve as saddle-type supports for the cylinder during storage and to protect the cylinder in the event it is dropped during lifting or lowering operations. In its preferred form, the invention includes a hardwood plank whose grain runs in the longitudinal direction. The basal portion of the plank is of solid cross-section, whereas the upper face of the plank is cut away to form a concave surface fittable against the sidewall of a storage cylinder. The concave surface is divided into a series of segments by transversely extending, throughgoing relief slots. A layer of elastomeric material is positioned on the concave face, the elastomer being extrudable into slots when pressed against the segments by a preselected pressure characteristic of a high-energy impact. The compressive, tensile, and shear properties of the hardwood and the elastomer are utilized in combination to provide a surprisingly high energy-absorption capability.

  12. Pipe weld crown removal device

    DOE Patents [OSTI]

    Sword, Charles K. (Pleasant Hills, PA); Sette, Primo J. (West Newton, PA)

    1992-01-01

    A device is provided for grinding down the crown of a pipe weld joining aligned pipe sections so that the weld is substantially flush with the pipe sections joined by the weld. The device includes a cage assembly comprising a pair of spaced cage rings adapted to be mounted for rotation on the respective pipe sections on opposite sides of the weld, a plurality of grinding wheels, supported by the cage assembly for grinding down the crown of the weld, and a plurality of support shafts, each extending longitudinally along the joined pipe sections, parallel thereto, for individually mounting respective grinding wheels. Each end of the support shafts is mounted for rotation in a bearing assembly housed within a radially directed opening in a corresponding one of the cage rings so as to provide radial movement of the associated shaft, and thus of the associated grinding wheel, towards and away from the weld. A first drive sprocket provides rotation of the cage assembly around the pipe sections while a second drive unit, driven by a common motor, provides rotation of the grinding wheels.

  13. Passive fault current limiting device

    DOE Patents [OSTI]

    Evans, D.J.; Cha, Y.S.

    1999-04-06

    A passive current limiting device and isolator is particularly adapted for use at high power levels for limiting excessive currents in a circuit in a fault condition such as an electrical short. The current limiting device comprises a magnetic core wound with two magnetically opposed, parallel connected coils of copper, a high temperature superconductor or other electrically conducting material, and a fault element connected in series with one of the coils. Under normal operating conditions, the magnetic flux density produced by the two coils cancel each other. Under a fault condition, the fault element is triggered to cause an imbalance in the magnetic flux density between the two coils which results in an increase in the impedance in the coils. While the fault element may be a separate current limiter, switch, fuse, bimetal strip or the like, it preferably is a superconductor current limiter conducting one-half of the current load compared to the same limiter wired to carry the total current of the circuit. The major voltage during a fault condition is in the coils wound on the common core in a preferred embodiment. 6 figs.

  14. Automated internal pipe cutting device

    DOE Patents [OSTI]

    Godlewski, William J.; Haffke, Gary S.; Purvis, Dale; Bashar, Ronald W.; Jones, Stewart D.; Moretti, Jr., Henry; Pimentel, James

    2003-01-21

    The invention is a remotely controlled internal pipe cutting device primarily used for cutting pipes where the outside of the pipe is inaccessible at the line where the cut is to be made. The device includes an axial ram within a rotational cylinder which is enclosed in a housing. The housing is adapted for attachment to an open end of the pipe and for supporting the ram and cylinder in cantilever fashion within the pipe. A radially movable cutter, preferably a plasma arc torch, is attached to the distal end of the ram. A drive mechanism, containing motors and mechanical hardware for operating the ram and cylinder, is attached to the proximal end of the housing. The ram and cylinder provide for moving the cutter axially and circumferentially, and a cable assembly attached to a remote motor provide for the movement of the cutter radially, within the pipe. The control system can be adjusted and operated remotely to control the position and movement of the cutter to obtain the desired cut. The control system can also provide automatic standoff control for a plasma arc torch.

  15. Infrared emitting device and method

    DOE Patents [OSTI]

    Kurtz, S.R.; Biefeld, R.M.; Dawson, L.R.; Howard, A.J.; Baucom, K.C.

    1997-04-29

    The infrared emitting device comprises a III-V compound semiconductor substrate upon which are grown a quantum-well active region having a plurality of quantum-well layers formed of a ternary alloy comprising InAsSb sandwiched between barrier layers formed of a ternary alloy having a smaller lattice constant and a larger energy bandgap than the quantum-well layers. The quantum-well layers are preferably compressively strained to increase the threshold energy for Auger recombination; and a method is provided for determining the preferred thickness for the quantum-well layers. Embodiments of the present invention are described having at least one cladding layer to increase the optical and carrier confinement in the active region, and to provide for waveguiding of the light generated within the active region. Examples have been set forth showing embodiments of the present invention as surface- and edge-emitting light emitting diodes (LEDs), an optically-pumped semiconductor laser, and an electrically-injected semiconductor diode laser. The light emission from each of the infrared emitting devices of the present invention is in the midwave infrared region of the spectrum from about 2 to 6 microns. 8 figs.

  16. Passive fault current limiting device

    DOE Patents [OSTI]

    Evans, Daniel J. (Wheeling, IL); Cha, Yung S. (Darien, IL)

    1999-01-01

    A passive current limiting device and isolator is particularly adapted for use at high power levels for limiting excessive currents in a circuit in a fault condition such as an electrical short. The current limiting device comprises a magnetic core wound with two magnetically opposed, parallel connected coils of copper, a high temperature superconductor or other electrically conducting material, and a fault element connected in series with one of the coils. Under normal operating conditions, the magnetic flux density produced by the two coils cancel each other. Under a fault condition, the fault element is triggered to cause an imbalance in the magnetic flux density between the two coils which results in an increase in the impedance in the coils. While the fault element may be a separate current limiter, switch, fuse, bimetal strip or the like, it preferably is a superconductor current limiter conducting one-half of the current load compared to the same limiter wired to carry the total current of the circuit. The major voltage during a fault condition is in the coils wound on the common core in a preferred embodiment.

  17. Electrical device fabrication from nanotube formations

    DOE Patents [OSTI]

    Nicholas, Nolan Walker; Kittrell, W. Carter; Kim, Myung Jong; Schmidt, Howard K.

    2013-03-12

    A method for forming nanotube electrical devices, arrays of nanotube electrical devices, and device structures and arrays of device structures formed by the methods. Various methods of the present invention allow creation of semiconducting and/or conducting devices from readily grown SWNT carpets rather than requiring the preparation of a patterned growth channel and takes advantage of the self-controlling nature of these carpet heights to ensure a known and controlled channel length for reliable electronic properties as compared to the prior methods.

  18. Waveguide device and method for making same

    DOE Patents [OSTI]

    Forman, Michael A. (San Francisco, CA)

    2007-08-14

    A monolithic micromachined waveguide device or devices with low-loss, high-power handling, and near-optical frequency ranges is set forth. The waveguide and integrated devices are capable of transmitting near-optical frequencies due to optical-quality sidewall roughness. The device or devices are fabricated in parallel, may be mass produced using a LIGA manufacturing process, and may include a passive component such as a diplexer and/or an active capping layer capable of particularized signal processing of the waveforms propagated by the waveguide.

  19. Organic light emitting devices for illumination

    DOE Patents [OSTI]

    Hack, Michael (Lambertville, NJ); Lu, Min-Hao Michael (Lawrenceville, NJ); Weaver, Michael S. (Princeton, NJ)

    2012-01-24

    An organic light emitting device an a method of obtaining illumination from such a device is provided. The device has a plurality of regions, each region having an organic emissive layer adapted to emit a different spectrum of light. The regions in combination emit light suitable for illumination purposes. The area of each region may be selected such that the device is more efficient than an otherwise equivalent device having regions of equal size. The regions may have an aspect ratio of at least about four. All parts of any given region may be driven at the same current.

  20. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  1. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  2. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  3. LANL12-RS-108J Report on Device Modeler Testing of the Device Modeler Tool

    Office of Scientific and Technical Information (OSTI)

    Kit. DMTK in FY14 (Technical Report) | SciTech Connect Report on Device Modeler Testing of the Device Modeler Tool Kit. DMTK in FY14 Citation Details In-Document Search Title: LANL12-RS-108J Report on Device Modeler Testing of the Device Modeler Tool Kit. DMTK in FY14 This document covers the various testing and modifications of the Device Modeler Tool Kit (DMTK) for project LANL12-RS-108J in FY14. The testing has been comprised of different device modelers and trainees for device modeling

  4. V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability

    Broader source: Energy.gov [DOE]

    Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security.

  5. Development of a Thermoelectric Device for an Automotive Zonal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Thermoelectric Device for an Automotive Zonal HVAC System Development of a Thermoelectric Device for an Automotive Zonal HVAC System Presents development of a thermoelectric device...

  6. Organic spintronic devices and methods for making the same (Patent...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organic spintronic devices and methods for making the same Title: Organic spintronic devices and methods for making the same An organic spintronic photovoltaic device (100) having ...

  7. Heating device for semiconductor wafers

    DOE Patents [OSTI]

    Vosen, Steven R. (Berkeley, CA)

    1999-01-01

    An apparatus for heat treating semiconductor wafers is disclosed. The apparatus includes a heating device which contains an assembly of light energy sources for emitting light energy onto a wafer. In particular, the light energy sources are positioned such that many different radial heating zones are created on a wafer being heated. For instance, in one embodiment, the light energy sources form a spiral configuration. In an alternative embodiment, the light energy sources appear to be randomly dispersed with respect to each other so that no discernable pattern is present. In a third alternative embodiment of the present invention, the light energy sources form concentric rings. Tuning light sources are then placed in between the concentric rings of light.

  8. Seal device for ferromagnetic containers

    DOE Patents [OSTI]

    Meyer, R.E.; Jason, A.J.

    1994-10-18

    A temporary seal or patch assembly prevents the escape of contents, e.g., fluids and the like, from within a container having a breach there through until the contents can be removed and/or a repair effected. A frame that supports a sealing bladder can be positioned over the breach and the frame is then attached to the container surface, which must be of a ferromagnet material, by using switchable permanent magnets. The permanent magnets are designed to have a first condition that is not attracted to the ferromagnetic surface and a second conditions whereby the magnets are attracted to the surface with sufficient force to support the seal assembly on the surface. Latching devices may be attached to the frame and engage the container surface with hardened pins to prevent the lateral movement of the seal assembly along the container surface from external forces such as fluid drag or gravity. 10 figs.

  9. Volatile organic compound sensing devices

    DOE Patents [OSTI]

    Lancaster, G.D.; Moore, G.A.; Stone, M.L.; Reagen, W.K.

    1995-08-29

    Apparatus employing vapochromic materials in the form of inorganic double complex salts which change color reversibly when exposed to volatile organic compound (VOC) vapors is adapted for VOC vapor detection, VOC aqueous matrix detection, and selective VOC vapor detection. The basic VOC vapochromic sensor is incorporated in various devices such as a ground probe sensor, a wristband sensor, a periodic sampling monitor, a soil/water penetrometer, an evaporative purge sensor, and various vacuum-based sensors which are particularly adapted for reversible/reusable detection, remote detection, continuous monitoring, or rapid screening of environmental remediation and waste management sites. The vapochromic sensor is used in combination with various fiber optic arrangements to provide a calibrated qualitative and/or quantitative indication of the presence of VOCs. 15 figs.

  10. Haptic device for telerobotic surgery

    DOE Patents [OSTI]

    Salisbury, Curt; Salisbury, Jr., J. Kenneth

    2014-12-30

    A haptic device for telerobotic surgery, including a base; a linkage system having first and second linkage members coupled to the base; a motor that provides a motor force; a transmission including first and second driving pulleys arranged such that their faces form an angle and their axes form a plane, first and second idler pulleys offset from the plane and arranged between the first and second driving pulleys such that their axes divide the angle between the first and second driving pulleys, and a cable that traverses the first and second driving pulleys and the set of idler pulleys and transfers the motor force to the linkage system; an end effector coupled to distal ends of the first and second linkage members and maneuverable relative to the base; and a controller that modulates the motor force to simulate a body part at a point portion of the end effector.

  11. Heating device for semiconductor wafers

    DOE Patents [OSTI]

    Vosen, S.R.

    1999-07-27

    An apparatus for heat treating semiconductor wafers is disclosed. The apparatus includes a heating device which contains an assembly of light energy sources for emitting light energy onto a wafer. In particular, the light energy sources are positioned such that many different radial heating zones are created on a wafer being heated. For instance, in one embodiment, the light energy sources form a spiral configuration. In an alternative embodiment, the light energy sources appear to be randomly dispersed with respect to each other so that no discernible pattern is present. In a third alternative embodiment of the present invention, the light energy sources form concentric rings. Tuning light sources are then placed in between the concentric rings of light. 4 figs.

  12. Cryogenic vacuumm RF feedthrough device

    DOE Patents [OSTI]

    Wu, Genfa (Yorktown, VA); Phillips, Harry Lawrence (Hayes, VA)

    2008-12-30

    A cryogenic vacuum rf feedthrough device comprising: 1) a probe for insertion into a particle beam; 2) a coaxial cable comprising an inner conductor and an outer conductor, a dielectric/insulating layer surrounding the inner conductor, the latter being connected to the probe for the transmission of higher mode rf energy from the probe; and 3) a high thermal conductivity stub attached to the coaxial dielectric about and in thermal contact with the inner conductor which high thermal conductivity stub transmits heat generated in the vicinity of the probe efficiently and radially from the area of the probe and inner conductor all while maintaining useful rf transmission line characteristics between the inner and outer coaxial conductors.

  13. Seal device for ferromagnetic containers

    DOE Patents [OSTI]

    Meyer, Ross E. (Los Alamos, NM); Jason, Andrew J. (Los Alamos, NM)

    1994-01-01

    A temporary seal or patch assembly prevents the escape of contents, e.g., fluids and the like, from within a container having a breach therethrough until the contents can be removed and/or a repair effected. A frame that supports a sealing bladder can be positioned over the breach and the frame is then attached to the container surface, which must be of a ferromagnet material, by using switchable permanent magnets. The permanent magnets are designed to have a first condition that is not attracted to the ferromagnetic surface and a second conditions whereby the magnets are attracted to the surface with sufficient force to support the seal assembly on the surface. Latching devices may be attached to the frame and engage the container surface with hardened pins to prevent the lateral movement of the seal assembly along the container surface from external forces such as fluid drag or gravity.

  14. Volatile organic compound sensing devices

    DOE Patents [OSTI]

    Lancaster, Gregory D. (Idaho Falls, ID); Moore, Glenn A. (Idaho Falls, ID); Stone, Mark L. (Idaho Falls, ID); Reagen, William K. (Stillwater, MN)

    1995-01-01

    Apparatus employing vapochromic materials in the form of inorganic double complex salts which change color reversibly when exposed to volatile organic compound (VOC) vapors is adapted for VOC vapor detection, VOC aqueous matrix detection, and selective VOC vapor detection. The basic VOC vapochromic sensor is incorporated in various devices such as a ground probe sensor, a wristband sensor, a periodic sampling monitor, a soil/water penetrometer, an evaporative purge sensor, and various vacuum-based sensors which are particularly adapted for reversible/reusable detection, remote detection, continuous monitoring, or rapid screening of environmental remediation and waste management sites. The vapochromic sensor is used in combination with various fiber optic arrangements to provide a calibrated qualitative and/or quantitative indication of the presence of VOCs.

  15. Device for monitoring cell voltage

    DOE Patents [OSTI]

    Doepke, Matthias (Garbsen, DE); Eisermann, Henning (Edermissen, DE)

    2012-08-21

    A device for monitoring a rechargeable battery having a number of electrically connected cells includes at least one current interruption switch for interrupting current flowing through at least one associated cell and a plurality of monitoring units for detecting cell voltage. Each monitoring unit is associated with a single cell and includes a reference voltage unit for producing a defined reference threshold voltage and a voltage comparison unit for comparing the reference threshold voltage with a partial cell voltage of the associated cell. The reference voltage unit is electrically supplied from the cell voltage of the associated cell. The voltage comparison unit is coupled to the at least one current interruption switch for interrupting the current of at least the current flowing through the associated cell, with a defined minimum difference between the reference threshold voltage and the partial cell voltage.

  16. Electro-optic component mounting device

    DOE Patents [OSTI]

    Gruchalla, M.E.

    1994-09-13

    A technique is provided for integrally mounting a device such as an electro-optic device in a transmission line to avoid series resonant effects. A center conductor of the transmission line has an aperture formed therein for receiving the device. The aperture splits the center conductor into two parallel sections on opposite sides of the device. For a waveguide application, the center conductor is surrounded by a conductive ground surface which is spaced apart from the center conductor with a dielectric material. One set of electrodes formed on the surface of the electro-optic device is directly connected to the center conductor and an electrode formed on the surface of the electro-optic device is directly connected to the conductive ground surface. The electrodes formed on the surface of the electro-optic device are formed on curved sections of the surface of the device to mate with correspondingly shaped electrodes on the conductor and ground surface to provide a uniform electric field across the electro-optic device. The center conductor includes a passage formed therein for passage of optical signals to an electro-optic device. 10 figs.

  17. Electro-optic component mounting device

    DOE Patents [OSTI]

    Gruchalla, Michael E. (Albuquerque, NM)

    1994-01-01

    A technique is provided for integrally mounting a device such as an electro-optic device (50) in a transmission line to avoid series resonant effects. A center conductor (52) of the transmission line has an aperture (58) formed therein for receiving the device (50). The aperture (58) splits the center conductor into two parallel sections on opposite sides of the device. For a waveguide application, the center conductor is surrounded by a conductive ground surface (54), which is spaced apart from the center conductor with a dielectric material (56). One set of electrodes formed on the surface of the electro-optic device (50) is directly connected to the center conductor 52 and an electrode formed on the surface of the electro-optic device is directly connected to the conductive ground surface (54). The electrodes formed on the surface of the electro-optic device are formed on curved sections of the surface of the device to mate with correspondingly shaped electrodes on the conductor and ground surface to provide a uniform electric field across the electro-optic device. The center conductor includes a passage ( 60) formed therein for passage of optical signals to an electro-optic device.

  18. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  19. Groundwaters of Florence (Italy): Trace element distribution and vulnerability of the aquifers

    SciTech Connect (OSTI)

    Bencini, A.; Ercolanelli, R.; Sbaragli, A.

    1993-11-01

    Geochemical and hydrogeological research has been carried out in Florence, to evaluate conductivity and main chemistry of groundwaters, the pattern of some possible pollutant chemical species (Fe, Mn, Cr, Cu, Pb, Zn, NO{sub 2}, NO{sub 3}), and the vulnerability of the aquifers. The plain is made up of Plio-Quaternary alluvial and lacustrine sediments for a maximum thickness of 600 m. Silts and clays, sometimes with lenses of sandy gravels, are dominant, while considerable deposits of sands, pebbles, and gravels occur along the course of the Arno river and its tributary streams, and represent the most important aquifer of the plain. Most waters show conductivity values around 1000-1200 {mu}S, and almost all of them have an alkaline-earth-bicarbonate chemical character. In western areas higher salt content of the groundwaters is evident. Heavy metal and NO{sub 2}, NO{sub 3} analyses point out that no important pollution phenomena affect the groundwaters; all mean values are below the maximum admissible concentration (MAC) for drinkable waters. Some anomalies of NO{sub 2}, NO{sub 3}, Fe, Mn, and Zn are present. The most plausible causes can be recognized in losses of the sewage system; use of nitrate compounds in agriculture; oxidation of well pipes. All the observations of Cr, Cu, and Pb are below the MAC; the median values of <3, 3.9, and 1.1 {mu}g/l, respectively, could be considered reference concentrations for groundwaters in calcareous lithotypes, under undisturbed natural conditions. Finally, a map of vulnerability shows that the areas near the Arno river are highly vulnerable, for the minimum thickness (or lacking) of sediments covering the aquifer. On the other hand, in the case of pollution, several factors not considered could significantly increase the self-purification capacity of the aquifer, such asdilution of groundwaters, bacteria oxidation of nitrogenous species, and sorption capacity of clay minerals and organic matter. 31 refs., 6 figs., 5 tabs.

  20. Vulnerability of Karangkates dams area by means of zero crossing analysis of data magnetic

    SciTech Connect (OSTI)

    Sunaryo, E-mail: sunaryo.geofis.ub@gmail.com; Susilo, Adi

    2015-04-24

    Study with entitled Vulnerability Karangkates Dam Area By Means of Zero Crossing Analysis of Data Magnetic has been done. The study was aimed to obtain information on the vulnerability of two parts area of Karangkates dams, i.e. Lahor dam which was inaugurated in 1977 and Sutami dam inaugurated in 1981. Three important things reasons for this study are: 1). The dam age was 36 years old for Lahor dam and 32 years old for Sutami dam, 2). Geologically, the location of the dams are closed together to the Pohgajih local shear fault, Selorejo local fault, and Selorejo limestone-andesite rocks contact plane, and 3). Karangkates dams is one of the important Hydro Power Plant PLTA with the generating power of about 400 million KWH per year from a total of about 29.373MW installed in Indonesia. Geographically, the magnetic data acquisition was conducted at coordinates (112.4149oE;-8.2028oS) to (112.4839oE;-8.0989oS) by using Proton Precession Magnetometer G-856. Magnetic Data acquisition was conducted in the radial direction from the dams with diameter of about 10 km and the distance between the measurements about 500m. The magnetic data acquisition obtained the distribution of total magnetic field value in the range of 45800 nT to 44450 nT. Residual anomalies obtained by doing some corrections, including diurnal correction, International Geomagnetic Reference Field (IGRF) correction, and reductions so carried out the distribution of the total magnetic field value in the range of -650 nT to 700 nT. Based on the residual anomalies, indicate the presence of 2 zones of closed closures dipole pairs at located in the west of the Sutami dam and the northwest of the Lahor dam from 5 total zones. Overlapping on the local geological map indicated the lineament of zero crossing patterns in the contour of residual anomaly contour with the Pohgajih shear fault where located at about 4 km to the west of the Sutami dam approximately and andesite-limestone rocks contact where located at about 6 km to the west of the Lahor dam approximately. These shown a possible of vulnerability on geohazards at the west zone of the Karangkates (Lahor-Sutami) dams area if there are triggers by the vibration (earthquake) on the Pohgajih shear fault, andesite-limestone contact plane, and instability rocks on two zones of closed closure dipole pairs area. Reality, on the location of the study shown some local landslide at the several locations and the main road that need considering for disaster mitigation.