Powered by Deep Web Technologies
Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-547: Microsoft Windows Human Interface Device (HID) Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer.

2

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

3

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

4

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

5

Study of high frequency & low frequency electronic ballasts for HID lamps  

E-Print Network [OSTI]

High-intensity discharge (HID) lamp electronic ballasting is receiving increasing attention in the recent years as low wattage HID lighting systems are finding indoor applications. Advantages of high frequency electronic ballast for HID lamps...

Peng, Hua

1997-01-01T23:59:59.000Z

6

Application of vane-type resonator to microwave powered electrodeless HID lamp  

SciTech Connect (OSTI)

A cavity resonator has been generally used as microwave applicator for an electrodeless high intensity discharge (HID) lamp. The size of a cavity resonator is determined by the wavelength of a microwave applied. For example, for a microwave of 2.45 GHz, an inner diameter of more than about 76 mm is necessary for obtaining a microwave resonant field, and then the size of a plasma arc capable of maintaining a stable discharge is experimentally limited at about 15 mm and above. Accordingly the microwave powered electrodeless HID lamp device using cavity resonator is inappropriate in applications where a point light source is required. A vane-type resonator is generally known as an anode of a magnetron, which decides the oscillation frequency of the magnetron. The authors used 3-D finite element method simulation for a design of a vane-type resonator with parabolic reflector to obtain a desired resonant frequency. According to the results of the simulation, the sizes of a 4-vanes resonator with the parabolic reflector were decided, and the resonator made of aluminum and copper was prepared. An electrodeless lamp with InBr and Ar gas enclosed in a spherical quartz glass tube having an inner diameter of about 4 mm was also prepared, and was set at center portion of the resonator. The total luminous flux was about 2,150 lm at microwave input of 27 W. Incidentally, the CRI and Tc for this lamp were 93 and 10,200 K, respectively. Thus, it becomes possible to efficiently couple microwave energy with a smaller-sized electrodeless HID lamp than conventional.

Hochi, Akira; Takeda, Mamoru

1999-07-01T23:59:59.000Z

7

Electrodeless HID lamp study. Final report. [High intensity discharge  

SciTech Connect (OSTI)

High intensity discharge lamps excited by solenoidal electric fields (SEF/HID) were examined for their ability to give high brightness, high efficacy and good color. Frequency of operation was 13.56 MHz (ISM Band) and power to the lamp plasma ranged from about 400 to 1000 W. Radio frequency transformers with air cores and with air core complemented by ferrite material in the magnetic path were used to provide the voltage for excitation. Electrical properties of the matching network and the lamp plasma were measured or calculated and total light from the lamp was measured by an integrating sphere. Efficacies calculated from measurement were found to agree well with the positive column efficacies of conventional HID lamps containing only mercury, and with additives of sodium, thallium, and scandium iodide. Recommendations for future work are given.

Anderson, J.M.; Johnson, P.D.; Jones, C.E.; Rautenberg, T.H.

1985-01-01T23:59:59.000Z

8

Performance of "Ultra-High" Efficient Electronic Ballast for HID Lamps  

E-Print Network [OSTI]

. Index Terms--Electronic ballast, HID lamps, resonant inverter, power loss modeling, Silicon Carbide (Si of >95% for the ballast. Diode bridge rectifier EMI filter Resonant Inverter Power Factor Correction 75423, USA Abstract--A new electronic ballast circuit for High Intensity Discharge (HID) lamps

Tolbert, Leon M.

9

IEEE Power Electronics Specialists Conference, PESC-97, 39-45, St. Louis, 1997. A MHz Electronic Ballast for Automotive-Type HID Lamps  

E-Print Network [OSTI]

Ballast for Automotive-Type HID Lamps Michael Gulko and Sam Ben-Yaakov* Power Electronics Laboratory-Resonance Inverter (CS-PPRI) topology [2] as a ballast for low wattage HID lamps designated as automotive headlights lamp option to replace the conventional 'halogen' type headlights. Unfortunately, application of HID

10

Plasma spectroscopic study of an electrodeless HID lamp containing Tl and Zn  

SciTech Connect (OSTI)

Recently the electrodeless HID lamps excited by microwaves have been studied intensively. Tl is well known as a material having strong green emission lines. In this study, Tl spectra excited by microwaves were reported in the cases of Tl only and Tl + Zn. Using the Elenbaas`s method of high pressure Hg lamp, the cause of Tl continuous spectrum was examined. From the ratio of radiative intensities of two lines, an average arc temperature in the bulb was estimated. Then excitation level of the continuous emission spectrum near the 600nm wavelength was calculated from the dependence of the radiative intensities on these arc temperatures.

Takeda, Mamoru; Horii, Shigeru; Hochi, Akira [Matsushita Electric Industrial Co., Ltd., Kyoto (Japan). Lighting Research Lab.

1996-12-31T23:59:59.000Z

11

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

12

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

13

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

14

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

15

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

16

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

17

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

18

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

19

Nuclear Fuel Cycle & Vulnerabilities  

SciTech Connect (OSTI)

The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

Boyer, Brian D. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

20

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

22

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

23

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

24

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

25

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

26

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

27

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

28

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

29

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

30

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

31

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

32

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

33

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

34

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

35

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

36

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

37

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

38

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

39

SUPERCONDUCTING DEVICES  

E-Print Network [OSTI]

communications. References Superconductor Applications: ~on all aspects of superconducting devices. IEEE Trans.on all aspects vf superconducting devices. The IBM Journal

Clarke, John

2014-01-01T23:59:59.000Z

40

SUPERCONDUCTING DEVICES  

E-Print Network [OSTI]

on all aspects of superconducting devices. IEEE Trans.on all aspects vf superconducting devices. The IBM JournalJ. Matisoo, The Superconducting Computer," Scientific

Clarke, John

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

42

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

43

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nations energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

44

Daydreaming Devices  

E-Print Network [OSTI]

Daydreaming Devices is a project on aspects of daydream and the design of convertible furniture within the context of art. This thesis addresses the concepts and the design of two daydreaming devices developed during my ...

Da Ponte, Ana Sofia Lopes

2008-01-01T23:59:59.000Z

45

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

46

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

47

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

48

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

49

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

50

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

51

Sealing device  

DOE Patents [OSTI]

A sealing device for sealing a gap between a dovetail of a bucket assembly and a rotor wheel is disclosed. The sealing device includes a cover plate configured to cover the gap and a retention member protruding from the cover plate and configured to engage the dovetail. The sealing device provides a seal against the gap when the bucket assemply is subjected to a centrifugal force.

Garcia-Crespo, Andres Jose

2013-12-10T23:59:59.000Z

52

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

53

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INLs Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendors system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendors) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

54

Electrochromic devices  

DOE Patents [OSTI]

An electrochromic device is disclosed having a selective ion transport layer which separates an electrochemically active material from an electrolyte containing a redox active material. The devices are particularly useful as large area architectural and automotive glazings due to there reduced back reaction.

Allemand, Pierre M. (Tucson, AZ); Grimes, Randall F. (Ann Arbor, MI); Ingle, Andrew R. (Tucson, AZ); Cronin, John P. (Tucson, AZ); Kennedy, Steve R. (Tuscon, AZ); Agrawal, Anoop (Tucson, AZ); Boulton, Jonathan M. (Tucson, AZ)

2001-01-01T23:59:59.000Z

55

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

56

Device Performance  

SciTech Connect (OSTI)

In the Device Performance group, within the National Center for Photovoltaic's Measurements and Characterization Division, we measure the performance of PV cells and modules with respect to standard reporting conditions--defined as a reference temperature (25 C), total irradiance (1000 Wm-2), and spectral irradiance distribution (IEC standard 60904-3). Typically, these are ''global'' reference conditions, but we can measure with respect to any reference set. To determine device performance, we conduct two general categories of measurements: spectral responsivity (SR) and current versus voltage (I-V). We usually perform these measurements using standard procedures, but we develop new procedures when required by new technologies. We also serve as an independent facility for verifying device performance for the entire PV community. We help the PV community solve its special measurement problems, giving advice on solar simulation, instrumentation for I-V measurements, reference cells, measurement procedures, and anomalous results. And we collaborate with researchers to analyze devices and materials.

Not Available

2006-06-01T23:59:59.000Z

57

Microchannel devices  

SciTech Connect (OSTI)

The fabrication of stainless steel microchannel heat exchangers was examined through microlamination, the process of diffusion bonding precision machined metallic foils. The influence of diffusion bonding parameters, as well as the device geometry on the strength of the bond between the foils and embedded channel integrity, was investigated. During diffusion bonding, high temperatures and/or pressures result in well bonded foils, but these conditions cause the embedded channels to deform, which will degrade the efficiency of fluid flow through the channels. Alternatively, low temperatures and/or pressures result in undeformed channels but weakly bonded foils. This causes failure of the device due to fluid leakage. Thus, a processing envelope exists for producing a sound device with no fluid leakage and no degradation of fluid flow properties. The theoretical limit on aspect ratio within two-fluid counter-flow microchannel heat exchangers was also investigated. A counter-flow device is comprised of alternating layers of microchannels, which allow the two fluids to flow in opposite directions separated by fins. A theoretical model for interpreting the span of the fin as a function of the fin thickness was established. The model was verified experimentally by fabricating specimens to simulate the counter-flow device. The results of these investigations were used to aid in the design and processing of prototype microchannel devices.

Alman, David E.; Wilson, Rick D.

2001-09-01T23:59:59.000Z

58

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to cross-administrative boundaries, which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. Seventeen social vulnerability indicators are categorized into four dimensions. This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. This study provides a foundation for sustainable strategic planning to deal with environmental change. Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

59

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

60

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

62

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

63

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

64

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

65

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

66

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

67

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

68

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

69

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

70

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

71

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

72

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

73

Detection device  

DOE Patents [OSTI]

The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

Smith, J.E.

1981-02-27T23:59:59.000Z

74

Electrochemical device  

DOE Patents [OSTI]

A tunnel protected electrochemical device features channels fluidically communicating between manifold, tunnels and cells. The channels are designed to provide the most efficient use of auxiliary power. The channels have a greater hydraulic pressure drop and electrical resistance than the manifold. This will provide a design with the optimum auxiliary energy requirements.

Grimes, Patrick G. (Westfield, NJ); Einstein, Harry (Springfield, NJ); Bellows, Richard J. (Westfield, NJ)

1988-01-12T23:59:59.000Z

75

HID Laboratories Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:Photon Place:Net JumpStrategy | Open EnergyHawaiiH2GoHERA USA

76

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

77

Laser device  

DOE Patents [OSTI]

A laser device includes a virtual source configured to aim laser energy that originates from a true source. The virtual source has a vertical rotational axis during vertical motion of the virtual source and the vertical axis passes through an exit point from which the laser energy emanates independent of virtual source position. The emanating laser energy is collinear with an orientation line. The laser device includes a virtual source manipulation mechanism that positions the virtual source. The manipulation mechanism has a center of lateral pivot approximately coincident with a lateral index and a center of vertical pivot approximately coincident with a vertical index. The vertical index and lateral index intersect at an index origin. The virtual source and manipulation mechanism auto align the orientation line through the index origin during virtual source motion.

Scott, Jill R. (Idaho Falls, ID); Tremblay, Paul L. (Idaho Falls, ID)

2008-08-19T23:59:59.000Z

78

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

79

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

80

Mobile Device Guide Google Android based devices  

E-Print Network [OSTI]

Mobile Device Guide ­ Google Android based devices CSUF Date Last Revised: 1/20/11 Page 1 of 3;Mobile Device Guide ­ Google Android based devices CSUF Date Last Revised: 1/20/11 Page 2 of 3 2. Under' with your campus username and enter your password (case sensitive). 4. Tap `next'. #12;Mobile Device Guide

de Lijser, Peter

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

82

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

83

Electrochromic device  

DOE Patents [OSTI]

An electrochromic device includes a first substrate spaced from a second substrate. A first conductive member is formed over at least a portion of the first substrate. A first electrochromic material is formed over at least a portion of the first conductive member. The first electrochromic material includes an organic material. A second conductive member is formed over at least a portion of the second substrate. A second electrochromic material is formed over at least a portion of the second conductive member. The second electrochromic material includes an inorganic material. An ionic liquid is positioned between the first electrochromic material and the second electrochromic material.

Schwendemanm, Irina G. (Wexford, PA); Polcyn, Adam D. (Pittsburgh, PA); Finley, James J. (Pittsburgh, PA); Boykin, Cheri M. (Kingsport, TN); Knowles, Julianna M. (Apollo, PA)

2011-03-15T23:59:59.000Z

84

OLED devices  

DOE Patents [OSTI]

An OLED device having an emission layer formed of an ambipolar phosphine oxide host material and a dopant, a hole transport layer in electrical communication with an anode, an electron transport layer in communication with a cathode, wherein the HOMO energy of the hole transport layer is substantially the same as the HOMO energy of the ambipolar host in the emission layer, and the LUMO energy of the electron transport layer is substantially the same as the LUMO energy of the ambipolar host in the emission layer.

Sapochak, Linda Susan [Arlington, VA; Burrows, Paul Edward [Kennewick, WA; Bimalchandra, Asanga [Richland, WA

2011-02-22T23:59:59.000Z

85

Diversionary device  

DOE Patents [OSTI]

A diversionary device has a housing having at least one opening and containing a non-explosive propellant and a quantity of fine powder packed within the housing, with the powder being located between the propellant and the opening. When the propellant is activated, it has sufficient energy to propel the powder through the opening to produce a cloud of powder outside the housing. An igniter is also provided for igniting the cloud of powder to create a diversionary flash and bang, but at a low enough pressure to avoid injuring nearby people.

Grubelich, Mark C. (Albuquerque, NM)

2001-01-01T23:59:59.000Z

86

Interconnector device  

SciTech Connect (OSTI)

This patent describes an interconnector device that allows a lithium-type battery to be substituted for a Leclanche battery. The Leclanche battery is of predetermined dimensions and has a pair of coil spring connection terminals at predetermined locations on the top surface thereof. The lithium battery of different predetermined dimensions than the Lechanche battery and has a pair of female connection sockets positioned at a predetermined off-center location on the top surface. The locations of the coil spring terminals and the connection sockets of the respective batteries are at substantially different non-matching positions, comprising a thin flat water of non-conducive material of predetermined size and configuration, the wafer having the same cross-section dimensions as the Leclanche battery. A pair of prongs on the underside surface of the wafer and at locations correspond to the locations of the female connection sockets of the lithium battery. The prongs received into the female connection sockets when the interconnector device is mounted on the lithium batter. A pair of coil spring connection terminals mounted on the opposite of top surface of the wafer and having a configuration which matches that of the connection terminals of the Leclanche battery and positioned at locations which corresponds to the locations of the coil spring connection terminals of the Leclanche battery. A pair of electrical conductors plated on the underside surface of the wafer for respectively interconnecting the pairs of prongs and the pair of coil spring connection terminals in parallel.

Christopulos, J.A.

1987-07-07T23:59:59.000Z

87

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

88

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

89

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

90

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

91

Optoelectronic device  

DOE Patents [OSTI]

The invention is an optoelectronic device comprising an active portion which converts light to electricity or converts electricity to light, the active portion having a front side for the transmittal of the light and a back side opposite from the front side, at least two electrical leads to the active portion to convey electricity to or from the active portion, an enclosure surrounding the active portion and through which the at least two electrical leads pass wherein the hermetically sealed enclosure comprises at the front side of the active portion a barrier material which allows for transmittal of light, one or more getter materials disposed so as to not impede the transmission of light to or from the active portion, and a contiguous gap pathway to the getter material which pathway is disposed between the active portion and the barrier material.

Bonekamp, Jeffrey E.; Boven, Michelle L.; Gaston, Ryan S.

2014-09-09T23:59:59.000Z

92

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

93

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

94

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

95

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

96

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

97

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

98

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

99

Laser device  

DOE Patents [OSTI]

A laser device includes a target position, an optical component separated a distance J from the target position, and a laser energy source separated a distance H from the optical component, distance H being greater than distance J. A laser source manipulation mechanism exhibits a mechanical resolution of positioning the laser source. The mechanical resolution is less than a spatial resolution of laser energy at the target position as directed through the optical component. A vertical and a lateral index that intersect at an origin can be defined for the optical component. The manipulation mechanism can auto align laser aim through the origin during laser source motion. The laser source manipulation mechanism can include a mechanical index. The mechanical index can include a pivot point for laser source lateral motion and a reference point for laser source vertical motion. The target position can be located within an adverse environment including at least one of a high magnetic field, a vacuum system, a high pressure system, and a hazardous zone. The laser source and an electro-mechanical part of the manipulation mechanism can be located outside the adverse environment. The manipulation mechanism can include a Peaucellier linkage.

Scott, Jill R. (Idaho Falls, ID); Tremblay, Paul L. (Idaho Falls, ID)

2007-07-10T23:59:59.000Z

100

Medical Device Reliability BIOMATERIALS  

E-Print Network [OSTI]

NEMI Medical Electronics team to address short- and long-term reliability issues with medical devices. OurMedical Device Reliability BIOMATERIALS Our goal is to provide medical device manufacturers, and consistency of active implantable medical devices. These devices, including pacemakers, cardiac defibrillators

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Connector device for building integrated photovoltaic device  

SciTech Connect (OSTI)

The present invention is premised upon a connector device and method that can more easily electrically connect a plurality of PV devices or photovoltaic system components and/or locate these devices/components upon a building structure. It also may optionally provide some additional sub-components (e.g. at least one bypass diode and/or an indicator means) and may enhance the serviceability of the device.

Keenihan, James R.; Langmaid, Joseph A.; Eurich, Gerald K.; Lesniak, Michael J.; Mazor, Michael H.; Cleereman, Robert J.; Gaston, Ryan S.

2014-06-03T23:59:59.000Z

102

Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.  

SciTech Connect (OSTI)

Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

Enos, David George; Goods, Steven Howard

2006-11-01T23:59:59.000Z

103

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

104

Operated device estimation framework  

E-Print Network [OSTI]

Protective device estimation is a challenging task because there are numerous protective devices present in a typical distribution system. Among various protective devices, auto-reclosers and fuses are the main overcurrent protection on distribution...

Rengarajan, Janarthanan

2009-05-15T23:59:59.000Z

105

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

106

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

107

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

108

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

109

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

110

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

111

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity Implications for agricultural production, trade and poverty The issue of climate volatility Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

112

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

113

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

114

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

115

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

116

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

117

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

118

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

119

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

120

Bipolar thermoelectric devices  

E-Print Network [OSTI]

The work presented here is a theoretical and experimental study of heat production and transport in bipolar electrical devices, with detailed treatment of thermoelectric effects. Both homojunction and heterojunction devices ...

Pipe, Kevin P. (Kevin Patrick), 1976-

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

122

Pulse flux measuring device  

DOE Patents [OSTI]

A device for measuring particle flux comprises first and second photodiode detectors for receiving flux from a source and first and second outputs for producing first and second signals representing the flux incident to the detectors. The device is capable of reducing the first output signal by a portion of the second output signal, thereby enhancing the accuracy of the device. Devices in accordance with the invention may measure distinct components of flux from a single source or fluxes from several sources.

Riggan, William C. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

123

Pulse detecting device  

DOE Patents [OSTI]

A device for measuring particle flux comprises first and second photodiode detectors for receiving flux from a source and first and second outputs for producing first and second signals representing the flux incident to the detectors. The device is capable of reducing the first output signal by a portion of the second output signal, thereby enhancing the accuracy of the device. Devices in accordance with the invention may measure distinct components of flux from a single source or fluxes from several sources.

Riggan, W.C.

1984-01-01T23:59:59.000Z

124

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

125

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

126

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

127

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

128

Articulating feedstock delivery device  

DOE Patents [OSTI]

A fully articulable feedstock delivery device that is designed to operate at pressure and temperature extremes. The device incorporates an articulating ball assembly which allows for more accurate delivery of the feedstock to a target location. The device is suitable for a variety of applications including, but not limited to, delivery of feedstock to a high-pressure reaction chamber or process zone.

Jordan, Kevin

2013-11-05T23:59:59.000Z

129

Organic photosensitive devices  

DOE Patents [OSTI]

The present invention generally relates to organic photosensitive optoelectronic devices. More specifically, it is directed to organic photosensitive optoelectronic devices having a photoactive organic region containing encapsulated nanoparticles that exhibit plasmon resonances. An enhancement of the incident optical field is achieved via surface plasmon polariton resonances. This enhancement increases the absorption of incident light, leading to a more efficient device.

Rand, Barry P; Forrest, Stephen R

2013-11-26T23:59:59.000Z

130

Amorphous silicon photovoltaic devices  

DOE Patents [OSTI]

This invention is a photovoltaic device comprising an intrinsic or i-layer of amorphous silicon and where the photovoltaic device is more efficient at converting light energy to electric energy at high operating temperatures than at low operating temperatures. The photovoltaic devices of this invention are suitable for use in high temperature operating environments.

Carlson, David E.; Lin, Guang H.; Ganguly, Gautam

2004-08-31T23:59:59.000Z

131

INFORMATION DEVICES AND  

E-Print Network [OSTI]

to access or hold sensitive, confidential or personal information on mobile devices, such as laptopsPROTECTION OF INFORMATION HELD ON MOBILE DEVICES AND ENCRYPTION POLICY (V3.5) the place of useful;Protection of Information Held on Mobile Devices and Encryption Policy (v3.5) Page 1 Table of Contents 1

Mottram, Nigel

132

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

133

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

134

Physical security and tamper-indicating devices  

SciTech Connect (OSTI)

Computer systems, electronic communications, digital data, and computer storage media are often highly vulnerable to physical tampering. Tamper-indicating devices, also called security seals, are widely used to detect physical tampering or unauthorized access. We studied 94 different security seals, both passive and electronic, developed either commercially or by the US government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low-tech methods. Cost was not a good predictor of seal security. It appears to us that many of these seals can be dramatically improved with minor, low-cost modifications to either the seal or the use protocol.

Johnston, R.G.; Garcia, A.R.E.

1997-02-01T23:59:59.000Z

135

Abrasion Testing of Critical Components of Hydrokinetic Devices  

SciTech Connect (OSTI)

The objective of the Abrasion Testing of Critical Components of Hydrokinetic Devices (Project) was to test critical components of hydrokinetic devices in waters with high levels of suspended sediment information that is widely applicable to the hydrokinetic industry. Tidal and river sites in Alaska typically have high suspended sediment concentrations. High suspended sediment also occurs in major rivers and estuaries throughout the world and throughout high latitude locations where glacial inputs introduce silt into water bodies. In assessing the vulnerability of technology components to sediment induced abrasion, one of the greatest concerns is the impact that the sediment may have on device components such as bearings and seals, failures of which could lead to both efficiency loss and catastrophic system failures.

Worthington, Monty [ORPC Alaska] [ORPC Alaska; Ali, Muhammad [Ohio University] [Ohio University; Ravens, Tom [University of Alaska Anchorage] [University of Alaska Anchorage

2013-12-06T23:59:59.000Z

136

Portable data collection device  

DOE Patents [OSTI]

The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time.

French, Patrick D. (Aurora, CO)

1996-01-01T23:59:59.000Z

137

Unitary lens semiconductor device  

DOE Patents [OSTI]

A unitary lens semiconductor device and method. The unitary lens semiconductor device is provided with at least one semiconductor layer having a composition varying in the growth direction for unitarily forming one or more lenses in the semiconductor layer. Unitary lens semiconductor devices may be formed as light-processing devices such as microlenses, and as light-active devices such as light-emitting diodes, photodetectors, resonant-cavity light-emitting diodes, vertical-cavity surface-emitting lasers, and resonant cavity photodetectors.

Lear, Kevin L. (Albuquerque, NM)

1997-01-01T23:59:59.000Z

138

Portable data collection device  

DOE Patents [OSTI]

The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time. 7 figs.

French, P.D.

1996-06-11T23:59:59.000Z

139

Mobile Device Guide Apple iPhone Devices  

E-Print Network [OSTI]

Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised: 1/20/11 Page 1 of 3 ConnectingPhone desktop. 1a. Expand `Mail, Contacts, Calendars' as shown. #12;Mobile Device Guide ­ Apple iPhone Devices (case sensitive). 4. Tap `next'. #12;Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised

de Lijser, Peter

140

Barrier breaching device  

DOE Patents [OSTI]

A barrier breaching device that is designed primarily for opening holes in interior walls of buildings uses detonating fuse for explosive force. The fuse acts as the ribs or spokes of an umbrella-like device that may be opened up to form a cone. The cone is placed against the wall so that detonating fuse that rings the base of the device and which is ignited by the spoke-like fuses serves to cut a circular hole in the wall.

Honodel, Charles A. (Tracy, CA)

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Barrier breaching device  

DOE Patents [OSTI]

A barrier breaching device that is designed primarily for opening holes in interior walls of buildings uses detonating fuse for explosive force. The fuse acts as the ribs or spokes of an umbrella-like device that may be opened up to form a cone. The cone is placed against the wall so that detonating fuse that rings the base of the device and which is ignited by the spoke-like fuses serves to cut a circular hole in the wall.

Honodel, C.A.

1983-06-01T23:59:59.000Z

142

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

143

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

144

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

145

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

146

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

147

Mobile Device Management Android Device Enrollment  

E-Print Network [OSTI]

to manage your device. c. Enter your password. #12;d. Accept the Terms and Conditions e. You have completed. 2. Get Touchdown from Google Play a. Open up the Google Play Store. b. Search for Touchdown. c. Use the application. #12;3. Get Citrix Mobile Connect from Google Play a. Open up the Google Play Store. b. Search

148

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

149

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

150

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

151

Grey man devices  

E-Print Network [OSTI]

The Vision Slaved to Walking Device i s one in a series of devices that are a result of the experimental ambulation series. The ability to see only when one's feet are moving allows for a distorted perspective of ones own ...

Sethi, Sanjit (Sanjit Singh), 1971-

2002-01-01T23:59:59.000Z

152

Capillary interconnect device  

DOE Patents [OSTI]

An interconnecting device for connecting a plurality of first fluid-bearing conduits to a corresponding plurality of second fluid-bearing conduits thereby providing fluid communication between the first fluid-bearing conduits and the second fluid-bearing conduits. The device includes a manifold and one or two ferrule plates that are held by compressive axial forces.

Renzi, Ronald F

2013-11-19T23:59:59.000Z

153

Self-actuated device  

DOE Patents [OSTI]

A self-actuated device, of particular use as a valve or an orifice for nuclear reactor fuel and blanket assemblies, in which a gas produced by a neutron induced nuclear reaction gradually accumulates as a function of neutron fluence. The gas pressure increase occasioned by such accumulation of gas is used to actuate the device.

Hecht, Samuel L. (Richland, WA)

1984-01-01T23:59:59.000Z

154

Fluidic nanotubes and devices  

DOE Patents [OSTI]

Fluidic nanotube devices are described in which a hydrophilic, non-carbon nanotube, has its ends fluidly coupled to reservoirs. Source and drain contacts are connected to opposing ends of the nanotube, or within each reservoir near the opening of the nanotube. The passage of molecular species can be sensed by measuring current flow (source-drain, ionic, or combination). The tube interior can be functionalized by joining binding molecules so that different molecular species can be sensed by detecting current changes. The nanotube may be a semiconductor, wherein a tubular transistor is formed. A gate electrode can be attached between source and drain to control current flow and ionic flow. By way of example an electrophoretic array embodiment is described, integrating MEMs switches. A variety of applications are described, such as: nanopores, nanocapillary devices, nanoelectrophoretic, DNA sequence detectors, immunosensors, thermoelectric devices, photonic devices, nanoscale fluidic bioseparators, imaging devices, and so forth.

Yang, Peidong (El Cerrito, CA); He, Rongrui (El Cerrito, CA); Goldberger, Joshua (Berkeley, CA); Fan, Rong (El Cerrito, CA); Wu, Yiying (Albany, CA); Li, Deyu (Albany, CA); Majumdar, Arun (Orinda, CA)

2010-01-10T23:59:59.000Z

155

Fluidic nanotubes and devices  

DOE Patents [OSTI]

Fluidic nanotube devices are described in which a hydrophilic, non-carbon nanotube, has its ends fluidly coupled to reservoirs. Source and drain contacts are connected to opposing ends of the nanotube, or within each reservoir near the opening of the nanotube. The passage of molecular species can be sensed by measuring current flow (source-drain, ionic, or combination). The tube interior can be functionalized by joining binding molecules so that different molecular species can be sensed by detecting current changes. The nanotube may be a semiconductor, wherein a tubular transistor is formed. A gate electrode can be attached between source and drain to control current flow and ionic flow. By way of example an electrophoretic array embodiment is described, integrating MEMs switches. A variety of applications are described, such as: nanopores, nanocapillary devices, nanoelectrophoretic, DNA sequence detectors, immunosensors, thermoelectric devices, photonic devices, nanoscale fluidic bioseparators, imaging devices, and so forth.

Yang, Peidong (Berkeley, CA); He, Rongrui (El Cerrito, CA); Goldberger, Joshua (Berkeley, CA); Fan, Rong (El Cerrito, CA); Wu, Yiying (Albany, CA); Li, Deyu (Albany, CA); Majumdar, Arun (Orinda, CA)

2008-04-08T23:59:59.000Z

156

Device for cutting protrusions  

DOE Patents [OSTI]

An apparatus for clipping a protrusion of material is provided. The protrusion may, for example, be a bolt head, a nut, a rivet, a weld bead, or a temporary assembly alignment tab protruding from a substrate surface of assembled components. The apparatus typically includes a cleaver having a cleaving edge and a cutting blade having a cutting edge. Generally, a mounting structure configured to confine the cleaver and the cutting blade and permit a range of relative movement between the cleaving edge and the cutting edge is provided. Also typically included is a power device coupled to the cutting blade. The power device is configured to move the cutting edge toward the cleaving edge. In some embodiments the power device is activated by a momentary switch. A retraction device is also generally provided, where the retraction device is configured to move the cutting edge away from the cleaving edge.

Bzorgi, Fariborz M. (Knoxville, TN)

2011-07-05T23:59:59.000Z

157

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

158

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

159

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

160

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

162

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

163

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

164

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

165

Rain sampling device  

DOE Patents [OSTI]

The present invention constitutes a rain sampling device adapted for independent operation at locations remote from the user which allows rainfall to be sampled in accordance with any schedule desired by the user. The rain sampling device includes a mechanism for directing wet precipitation into a chamber, a chamber for temporarily holding the precipitation during the process of collection, a valve mechanism for controllably releasing samples of the precipitation from the chamber, a means for distributing the samples released from the holding chamber into vessels adapted for permanently retaining these samples, and an electrical mechanism for regulating the operation of the device. 11 figures.

Nelson, D.A.; Tomich, S.D.; Glover, D.W.; Allen, E.V.; Hales, J.M.; Dana, M.T.

1991-05-14T23:59:59.000Z

166

Rain sampling device  

DOE Patents [OSTI]

The present invention constitutes a rain sampling device adapted for independent operation at locations remote from the user which allows rainfall to be sampled in accordance with any schedule desired by the user. The rain sampling device includes a mechanism for directing wet precipitation into a chamber, a chamber for temporarily holding the precipitation during the process of collection, a valve mechanism for controllably releasing samples of said precipitation from said chamber, a means for distributing the samples released from the holding chamber into vessels adapted for permanently retaining these samples, and an electrical mechanism for regulating the operation of the device.

Nelson, Danny A. (Richland, WA); Tomich, Stanley D. (Richland, WA); Glover, Donald W. (Prosser, WA); Allen, Errol V. (Benton City, WA); Hales, Jeremy M. (Kennewick, WA); Dana, Marshall T. (Richland, WA)

1991-01-01T23:59:59.000Z

167

Wireless device monitoring systems and monitoring devices, and associated methods  

DOE Patents [OSTI]

Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

2014-05-27T23:59:59.000Z

168

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

169

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

170

Multimaterial rectifying device fibers  

E-Print Network [OSTI]

Electronic and optoelectronic device processing is commonly thought to be incompatible with much simpler thermal drawing techniques used in optical fiber production. The incorporation of metals, polymer insulators, and ...

Orf, Nicholas D

2009-01-01T23:59:59.000Z

171

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

172

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

173

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

174

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

175

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Universit de

176

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

177

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

178

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

179

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

180

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

182

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

183

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

184

Electrical apparatus lockout device  

SciTech Connect (OSTI)

A simple lockout device for electrical equipment equipped with recessed power blades is described. The device comprises a face-plate (12) having a threaded member (14) attached thereto and apertures suitable for accommodating the power blades of a piece of electrical equipment, an elastomeric nose (16) abutting the face-plate having a hole for passage of the threaded member therethrough and power blade apertures in registration with those of the face-plate, a block (20) having a recess (34) in its forward face for receiving at least a portion of the hose, a hole therein for receiving the threaded member and an integral extension (26) extending from its rear face. A thumb screw (22) suitable for turning with the hands and having internal threads suitable for engaging the threaded member attached to the face-plate is inserted into a passage in the integral extension to engage the threaded member in such a fashion that when the device is inserted over the recessed power blades of a piece of electrical equipment and the thumb screw (22) tightened, the elastomeric nose (16) is compressed between the face-plate (12) and the block (20) forcing it to expand laterally thereby securing the device in the recess and precluding the accidental or intentional energization of the piece of equipment by attachment of a power cord to the recessed power blades. Means are provided in the interval extension and the thumb screw for the attachment of a locking device (46) which will satisfy OSHA standards.

Gonzales, R.

1999-10-12T23:59:59.000Z

185

Electrical apparatus lockout device  

DOE Patents [OSTI]

A simple lockout device for electrical equipment equipped with recessed power blades is described. The device comprises a face-plate (12) having a threaded member (14) attached thereto and apertures suitable for accommodating the power blades of a piece of electrical equipment, an elastomeric nose (16) abutting the face-plate having a hole for passage of the threaded member therethrough and power blade apertures in registration with those of the face-plate, a block (20) having a recess (34) in its forward face for receiving at least a portion of the hose, a hole therein for receiving the threaded member and an integral extension (26) extending from its rear face. A thumb screw (22) suitable for turning with the hands and having internal threads suitable for engaging the threaded member attached to the face-plate is inserted into a passage in the integral extension to engage the threaded member in such a fashion that when the device is inserted over the recessed power blades of a piece of electrical equipment and the thumb screw (22) tightened, the elastomeric nose (16) is compressed between the face-plate (12) and the block (20) forcing it to expand laterally thereby securing the device in the recess and precluding the accidental or intentional energization of the piece of equipment by attachment of a power cord to the recessed power blades. Means are provided in the interval extension and the thumb screw for the attachment of a locking device (46) which will satisfy OSHA standards.

Gonzales, Rick (Chesapeake, VA)

1999-01-01T23:59:59.000Z

186

Spectral tailoring device  

DOE Patents [OSTI]

A spectral tailoring device for altering the neutron energy spectra and flux of neutrons in a fast reactor thereby selectively to enhance or inhibit the transmutation rate of a target metrical to form a product isotope. Neutron moderators, neutron filters, neutron absorbers and neutron reflectors may be used as spectral tailoring devices. Depending on the intended use for the device, a member from each of these four classes of materials could be used singularly, or in combination, to provide a preferred neutron energy spectra and flux of the neutrons in the region of the target material. In one embodiment of the invention, an assembly is provided for enhancing the production of isotopes, such as cobalt 60 and gadolinium 153. In another embodiment of the invention, a spectral tailoring device is disposed adjacent a target material which comprises long lived or volatile fission products and the device is used to shift the neutron energy spectra and flux of neutrons in the region of the fission products to preferentially transmute them to produce a less volatile fission product inventory. 6 figs.

Brager, H.R.; Schenter, R.E.; Carter, L.L.; Karnesky, R.A.

1987-08-05T23:59:59.000Z

187

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

188

Testing of High Voltage Surge Protection Devices for Use in Liquid Argon TPC Detectors  

E-Print Network [OSTI]

In this paper we demonstrate the capability of high voltage varistors and gas discharge tube arrestors for use as surge protection devices in liquid argon time projection chamber detectors. The insulating and clamping behavior of each type of device is characterized in air (room temperature), and liquid argon (90~K), and their robustness under high voltage and high energy surges in cryogenic conditions is verified. The protection of vulnerable components in liquid argon during a 150 kV high voltage discharge is also demonstrated. Each device is tested for argon contamination and light emission effects, and both are constrained to levels where no significant impact upon liquid argon time projection chamber functionality is expected. Both devices investigated are shown to be suitable for HV surge protection applications in cryogenic detectors.

J. Asaadi; J. M. Conrad; S. Gollapinni; B. J. P. Jones; H. Jostlein; J. M. St. John; T. Strauss; S. Wolbers; J. Zennamo

2014-06-23T23:59:59.000Z

189

Hanford Identification (HID) PIA, Richland Operations Office | Department  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecemberGlossary ofGroundwaterHC Policy andHQTargets |of

190

RAPID/Roadmap/18-HI-d | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration JumpSanyalTempWellheadWahkiakumNV-a Nonpoint7-FD-a Wild8-HI-b RCRA 18HIB

191

RAPID/Roadmap/3-HI-d | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExploration JumpSanyalTempWellheadWahkiakumNV-a20-AK-a WellAK-g UtilityHI-d Use and

192

RAPID/Roadmap/6-HI-d | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-g Grant of Access Permit5-ID-a Drilling and Well5-OR-a6AK-bHI-c

193

RAPID/Roadmap/14-HI-d | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to: navigation, search RAPIDColorado < RAPID‎ |1-TX-a13-ID-a State14-FD-c EPA

194

Biochip scanner device  

DOE Patents [OSTI]

A biochip scanner device used to detect and acquire fluorescence signal data from biological microchips or biochips and method of use are provided. The biochip scanner device includes a laser for emitting a laser beam. A modulator, such as an optical chopper modulates the laser beam. A scanning head receives the modulated laser beam and a scanning mechanics coupled to the scanning head moves the scanning head relative to the biochip. An optical fiber delivers the modulated laser beam to the scanning head. The scanning head collects the fluorescence light from the biochip, launches it into the same optical fiber, which delivers the fluorescence into a photodetector, such as a photodiode. The biochip scanner device is used in a row scanning method to scan selected rows of the biochip with the laser beam size matching the size of the immobilization site.

Perov, Alexander (Troitsk, RU); Belgovskiy, Alexander I. (Mayfield Heights, OH); Mirzabekov, Andrei D. (Darien, IL)

2001-01-01T23:59:59.000Z

195

Fragment capture device  

DOE Patents [OSTI]

A fragment capture device for use in explosive containment. The device comprises an assembly of at least two rows of bars positioned to eliminate line-of-sight trajectories between the generation point of fragments and a surrounding containment vessel or asset. The device comprises an array of at least two rows of bars, wherein each row is staggered with respect to the adjacent row, and wherein a lateral dimension of each bar and a relative position of each bar in combination provides blockage of a straight-line passage of a solid fragment through the adjacent rows of bars, wherein a generation point of the solid fragment is located within a cavity at least partially enclosed by the array of bars.

Payne, Lloyd R. (Los Lunas, NM); Cole, David L. (Albuquerque, NM)

2010-03-30T23:59:59.000Z

196

Pendulum detector testing device  

DOE Patents [OSTI]

A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.

Gonsalves, John M. (Modesto, CA)

1997-01-01T23:59:59.000Z

197

Electrochromic optical switching device  

DOE Patents [OSTI]

An electrochromic cell is disclosed which comprises an electrochromic layer, a polymerizable organo-sulfur layer which comprises the counter electrode of the structure, and an ionically conductive electronically insulating material which comprises the separator between the electrodes. In a preferred embodiment, both the separator and the organo-sulfur electrode (in both its charged and uncharged states) are transparent either to visible light or to the entire solar spectrum. An electrochromic device is disclosed which comprises such electrodes and separator encased in glass plates on the inner surface of each of which is formed a transparent electrically conductive film in respective electrical contact with the electrodes which facilitates formation of an external electrical connection or contact to the electrodes of the device to permit electrical connection of the device to an external potential source.

Lampert, Carl M. (El Sobrante, CA); Visco, Steven J. (Berkeley, CA)

1992-01-01T23:59:59.000Z

198

Pendulum detector testing device  

DOE Patents [OSTI]

A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.

Gonsalves, J.M.

1997-09-30T23:59:59.000Z

199

Nonaqueous Electrical Storage Device  

DOE Patents [OSTI]

An electrochemical capacitor is disclosed that features two, separated, high surface area carbon cloth electrodes sandwiched between two current collectors fabricated of a conductive polymer having a flow temperature greater than 130.degree. C., the perimeter of the electrochemical capacitor being sealed with a high temperature gasket to form a single cell device. The gasket material is a thermoplastic stable at temperatures greater than 100.degree. C., preferably a polyester or a polyurethane, and having a reflow temperature above 130.degree. C. but below the softening temperature of the current collector material. The capacitor packaging has good mechanical integrity over a wide temperature range, contributes little to the device equivalent series resistance (ESR), and is stable at high potentials. In addition, the packaging is designed to be easily manufacturable by assembly line methods. The individual cells can be stacked in parallel or series configuration to reach the desired device voltage and capacitance.

McEwen, Alan B. (Melrose, MA); Evans, David A. (Seekonk, MA); Blakley, Thomas J. (Woburn, MA); Goldman, Jay L. (Mansfield, MA)

1999-10-26T23:59:59.000Z

200

Ion manipulation device  

DOE Patents [OSTI]

An ion manipulation method and device is disclosed. The device includes a pair of substantially parallel surfaces. An array of inner electrodes is contained within, and extends substantially along the length of, each parallel surface. The device includes a first outer array of electrodes and a second outer array of electrodes. Each outer array of electrodes is positioned on either side of the inner electrodes, and is contained within and extends substantially along the length of each parallel surface. A DC voltage is applied to the first and second outer array of electrodes. A RF voltage, with a superimposed electric field, is applied to the inner electrodes by applying the DC voltages to each electrode. Ions either move between the parallel surfaces within an ion confinement area or along paths in the direction of the electric field, or can be trapped in the ion confinement area.

Anderson, Gordon A; Smith, Richard D; Ibrahim, Yehia M; Baker, Erin M

2014-09-16T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Regenerative combustion device  

DOE Patents [OSTI]

A regenerative combustion device having a combustion zone, and chemicals contained within the combustion zone, such as water, having a first equilibrium state, and a second combustible state. Means for transforming the chemicals from the first equilibrium state to the second combustible state, such as electrodes, are disposed within the chemicals. An igniter, such as a spark plug or similar device, is disposed within the combustion zone for igniting combustion of the chemicals in the second combustible state. The combustion products are contained within the combustion zone, and the chemicals are selected such that the combustion products naturally chemically revert into the chemicals in the first equilibrium state following combustion. The combustion device may thus be repeatedly reused, requiring only a brief wait after each ignition to allow the regeneration of combustible gasses within the head space.

West, Phillip B.

2004-03-16T23:59:59.000Z

202

Electrochromic optical switching device  

DOE Patents [OSTI]

An electrochromic cell is disclosed which comprises an electrochromic layer, a polymerizable organo-sulfur layer which comprises the counter electrode of the structure, and an ionically conductive electronically insulating material which comprises the separator between the electrodes. In a preferred embodiment, both the separator and the organo-sulfur electrode (in both its charged and uncharged states) are transparent either to visible light or to the entire solar spectrum. An electrochromic device is disclosed which comprises such electrodes and separator encased in glass plates on the inner surface of each of which is formed a transparent electrically conductive film in respective electrical contact with the electrodes which facilitates formation of an external electrical connection or contact to the electrodes of the device to permit electrical connection of the device to an external potential source. 3 figs.

Lampert, C.M.; Visco, S.J.

1992-08-25T23:59:59.000Z

203

Precision alignment device  

DOE Patents [OSTI]

Apparatus for providing automatic alignment of beam devices having an associated structure for directing, collimating, focusing, reflecting, or otherwise modifying the main beam. A reference laser is attached to the structure enclosing the main beam producing apparatus and produces a reference beam substantially parallel to the main beam. Detector modules containing optical switching devices and optical detectors are positioned in the path of the reference beam and are effective to produce an electrical output indicative of the alignment of the main beam. This electrical output drives servomotor operated adjustment screws to adjust the position of elements of the structure associated with the main beam to maintain alignment of the main beam. 5 figs.

Jones, N.E.

1988-03-10T23:59:59.000Z

204

Phononic crystal devices  

DOE Patents [OSTI]

Phononic crystals that have the ability to modify and control the thermal black body phonon distribution and the phonon component of heat transport in a solid. In particular, the thermal conductivity and heat capacity can be modified by altering the phonon density of states in a phononic crystal. The present invention is directed to phononic crystal devices and materials such as radio frequency (RF) tags powered from ambient heat, dielectrics with extremely low thermal conductivity, thermoelectric materials with a higher ratio of electrical-to-thermal conductivity, materials with phononically engineered heat capacity, phononic crystal waveguides that enable accelerated cooling, and a variety of low temperature application devices.

El-Kady, Ihab F. (Albuquerque, NM); Olsson, Roy H. (Albuquerque, NM)

2012-01-10T23:59:59.000Z

205

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

206

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

207

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

208

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

209

Solar Innovator | Alta Devices  

ScienceCinema (OSTI)

Selected to participate in the Energy Department's SunShot Initiative, Alta Devices produces solar cells that convert sunlight into electricity at world record-breaking levels of efficiency. Through its innovative solar technology Alta is helping bring down the cost of solar. Learn more about the Energy Department's efforts to advance solar technology at energy.gov/solar .

Mattos, Laila; Le, Minh

2013-05-29T23:59:59.000Z

210

Device Oriented Project Controller  

SciTech Connect (OSTI)

This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions have been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.

Dalesio, Leo; Kraimer, Martin

2013-11-20T23:59:59.000Z

211

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

212

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network [OSTI]

protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user

Van Oorschot, Paul

213

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

214

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

215

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

216

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

217

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

218

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

219

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, HerbertE.

220

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Packaging of solid state devices  

DOE Patents [OSTI]

A package for one or more solid state devices in a single module that allows for operation at high voltage, high current, or both high voltage and high current. Low thermal resistance between the solid state devices and an exterior of the package and matched coefficient of thermal expansion between the solid state devices and the materials used in packaging enables high power operation. The solid state devices are soldered between two layers of ceramic with metal traces that interconnect the devices and external contacts. This approach provides a simple method for assembling and encapsulating high power solid state devices.

Glidden, Steven C.; Sanders, Howard D.

2006-01-03T23:59:59.000Z

222

Non- contacting capacitive diagnostic device  

DOE Patents [OSTI]

A non-contacting capacitive diagnostic device includes a pulsed light source for producing an electric field in a semiconductor or photovoltaic device or material to be evaluated and a circuit responsive to the electric field. The circuit is not in physical contact with the device or material being evaluated and produces an electrical signal characteristic of the electric field produced in the device or material. The diagnostic device permits quality control and evaluation of semiconductor or photovoltaic device properties in continuous manufacturing processes.

Ellison, Timothy

2005-07-12T23:59:59.000Z

223

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

224

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

225

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

226

Light modulating device  

DOE Patents [OSTI]

In a device for transmitting light, means for controlling the transmissivity of the device, including a ceramic, reversibly electrochromic, crystalline element having a highly reflective state when injected with electrons and charge compensating ions and a highly transmissive state when the electrons and ions are removed, the crystalline element being characterized as having a reflectivity of at least 50% in the reflective state and not greater than 10% in the transmissive state, and means for modulating the crystalline element between the reflective and transmissive states by injecting ions into the crystalline element in response to an applied electrical current of a first polarity and removing the ions in response to an applied electrical current of a second polarity.

Rauh, R. David (Newton, MA); Goldner, Ronald B. (Lexington, MA)

1989-01-01T23:59:59.000Z

227

Light modulating device  

DOE Patents [OSTI]

In a device for transmitting light, means for controlling the transmissivity of the device, including a ceramic, reversibly electrochromic, crystalline element having a highly reflective state when injected with electrons and charge compensating ions and a highly transmissive state when the electrons and ions are removed, the crystalline element being characterized as having a reflectivity of at least 50% in the reflective state and not greater than 10% in the transmissive state, and means for modulating the crystalline element between the reflective and transmissive states by injecting ions into the crystalline element in response to an applied electrical current of a first polarity and removing the ions in response to an applied electrical current of a second polarity are disclosed. 1 fig.

Rauh, R.D.; Goldner, R.B.

1989-12-26T23:59:59.000Z

228

Nuclear reactor safety device  

DOE Patents [OSTI]

A safety device is disclosed for use in a nuclear reactor for axially repositioning a control rod with respect to the reactor core in the event of an upward thermal excursion. Such safety device comprises a laminated helical ribbon configured as a tube-like helical coil having contiguous helical turns with slidably abutting edges. The helical coil is disclosed as a portion of a drive member connected axially to the control rod. The laminated ribbon is formed of outer and inner laminae. The material of the outer lamina has a greater thermal coefficient of expansion than the material of the inner lamina. In the event of an upward thermal excursion, the laminated helical coil curls inwardly to a smaller diameter. Such inward curling causes the total length of the helical coil to increase by a substantial increment, so that the control rod is axially repositioned by a corresponding amount to reduce the power output of the reactor.

Hutter, Ernest (Wilmette, IL)

1986-01-01T23:59:59.000Z

229

Dielectrokinetic chromatography devices  

DOE Patents [OSTI]

Disclosed herein are methods and devices for dielectrokinetic chromatography. As disclosed, the devices comprise microchannels having at least one perturber which produces a non-uniformity in a field spanning the width of the microchannel. The interaction of the field non-uniformity with a perturber produces a secondary flow which competes with a primary flow. By decreasing the size of the perturber the secondary flow becomes significant for particles/analytes in the nanometer-size range. Depending on the nature of a particle/analyte present in the fluid and its interaction with the primary flow and the secondary flow, the analyte may be retained or redirected. The composition of the primary flow can be varied to affect the magnitude of primary and/or secondary flows on the particles/analytes and thereby separate and concentrate it from other particles/analytes.

Chirica, Gabriela S; Fiechtner, Gregory J; Singh, Anup K

2014-12-16T23:59:59.000Z

230

Regenerative braking device  

DOE Patents [OSTI]

Disclosed are several embodiments of a regenerative braking device for an automotive vehicle. The device includes a plurality of rubber rollers (24, 26) mounted for rotation between an input shaft (14) connectable to the vehicle drivetrain and an output shaft (16) which is drivingly connected to the input shaft by a variable ratio transmission (20). When the transmission ratio is such that the input shaft rotates faster than the output shaft, the rubber rollers are torsionally stressed to accumulate energy, thereby slowing the vehicle. When the transmission ratio is such that the output shaft rotates faster than the input shaft, the rubber rollers are torsionally relaxed to deliver accumulated energy, thereby accelerating or driving the vehicle.

Hoppie, Lyle O. (Birmingham, MI)

1982-01-12T23:59:59.000Z

231

Support and maneuvering device  

DOE Patents [OSTI]

A support and maneuvering device includes an elongated flexible inflatable enclosure having a fixed end and a movable end. The movable end is collapsible toward the fixed end to a contracted position when the enclosure is in a noninflated condition. Upon inflation, the movable end is movable away from the fixed end to an extended position. The movable end includes means for mounting an article such as a solar reflector thereon. The device also includes a plurality of position controlling means disposed about the movable end to effect adjusting movement of portions thereof by predetermined amounts and for controlling an angle at which the article disposed at the movable end is oriented. The plurality of position controlling means limits a suitable number degrees of freedom of the movable end for transmitting a steering motion thereto and for controlling the position thereof. 9 figs.

Wood, R.L.

1987-03-23T23:59:59.000Z

232

Microelectromechanical safe arm device  

DOE Patents [OSTI]

Microelectromechanical (MEM) apparatus and methods for operating, for preventing unintentional detonation of energetic components comprising pyrotechnic and explosive materials, such as air bag deployment systems, munitions and pyrotechnics. The MEM apparatus comprises an interrupting member that can be moved to block (interrupt) or complete (uninterrupt) an explosive train that is part of an energetic component. One or more latching members are provided that engage and prevent the movement of the interrupting member, until the one or more latching members are disengaged from the interrupting member. The MEM apparatus can be utilized as a safe and arm device (SAD) and electronic safe and arm device (ESAD) in preventing unintentional detonations. Methods for operating the MEM apparatus include independently applying drive signals to the actuators coupled to the latching members, and an actuator coupled to the interrupting member.

Roesler, Alexander W. (Tijeras, NM)

2012-06-05T23:59:59.000Z

233

Wire brush fastening device  

DOE Patents [OSTI]

A fastening device is provided which is a variation on the conventional nut and bolt. The bolt has a longitudinal axis and threading helically affixed thereon along the longitudinal axis. A nut having a bore extending therethrough is provided. The bore of the nut has a greater diameter than the diameter of the bolt so the bolt can extend through the bore. An array of wire bristles are affixed within the bore so as to form a brush. The wire bristles extend inwardly from the bore and are constructed and arranged of the correct size, length and stiffness to guide the bolt within the bore and to restrain the bolt within the bore as required. A variety of applications of the wire brush nut are disclosed, including a bolt capture device and a test rig apparatus. 13 figs.

Meigs, R.A.

1995-09-19T23:59:59.000Z

234

Residual gas analysis device  

DOE Patents [OSTI]

A system is provided for testing the hermeticity of a package, such as a microelectromechanical systems package containing a sealed gas volume, with a sampling device that has the capability to isolate the package and breach the gas seal connected to a pulse valve that can controllably transmit small volumes down to 2 nanoliters to a gas chamber for analysis using gas chromatography/mass spectroscopy diagnostics.

Thornberg, Steven M. (Peralta, NM)

2012-07-31T23:59:59.000Z

235

Biomolecular detection device  

DOE Patents [OSTI]

A device for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode.

Huo, Qisheng (Albuquerque, NM); Liu, Jun (Albuquerque, NM)

2008-10-21T23:59:59.000Z

236

Hybrid electroluminescent devices  

DOE Patents [OSTI]

A hybrid electroluminescent (EL) device comprises at least one inorganic diode element and at least one organic EL element that are electrically connected in series. The absolute value of the breakdown voltage of the inorganic diode element is greater than the absolute value of the maximum reverse bias voltage across the series. The inorganic diode element can be a power diode, a Schottky barrier diode, or a light-emitting diode.

Shiang, Joseph John (Niskayuna, NY); Duggal, Anil Raj (Niskayuna, NY); Michael, Joseph Darryl (Schenectady, NY)

2010-08-03T23:59:59.000Z

237

Plasma jet ignition device  

DOE Patents [OSTI]

An ignition device of the plasma jet type is disclosed. The device has a cylindrical cavity formed in insulating material with an electrode at one end. The other end of the cylindrical cavity is closed by a metal plate with a small orifice in the center which plate serves as a second electrode. An arc jumping between the first electrode and the orifice plate causes the formation of a highly-ionized plasma in the cavity which is ejected through the orifice into the engine cylinder area to ignite the main fuel mixture. Two improvements are disclosed to enhance the operation of the device and the length of the plasma plume. One improvement is a metal hydride ring which is inserted in the cavity next to the first electrode. During operation, the high temperature in the cavity and the highly excited nature of the plasma breaks down the metal hydride, liberating hydrogen which acts as an additional fuel to help plasma formation. A second improvement consists of a cavity insert containing a plurality of spaced, metal rings. The rings act as secondary spark gap electrodes reducing the voltage needed to maintain the initial arc in the cavity.

McIlwain, Michael E. (Franklin, MA); Grant, Jonathan F. (Wayland, MA); Golenko, Zsolt (North Reading, MA); Wittstein, Alan D. (Fairfield, CT)

1985-01-15T23:59:59.000Z

238

Thermophotovoltaic energy conversion device  

DOE Patents [OSTI]

A thermophotovoltaic device and a method for making the thermophotovoltaic device are disclosed. The device includes an n-type semiconductor material substrate having top and bottom surfaces, a tunnel junction formed on the top surface of the substrate, a region of active layers formed on top of the tunnel junction and a back surface reflector (BSR). The tunnel junction includes a layer of heavily doped n-type semiconductor material that is formed on the top surface of the substrate and a layer of heavily doped p-type semiconductor material formed on the n-type layer. An optional pseudomorphic layer can be formed between the n-type and p-type layers. A region of active layers is formed on top of the tunnel junction. This region includes a base layer of p-type semiconductor material and an emitter layer of n-type semiconductor material. An optional front surface window layer can be formed on top of the emitter layer. An optional interference filter can be formed on top of the emitter layer or the front surface window layer when it is used. 1 fig.

Charache, G.W.; Baldasaro, P.F.; Egley, J.L.

1998-05-19T23:59:59.000Z

239

Thermoelectric Materials, Devices and Systems:  

Broader source: Energy.gov (indexed) [DOE]

-DRAFT - FOR OFFICIAL USE ONLY - DRAFT Thermoelectric Materials, Devices and Systems: 1 Technology Assessment 2 Contents 3 1. Thermoelectric Generation ......

240

Improved Thermoelectric Devices: Advanced Semiconductor Materials for Thermoelectric Devices  

SciTech Connect (OSTI)

Broad Funding Opportunity Announcement Project: Phononic Devices is working to recapture waste heat and convert it into usable electric power. To do this, the company is using thermoelectric devices, which are made from advanced semiconductor materials that convert heat into electricity or actively remove heat for refrigeration and cooling purposes. Thermoelectric devices resemble computer chips, and they manage heat by manipulating the direction of electrons at the nanoscale. These devices arent new, but they are currently too inefficient and expensive for widespread use. Phononic Devices is using a high-performance, cost-effective thermoelectric design that will improve the devices efficiency and enable electronics manufacturers to more easily integrate them into their products.

None

2009-12-11T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Portable Source Identification Device  

SciTech Connect (OSTI)

U.S. Customs and Border Protection (CBP) is the primary enforcement agency protecting the nations ports of entry. CBP is enhancing its capability to interdict the illicit import of nuclear and radiological materials and devices that may be used by terrorists. Pacific Northwest National Laboratory (PNNL) is providing scientific and technical support to CBP in their goal to enable rapid deployment of nuclear and radiation detection systems at U. S. ports of entry to monitor 100% of the incoming international traffic and cargo while not adversely impacting the operations or throughput of the ports. As the deployment of radiation detection systems proceeds, there is a need to adapt the baseline radiation portal monitor (RPM) system technology to operations at these diverse ports of entry. When screening produces an alarm in the primary inspection RPM, the alarming vehicle is removed from the flow of commerce and the alarm is typically confirmed in a secondary inspection RPM. The portable source identification device (PSID) is a radiation sensor panel (RSP), based on thallium-doped sodium iodide (NaI(Tl)) scintillation detector and gamma spectroscopic analysis hardware and software, mounted on a scissor lift on a small truck. The lift supports a box containing a commercial off-the-shelf (COTS) sodium iodide detector that provides real-time isotopic identification, including neutron detectors to interdict Weapons of Mass Destruction (WMD) and radiation dispersion devices (RDD). The scissor lift will lower the detectors to within a foot off the ground and raise them to approximately 24 feet in the air, allowing a wide vertical scanning range.

Andersen, Eric S.; Samuel, Todd J.; Gervais, Kevin L.

2005-08-01T23:59:59.000Z

242

Nanotube resonator devices  

DOE Patents [OSTI]

A fully-functional radio receiver fabricated from a single nanotube is being disclosed. Simultaneously, a single nanotube can perform the functions of all major components of a radio: antenna, tunable band-pass filter, amplifier, and demodulator. A DC voltage source, as supplied by a battery, can power the radio. Using carrier waves in the commercially relevant 40-400 MHz range and both frequency and amplitude modulation techniques, successful music and voice reception has been demonstrated. Also disclosed are a radio transmitter and a mass sensor using a nanotube resonator device.

Jensen, Kenneth J; Zettl, Alexander K; Weldon, Jeffrey A

2014-05-06T23:59:59.000Z

243

Micro environmental sensing device  

DOE Patents [OSTI]

A microelectromechanical (MEM) acceleration switch is disclosed which includes a proof mass flexibly connected to a substrate, with the proof mass being moveable in a direction substantially perpendicular to the substrate in response to a sensed acceleration. An electrode on the proof mass contacts one or more electrodes located below the proof mass to provide a switch closure in response to the sensed acceleration. Electrical latching of the switch in the closed position is possible with an optional latching electrode. The MEM acceleration switch, which has applications for use as an environmental sensing device, can be fabricated using micromachining.

Polosky, Marc A. (Tijeras, NM); Lukens, Laurance L. (Tijeras, NM)

2006-05-02T23:59:59.000Z

244

Stretchable and foldable electronic devices  

DOE Patents [OSTI]

Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers. Multilayer devices are constructed to position a neutral mechanical surface coincident or proximate to a functional layer having a material that is susceptible to strain-induced failure. Neutral mechanical surfaces are positioned by one or more layers having a property that is spatially inhomogeneous, such as by patterning any of the layers of the multilayer device.

Rogers, John A; Huang, Yonggang; Ko, Heung Cho; Stoykovich, Mark; Choi, Won Mook; Song, Jizhou; Ahn, Jong Hyun; Kim, Dae Hyeong

2014-12-09T23:59:59.000Z

245

Stretchable and foldable electronic devices  

DOE Patents [OSTI]

Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers. Multilayer devices are constructed to position a neutral mechanical surface coincident or proximate to a functional layer having a material that is susceptible to strain-induced failure. Neutral mechanical surfaces are positioned by one or more layers having a property that is spatially inhomogeneous, such as by patterning any of the layers of the multilayer device.

2013-10-08T23:59:59.000Z

246

Fluid flow monitoring device  

DOE Patents [OSTI]

A flow meter and temperature measuring device are described comprising a tube with a body centered therein for restricting flow and a sleeve at the upper end of the tube to carry several channels formed longitudinally in the sleeve to the appropriate axial location where they penetrate the tube to allow pressure measurements and temperature measurements with thermocouples. The high pressure measurement is made using a channel penetrating the tube away from the body and the low pressure measurement is made at a location at the widest part of the body. An end plug seals the end of the device and holes at its upper end allow fluid to pass from the interior of the tube into a plenum. The channels are made by cutting grooves in the sleeve, the grooves widened at the surface of the sleeve and then a strip of sleeve material is welded to the grooves closing the channels. Preferably the sleeve is packed with powdered graphite before cutting the grooves and welding the strips. 7 figures.

McKay, M.D.; Sweeney, C.E.; Spangler, B.S. Jr.

1993-11-30T23:59:59.000Z

247

Fluid flow monitoring device  

DOE Patents [OSTI]

A flow meter and temperature measuring device comprising a tube with a body centered therein for restricting flow and a sleeve at the upper end of the tube to carry several channels formed longitudinally in the sleeve to the appropriate axial location where they penetrate the tube to allow pressure measurements and temperature measurements with thermocouples. The high pressure measurement is made using a channel penetrating the tube away from the body and the low pressure measurement is made at a location at the widest part of the body. An end plug seals the end of the device and holes at its upper end allow fluid to pass from the interior of the tube into a plenum. The channels are made by cutting grooves in the sleeve, the grooves widened at the surface of the sleeve and then a strip of sleeve material is welded to the grooves closing the channels. Preferably the sleeve is packed with powdered graphite before cutting the grooves and welding the strips.

McKay, Mark D. (1426 Socastee Dr., North Augusta, SC 29841); Sweeney, Chad E. (3600 Westhampton Dr., Martinez, GA 30907-3036); Spangler, Jr., B. Samuel (2715 Margate Dr., Augusta, GA 30909)

1993-01-01T23:59:59.000Z

248

Thermoplastic tape compaction device  

DOE Patents [OSTI]

A device is disclosed for bonding a thermoplastic tape to a substrate to form a fully consolidated composite. This device has an endless chain associated with a frame so as to rotate in a plane that is perpendicular to a long dimension of the tape, the chain having pivotally connected chain links with each of the links carrying a flexible foot member that extends outwardly from the chain. A selected number of the foot members contact the tape, after the heating thereof, to cause the heated tape to bond to the substrate. The foot members are each a thin band of metal oriented transversely to the chain, with a flexibility and width and length to contact the tape so as to cause the tape to conform to the substrate to achieve consolidation of the tape and the substrate. A biased leaf-type spring within the frame bears against an inner surface of the chain to provide the compliant pressure necessary to bond the tape to the substrate. The chain is supported by sprockets on shafts rotatably supported in the frame and, in one embodiment, one of the shafts has a drive unit to produce rotation such that the foot members in contact with the tape move at the same speed as the tape. Cooling jets are positioned along the frame to cool the resultant consolidated composite. 5 figures.

Campbell, V.W.

1994-12-27T23:59:59.000Z

249

Carbon based prosthetic devices  

SciTech Connect (OSTI)

This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The project objective was to evaluate the use of carbon/carbon-fiber-reinforced composites for use in endoprosthetic devices. The application of these materials for the metacarpophalangeal (MP) joints of the hand was investigated. Issues concerning mechanical properties, bone fixation, biocompatibility, and wear are discussed. A system consisting of fiber reinforced materials with a pyrolytic carbon matrix and diamond-like, carbon-coated wear surfaces was developed. Processes were developed for the chemical vapor infiltration (CVI) of pyrolytic carbon into porous fiber preforms with the ability to tailor the outer porosity of the device to provide a surface for bone in-growth. A method for coating diamond-like carbon (DLC) on the articulating surface by plasma-assisted chemical vapor deposition (CVD) was developed. Preliminary results on mechanical properties of the composite system are discussed and initial biocompatibility studies were performed.

Devlin, D.J.; Carroll, D.W.; Barbero, R.S.; Archuleta, T. [Los Alamos National Lab., NM (US); Klawitter, J.J.; Ogilvie, W.; Strzepa, P. [Ascension Orthopedics (US); Cook, S.D. [Tulane Univ., New Orleans, LA (US). School of Medicine

1998-12-31T23:59:59.000Z

250

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

251

Fuel vapor control device  

SciTech Connect (OSTI)

A fuel vapor control device is described having a valve opening and closing a passage connecting a carburetor and a charcoal canister according to a predetermined temperature. A first coil spring formed by a ''shape memory effect'' alloy is provided to urge the valve to open the passage when the temperature is high. A second coil spring urges the valve to close the passage. A solenoid is provided to urge an armature against the valve to close the passage against the force of the first coil spring when the engine is running. The solenoid heats the first coil spring to generate a spring force therein when the engine is running. When the engine is turned off, the solenoid is deactivated, and the force of the first spring overcomes the force of the second spring to open the passage until such time as the temperature of the first spring drops below the predetermined temperature.

Ota, I.; Nishimura, Y.; Nishio, S.; Yogo, K.

1987-10-20T23:59:59.000Z

252

Ceramics for fusion devices  

SciTech Connect (OSTI)

Ceramics are required for a number of applications in fusion devices, among the most critical of which are magnetic coil insulators, windows for RF heating systems, and structural uses. Radiation effects dominate consideration of candidate materials, although good pre-irradiation properties are a requisite. Materials and components can be optimized by careful control of chemical and microstructural content, and application of brittle material design and testing techniques. Future directions for research and development should include further extension of the data base in the areas of electrical, structural, and thermal properties; establishment of a fission neutron/fusion neutron correlation including transmutation gas effects; and development of new materials tailored to meet the specific needs of fusion reactors.

Clinard, F.W. Jr.

1984-01-01T23:59:59.000Z

253

False color viewing device  

DOE Patents [OSTI]

This invention consists of a viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching, the user`s eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

Kronberg, J.W.

1991-05-08T23:59:59.000Z

254

Tunable surface plasmon devices  

DOE Patents [OSTI]

A tunable extraordinary optical transmission (EOT) device wherein the tunability derives from controlled variation of the dielectric constant of a semiconducting material (semiconductor) in evanescent-field contact with a metallic array of sub-wavelength apertures. The surface plasmon resonance wavelength can be changed by changing the dielectric constant of the dielectric material. In embodiments of this invention, the dielectric material is a semiconducting material. The dielectric constant of the semiconducting material in the metal/semiconductor interfacial region is controllably adjusted by adjusting one or more of the semiconductor plasma frequency, the concentration and effective mass of free carriers, and the background high-frequency dielectric constant in the interfacial region. Thermal heating and/or voltage-gated carrier-concentration changes may be used to variably adjust the value of the semiconductor dielectric constant.

Shaner, Eric A. (Rio Rancho, NM); Wasserman, Daniel (Lowell, MA)

2011-08-30T23:59:59.000Z

255

Light emitting ceramic device  

DOE Patents [OSTI]

A light-emitting ceramic based panel, hereafter termed "electroceramescent" panel, is herein claimed. The electroceramescent panel is formed on a substrate providing mechanical support as well as serving as the base electrode for the device. One or more semiconductive ceramic layers directly overlay the substrate, and electrical conductivity and ionic diffusion are controlled. Light emitting regions overlay the semiconductive ceramic layers, and said regions consist sequentially of a layer of a ceramic insulation layer and an electroluminescent layer, comprised of doped phosphors or the equivalent. One or more conductive top electrode layers having optically transmissive areas overlay the light emitting regions, and a multi-layered top barrier cover comprising one or more optically transmissive non-combustible insulation layers overlay said top electrode regions.

Valentine, Paul; Edwards, Doreen D.; Walker, Jr., William John; Slack, Lyle H.; Brown, Wayne Douglas; Osborne, Cathy; Norton, Michael; Begley, Richard

2010-05-18T23:59:59.000Z

256

Nuclear reactor safety device  

DOE Patents [OSTI]

A safety device is described for use in a nuclear reactor for axially repositioning a control rod with respect to the reactor core in the event of a thermal excursion. It comprises a laminated strip helically configured to form a tube, said tube being in operative relation to said control rod. The laminated strip is formed of at least two materials having different thermal coefficients of expansion, and is helically configured such that the material forming the outer lamina of the tube has a greater thermal coefficient of expansion than the material forming the inner lamina of said tube. In the event of a thermal excursion the laminated strip will tend to curl inwardly so that said tube will increase in length, whereby as said tube increases in length it exerts a force on said control rod to axially reposition said control rod with respect to said core.

Hutter, E.

1983-08-15T23:59:59.000Z

257

Capillary interconnect device  

DOE Patents [OSTI]

A manifold for connecting external capillaries to the inlet and/or outlet ports of a microfluidic device for high pressure applications is provided. The fluid connector for coupling at least one fluid conduit to a corresponding port of a substrate that includes: (i) a manifold comprising one or more channels extending therethrough wherein each channel is at least partially threaded, (ii) one or more threaded ferrules each defining a bore extending therethrough with each ferrule supporting a fluid conduit wherein each ferrule is threaded into a channel of the manifold, (iii) a substrate having one or more ports on its upper surface wherein the substrate is positioned below the manifold so that the one or more ports is aligned with the one or more channels of the manifold, and (iv) means for applying an axial compressive force to the substrate to couple the one or more ports of the substrate to a corresponding proximal end of a fluid conduit.

Renzi, Ronald F. (Tracy, CA)

2007-12-25T23:59:59.000Z

258

False color viewing device  

DOE Patents [OSTI]

A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

Kronberg, James W. (108 Independent Blvd., Aiken, SC 29801)

1992-01-01T23:59:59.000Z

259

False color viewing device  

DOE Patents [OSTI]

A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage. 7 figs.

Kronberg, J.W.

1992-10-20T23:59:59.000Z

260

Electrical safety device  

DOE Patents [OSTI]

An electrical safety device for use in power tools that is designed to automatically discontinue operation of the power tool upon physical contact of the tool with a concealed conductive material. A step down transformer is used to supply the operating power for a disconnect relay and a reset relay. When physical contact is made between the power tool and the conductive material, an electrical circuit through the disconnect relay is completed and the operation of the power tool is automatically interrupted. Once the contact between the tool and conductive material is broken, the power tool can be quickly and easily reactivated by a reset push button activating the reset relay. A remote reset is provided for convenience and efficiency of operation.

White, David B. (Greenock, PA)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Air bag restraint device  

DOE Patents [OSTI]

A rear-seat air bag restraint device is disclosed that prevents an individual, or individuals, from continuing violent actions while being transported in a patrol vehicle`s rear seat without requiring immediate physical contact by the law enforcement officer. The air bag is activated by a control switch in the front seat and inflates to independently restrict the amount of physical activity occurring in the rear seat of the vehicle while allowing the officer to safely stop the vehicle. The air bag can also provide the officer additional time to get backup personnel to aid him if the situation warrants it. The bag is inflated and maintains a constant pressure by an air pump. 8 figs.

Marts, D.J.; Richardson, J.G.

1995-10-17T23:59:59.000Z

262

190 IEEE TRANSACTIONS ON PLASMA SCIENCE, VOL. 30, NO. 1, FEBRUARY 2002 Gap Closure in a Cold Metal Halide Lamp  

E-Print Network [OSTI]

lamp has been investigated using a two-dimensional, plasma transport model. Im- ages are presented- charge devices, lighting, plasma applications. METAL halide high-intensity-discharge (HID) lamps op- erate as high-pressure thermal arcs [1]. The cold fills of HID lamps are typically 50­100 torr of a rare

Kushner, Mark

263

Microbiopsy/precision cutting devices  

DOE Patents [OSTI]

Devices are disclosed for performing tissue biopsy on a small scale (microbiopsy). By reducing the size of the biopsy tool and removing only a small amount of tissue or other material in a minimally invasive manner, the risks, costs, injury and patient discomfort associated with traditional biopsy procedures can be reduced. By using micromachining and precision machining capabilities, it is possible to fabricate small biopsy/cutting devices from silicon. These devices can be used in one of four ways (1) intravascularly, (2) extravascularly, (3) by vessel puncture, and (4) externally. Additionally, the devices may be used in precision surgical cutting. 6 figs.

Krulevitch, P.A.; Lee, A.P.; Northrup, M.A.; Benett, W.J.

1999-07-27T23:59:59.000Z

264

Microbiopsy/precision cutting devices  

DOE Patents [OSTI]

Devices for performing tissue biopsy on a small scale (microbiopsy). By reducing the size of the biopsy tool and removing only a small amount of tissue or other material in a minimally invasive manner, the risks, costs, injury and patient discomfort associated with traditional biopsy procedures can be reduced. By using micromachining and precision machining capabilities, it is possible to fabricate small biopsy/cutting devices from silicon. These devices can be used in one of four ways 1) intravascularly, 2) extravascularly, 3) by vessel puncture, and 4) externally. Additionally, the devices may be used in precision surgical cutting.

Krulevitch, Peter A. (Pleasanton, CA); Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Benett, William J. (Livermore, CA)

1999-01-01T23:59:59.000Z

265

Automated control of microfluidics devices.  

E-Print Network [OSTI]

??In order for microfluidics devices to be marketable, they must be inexpensive and easy to use. Two projects were pursued in this study for this (more)

Gerstel, Ian.

2010-01-01T23:59:59.000Z

266

Structured wafer for device processing  

SciTech Connect (OSTI)

A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

Okandan, Murat; Nielson, Gregory N

2014-11-25T23:59:59.000Z

267

Temperature differential detection device  

DOE Patents [OSTI]

A temperature differential detection device for detecting the temperature differential between predetermined portions of a container wall is disclosed as comprising a Wheatstone bridge circuit for detecting resistance imbalance with a first circuit branch having a first elongated wire element mounted in thermal contact with a predetermined portion of the container wall, a second circuit branch having a second elongated wire element mounted in thermal contact with a second predetermined portion of a container wall with the wire elements having a predetermined temperature-resistant coefficient, an indicator interconnected between the first and second branches remote from the container wall for detecting and indicating resistance imbalance between the first and second wire elements, and connector leads for electrically connecting the wire elements to the remote indicator in order to maintain the respective resistance value relationship between the first and second wire elements. The indicator is calibrated to indicate the detected resistance imbalance in terms of a temperature differential between the first and second wall portions. 2 figs.

Girling, P.M.

1986-04-22T23:59:59.000Z

268

Mobile Device Policy & Program Considerations  

E-Print Network [OSTI]

Page 1 Mobile Device Policy & Program Considerations To BYOD or not to BYOD (bring to manage the use of mobile devices within their corporate resources. Every business will naturally have different mobility requirements, and developing a policy in the first place, let alone an appropriate policy

Fisher, Kathleen

269

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

270

Automatic Mechetronic Wheel Light Device  

DOE Patents [OSTI]

A wheel lighting device for illuminating a wheel of a vehicle to increase safety and enhance aesthetics. The device produces the appearance of a "ring of light" on a vehicle's wheels as the vehicle moves. The "ring of light" can automatically change in color and/or brightness according to a vehicle's speed, acceleration, jerk, selection of transmission gears, and/or engine speed. The device provides auxiliary indicator lights by producing light in conjunction with a vehicle's turn signals, hazard lights, alarm systems, and etc. The device comprises a combination of mechanical and electronic components and can be placed on the outer or inner surface of a wheel or made integral to a wheel or wheel cover. The device can be configured for all vehicle types, and is electrically powered by a vehicle's electrical system and/or battery.

Khan, Mohammed John Fitzgerald (Silver Spring, MD)

2004-09-14T23:59:59.000Z

271

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

272

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

273

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

274

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

275

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

276

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

277

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

278

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

279

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

280

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

282

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

283

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

284

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

285

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

286

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Universit de

287

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

288

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

289

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

290

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

291

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

292

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

293

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

294

Split ring containment attachment device  

DOE Patents [OSTI]

A containment attachment device 10 for operatively connecting a glovebag 200 to plastic sheeting 100 covering hazardous material. The device 10 includes an inner split ring member 20 connected on one end 22 to a middle ring member 30 wherein the free end 21 of the split ring member 20 is inserted through a slit 101 in the plastic sheeting 100 to captively engage a generally circular portion of the plastic sheeting 100. A collar potion 41 having an outer ring portion 42 is provided with fastening means 51 for securing the device 10 together wherein the glovebag 200 is operatively connected to the collar portion 41.

Sammel, Alfred G. (Pittsburgh, PA)

1996-01-01T23:59:59.000Z

295

Optical and optoelectronic fiber devices  

E-Print Network [OSTI]

The ability to integrate materials with disparate electrical, thermal, and optical properties into a single fiber structure enabled the realization of fiber devices with diverse and complex functionalities. Amongst those, ...

Shapira, Ofer, Ph. D. Massachusetts Institute of Technology

2007-01-01T23:59:59.000Z

296

Polymer electronic devices and materials.  

SciTech Connect (OSTI)

Polymer electronic devices and materials have vast potential for future microsystems and could have many advantages over conventional inorganic semiconductor based systems, including ease of manufacturing, cost, weight, flexibility, and the ability to integrate a wide variety of functions on a single platform. Starting materials and substrates are relatively inexpensive and amenable to mass manufacturing methods. This project attempted to plant the seeds for a new core competency in polymer electronics at Sandia National Laboratories. As part of this effort a wide variety of polymer components and devices, ranging from simple resistors to infrared sensitive devices, were fabricated and characterized. Ink jet printing capabilities were established. In addition to promising results on prototype devices the project highlighted the directions where future investments must be made to establish a viable polymer electronics competency.

Schubert, William Kent; Baca, Paul Martin; Dirk, Shawn M.; Anderson, G. Ronald; Wheeler, David Roger

2006-01-01T23:59:59.000Z

297

Personal cooling air filtering device  

DOE Patents [OSTI]

A temperature modification system for modifying the temperature of fluids includes at least one thermally conductive carbon foam element, the carbon foam element having at least one flow channel for the passage of fluids. At least one temperature modification device is provided, the temperature modification device thermally connected to the carbon foam element and adapted to modify the temperature of the carbon foam to modify the temperature of fluids flowing through the flow channels. Thermoelectric and/or thermoionic elements can preferably be used as the temperature modification device. A method for the reversible temperature modification of fluids includes the steps of providing a temperature modification system including at least one thermally conductive carbon foam element having flow channels and at least one temperature modification device, and flowing a fluid through the flow channels.

Klett, James (Knoxville, TN); Conway, Bret (Denver, NC)

2002-08-13T23:59:59.000Z

298

Devices for collecting chemical compounds  

DOE Patents [OSTI]

A device for sampling chemical compounds from fixed surfaces and related methods are disclosed. The device may include a vacuum source, a chamber and a sorbent material. The device may utilize vacuum extraction to volatilize the chemical compounds from a fixed surface so that they may be sorbed by the sorbent material. The sorbent material may then be analyzed using conventional thermal desorption/gas chromatography/mass spectrometry (TD/GC/MS) instrumentation to determine presence of the chemical compounds. The methods may include detecting release and presence of one or more chemical compounds and determining the efficacy of decontamination. The device may be useful in collection and analysis of a variety of chemical compounds, such as residual chemical warfare agents, chemical attribution signatures and toxic industrial chemicals.

Scott, Jill R; Groenewold, Gary S

2013-12-24T23:59:59.000Z

299

Device-transparent personal storage  

E-Print Network [OSTI]

Users increasingly store data collections such as digital photographs on multiple personal devices, each of which typically presents the user with a storage management interface isolated from the contents of all other ...

Strauss, Jacob A. (Jacob Alo), 1979-

2010-01-01T23:59:59.000Z

300

Piezo-phototronic effect devices  

DOE Patents [OSTI]

A semiconducting device includes a piezoelectric structure that has a first end and an opposite second end. A first conductor is in electrical communication with the first end and a second conductor is in electrical communication with the second end so as to form an interface therebetween. A force applying structure is configured to maintain an amount of strain in the piezoelectric member sufficient to generate a desired electrical characteristic in the semiconducting device.

Wang, Zhong L.; Yang, Qing

2013-09-10T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Lih thermal energy storage device  

DOE Patents [OSTI]

A thermal energy storage device for use in a pulsed power supply to store waste heat produced in a high-power burst operation utilizes lithium hydride as the phase change thermal energy storage material. The device includes an outer container encapsulating the lithium hydride and an inner container supporting a hydrogen sorbing sponge material such as activated carbon. The inner container is in communication with the interior of the outer container to receive hydrogen dissociated from the lithium hydride at elevated temperatures.

Olszewski, Mitchell (Knoxville, TN); Morris, David G. (Knoxville, TN)

1994-01-01T23:59:59.000Z

302

Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture  

DOE Patents [OSTI]

Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

McCown, Steven H. (Rigby, ID); Derr, Kurt W. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID)

2012-05-08T23:59:59.000Z

303

"Develop enabling optoelectronic devices for broadband  

E-Print Network [OSTI]

"Develop enabling optoelectronic devices for broadband communications and photonic systems Group Our group focuses on optoelectronic devices and photonic integrated circuits to photodiodes with the highest linearity and output power to date. High-Speed Optoelectronic Devices Driven

Acton, Scott

304

SLAC All Access: Vacuum Microwave Device Department  

ScienceCinema (OSTI)

The Vacuum Microwave Device Department (VMDD) builds the devices that make SLAC's particle accelerators go. These devices, called klystrons, generate intense waves of microwave energy that rocket subatomic particles up to nearly the speed of light.

Haase, Andy

2014-06-13T23:59:59.000Z

305

MDCF Tutorial Device Interface and App Development  

E-Print Network [OSTI]

-generated Device Interface (ICE Device Model) Vision: IDE for Driver Development & Validation Vision: IntegratedMDCF Tutorial Device Interface and App Development Acknowledgements: Funding provided by US National Science Foundation awards 0734204, 0930647 Clinical documentation and hardware provided by CIMIT

Huth, Michael

306

DISSERTATION DEVICE CHARACTERIZATION OF CADMIUM TELLURIDE PHOTOVOLTAICS  

E-Print Network [OSTI]

DISSERTATION DEVICE CHARACTERIZATION OF CADMIUM TELLURIDE PHOTOVOLTAICS Submitted by Russell M Reserved #12;ABSTRACT DEVICE CHARACTERIZATION OF CADMIUM TELLURIDE PHOTOVOLTAICS Thin-film photovoltaics

Sites, James R.

307

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

308

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

309

Semiconductor-based, large-area, flexible, electronic devices  

SciTech Connect (OSTI)

Novel articles and methods to fabricate the same resulting in flexible, large-area, triaxially textured, single-crystal or single-crystal-like, semiconductor-based, electronic devices are disclosed. Potential applications of resulting articles are in areas of photovoltaic devices, flat-panel displays, thermophotovoltaic devices, ferroelectric devices, light emitting diode devices, computer hard disc drive devices, magnetoresistance based devices, photoluminescence based devices, non-volatile memory devices, dielectric devices, thermoelectric devices and quantum dot laser devices.

Goyal, Amit (Knoxville, TN)

2011-03-15T23:59:59.000Z

310

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

311

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

312

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

313

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

314

Aerosol can waste disposal device  

DOE Patents [OSTI]

Disclosed is a device for removing gases and liquid from containers. The device punctures the bottom of a container for purposes of exhausting gases and liquid from the container without their escaping into the atmosphere. The device includes an inner cup or cylinder having a top portion with an open end for receiving a container and a bottom portion which may be fastened to a disposal or waste container in a substantially leak-proof manner. A piercing device is mounted in the lower portion of the inner cylinder for puncturing the can bottom placed in the inner cylinder. An outer cylinder having an open end and a closed end fits over the top portion of the inner cylinder in telescoping engagement. A force exerted on the closed end of the outer cylinder urges the bottom of a can in the inner cylinder into engagement with the piercing device in the bottom of the inner cylinder to form an opening in the can bottom, thereby permitting the contents of the can to enter the disposal container. 7 figures.

O'Brien, M.D.; Klapperick, R.L.; Bell, C.

1993-12-21T23:59:59.000Z

315

Radiation-tolerant imaging device  

DOE Patents [OSTI]

A barrier at a uniform depth for an entire wafer is used to produce imaging devices less susceptible to noise pulses produced by the passage of ionizing radiation. The barrier prevents charge created in the bulk silicon of a CCD detector or a semiconductor logic or memory device from entering the collection volume of each pixel in the imaging device. The charge barrier is a physical barrier, a potential barrier, or a combination of both. The physical barrier is formed by an SiO{sub 2} insulator. The potential barrier is formed by increasing the concentration of majority carriers (holes) to combine with the electron`s generated by the ionizing radiation. A manufacturer of CCD imaging devices can produce radiation-tolerant devices by merely changing the wafer type fed into his process stream from a standard wafer to one possessing a barrier beneath its surface, thus introducing a very small added cost to his production cost. An effective barrier type is an SiO{sub 2} layer. 7 figs.

Colella, N.J.; Kimbrough, J.R.

1996-11-19T23:59:59.000Z

316

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

317

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

318

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

319

Bad data packet capture device  

DOE Patents [OSTI]

An apparatus and method for capturing data packets for analysis on a network computing system includes a sending node and a receiving node connected by a bi-directional communication link. The sending node sends a data transmission to the receiving node on the bi-directional communication link, and the receiving node receives the data transmission and verifies the data transmission to determine valid data and invalid data and verify retransmissions of invalid data as corresponding valid data. A memory device communicates with the receiving node for storing the invalid data and the corresponding valid data. A computing node communicates with the memory device and receives and performs an analysis of the invalid data and the corresponding valid data received from the memory device.

Chen, Dong; Gara, Alan; Heidelberger, Philip; Vranas, Pavlos

2010-04-20T23:59:59.000Z

320

Microelectroporation device for genomic screening  

DOE Patents [OSTI]

We have developed an microelectroporation device that combines microarrays of oligonucleotides, microfluidic channels, and electroporation for cell transfection and high-throughput screening applications (e.g. RNA interference screens). Microarrays allow the deposition of thousands of different oligonucleotides in microscopic spots. Microfluidic channels and microwells enable efficient loading of cells into the device and prevent cross-contamination between different oligonucleotides spots. Electroporation allows optimal transfection of nucleic acids into cells (especially hard-to-transfect cells such as primary cells) by minimizing cell death while maximizing transfection efficiency. This invention has the advantage of a higher throughput and lower cost, while preventing cross-contamination compared to conventional screening technologies. Moreover, this device does not require bulky robotic liquid handling equipment and is inherently safer given that it is a closed system.

Perroud, Thomas D.; Renzi, Ronald F.; Negrete, Oscar; Claudnic, Mark R.

2014-09-09T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Device Independent Random Number Generation  

E-Print Network [OSTI]

Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide randomness certified by classical statistical tests -- Device Independent Quantum Random Number Generators. In this paper we review the most relevant results in this field, which allow the production of almost perfect randomness with help of quantum devices, supplemented with an arbitrary weak source of additional randomness. This is in fact the best one could hope for to achieve, as with no starting randomness (corresponding to no free will in a different concept) even a quantum world would have a fully deterministic description.

Mataj Pivoluska; Martin Plesch

2015-02-23T23:59:59.000Z

322

Metamaterials for terahertz polarimetric devices  

SciTech Connect (OSTI)

We present experimental and numerical investigations of planar terahertz metamaterial structures designed to interact with the state of polarization. The dependence of metamaterial resonances on polarization results in unique amplitude and phase characteristics of the terahertz transmission, providing the basis for polarimetric terahertz devices. We highlight some potential applications for polarimetric devices and present simulations of a terahertz quarter-wave plate and a polarizing terahertz beam splitter. Although this work was performed at terahertz frequencies, it may find applications in other frequency ranges as well.

O'hara, John F [Los Alamos National Laboratory; Taylor, Antoinette J [Los Alamos National Laboratory; Smirnova, Evgenya [Los Alamos National Laboratory; Azad, Abul [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

323

Beta ray flux measuring device  

DOE Patents [OSTI]

A beta ray flux measuring device in an activated member in-core instrumentation system for pressurized water reactors. The device includes collector rings positioned about an axis in the reactor's pressure boundary. Activated members such as hydroballs are positioned within respective ones of the collector rings. A response characteristic such as the current from or charge on a collector ring indicates the beta ray flux from the corresponding hydroball and is therefore a measure of the relative nuclear power level in the region of the reactor core corresponding to the specific exposed hydroball within the collector ring.

Impink, Jr., Albert J. (Murrysville, PA); Goldstein, Norman P. (Murrysville, PA)

1990-01-01T23:59:59.000Z

324

Surface-micromachined microfluidic devices  

DOE Patents [OSTI]

Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators.

Galambos, Paul C. (Albuquerque, NM); Okandan, Murat (Albuquerque, NM); Montague, Stephen (Albuquerque, NM); Smith, James H. (Redmond, WA); Paul, Phillip H. (Livermore, CA); Krygowski, Thomas W. (Cortlandt Manor, NY); Allen, James J. (Albuquerque, NM); Nichols, Christopher A. (Hauppauge, NY); Jakubczak, II, Jerome F. (Rio Rancho, NM)

2003-01-01T23:59:59.000Z

325

Inertial impaction air sampling device  

DOE Patents [OSTI]

An inertial impactor is designed which is to be used in an air sampling device for collection of respirable size particles in ambient air. The device may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry. 3 figs.

Dewhurst, K.H.

1990-05-22T23:59:59.000Z

326

Gas sensing with acoustic devices  

SciTech Connect (OSTI)

A survey is made of acoustic devices that are suitable as gas and vapor sensors. This survey focuses on attributes such as operating frequency, mass sensitivity, quality factor (Q), and their ability to be fabricated on a semiconductor substrate to allow integration with electronic circuitry. The treatment of the device surface with chemically-sensitive films to detect species of interest is discussed. Strategies for improving discrimination are described, including sensor arrays and species concentration and separation schemes. The advantages and disadvantages of integrating sensors with microelectronics are considered, along with the effect on sensitivity of scaling acoustic gas sensors to smaller size.

Martin, S.J.; Frye, G.C. [Sandia National Labs., Albuquerque, NM (United States); Spates, J.J. [Ktech Corp., Albuquerque, NM (United States); Butler, M.A. [Sandia National Labs., Albuquerque, NM (United States)

1996-12-31T23:59:59.000Z

327

Implantable biomedical devices on bioresorbable substrates  

DOE Patents [OSTI]

Provided herein are implantable biomedical devices, methods of administering implantable biomedical devices, methods of making implantable biomedical devices, and methods of using implantable biomedical devices to actuate a target tissue or sense a parameter associated with the target tissue in a biological environment. Each implantable biomedical device comprises a bioresorbable substrate, an electronic device having a plurality of inorganic semiconductor components supported by the bioresorbable substrate, and a barrier layer encapsulating at least a portion of the inorganic semiconductor components. Upon contact with a biological environment the bioresorbable substrate is at least partially resorbed, thereby establishing conformal contact between the implantable biomedical device and the target tissue in the biological environment.

Rogers, John A; Kim, Dae-Hyeong; Omenetto, Fiorenzo; Kaplan, David L; Litt, Brian; Viventi, Jonathan; Huang, Yonggang; Amsden, Jason

2014-03-04T23:59:59.000Z

328

Encapsulation methods for organic electrical devices  

DOE Patents [OSTI]

The disclosure provides methods and materials suitable for use as encapsulation barriers in electronic devices. In one embodiment, for example, there is provided an electroluminescent device or other electronic device encapsulated by alternating layers of a silicon-containing bonding material and a ceramic material. The encapsulation methods provide, for example, electronic devices with increased stability and shelf-life. The invention is useful, for example, in the field of microelectronic devices.

Blum, Yigal D.; Chu, William Siu-Keung; MacQueen, David Brent; Shi, Yijian

2013-06-18T23:59:59.000Z

329

Mechanical scriber for semiconductor devices  

DOE Patents [OSTI]

A mechanical scriber using a scribing tip, such as a diamond, provides controlled scriber forces with a spring-loaded compound lever arrangement. The scribing force and range of scribing depth are adjusted by a pair of adjustable micrometer heads. A semiconductor device, such as a multilayer solar cell, can be formed into scribed strips at each layer.

Lin, Peter T. (East Brunswick, NJ)

1985-01-01T23:59:59.000Z

330

Mechanical scriber for semiconductor devices  

DOE Patents [OSTI]

A mechanical scriber using a scribing tip, such as a diamond, provides controlled scriber forces with a spring-loaded compound lever arrangement. The scribing force and range of scribing depth are adjusted by a pair of adjustable micrometer heads. A semiconductor device, such as a multilayer solar cell, can be formed into scribed strips at each layer. 5 figs.

Lin, P.T.

1985-03-05T23:59:59.000Z

331

Surface-Micromachined Microfluidic Devices  

DOE Patents [OSTI]

Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators. Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators.

Galambos, Paul C. (Albuquerque, NM); Okandan, Murat (Albuquerque, NM); Montague, Stephen (Albuquerque, NM); Smith, James H. (Redmond, WA); Paul, Phillip H. (Livermore, CA); Krygowski, Thomas W. (Coutlandt Manor, NY); Allen, James J. (Albuquerque, NM); Nichols, Christopher A. (Hauppauge, NY); Jakubczak, II, Jerome F. (Rio Rancho, NM)

2004-09-28T23:59:59.000Z

332

High performance thermoelectric nanocomposite device  

DOE Patents [OSTI]

A thermoelectric device includes a nanocomposite material with nanowires of at least one thermoelectric material having a predetermined figure of merit, the nanowires being formed in a porous substrate having a low thermal conductivity and having an average pore diameter ranging from about 4 nm to about 300 nm.

Yang, Jihui (Lakeshore, CA); Snyder, Dexter D. (Birmingham, MI)

2011-10-25T23:59:59.000Z

333

Interdigitated photovoltaic power conversion device  

DOE Patents [OSTI]

A photovoltaic power conversion device has a top surface adapted to receive impinging radiation. The device includes at least two adjacent, serially connected cells. Each cell includes a semi-insulating substrate and a lateral conductivity layer of a first doped electrical conductivity disposed on the substrate. A base layer is disposed on the lateral conductivity layer and has the same electrical charge conductivity thereof. An emitter layer of a second doped electrical conductivity of opposite electrical charge is disposed on the base layer and forms a p-n junction therebetween. A plurality of spaced channels are formed in the emitter and base layers to expose the lateral conductivity layer at the bottoms thereof. A front contact grid is positioned on the top surface of the emitter layer of each cell. A first current collector is positioned along one outside edge of at least one first cell. A back contact grid is positioned in the channels at the top surface of the device for engagement with the lateral conductivity layer. A second current collector is positioned along at least one outside edge of at least one oppositely disposed second cell. Finally, an interdigitation mechanism is provided for serially connecting the front contact grid of one cell to the back contact grid of an adjacent cell at the top surface of the device.

Ward, James Scott (Englewood, CO); Wanlass, Mark Woodbury (Golden, CO); Gessert, Timothy Arthur (Conifer, CO)

1999-01-01T23:59:59.000Z

334

In situ biofilm coupon device  

DOE Patents [OSTI]

An apparatus is disclosed for characterization of in-situ microbial biofilm populations in subsurface groundwater. The device permits biofilm-forming microorganisms to adhere to packing material while emplaced in a groundwater strata, so that the packing material can be later analyzed for quantity and type of microorganisms, growth rate, and nutrient requirements. 3 figs.

Peyton, B.M.; Truex, M.J.

1997-06-24T23:59:59.000Z

335

Interdigitated photovoltaic power conversion device  

DOE Patents [OSTI]

A photovoltaic power conversion device has a top surface adapted to receive impinging radiation. The device includes at least two adjacent, serially connected cells. Each cell includes a semi-insulating substrate and a lateral conductivity layer of a first doped electrical conductivity disposed on the substrate. A base layer is disposed on the lateral conductivity layer and has the same electrical charge conductivity thereof. An emitter layer of a second doped electrical conductivity of opposite electrical charge is disposed on the base layer and forms a p-n junction therebetween. A plurality of spaced channels are formed in the emitter and base layers to expose the lateral conductivity layer at the bottoms thereof. A front contact grid is positioned on the top surface of the emitter layer of each cell. A first current collector is positioned along one outside edge of at least one first cell. A back contact grid is positioned in the channels at the top surface of the device for engagement with the lateral conductivity layer. A second current collector is positioned along at least one outside edge of at least one oppositely disposed second cell. Finally, an interdigitation mechanism is provided for serially connecting the front contact grid of one cell to the back contact grid of an adjacent cell at the top surface of the device. 15 figs.

Ward, J.S.; Wanlass, M.W.; Gessert, T.A.

1999-04-27T23:59:59.000Z

336

Aerosol can waste disposal device  

DOE Patents [OSTI]

Disclosed is a device for removing gases and liquid from containers. The ice punctures the bottom of a container for purposes of exhausting gases and liquid from the container without their escaping into the atmosphere. The device includes an inner cup or cylinder having a top portion with an open end for receiving a container and a bottom portion which may be fastened to a disposal or waste container in a substantially leak-proof manner. A piercing device is mounted in the lower portion of the inner cylinder for puncturing the can bottom placed in the inner cylinder. An outer cylinder having an open end and a closed end fits over the top portion of the inner cylinder in telescoping engagement. A force exerted on the closed end of the outer cylinder urges the bottom of a can in the inner cylinder into engagement with the piercing device in the bottom of the inner cylinder to form an opening in the can bottom, thereby permitting the contents of the can to enter the disposal container.

O'Brien, Michael D. (Las Vegas, NV); Klapperick, Robert L. (Las Vegas, NV); Bell, Chris (Las Vegas, NV)

1993-01-01T23:59:59.000Z

337

Evaluation of Miscellaneous and Electronic Device Energy Use in Hospitals  

E-Print Network [OSTI]

of Devices Device Category Infusion Pump Sphygmomanometer,Fixed Sphygmomanometer, Portable Pulse Oximeters, Portable

Black, Douglas R.

2014-01-01T23:59:59.000Z

338

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

339

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

1998-08-01T23:59:59.000Z

340

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress  

E-Print Network [OSTI]

ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

2009-02-19T23:59:59.000Z

342

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

343

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

344

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

345

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

346

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

347

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

348

Recombination device for storage batteries  

DOE Patents [OSTI]

A recombination device including a gas-tight enclosure connected to receive the discharge gases from a rechargeable storage battery. Catalytic material for the recombination of hydrogen and oxygen to form water is supported within the enclosure. The enclosure is sealed from the atmosphere by a liquid seal including two vertical chambers interconnected with an inverted U-shaped overflow tube. The first chamber is connected at its upper portion to the enclosure and the second chamber communicates at its upper portion with the atmosphere. If the pressure within the enclosure differs as overpressure or vacuum by more than the liquid level, the liquid is forced into one of the two chambers and the overpressure is vented or the vacuum is relieved. The recombination device also includes means for returning recombined liquid to the battery and for absorbing metal hydrides.

Kraft, H.; Ledjeff, K.

1984-01-01T23:59:59.000Z

349

Recombination device for storage batteries  

DOE Patents [OSTI]

A recombination device including a gas-tight enclosure connected to receive he discharge gases from a rechargeable storage battery. Catalytic material for the recombination of hydrogen and oxygen to form water is supported within the enclosure. The enclosure is sealed from the atmosphere by a liquid seal including two vertical chambers interconnected with an inverted U-shaped overflow tube. The first chamber is connected at its upper portion to the enclosure and the second chamber communicates at its upper portion with the atmosphere. If the pressure within the enclosure differs as overpressure or vacuum by more than the liquid level, the liquid is forced into one of the two chambers and the overpressure is vented or the vacuum is relieved. The recombination device also includes means for returning recombined liquid to the battery and for absorbing metal hydrides.

Kraft, Helmut (Liederbach, DE); Ledjeff, Konstantin (Bad Krozingen, DE)

1985-01-01T23:59:59.000Z

350

Variable ratio regenerative braking device  

DOE Patents [OSTI]

Disclosed is a regenerative braking device (10) for an automotive vehicle. The device includes an energy storage assembly (12) having a plurality of rubber rollers (26, 28) mounted for rotation between an input shaft (36) and an output shaft (42), clutches (38, 46) and brakes (40, 48) associated with each shaft, and a continuously variable transmission (22) connectable to a vehicle drivetrain and to the input and output shafts by the respective clutches. The rubber rollers are torsionally stressed to accumulate energy from the vehicle when the input shaft is clutched to the transmission while the brake on the output shaft is applied, and are torsionally relaxed to deliver energy to the vehicle when the output shaft is clutched to the transmission while the brake on the input shaft is applied. The transmission ratio is varied to control the rate of energy accumulation and delivery for a given rotational speed of the vehicle drivetrain.

Hoppie, Lyle O. (Birmingham, MI)

1981-12-15T23:59:59.000Z

351

Neutron-absorber release device  

DOE Patents [OSTI]

A resettable device is provided for supporting an object, sensing when an environment reaches a critical temperature and releasing the object when the critical temperature is reached. It includes a flexible container having a material inside with a melting point at the critical temperature. The object's weight is supported by the solid material which gives rigidity to the container until the critical temperature is reached at which point the material in the container melts. The flexible container with the now fluid material inside has insufficient strength to support the object which is thereby released. Biasing means forces the container back to its original shape so that when the temperature falls below the melting temperature the material again solidifies, and the object may again be supported by the device.

VAN Erp, Jan B. (Hinsdale, IL); Kimont, Edward L. (Evergreen Park, IL)

1976-01-01T23:59:59.000Z

352

Nanowire structures and electrical devices  

DOE Patents [OSTI]

The present invention provides structures and devices comprising conductive segments and conductance constricting segments of a nanowire, such as metallic, superconducting or semiconducting nanowire. The present invention provides structures and devices comprising conductive nanowire segments and conductance constricting nanowire segments having accurately selected phases including crystalline and amorphous states, compositions, morphologies and physical dimensions, including selected cross sectional dimensions, shapes and lengths along the length of a nanowire. Further, the present invention provides methods of processing nanowires capable of patterning a nanowire to form a plurality of conductance constricting segments having selected positions along the length of a nanowire, including conductance constricting segments having reduced cross sectional dimensions and conductance constricting segments comprising one or more insulating materials such as metal oxides.

Bezryadin, Alexey (Champaign, IL); Remeika, Mikas (Urbana, IL)

2010-07-06T23:59:59.000Z

353

Encapsulant materials and associated devices  

DOE Patents [OSTI]

Compositions suitable for use as encapsulants are described. The inventive compositions include a high molecular weight polymeric material, a curing agent, an inorganic compound, and a coupling agent. Optional elements include adhesion promoting agents, colorants, antioxidants, and UV absorbers. The compositions have desirable diffusivity properties, making them suitable for use in devices in which a substantial blocking of moisture ingress is desired, such as photovoltaic (PV) modules.

Kempe, Michael D (Littleton, CO); Thapa, Prem (Lima, OH)

2012-05-22T23:59:59.000Z

354

Encapsulant materials and associated devices  

DOE Patents [OSTI]

Compositions suitable for use as encapsulants are described. The inventive compositions include a high molecular weight polymeric material, a curing agent, an inorganic compound, and a coupling agent. Optional elements include adhesion promoting agents, colorants, antioxidants, and UV absorbers. The compositions have desirable diffusivity properties, making them suitable for use in devices in which a substantial blocking of moisture ingress is desired, such as photovoltaic (PV) modules.

Kempe, Michael D (Littleton, CO); Thapa, Prem (Lima, OH)

2011-03-08T23:59:59.000Z

355

Infrared emitting device and method  

DOE Patents [OSTI]

An infrared emitting device and method. The infrared emitting device comprises a III-V compound semiconductor substrate upon which are grown a quantum-well active region having a plurality of quantum-well layers formed of a ternary alloy comprising InAsSb sandwiched between barrier layers formed of a ternary alloy having a smaller lattice constant and a larger energy bandgap than the quantum-well layers. The quantum-well layers are preferably compressively strained to increase the threshold energy for Auger recombination; and a method is provided for determining the preferred thickness for the quantum-well layers. Embodiments of the present invention are described having at least one cladding layer to increase the optical and carrier confinement in the active region, and to provide for waveguiding of the light generated within the active region. Examples have been set forth showing embodiments of the present invention as surface- and edge-emitting light emitting diodes (LEDs), an optically-pumped semiconductor laser, and an electrically-injected semiconductor diode laser. The light emission from each of the infrared emitting devices of the present invention is in the midwave infrared region of the spectrum from about 2 to 6 microns.

Kurtz, Steven R. (Albuquerque, NM); Biefeld, Robert M. (Albuquerque, NM); Dawson, L. Ralph (Albuquerque, NM); Howard, Arnold J. (Albuquerque, NM); Baucom, Kevin C. (Albuquerque, NM)

1997-01-01T23:59:59.000Z

356

Release strategies for making transferable semiconductor structures, devices and device components  

DOE Patents [OSTI]

Provided are methods for making a device or device component by providing a multilayer structure having a plurality of functional layers and a plurality of release layers and releasing the functional layers from the multilayer structure by separating one or more of the release layers to generate a plurality of transferable structures. The transferable structures are printed onto a device substrate or device component supported by a device substrate. The methods and systems provide means for making high-quality and low-cost photovoltaic devices, transferable semiconductor structures, (opto-)electronic devices and device components.

Rogers, John A; Nuzzo, Ralph G; Meitl, Matthew; Ko, Heung Cho; Yoon, Jongseung; Menard, Etienne; Baca, Alfred J

2014-11-25T23:59:59.000Z

357

Release strategies for making transferable semiconductor structures, devices and device components  

DOE Patents [OSTI]

Provided are methods for making a device or device component by providing a multilayer structure having a plurality of functional layers and a plurality of release layers and releasing the functional layers from the multilayer structure by separating one or more of the release layers to generate a plurality of transferable structures. The transferable structures are printed onto a device substrate or device component supported by a device substrate. The methods and systems provide means for making high-quality and low-cost photovoltaic devices, transferable semiconductor structures, (opto-)electronic devices and device components.

Rogers, John A. (Champaign, IL); Nuzzo, Ralph G. (Champaign, IL); Meitl, Matthew (Raleigh, NC); Ko, Heung Cho (Urbana, IL); Yoon, Jongseung (Urbana, IL); Menard, Etienne (Durham, NC); Baca, Alfred J. (Urbana, IL)

2011-04-26T23:59:59.000Z

358

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability  

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

359

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarn et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

360

Implementation for simplifying Bluetooth device connection methods  

E-Print Network [OSTI]

This thesis provides a way for users to easily add and remove devices to secure groups, allowing for a more intuitive way of making connections between devices. These groups allow users to seamlessly make connections between ...

Wan, Tehyih Debbie, 1981-

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Rapid prototyping method for a microfluidics device  

E-Print Network [OSTI]

The product design process can be described as a number of steps taken to turn an idea into a reality. One particular design process of creating a microfluidics device was studied and analyzed. A device containing channels ...

Klauber, Kameron L

2012-01-01T23:59:59.000Z

362

Acoustic enhancement for photo detecting devices  

DOE Patents [OSTI]

Provided are improvements to photo detecting devices and methods for enhancing the sensitivity of photo detecting devices. A photo detecting device generates an electronic signal in response to a received light pulse. An electro-mechanical acoustic resonator, electrically coupled to the photo detecting device, damps the electronic signal and increases the signal noise ratio (SNR) of the electronic signal. Increased photo detector standoff distances and sensitivities will result.

Thundat, Thomas G; Senesac, Lawrence R; Van Neste, Charles W

2013-02-19T23:59:59.000Z

363

Multi-reflective acoustic wave device  

DOE Patents [OSTI]

An acoustic wave device, which utilizes multiple localized reflections of acoustic wave for achieving an infinite impulse response while maintaining high tolerance for dampening effects, is disclosed. The device utilized a plurality of electromechanically significant electrodes disposed on most of the active surface. A plurality of sensors utilizing the disclosed acoustic wave mode device are also described.

Andle, Jeffrey C.

2006-02-21T23:59:59.000Z

364

Technische Universiteit Eindhoven Opto-Electronic Devices  

E-Print Network [OSTI]

in micro­ and optoelectronic devices. TUHH Heinrich Voss Iterative projection methods New Orleans 2005 4 and their potential for applications in micro­ and optoelectronic devices. In such nanostructures, the free carriers of their special physical properties and their potential for applications in micro­ and optoelectronic devices

Lipari, Giuseppe

365

Student Mobile Device Survey Table of Contents  

E-Print Network [OSTI]

CiCS. Student Mobile Device Survey 2011 Table of Contents Section Number Subject Page 1 With little information and supporting evidence on student ownership and usage of mobile devices at the University of Sheffield, making decisions on our services and support for mobile devices has been based

Martin, Stephen John

366

Portable control device for networked mobile robots  

DOE Patents [OSTI]

A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

Feddema, John T. (Albuquerque, NM); Byrne, Raymond H. (Albuquerque, NM); Bryan, Jon R. (Edgewood, NM); Harrington, John J. (Albuquerque, NM); Gladwell, T. Scott (Albuquerque, NM)

2002-01-01T23:59:59.000Z

367

Sensor device and methods for using same  

DOE Patents [OSTI]

A sensor device and method of employment is provided. More specifically, a sensor device adapted to detect, identify and/or measure a chemical and/or physical characteristic upon placement of the device into an environment, especially a liquid medium for which monitoring is sought is provided.

Rothgeb, Timothy Michael; Gansle, Kristina Marie; Joyce, Jonathan Livingsto; Jordan, James Madison; Rohwer, Tedd Addison; Lockhart, Randal Ray; Smith, Christopher Lawrence; Trinh, Toan; Cipollone, Mark Gary

2005-10-25T23:59:59.000Z

368

Organic electrophosphorescence device having interfacial layers  

SciTech Connect (OSTI)

Techniques are described for forming an organic light emitting diode device with improved device efficiency. Materials having at least one energy level that is similar to those of a phosphorescent light emitting material in the diode are incorporated into the device to directly inject holes or electrons to the light emitting material.

Choulis, Stelios A. (San Jose, CA); Mathai, Mathew (Santa Clara, CA); Choong, Vi-En (San Jose, CA); So, Franky (Gainesville, FL)

2010-08-10T23:59:59.000Z

369

Device Selection by a Personal Proxy Agent  

E-Print Network [OSTI]

Device Selection by a Personal Proxy Agent N. Hadibi, K. El-khatib, Eric Z. Zhang, Ken Chan, G. v user to access communication devices currently present in his Personal Area Network (PAN) Performs PreferencesDevice Capability An example Scenario: Connecting Alice and Bob w/o a Personal Proxy Internet Home

von Bochmann, Gregor

370

The Simplicity Device: Your Personal Mobile Representative  

E-Print Network [OSTI]

The Simplicity Device: Your Personal Mobile Representative Giovanni Bartolomeo1, Francesca Martire1 mobile phone that stores and handles personal information about the user. The Simplicity Device can be connected (e.g. via Bluetooth) to several other devices thus allowing personalization of services

371

SECURITY FOR WIRELESS NETWORKS AND DEVICES  

E-Print Network [OSTI]

connections. Users of handheld devices such as personal digital assis tants (PDAs) and cell phones can synMarch 2003 SECURITY FOR WIRELESS NETWORKS AND DEVICES Shirley Radack, Editor, Computer Security organizations and users have found that wireless communications and devices are convenient, flexible, and easy

372

Manual authentication for wireless devices Christian Gehrmann  

E-Print Network [OSTI]

is to examine how these services might best be achieved for personal wireless-enabled devices. Using the terminology of Stajano [12], the problem is that of securely `imprinting' a personal device. That is, suppose a user has two wireless-enabled devices, e.g. a mobile phone and a Personal Digital Assistant (PDA

Mitchell, Chris

373

V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability  

Broader source: Energy.gov [DOE]

Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security.

374

Protective laser beam viewing device  

DOE Patents [OSTI]

A protective laser beam viewing system or device including a camera selectively sensitive to laser light wavelengths and a viewing screen receiving images from the laser sensitive camera. According to a preferred embodiment of the invention, the camera is worn on the head of the user or incorporated into a goggle-type viewing display so that it is always aimed at the area of viewing interest to the user and the viewing screen is incorporated into a video display worn as goggles over the eyes of the user.

Neil, George R.; Jordan, Kevin Carl

2012-12-18T23:59:59.000Z

375

Inertial impaction air sampling device  

DOE Patents [OSTI]

An inertial impactor to be used in an air sampling device for collection of respirable size particles in ambient air which may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry. 3 figs.

Dewhurst, K.H.

1987-12-10T23:59:59.000Z

376

Assistive Devices for the Home  

E-Print Network [OSTI]

, replacing or modifying conventional knobs. The lever handle makes opening and closing doors easier. Some handles glow in the dark. a71 Pneumatic lift cushion. Helps raise one from a sitting to a standing position. The lift cushion is portable and can be used... called or emer- gency numbers can be programmed to dial with one button. a71 Telephone ring alerter. When a phone and lamp are plugged into the device, the lamp will flash with each ring of the phone. a71 Television remote control with large but- tons...

Harris, Janie

2002-01-31T23:59:59.000Z

377

Inertial impaction air sampling device  

DOE Patents [OSTI]

An inertial impactor to be used in an air sampling device for collection of respirable size particles in ambient air which may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry.

Dewhurst, Katharine H. (13150 Wenonah SE. Apt. 727, Albuquerque, NM 87123)

1990-01-01T23:59:59.000Z

378

Mobile Communication Device Allowance Authorization Form Revised: April 2011 MOBILE COMMUNICATION DEVICE ALLOWANCE AUTHORIZATION FORM  

E-Print Network [OSTI]

Mobile Communication Device Allowance Authorization Form Revised: April 2011 MOBILE COMMUNICATION list your CURRENT PLAN features: Mobile service provider Name: ________ Monthly Charge: $ Device.edu/policy/itc/FINAL%20Policy%20on%20Mobile%20Comm%20Devices.htm I have read the Mobile Communication Devices Policy

Dyer, Bill

379

Health Sciences Library Resources for Mobile Device Users Wireless Access for Mobile Devices  

E-Print Network [OSTI]

1 Health Sciences Library Resources for Mobile Device Users Wireless Access for Mobile Devices to configure your mobile device; instructions are available at http://www.usask.ca/ict/services/network-services/wireless/index.php - Assistance with accessing University services (such as wireless) on mobile devices is available from the ICT

Peak, Derek

380

Waveguide device and method for making same  

DOE Patents [OSTI]

A monolithic micromachined waveguide device or devices with low-loss, high-power handling, and near-optical frequency ranges is set forth. The waveguide and integrated devices are capable of transmitting near-optical frequencies due to optical-quality sidewall roughness. The device or devices are fabricated in parallel, may be mass produced using a LIGA manufacturing process, and may include a passive component such as a diplexer and/or an active capping layer capable of particularized signal processing of the waveforms propagated by the waveguide.

Forman, Michael A. (San Francisco, CA)

2007-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Electrical device fabrication from nanotube formations  

DOE Patents [OSTI]

A method for forming nanotube electrical devices, arrays of nanotube electrical devices, and device structures and arrays of device structures formed by the methods. Various methods of the present invention allow creation of semiconducting and/or conducting devices from readily grown SWNT carpets rather than requiring the preparation of a patterned growth channel and takes advantage of the self-controlling nature of these carpet heights to ensure a known and controlled channel length for reliable electronic properties as compared to the prior methods.

Nicholas, Nolan Walker; Kittrell, W. Carter; Kim, Myung Jong; Schmidt, Howard K.

2013-03-12T23:59:59.000Z

382

Fabrication and Characterization of Organic/Inorganic Photovoltaic Devices  

E-Print Network [OSTI]

J. W. Yu, Organic photovoltaic devices with a crosslinkablein Nanostructured Photovoltaic Devices, Recent Patents oninterfaces in organic photovoltaic devices, Solar Energy

Guvenc, Ali Bilge

2012-01-01T23:59:59.000Z

383

Automated internal pipe cutting device  

DOE Patents [OSTI]

The invention is a remotely controlled internal pipe cutting device primarily used for cutting pipes where the outside of the pipe is inaccessible at the line where the cut is to be made. The device includes an axial ram within a rotational cylinder which is enclosed in a housing. The housing is adapted for attachment to an open end of the pipe and for supporting the ram and cylinder in cantilever fashion within the pipe. A radially movable cutter, preferably a plasma arc torch, is attached to the distal end of the ram. A drive mechanism, containing motors and mechanical hardware for operating the ram and cylinder, is attached to the proximal end of the housing. The ram and cylinder provide for moving the cutter axially and circumferentially, and a cable assembly attached to a remote motor provide for the movement of the cutter radially, within the pipe. The control system can be adjusted and operated remotely to control the position and movement of the cutter to obtain the desired cut. The control system can also provide automatic standoff control for a plasma arc torch.

Godlewski, William J. (Clifton Park, NY); Haffke, Gary S. (Ballston Spa, NY); Purvis, Dale (Amsterdam, NY); Bashar, Ronald W. (Oakdale, CT); Jones, Stewart D. (Mechanicville, NY); Moretti, Jr., Henry (Cranston, RI); Pimentel, James (Warwick, RI)

2003-01-21T23:59:59.000Z

384

Pipe weld crown removal device  

DOE Patents [OSTI]

A device is provided for grinding down the crown of a pipe weld joining aligned pipe sections so that the weld is substantially flush with the pipe sections joined by the weld. The device includes a cage assembly comprising a pair of spaced cage rings adapted to be mounted for rotation on the respective pipe sections on opposite sides of the weld, a plurality of grinding wheels, supported by the cage assembly for grinding down the crown of the weld, and a plurality of support shafts, each extending longitudinally along the joined pipe sections, parallel thereto, for individually mounting respective grinding wheels. Each end of the support shafts is mounted for rotation in a bearing assembly housed within a radially directed opening in a corresponding one of the cage rings so as to provide radial movement of the associated shaft, and thus of the associated grinding wheel, towards and away from the weld. A first drive sprocket provides rotation of the cage assembly around the pipe sections while a second drive unit, driven by a common motor, provides rotation of the grinding wheels.

Sword, Charles K. (Pleasant Hills, PA); Sette, Primo J. (West Newton, PA)

1992-01-01T23:59:59.000Z

385

Passive fault current limiting device  

DOE Patents [OSTI]

A passive current limiting device and isolator is particularly adapted for use at high power levels for limiting excessive currents in a circuit in a fault condition such as an electrical short. The current limiting device comprises a magnetic core wound with two magnetically opposed, parallel connected coils of copper, a high temperature superconductor or other electrically conducting material, and a fault element connected in series with one of the coils. Under normal operating conditions, the magnetic flux density produced by the two coils cancel each other. Under a fault condition, the fault element is triggered to cause an imbalance in the magnetic flux density between the two coils which results in an increase in the impedance in the coils. While the fault element may be a separate current limiter, switch, fuse, bimetal strip or the like, it preferably is a superconductor current limiter conducting one-half of the current load compared to the same limiter wired to carry the total current of the circuit. The major voltage during a fault condition is in the coils wound on the common core in a preferred embodiment. 6 figs.

Evans, D.J.; Cha, Y.S.

1999-04-06T23:59:59.000Z

386

Infrared emitting device and method  

DOE Patents [OSTI]

The infrared emitting device comprises a III-V compound semiconductor substrate upon which are grown a quantum-well active region having a plurality of quantum-well layers formed of a ternary alloy comprising InAsSb sandwiched between barrier layers formed of a ternary alloy having a smaller lattice constant and a larger energy bandgap than the quantum-well layers. The quantum-well layers are preferably compressively strained to increase the threshold energy for Auger recombination; and a method is provided for determining the preferred thickness for the quantum-well layers. Embodiments of the present invention are described having at least one cladding layer to increase the optical and carrier confinement in the active region, and to provide for waveguiding of the light generated within the active region. Examples have been set forth showing embodiments of the present invention as surface- and edge-emitting light emitting diodes (LEDs), an optically-pumped semiconductor laser, and an electrically-injected semiconductor diode laser. The light emission from each of the infrared emitting devices of the present invention is in the midwave infrared region of the spectrum from about 2 to 6 microns. 8 figs.

Kurtz, S.R.; Biefeld, R.M.; Dawson, L.R.; Howard, A.J.; Baucom, K.C.

1997-04-29T23:59:59.000Z

387

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

388

Sublethal OxygenGlucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to  

E-Print Network [OSTI]

Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygenglucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 2448 hr after sublethal oxygenglucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

389

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

390

Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may  

E-Print Network [OSTI]

Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

Boone, Randall B.

391

Electro-optic component mounting device  

DOE Patents [OSTI]

A technique is provided for integrally mounting a device such as an electro-optic device (50) in a transmission line to avoid series resonant effects. A center conductor (52) of the transmission line has an aperture (58) formed therein for receiving the device (50). The aperture (58) splits the center conductor into two parallel sections on opposite sides of the device. For a waveguide application, the center conductor is surrounded by a conductive ground surface (54), which is spaced apart from the center conductor with a dielectric material (56). One set of electrodes formed on the surface of the electro-optic device (50) is directly connected to the center conductor 52 and an electrode formed on the surface of the electro-optic device is directly connected to the conductive ground surface (54). The electrodes formed on the surface of the electro-optic device are formed on curved sections of the surface of the device to mate with correspondingly shaped electrodes on the conductor and ground surface to provide a uniform electric field across the electro-optic device. The center conductor includes a passage ( 60) formed therein for passage of optical signals to an electro-optic device.

Gruchalla, Michael E. (Albuquerque, NM)

1994-01-01T23:59:59.000Z

392

Electro-optic component mounting device  

DOE Patents [OSTI]

A technique is provided for integrally mounting a device such as an electro-optic device in a transmission line to avoid series resonant effects. A center conductor of the transmission line has an aperture formed therein for receiving the device. The aperture splits the center conductor into two parallel sections on opposite sides of the device. For a waveguide application, the center conductor is surrounded by a conductive ground surface which is spaced apart from the center conductor with a dielectric material. One set of electrodes formed on the surface of the electro-optic device is directly connected to the center conductor and an electrode formed on the surface of the electro-optic device is directly connected to the conductive ground surface. The electrodes formed on the surface of the electro-optic device are formed on curved sections of the surface of the device to mate with correspondingly shaped electrodes on the conductor and ground surface to provide a uniform electric field across the electro-optic device. The center conductor includes a passage formed therein for passage of optical signals to an electro-optic device. 10 figs.

Gruchalla, M.E.

1994-09-13T23:59:59.000Z

393

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer  

E-Print Network [OSTI]

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

Boyer, Edmond

394

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

395

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,  

E-Print Network [OSTI]

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

Saldin, Dilano

396

Volatile organic compound sensing devices  

DOE Patents [OSTI]

Apparatus employing vapochromic materials in the form of inorganic double complex salts which change color reversibly when exposed to volatile organic compound (VOC) vapors is adapted for VOC vapor detection, VOC aqueous matrix detection, and selective VOC vapor detection. The basic VOC vapochromic sensor is incorporated in various devices such as a ground probe sensor, a wristband sensor, a periodic sampling monitor, a soil/water penetrometer, an evaporative purge sensor, and various vacuum-based sensors which are particularly adapted for reversible/reusable detection, remote detection, continuous monitoring, or rapid screening of environmental remediation and waste management sites. The vapochromic sensor is used in combination with various fiber optic arrangements to provide a calibrated qualitative and/or quantitative indication of the presence of VOCs. 15 figs.

Lancaster, G.D.; Moore, G.A.; Stone, M.L.; Reagen, W.K.

1995-08-29T23:59:59.000Z

397

Haptic device for telerobotic surgery  

DOE Patents [OSTI]

A haptic device for telerobotic surgery, including a base; a linkage system having first and second linkage members coupled to the base; a motor that provides a motor force; a transmission including first and second driving pulleys arranged such that their faces form an angle and their axes form a plane, first and second idler pulleys offset from the plane and arranged between the first and second driving pulleys such that their axes divide the angle between the first and second driving pulleys, and a cable that traverses the first and second driving pulleys and the set of idler pulleys and transfers the motor force to the linkage system; an end effector coupled to distal ends of the first and second linkage members and maneuverable relative to the base; and a controller that modulates the motor force to simulate a body part at a point portion of the end effector.

Salisbury, Curt; Salisbury, Jr., J. Kenneth

2014-12-30T23:59:59.000Z

398

Volatile organic compound sensing devices  

DOE Patents [OSTI]

Apparatus employing vapochromic materials in the form of inorganic double complex salts which change color reversibly when exposed to volatile organic compound (VOC) vapors is adapted for VOC vapor detection, VOC aqueous matrix detection, and selective VOC vapor detection. The basic VOC vapochromic sensor is incorporated in various devices such as a ground probe sensor, a wristband sensor, a periodic sampling monitor, a soil/water penetrometer, an evaporative purge sensor, and various vacuum-based sensors which are particularly adapted for reversible/reusable detection, remote detection, continuous monitoring, or rapid screening of environmental remediation and waste management sites. The vapochromic sensor is used in combination with various fiber optic arrangements to provide a calibrated qualitative and/or quantitative indication of the presence of VOCs.

Lancaster, Gregory D. (Idaho Falls, ID); Moore, Glenn A. (Idaho Falls, ID); Stone, Mark L. (Idaho Falls, ID); Reagen, William K. (Stillwater, MN)

1995-01-01T23:59:59.000Z

399

Seal device for ferromagnetic containers  

DOE Patents [OSTI]

A temporary seal or patch assembly prevents the escape of contents, e.g., fluids and the like, from within a container having a breach therethrough until the contents can be removed and/or a repair effected. A frame that supports a sealing bladder can be positioned over the breach and the frame is then attached to the container surface, which must be of a ferromagnet material, by using switchable permanent magnets. The permanent magnets are designed to have a first condition that is not attracted to the ferromagnetic surface and a second conditions whereby the magnets are attracted to the surface with sufficient force to support the seal assembly on the surface. Latching devices may be attached to the frame and engage the container surface with hardened pins to prevent the lateral movement of the seal assembly along the container surface from external forces such as fluid drag or gravity.

Meyer, Ross E. (Los Alamos, NM); Jason, Andrew J. (Los Alamos, NM)

1994-01-01T23:59:59.000Z

400

Heating device for semiconductor wafers  

DOE Patents [OSTI]

An apparatus for heat treating semiconductor wafers is disclosed. The apparatus includes a heating device which contains an assembly of light energy sources for emitting light energy onto a wafer. In particular, the light energy sources are positioned such that many different radial heating zones are created on a wafer being heated. For instance, in one embodiment, the light energy sources form a spiral configuration. In an alternative embodiment, the light energy sources appear to be randomly dispersed with respect to each other so that no discernable pattern is present. In a third alternative embodiment of the present invention, the light energy sources form concentric rings. Tuning light sources are then placed in between the concentric rings of light.

Vosen, Steven R. (Berkeley, CA)

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Heating device for semiconductor wafers  

DOE Patents [OSTI]

An apparatus for heat treating semiconductor wafers is disclosed. The apparatus includes a heating device which contains an assembly of light energy sources for emitting light energy onto a wafer. In particular, the light energy sources are positioned such that many different radial heating zones are created on a wafer being heated. For instance, in one embodiment, the light energy sources form a spiral configuration. In an alternative embodiment, the light energy sources appear to be randomly dispersed with respect to each other so that no discernible pattern is present. In a third alternative embodiment of the present invention, the light energy sources form concentric rings. Tuning light sources are then placed in between the concentric rings of light. 4 figs.

Vosen, S.R.

1999-07-27T23:59:59.000Z

402

Cryogenic vacuumm RF feedthrough device  

DOE Patents [OSTI]

A cryogenic vacuum rf feedthrough device comprising: 1) a probe for insertion into a particle beam; 2) a coaxial cable comprising an inner conductor and an outer conductor, a dielectric/insulating layer surrounding the inner conductor, the latter being connected to the probe for the transmission of higher mode rf energy from the probe; and 3) a high thermal conductivity stub attached to the coaxial dielectric about and in thermal contact with the inner conductor which high thermal conductivity stub transmits heat generated in the vicinity of the probe efficiently and radially from the area of the probe and inner conductor all while maintaining useful rf transmission line characteristics between the inner and outer coaxial conductors.

Wu, Genfa (Yorktown, VA); Phillips, Harry Lawrence (Hayes, VA)

2008-12-30T23:59:59.000Z

403

Seal device for ferromagnetic containers  

DOE Patents [OSTI]

A temporary seal or patch assembly prevents the escape of contents, e.g., fluids and the like, from within a container having a breach there through until the contents can be removed and/or a repair effected. A frame that supports a sealing bladder can be positioned over the breach and the frame is then attached to the container surface, which must be of a ferromagnet material, by using switchable permanent magnets. The permanent magnets are designed to have a first condition that is not attracted to the ferromagnetic surface and a second conditions whereby the magnets are attracted to the surface with sufficient force to support the seal assembly on the surface. Latching devices may be attached to the frame and engage the container surface with hardened pins to prevent the lateral movement of the seal assembly along the container surface from external forces such as fluid drag or gravity. 10 figs.

Meyer, R.E.; Jason, A.J.

1994-10-18T23:59:59.000Z

404

MIDAS: Multi-device Integrated Dynamic Activity Spaces  

E-Print Network [OSTI]

of this device multiplicity and support information access from single devices only. Changing devices means restarting an information session. Using devices in conjunction with each other poses several challenges, which include the presentation of content...

Karadkar, Unmil Purushottam

2012-02-14T23:59:59.000Z

405

A Brief Survey of Physical Activity Monitoring Devices1  

E-Print Network [OSTI]

on their mechanisms, measurements, product forms, and data portability. and 3) the role of personal devices both conventional standalone pedometer devices and personal digital devices integrated A Brief Survey of Physical Activity Monitoring Devices1 Technical Report MPCL-08

Helal, Abdelsalam

406

Acceptable Information Technology Devices | Y-12 National Security...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

without limitation, cellular telephones, smart phones, personal digital assistants, personal electronic devices, pagers, and flash memory storage devices. Examples include...

407

Dynamic Analysis of Mobile Device Applications  

SciTech Connect (OSTI)

The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the computer as possible, the users ability to assess the software running on their system is limited. The research team chose Googles Android platform for this initial research because it is open source and it would give us freedom in our approach, including the ability to modify the mobile devices operating system itself. The research team concluded that a Privileged Application was the right approach, and the result was ODAMA. This project is an important piece of the work to secure the expanding use of mobile devices with our nations critical infrastructure.

Corey Thuen

2013-01-01T23:59:59.000Z

408

Microfabricated fuel heating value monitoring device  

DOE Patents [OSTI]

A microfabricated fuel heating value monitoring device comprises a microfabricated gas chromatography column in combination with a catalytic microcalorimeter. The microcalorimeter can comprise a reference thermal conductivity sensor to provide diagnostics and surety. Using microfabrication techniques, the device can be manufactured in production quantities at a low per-unit cost. The microfabricated fuel heating value monitoring device enables continuous calorimetric determination of the heating value of natural gas with a 1 minute analysis time and 1.5 minute cycle time using air as a carrier gas. This device has applications in remote natural gas mining stations, pipeline switching and metering stations, turbine generators, and other industrial user sites. For gas pipelines, the device can improve gas quality during transfer and blending, and provide accurate financial accounting. For industrial end users, the device can provide continuous feedback of physical gas properties to improve combustion efficiency during use.

Robinson, Alex L. (Albuquerque, NM); Manginell, Ronald P. (Albuquerque, NM); Moorman, Matthew W. (Albuquerque, NM)

2010-05-04T23:59:59.000Z

409

Viewing device for electron-beam equipment  

SciTech Connect (OSTI)

Viewing devices are used to observe melting, welding, and so on in vacuum systems, an it is necessary to protect the windows from droplets and vapor. A viewing device for electron-beam equipment is described in which the viewing tube and mounting flange are made as a tubular ball joint enclosed in a steel bellows, which render the viewing device flexible. Bending the viewing tube in the intervals between observations protects the viewing window from sputtering and from drops of molten metal.

Nasyrov, R.S.

1985-06-01T23:59:59.000Z

410

Stable blue phosphorescent organic light emitting devices  

DOE Patents [OSTI]

Novel combination of materials and device architectures for organic light emitting devices is provided. An organic light emitting device, is provided, having an anode, a cathode, and an emissive layer disposed between the anode and the cathode. The emissive layer includes a host and a phosphorescent emissive dopant having a peak emissive wavelength less than 500 nm, and a radiative phosphorescent lifetime less than 1 microsecond. Preferably, the phosphorescent emissive dopant includes a ligand having a carbazole group.

Forrest, Stephen R.; Thompson, Mark; Giebink, Noel

2014-08-26T23:59:59.000Z

411

Passive gas separator and accumulator device  

DOE Patents [OSTI]

A separation device employing a gas separation filter and swirler vanes for separating gas from a gasliquid mixture is provided. The cylindrical filter utilizes the principle that surface tension in the pores of the filter prevents gas bubbles from passing through. As a result, the gas collects in the interior region of the filter and coalesces to form larger bubbles in the center of the device. The device is particularly suited for use in microgravity conditions since the swirlers induce a centrifugal force which causes liquid to move from the inner region of the filter, pass the pores, and flow through the outlet of the device while the entrained gas is trapped by the filter. The device includes a cylindrical gas storage screen which is enclosed by the cylindrical gas separation filter. The screen has pores that are larger than those of the filters. The screen prevents larger bubbles that have been formed from reaching and interfering with the pores of the gas separation filter. The device is initially filled with a gas other than that which is to be separated. This technique results in separation of the gas even before gas bubbles are present in the mixture. Initially filling the device with the dissimilar gas and preventing the gas from escaping before operation can be accomplished by sealing the dissimilar gas in the inner region of the separation device with a ruptured disc which can be ruptured when the device is activated for use.

Choe, Hwang (Saratoga, CA); Fallas, Thomas T. (Berkeley, CA)

1994-01-01T23:59:59.000Z

412

Passive gas separator and accumulator device  

DOE Patents [OSTI]

A separation device employing a gas separation filter and swirler vanes for separating gas from a gas-liquid mixture is provided. The cylindrical filter utilizes the principle that surface tension in the pores of the filter prevents gas bubbles from passing through. As a result, the gas collects in the interior region of the filter and coalesces to form larger bubbles in the center of the device. The device is particularly suited for use in microgravity conditions since the swirlers induce a centrifugal force which causes liquid to move from the inner region of the filter, pass the pores, and flow through the outlet of the device while the entrained gas is trapped by the filter. The device includes a cylindrical gas storage screen which is enclosed by the cylindrical gas separation filter. The screen has pores that are larger than those of the filters. The screen prevents larger bubbles that have been formed from reaching and interfering with the pores of the gas separation filter. The device is initially filled with a gas other than that which is to be separated. This technique results in separation of the gas even before gas bubbles are present in the mixture. Initially filling the device with the dissimilar gas and preventing the gas from escaping before operation can be accomplished by sealing the dissimilar gas in the inner region of the separation device with a ruptured disc which can be ruptured when the device is activated for use. 3 figs.

Choe, H.; Fallas, T.T.

1994-08-02T23:59:59.000Z

413

Low temperature proton conducting oxide devices  

DOE Patents [OSTI]

A device for conducting protons at a temperature below 550.degree. C. includes a LAMOX ceramic body characterized by an alpha crystalline structure.

Armstrong, Timothy R. (Clinton, TN); Payzant, Edward A. (Oak Ridge, TN); Speakman, Scott A. (Oak Ridge, TN); Greenblatt, Martha (Highland Park, NJ)

2008-08-19T23:59:59.000Z

414

Silicon Materials and Devices (Fact Sheet)  

SciTech Connect (OSTI)

This National Center for Photovoltaics sheet describes the capabilities of its silicon materials and devices research. The scope and core competencies and capabilities are discussed.

Not Available

2013-06-01T23:59:59.000Z

415

Silicon Materials and Devices (Fact Sheet)  

SciTech Connect (OSTI)

Capabilities fact sheet for the National Center for Photovoltaics: Silicon Materials and Devices that includes scope, core competencies and capabilities, and contact/web information.

Not Available

2011-06-01T23:59:59.000Z

416

Low Frequency Noise in Nano-Devices  

E-Print Network [OSTI]

device quality, reliability and the degradation processes. The generation- recombination noise which. His current research interests include low frequency noise, wide-band-gap semiconductors, UV light

417

Impacts of Biodiesel on Emission Control Devices  

Broader source: Energy.gov (indexed) [DOE]

Biodiesel on Emission Control Devices Todd J. Toops and Bruce G. Bunting Oak Ridge National Laboratory D. William Brookshear and Ke Nguyen University of Tennessee - Knoxville DEER...

418

Fabrication of microfluidic devices for artificial respiration  

E-Print Network [OSTI]

We are developing elastomeric polydimethylsiloxane (PDMS) microfluidic devices incorporated with photoactive thin films to create an implantable artificial respiration platform. Whereas state-of-the-art respiration support ...

Park, Hyesung, Ph. D. Massachusetts Institute of Technology

2007-01-01T23:59:59.000Z

419

Method and system for reducing device performance degradation of organic devices  

DOE Patents [OSTI]

Methods and systems for reducing the deleterious effects of gate bias stress on the drain current of an organic device, such as an organic thin film transistor, are provided. In a particular aspect, the organic layer of an organic device is illuminated with light having characteristics selected to reduce the gate bias voltage effects on the drain current of the organic device. For instance, the wavelength and intensity of the light are selected to provide a desired recovery of drain current of the organic device. If the characteristics of the light are appropriately matched to the organic device, recovery of the deleterious effects caused by gate bias voltage stress effects on the drain current of the organic device can be achieved. In a particular aspect, the organic device is selectively illuminated with light to operate the organic device in multiple modes of operation.

Teague, Lucile C.

2014-09-02T23:59:59.000Z

420

Towards the manufacturing of microfluidic devices : fluid flow in multilayer devices as a test case  

E-Print Network [OSTI]

In this work, the area of microfluidics is analyzed for advances that could be made in the manufacturing of a microfluidic device, and then one area - the alignment of multilayer devices - is selected for greater focus. ...

Korb, Samuel N. (Samuel Noaa), 1984-

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Josephson-junction logic device  

SciTech Connect (OSTI)

A Josephson-junction logic device having inductances and forming and AND circuit is described comprising: at least two superconductive loops, each having at least two Josephson-junction elements and a loop inductance connected between each of at least two Josephson-junction elements; at least two logic input signal lines, operatively connected to receive input currents, for supplying logic input signals; a bias line, operatively connected to at least two super conductive loops, for supplying a bias current to at least two superconductive loops, the bias current satisfying the condition vertical bar I/sub ml/ vertical bar > vertical bar I/sub mo/ vertical bar, where I/sub ml/ is a first threshold current, for switching the AND circuit, determined when at least two logic input signal lines receive different magnitude input currents and where I/sub mo/ is a second threshold current for switching the AND circuit, determined when at least two logic input signal lines receive the same magnitude input currents; and output terminals, operatively connected to one of at least two Josephson-junction elements, for outputting a logic output signal as a result of a logic operation performed on the logic input signals, whereby an operating margin of the AND circuit is expanded.

Suzuki, H.

1987-12-01T23:59:59.000Z

422

Portable basketball rim testing device  

DOE Patents [OSTI]

A portable basketball rim rebound testing device 10 is illustrated in two preferred embodiments for testing the rebound or energy absorption characteristics of a basketball rim 12 and its accompanying support to determine likely rebound or energy absorption charcteristics of the system. The apparatus 10 includes a depending frame 28 having a C-clamp 36 for releasably rigidly connecting the frame to the basketball rim 12. A glide weight 60 is mounted on a guide rod 52 permitting the weight 60 to be dropped against a calibrated spring 56 held on an abutment surface on the rod to generate for deflecting the basketball rim and then rebounding the weight upwardly. A photosensor 66 is mounted on the depending frame 28 to sense passage of reflective surfaces 75 on the weight to thereby obtain sufficient data to enable a processing means 26 to calculate the rebound velocity and relate it to an energy absorption percentage rate of the rim system 12. A readout is provided to display the energy absorption percentage.

Abbott, W. Bruce (610 Clover St., Cheney, WA 99004); Davis, Karl C. (Box 722, Richland, WA 99352)

1993-01-01T23:59:59.000Z

423

Apparatus for making photovoltaic devices  

DOE Patents [OSTI]

A process and apparatus (70) for making a large area photovoltaic device (22) that is capable of generating low cost electrical power. The apparatus (70) for performing the process includes an enclosure (126) providing a controlled environment in which an oven (156) is located. At least one and preferably a plurality of deposition stations (74,76,78) provide heated vapors of semiconductor material within the oven (156) for continuous elevated temperature deposition of semiconductor material on a sheet substrate (24) including a glass sheet (26) conveyed within the oven. The sheet substrate (24) is conveyed on a roller conveyor (184) within the oven (156) and the semiconductor material whose main layer (82) is cadmium telluride is deposited on an upwardly facing surface (28) of the substrate by each deposition station from a location within the oven above the roller conveyor. A cooling station (86) rapidly cools the substrate (24) after deposition of the semiconductor material thereon to strengthen the glass sheet of the substrate.

Foote, James B. (Toledo, OH); Kaake, Steven A. F. (Perrysburg, OH); Meyers, Peter V. (Bowling Green, OH); Nolan, James F. (Sylvania, OH)

1994-12-13T23:59:59.000Z

424

Control device for vehicle speed  

SciTech Connect (OSTI)

This patent describes a control device for vehicle speed comprising: a throttle driving means operatively coupled to a throttle valve of a vehicle; a set switch means for commanding memorization of the vehicle speed; a resume switch means for commanding read of the vehicle speed; a vehicle speed detecting means for generating a signal in accordance with the vehicle speed; a vehicle speed memory; an electronical control means for memorizing in the vehicle speed memory vehicle speed information corresponding to the signal obtained from the vehicle speed detecting means in response to actuation of the set switch means. The control means is also for reading out the content of the vehicle speed memory in response to actuation of the resume switch means to control the throttle driving means in accordance with the read-out content; a power supply means for supplying power to the electronical control means; and a power supply control switch means for controlling supply of power to the electronical control means in response to the state of at least one of the set switch means and the resume switch means and the state of the electronical control means. The improvement described here comprises the electronical control means sets the power supply control switch means into such a state that supply of power to the electronical control means is turned OFF, when vehicle speed information is not memorized in the vehicle speed memory.

Kawata, S.; Hyodo, H.

1987-03-03T23:59:59.000Z

425

Performance of Installed Cooking Exhaust Devices  

SciTech Connect (OSTI)

The performance metrics of airflow, sound, and combustion product capture efficiency (CE) were measured for a convenience sample of fifteen cooking exhaust devices, as installed in residences. Results were analyzed to quantify the impact of various device- and installation-dependent parameters on CE. Measured maximum airflows were 70% or lower than values noted on product literature for 10 of the devices. Above-the-cooktop devices with flat bottom surfaces (no capture hood) including exhaust fan/microwave combination appliances were found to have much lower CE at similar flow rates, compared to devices with capture hoods. For almost all exhaust devices and especially for rear-mounted downdraft exhaust and microwaves, CE was substantially higher for back compared with front burner use. Flow rate, and the extent to which the exhaust device extends over the burners that are in use, also had a large effect on CE. A flow rate of 95 liters per second (200 cubic feet per minute) was necessary, but not sufficient, to attain capture efficiency in excess of 75% for the front burners. A-weighted sound levels in kitchens exceeded 57 dB when operating at the highest fan setting for all 14 devices evaluated for sound performance.

Singer, Brett C.; Delp, William W.; Apte, Michael G.; Price, Philip N.

2011-11-01T23:59:59.000Z

426

Multicolored Electrochromism in Polymers: Structures and Devices  

E-Print Network [OSTI]

Multicolored Electrochromism in Polymers: Structures and Devices Avni A. Argun, Pierre-Henri Aubert May 12, 2004 A review of electrochromic (EC) polymers and their applications in absorption/transmission, reflective, and patterned electrochromic devices (ECDs) is presented. Fundamental properties of EC materials

Tanner, David B.

427

EELE408 Photovoltaics Lecture 15 Photovoltaic Devices  

E-Print Network [OSTI]

1 EELE408 Photovoltaics Lecture 15 Photovoltaic Devices Dr. Todd J. Kaiser tjkaiser) Demonstrated the photovoltaic effect Best results with UV or blue light 2 g Electrodes covered with light of photovoltaic effect in an all solid state device Several decades before the effect could be explained Fritts

Kaiser, Todd J.

428

Enhanced Thin Film Organic Photovoltaic Devices  

Energy Innovation Portal (Marketing Summaries) [EERE]

A novel structure design for thin film organic photovoltaic (OPV) devices provides a system for increasing the optical absorption in the active layer. The waveguided structure permits reduction of the active layer thickness, resulting in enhanced charge collection and extraction, leading to improved power conversion efficiency compared to standard OPV devices....

2014-01-10T23:59:59.000Z

429

Methods for dispensing mercury into devices  

DOE Patents [OSTI]

A process for dispensing mercury into devices which requires mercury. Mercury is first electrolytically separated from either HgO or Hg.sub.2 Cl.sub.2 and plated onto a cathode wire. The cathode wire is then placed into a device requiring mercury.

Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

1987-04-28T23:59:59.000Z

430

Methods for dispensing mercury into devices  

DOE Patents [OSTI]

A process is described for dispensing mercury into devices which requires mercury. Mercury is first electrolytically separated from either HgO or Hg[sub 2]Cl[sub 2] and plated onto a cathode wire. The cathode wire is then placed into a device requiring mercury. 2 figs.

Grossman, M.W.; George, W.A.

1987-04-28T23:59:59.000Z

431

Development of Microfluidic Devices Incorporating Electrochemical Detection  

E-Print Network [OSTI]

Development of Microfluidic Devices Incorporating Electrochemical Detection Anne Regel Submitted to the Department of Chemistry and the Graduate School of the University of Kansas in partial fulfillment of the requirements for the degree... _______________________________ Karen Nordheden Dissertation Defense: August 21, 2013 ii The Dissertation Committee for Anne Regel certifies that this is the approved version of the following dissertation: Development of Microfluidic Devices Incorporating...

Regel, Anne

2014-05-31T23:59:59.000Z

432

Radiation sensitivity of microelectromechanical system devices  

E-Print Network [OSTI]

them soonest. MEMS can also encounter a high radiation environment in nuclear reactors. Since nearly of space missions rather than of operation in nuclear re- actors. As a purely structural material, silicon to the impact on device operation of radiation-induced trapped charge in dielectrics. MEMS devices operating

Floreano, Dario

433

Protection of microelectronic devices during packaging  

DOE Patents [OSTI]

The present invention relates to a method of protecting a microelectronic device during device packaging, including the steps of applying a water-insoluble, protective coating to a sensitive area on the device; performing at least one packaging step; and then substantially removing the protective coating, preferably by dry plasma etching. The sensitive area can include a released MEMS element. The microelectronic device can be disposed on a wafer. The protective coating can be a vacuum vapor-deposited parylene polymer, silicon nitride, metal (e.g. aluminum or tungsten), a vapor deposited organic material, cynoacrylate, a carbon film, a self-assembled monolayered material, perfluoropolyether, hexamethyldisilazane, or perfluorodecanoic carboxylic acid, silicon dioxide, silicate glass, or combinations thereof. The present invention also relates to a method of packaging a microelectronic device, including: providing a microelectronic device having a sensitive area; applying a water-insoluble, protective coating to the sensitive area; providing a package; attaching the device to the package; electrically interconnecting the device to the package; and substantially removing the protective coating from the sensitive area.

Peterson, Kenneth A. (Albuquerque, NM); Conley, William R. (Tijeras, NM)

2002-01-01T23:59:59.000Z

434

Biomedical devices from ultraviolet February 24, 2012  

E-Print Network [OSTI]

- 1 - Biomedical devices from ultraviolet LEDs February 24, 2012 LEDs produce light, reported in the online Nature Communications, is a step toward biomedical devices with active components on solution-processed inorganic nanocrystals have promise for use in environmental and biomedical diagnostics

435

Chapter 9: Photovoltaic DevicesChapter 9: Photovoltaic Devices Solar energy spectrumSolar energy spectrum  

E-Print Network [OSTI]

Chapter 9: Photovoltaic DevicesChapter 9: Photovoltaic Devices Solar energy spectrumSolar energy Solar Energy? · Clean · Nearly unlimited PHYS5320 Chapter Nine 3 #12;S l ll l t PHYS5320 Chapter Nine 4 Solar cell plant #12;Cars powered by photovoltaic devices PHYS5320 Chapter Nine 5 #12;Solar Energy

Wang, Jianfang

436

High energy density redox flow device  

DOE Patents [OSTI]

Redox flow devices are described in which at least one of the positive electrode or negative electrode-active materials is a semi-solid or is a condensed ion-storing electroactive material, and in which at least one of the electrode-active materials is transported to and from an assembly at which the electrochemical reaction occurs, producing electrical energy. The electronic conductivity of the semi-solid is increased by the addition of conductive particles to suspensions and/or via the surface modification of the solid in semi-solids (e.g., by coating the solid with a more electron conductive coating material to increase the power of the device). High energy density and high power redox flow devices are disclosed. The redox flow devices described herein can also include one or more inventive design features. In addition, inventive chemistries for use in redox flow devices are also described.

Chiang, Yet-Ming; Carter, W. Craig; Ho, Bryan Y; Duduta, Mihai; Limthongkul, Pimpa

2014-05-13T23:59:59.000Z

437

Device for wavelength-selective imaging  

DOE Patents [OSTI]

An imaging device captures both a visible light image and a diagnostic image, the diagnostic image corresponding to emissions from an imaging medium within the object. The visible light image (which may be color or grayscale) and the diagnostic image may be superimposed to display regions of diagnostic significance within a visible light image. A number of imaging media may be used according to an intended application for the imaging device, and an imaging medium may have wavelengths above, below, or within the visible light spectrum. The devices described herein may be advantageously packaged within a single integrated device or other solid state device, and/or employed in an integrated, single-camera medical imaging system, as well as many non-medical imaging systems that would benefit from simultaneous capture of visible-light wavelength images along with images at other wavelengths.

Frangioni, John V. (Wayland, MA)

2010-09-14T23:59:59.000Z

438

System and method for networking electrochemical devices  

DOE Patents [OSTI]

An improved electrochemically active system and method including a plurality of electrochemical devices, such as fuel cells and fluid separation devices, in which the anode and cathode process-fluid flow chambers are connected in fluid-flow arrangements so that the operating parameters of each of said plurality of electrochemical devices which are dependent upon process-fluid parameters may be individually controlled to provide improved operating efficiency. The improvements in operation include improved power efficiency and improved fuel utilization in fuel cell power generating systems and reduced power consumption in fluid separation devices and the like through interstage process fluid parameter control for series networked electrochemical devices. The improved networking method includes recycling of various process flows to enhance the overall control scheme.

Williams, Mark C. (Morgantown, WV); Wimer, John G. (Morgantown, WV); Archer, David H. (Pittsburgh, PA)

1995-01-01T23:59:59.000Z

439

Liquid crystal device and method thereof  

DOE Patents [OSTI]

The invention provides a liquid crystal device and method thereof. Subsequent to applying a first electrical voltage on a liquid crystal to induce a reorientation of the liquid crystal, a second electrical voltage with proper polarity is applied on the liquid crystal to assist the relaxation of the reorientation that was induced by the first electrical voltage. The "switch-off" phase of the liquid crystal can therefore be accelerated or temporally shortened, and the device can exhibit better performance such as fast response to on/off signals. The invention can be widely used LCD, LC shutter, LC lens, spatial light modulator, telecommunication device, tunable filter, beam steering device, and electrically driven LC device, among others.

Shiyanovskii, Sergij V; Gu, Mingxia; Lavrentovich, Oleg D

2012-10-23T23:59:59.000Z

440

Noiseless nonreciprocity in a parametric active device  

E-Print Network [OSTI]

Nonreciprocal devices such as circulators and isolators belong to an important class of microwave components employed in applications like the measurement of mesoscopic circuits at cryogenic temperatures. The measurement protocols usually involve an amplification chain which relies on circulators to separate input and output channels and to suppress backaction from different stages on the sample under test. In these devices the usual reciprocal symmetry of circuits is broken by the phenomenon of Faraday rotation based on magnetic materials and fields. However, magnets are averse to on-chip integration, and magnetic fields are deleterious to delicate superconducting devices. Here we present a new proposal combining two stages of parametric modulation emulating the action of a circulator. It is devoid of magnetic components and suitable for on-chip integration. As the design is free of any dissipative elements and based on reversible operation, the device operates noiselessly, giving it an important advantage over other nonreciprocal active devices for quantum information processing applications.

Archana Kamal; John Clarke; Michel Devoret

2010-10-08T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

442

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

SciTech Connect (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

443

Floating seal system for rotary devices  

DOE Patents [OSTI]

This invention relates to a floating seal system for rotary devices to reduce gas leakage around the rotary device in a duct and across the face of the rotary device to an adjacent duct. The peripheral seal bodies are made of resilient material having a generally U-shaped cross section wherein one of the legs is secured to a support member and the other of the legs forms a contacting seal against the rotary device. The legs of the peripheral seal form an extended angle of intersection of about 10[degree] to about 30[degree] in the unloaded condition to provide even sealing forces around the periphery of the rotary device. The peripheral seal extends around the periphery of the support member except where intersected by radial seals which reduce gas leakage across the face of the rotary device and between adjacent duct portions. The radial seal assembly is fabricated from channel bars, the smaller channel bar being secured to the divider of the support member and a larger inverted rigid floating channel bar having its legs freely movable over the legs of the smaller channel bar forming therewith a tubular channel. A resilient flexible tube is positioned within the tubular channel for substantially its full length to reduce gas leakage across the tubular channel. A spacer extends beyond the face of the floating channel near each end of the floating channel a distance to provide desired clearance between the floating channel and the face of the rotary device. 5 figs.

Banasiuk, H.A.

1983-08-23T23:59:59.000Z

444

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-01-01T23:59:59.000Z

445

Integrated fuses for OLED lighting device  

DOE Patents [OSTI]

An embodiment of the present invention pertains to an electroluminescent lighting device for area illumination. The lighting device is fault tolerant due, in part, to the patterning of one or both of the electrodes into strips, and each of one or more of these strips has a fuse formed on it. The fuses are integrated on the substrate. By using the integrated fuses, the number of external contacts that are used is minimized. The fuse material is deposited using one of the deposition techniques that is used to deposit the thin layers of the electroluminescent lighting device.

Pschenitzka, Florian (San Jose, CA)

2007-07-10T23:59:59.000Z

446

Self bleaching photoelectrochemical-electrochromic device  

DOE Patents [OSTI]

A photoelectrochemical-electrochromic device comprising a first transparent electrode and a second transparent electrode in parallel, spaced relation to each other. The first transparent electrode is electrically connected to the second transparent electrode. An electrochromic material is applied to the first transparent electrode and a nanoporous semiconductor film having a dye adsorbed therein is applied to the second transparent electrode. An electrolyte layer contacts the electrochromic material and the nanoporous semiconductor film. The electrolyte layer has a redox couple whereby upon application of light, the nanoporous semiconductor layer dye absorbs the light and the redox couple oxidizes producing an electric field across the device modulating the effective light transmittance through the device.

Bechinger, Clemens S. (Konstanz, DE); Gregg, Brian A. (Golden, CO)

2002-04-09T23:59:59.000Z

447

Organic photosensitive devices using subphthalocyanine compounds  

DOE Patents [OSTI]

An organic photosensitive optoelectronic device, having a donor-acceptor heterojunction of a donor-like material and an acceptor-like material and methods of making such devices is provided. At least one of the donor-like material and the acceptor-like material includes a subphthalocyanine, a subporphyrin, and/or a subporphyrazine compound; and/or the device optionally has at least one of a blocking layer or a charge transport layer, where the blocking layer and/or the charge transport layer includes a subphthalocyanine, a subporphyrin, and/or a subporphyrazine compound.

Rand, Barry (Princeton, NJ); Forrest, Stephen R. (Ann Arbor, MI); Mutolo, Kristin L. (Hollywood, CA); Mayo, Elizabeth (Alhambra, CA); Thompson, Mark E. (Anaheim Hills, CA)

2011-07-05T23:59:59.000Z

448

Optoelectronic semiconductor device and method of fabrication  

DOE Patents [OSTI]

An optoelectronic device comprising an optically active layer that includes a plurality of domes is presented. The plurality of domes is arrayed in two dimensions having a periodicity in each dimension that is less than or comparable with the shortest wavelength in a spectral range of interest. By virtue of the plurality of domes, the optoelectronic device achieves high performance. A solar cell having high energy-conversion efficiency, improved absorption over the spectral range of interest, and an improved acceptance angle is presented as an exemplary device.

Cui, Yi; Zhu, Jia; Hsu, Ching-Mei; Fan, Shanhui; Yu, Zongfu

2014-11-25T23:59:59.000Z

449

Propeller based human powered swimming device  

E-Print Network [OSTI]

Currently the only human powered swimming device widely sold on the market are swim flippers. However, flippers are not efficient for the human body, and there is a potential to increase the speed while swimming with a ...

Bunker, Kristine (Kristine Alina)

2014-01-01T23:59:59.000Z

450

Polymer-based electrocaloric cooling devices  

DOE Patents [OSTI]

Cooling devices (i.e., refrigerators or heat pumps) based on polymers which exhibit a temperature change upon application or removal of an electrical field or voltage, (e.g., fluoropolymers or crosslinked fluoropolymers that exhibit electrocaloric effect).

Zhang, Qiming; Lu, Sheng-Guo; Li, Xinyu; Gorny, Lee; Cheng, Jiping; Neese, Bret P; Chu, Baojin

2014-10-28T23:59:59.000Z

451

Heat Transfer in Thermoelectric Materials and Devices  

E-Print Network [OSTI]

Solid-state thermoelectric devices are currently used in applications ranging from thermocouple sensors to power generators in space missions, to portable air-conditioners and refrigerators. With the ever-rising demand ...

Tian, Zhiting

452

Testing of Kaonetics Devices at BNL  

SciTech Connect (OSTI)

The goal of these measurements was to evaluate whether there is evidence of emission of X-rays, gamma-rays, and neutrons by devices developed by Kaonetics Technologies, Inc. during their operation.

Bolotnikov, A.; Smith, G.; and James, R.B.

2011-06-01T23:59:59.000Z

453

Durable Electrooptic Devices Comprising Ionic Liquids  

DOE Patents [OSTI]

Electrolyte solutions for electrochromic devices such as rear view mirrors and displays with low leakage currents are prepared using inexpensive, low conductivity conductors. Preferred electrolytes include bifunctional redox dyes and molten salt solvents with enhanced stability toward ultraviolet radiation. The solvents include lithium or quaternary ammonium cations, and perfluorinated sulfonylimide anions selected from trifluoromethylsulfonate (CF.sub.3SO.sub.3.sup.-), bis(trifluoromethylsulfonyl)imide ((CF.sub.3SO.sub.2).sub.2N.sup.-), bis(perfluoroethylsulfonyl)imide ((CF.sub.3CF.sub.2SO.sub.2).sub.2N.sup.-) and tris(trifluoromethylsulfonyl)methide ((CF.sub.3SO.sub.2).sub.3C.sup.-). Electroluminescent, electrochromic and photoelectrochromic devices with nanostructured electrodes include ionic liquids with bifunctional redox dyes. Some of the electrolyte solutions color to red when devices employing the solutions are powered, leading to red or neutral electrooptic devices.

Burrell, Anthony K. (Los Alamos, NM); Agrawal, Anoop (Tucson, AZ); Cronin, John P. (Tucson, AZ); Tonazzi, Juan C. L. (Tucson, AZ); Warner, Benjamin P. (Los Alamos, NM); McCleskey, T. Mark (Los Alamos, NM)

2008-11-11T23:59:59.000Z

454

Durable electrooptic devices comprising ionic liquids  

DOE Patents [OSTI]

Electrolyte solutions for electrochromic devices such as rear view mirrors and displays with low leakage currents are prepared using inexpensive, low conductivity conductors. Preferred electrolytes include bifunctional redox dyes and molten salt solvents with enhanced stability toward ultraviolet radiation. The solvents include lithium or quaternary ammonium cations, and perfluorinated sulfonylimide anions selected from trifluoromethylsulfonate (CF.sub.3SO.sub.3.sup.-), bis(trifluoromethylsulfonyl)imide ((CF.sub.3SO.sub.2).sub.2N.sup.-), bis(perfluoroethylsulfonyl)imide ((CF.sub.3CF.sub.2SO.sub.2).sub.2N.sup.-) and tris(trifluoromethylsulfonyl)methide ((CF.sub.3SO.sub.2).sub.3C.sup.-). Electroluminescent, electrochromic and photoelectrochromic devices with nanostructured electrodes include ionic liquids with bifunctional redox dyes. Some of the electrolyte solutions color to red when devices employing the solutions are powered, leading to red or neutral electrooptic devices.

Burrell, Anthony K. (Los Alamos, NM); Agrawal, Anoop (Tucson, AZ); Cronin; John P. (Tucson, AZ); Tonazzi, Juan C. L. (Tucson, AZ); Warner, Benjamin P. (Los Alamos, NM); McCleskey, T. Mark (Los Alamos, NM)

2009-12-15T23:59:59.000Z

455

Microelectronic Devices and Circuits - 2006 Electronic Edition  

E-Print Network [OSTI]

Combining semiconductor device physics and modeling with electronic circuit analysis and practice in a single sophomore/junior level microelectronics course, this textbook offers an integrated approach so students can truly ...

Fonstad, Clifton

2006-10-01T23:59:59.000Z

456

Asbestos : operating system security for mobile devices  

E-Print Network [OSTI]

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

457

Sinch : searching intelligently on a mobile device  

E-Print Network [OSTI]

Sinch is an application that allows mobile device users to obtain answers to their questions without having to perform a web search in their mobile browser. Questions are answered by human beings using Mechanical Turk, an ...

Nayak, Rajeev (Rajeev R.)

2010-01-01T23:59:59.000Z

458

Carbon nanotube polymer composition and devices  

DOE Patents [OSTI]

A thin film device and compound having an anode, a cathode, and at least one light emitting layer between the anode and cathode, the at least one light emitting layer having at least one carbon nanotube and a conductive polymer.

Liu, Gao (Oakland, CA); Johnson, Stephen (Richmond, CA); Kerr, John B. (Oakland, CA); Minor, Andrew M. (El Cerrito, CA); Mao, Samuel S. (Castro Valley, CA)

2011-06-14T23:59:59.000Z

459

Phosphorylation based insulation devices design and implementation  

E-Print Network [OSTI]

This thesis presents the analysis of a phosphorylation based insulation device implemented in Saccharomyces cerevisae and the minimization of the retroactivity to the input and retroactivity to the output of a single cycle ...

Rivera Ortiz, Phillip M. (Phillip Michael)

2013-01-01T23:59:59.000Z

460

Device integration for silicon microphotonic platforms  

E-Print Network [OSTI]

Silicon ULSI compatible, high index contrast waveguides and devices provide high density integration for optical networking and on-chip optical interconnects. Four such waveguide systems were fabricated and analyzed: ...

Lim, Desmond Rodney

2000-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Applications of Graphene Devices in RF Communications  

E-Print Network [OSTI]

Graphene, a one-atom-thick layer of carbon atoms arranged in a honeycomb lattice, has recently attracted great interest among physicists and engineers. The combination of the unique properties of graphene with new device ...

Palacios, Tomas

462

Advanced nanofabrication of thermal emission devices  

E-Print Network [OSTI]

Nanofabricated thermal emission devices can be used to modify and modulate blackbody thermal radiation. There are many areas in which altering thermal radiation is extremely useful, especially in static power conversion, ...

Hurley, Fergus (Fergus Gerard)

2008-01-01T23:59:59.000Z

463

Rating of Solar Energy Devices (Texas)  

Broader source: Energy.gov [DOE]

The Public Utility Commission has regulatory authority over solar energy devices installed and used in the state of Texas. The Commission can choose to adopt standards pertaining to the rating of...

464

Quantum error-correcting codes and devices  

DOE Patents [OSTI]

A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

Gottesman, Daniel (Los Alamos, NM)

2000-10-03T23:59:59.000Z

465

Application of microfluidic device to malaria diagnosis  

E-Print Network [OSTI]

Of many diagnostic devices and technology developed, microfluidics could be superior in terms of ease of fabrication, cost, portability, speed and sensitivity. The application of diagnosis of malaria infection by microfluidics ...

Zhang, Rou

2007-01-01T23:59:59.000Z

466

New Generation of Digital Microfluidic Devices  

E-Print Network [OSTI]

This paper reports on the design, fabrication, and performance of micro-sized fluidic devices that use electrowetting to control and transport liquids. Using standard microfabrication techniques, new pumping systems are ...

Abedian, Behrouz

467

Theoretical Analysis of Prospective Nanoelectronic Devices  

E-Print Network [OSTI]

, albeit at deep refrigeration. Alterna- tively, the comparator may be used for measurement of current (or . . . . . . . . . . . . . . . . 21 2.2.4 Charge Density . . . . . . . . . . . . . . . . . . . . . . 22 2.2.5 Device Current

468

Breakthrough: Fusion Research Leads to Antiterrorism Device  

ScienceCinema (OSTI)

How researchers at the Princeton Plasma Physics Laboratory developed an antiterrorism device that can detect and identify sources of dangerous radiation that could be used in a dirty bomb.

Gentile, Charles; Mastrovito, Dana; Prager Stewart

2014-05-23T23:59:59.000Z

469

Solid phase microextraction device using aerogel  

DOE Patents [OSTI]

A sample collection substrate of aerogel and/or xerogel materials bound to a support structure is used as a solid phase microextraction (SPME) device. The xerogels and aerogels may be organic or inorganic and doped with metals or other compounds to target specific chemical analytes. The support structure is typically formed of a glass fiber or a metal wire (stainless steel or kovar). The devices are made by applying gel solution to the support structures and drying the solution to form aerogel or xerogel. Aerogel particles may be attached to the wet layer before drying to increase sample collection surface area. These devices are robust, stable in fields of high radiation, and highly effective at collecting gas and liquid samples while maintaining superior mechanical and thermal stability during routine use. Aerogel SPME devices are advantageous for use in GC/MS analyses due to their lack of interfering background and tolerance of GC thermal cycling.

Miller, Fred S.; Andresen, Brian D.

2005-06-14T23:59:59.000Z

470

HIGH INTENSITY DISCHARGE (HID) SOLID STATE BALLAST PROGRAM PHASE I FINAL REPORT  

E-Print Network [OSTI]

change in the output power for the solid state ballast asof the solid state ballast's constant output power withswitching power supplies such as the solid state ballast.

Ailing, W.R.

2013-01-01T23:59:59.000Z

471

HIGH INTENSITY DISCHARGE (HID) SOLID STATE BALLAST PROGRAM PHASE I FINAL REPORT  

E-Print Network [OSTI]

A trapazoid for each type and lamp wattage is published bylamp wattage for the core-coil ballast was measured with a dynamometer type

Ailing, W.R.

2013-01-01T23:59:59.000Z

472

FUEL DEVICE REPLACEMENT Use this application to request a replacement fuel access device for a device that has been lost or stolen. Use and  

E-Print Network [OSTI]

FUEL DEVICE REPLACEMENT Use this application to request a replacement fuel access device as those explained in the original Fuel Device Application and for your convenience provided on this form Information Lost Stolen Unknown Date of last known use Certification of Use I certify that fuel access device

Kirschner, Denise

473

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

474

Design and Fabrication of Nanochannel Devices  

E-Print Network [OSTI]

and Stage 2 can be shifted horizontally to x-direction by rotating the handle. Butane torch is placed under the tubing to heat it up. The inset shows the deformation of the tubing under the heat and stretching??????? ..29 Fig. 12 SEM images... pace. In 1990s, a research interest in fluid handling microchannel devices boosted because of their genomics application and potential capability in bio/chemical agent detection. Now the fabrication techniques have pushed those devices down...

Wang, Miao

2010-10-12T23:59:59.000Z

475

Radiation effects in optoelectronic devices. [Review  

SciTech Connect (OSTI)

Purpose of this report is to provide not only a summary of radiation damage studies at Sandia National Laboratories, but also of those in the literature on the components of optoelectronic systems: light emitting diodes (LEDs), laser diodes, photodetectors, optical fibers, and optical isolators. This review of radiation damage in optoelectronic components is structured according to device type. In each section, a brief discussion of those device properties relevant to radiation effects is given.

Barnes, C.E.; Wiczer, J.J.

1984-05-01T23:59:59.000Z

476

A Tutorial on Automatic Speech Recognition for Wireless Mobile Devices  

E-Print Network [OSTI]

will consist of a survey of existing mobile ASR applications, architecures, and supporting technology technology including specialized transducers, specialized devices,and language resources for mobile, and supporting technology 1. ASR applications on handheld, mobile devices Portable Devices processing power

Rose, Richard

477

Wireless Electricity Metering of Miscellaneous and Electronic Devices in Buildings  

E-Print Network [OSTI]

Wireless Electricity Metering of Miscellaneous and Electronic Devices in Buildings, University of California, Berkeley, USA Abstract- Miscellaneous and electronic devices hundreds of miscellaneous and electronic devices where metered for several months

Culler, David E.

478

Biomimetic self-assembly of a functional asymmetrical electronic device  

E-Print Network [OSTI]

Biomimetic self-assembly of a functional asymmetrical electronic device Mila Boncheva, David H a biomimetic strategy for the fabrication of asymmetrical, three-dimensional electronic devices modeled distinct microelectronic elements into a multidomain electronic device with asymmet- rical structure

Prentiss, Mara

479

Translating semiconductor device physics into nanoparticle films for electronic applications  

E-Print Network [OSTI]

This thesis explores and quantifies some of the important device physics, parameters, and mechanisms of semiconductor nanocrystal quantum dot (QD) electronic devices, and photovoltaic devices in particular. This involves ...

Wanger, Darcy Deborah

2014-01-01T23:59:59.000Z

480

Device Transparency: a New Model for Mobile Storage  

E-Print Network [OSTI]

This paper proposes a new storage model, device transparency, in which users view and manage their entire data collection from any of their devices, even from disconnected storage-limited devices holding only a subset of ...

Strauss, Jacob A.

Note: This page contains sample records for the topic "device hid vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Quantum heat engines and refrigerators: Continuous devices  

E-Print Network [OSTI]

Quantum thermodynamics supplies a consistent description of quantum heat engines and refrigerators up to the level of a single few level system coupled to the environment. Once the environment is split into three;a hot, cold and work reservoirs a heat engine can operate. The device converts the positive gain into power;where the gain is obtained from population inversion between the components of the device. Reversing the operation transforms the device into a quantum refrigerator. The quantum tricycle, a device connected by three external leads to three heat reservoirs is used as a template for engines and refrigerators. The equation of motion for the heat currents and power can be derived from first principle. Only a global description of the coupling of the device to the reservoirs is consistent with the first and second laws of thermodynamics. Optimisation of the devices leads to a balanced set of parameters where the couplings to the three reservoirs are of the same order and the external driving field is in resonance. When analysing refrigerators special attention is devoted to a dynamical version of the third law of thermodynamics. Bounds on the rate of cooling when approaching the absolute zero are obtained by optimising the cooling current. At low temperature all refrigerators show universal behavior. Restrictions on the system imposed by the dynamical version of the third law are studied.

Ronnie Kosloff; Amikam Levy

2013-10-02T23:59:59.000Z

482

Methods and devices for fabricating and assembling printable semiconductor elements  

DOE Patents [OSTI]

The invention provides methods and devices for fabricating printable semiconductor elements and assembling printable semiconductor elements onto substrate surfaces. Methods, devices and device components of the present invention are capable of generating a wide range of flexible electronic and optoelectronic devices and arrays of devices on substrates comprising polymeric materials. The present invention also provides stretchable semiconductor structures and stretchable electronic devices capable of good performance in stretched configurations.

Nuzzo, Ralph G. (Champaign, IL); Rogers, John A. (Champaign, IL); Menard, Etienne (Urbana, IL); Lee, Keon Jae (Savoy, IL); Khang, Dahl-Young (Urbana, IL); Sun, Yugang (Champaign, IL); Meitl, Matthew (Champaign, IL); Zhu, Zhengtao (Urbana, IL)

2009-11-24T23:59:59.000Z

483

Methods and devices for fabricating and assembling printable semiconductor elements  

DOE Patents [OSTI]

The invention provides methods and devices for fabricating printable semiconductor elements and assembling printable semiconductor elements onto substrate surfaces. Methods, devices and device components of the present invention are capable of generating a wide range of flexible electronic and optoelectronic devices and arrays of devices on substrates comprising polymeric materials. The present invention also provides stretchable semiconductor structures and stretchable electronic devices capable of good performance in stretched configurations.

Nuzzo, Ralph G; Rogers, John A; Menard, Etienne; Lee, Keon Jae; Khang, Dahl-Young; Sun, Yugang; Meitl, Matthew; Zhu, Zhengtao

2013-05-14T23:59:59.000Z

484

Methods and devices for fabricating and assembling printable semiconductor elements  

DOE Patents [OSTI]

The invention provides methods and devices for fabricating printable semiconductor elements and assembling printable semiconductor elements onto substrate surfaces. Methods, devices and device components of the present invention are capable of generating a wide range of flexible electronic and optoelectronic devices and arrays of devices on substrates comprising polymeric materials. The present invention also provides stretchable semiconductor structures and stretchable electronic devices capable of good performance in stretched configurations.

Nuzzo, Ralph G; Rogers, John A; Menard, Etienne; Lee, Keon Jae; Khang, Dahl-Young; Sun, Yugang; Meitl, Matthew; Zhu, Zhengtao

2014-03-04T23:59:59.000Z

485

Methods and devices for fabricating and assembling printable semiconductor elements  

DOE Patents [OSTI]

The invention provides methods and devices for fabricating printable semiconductor elements and assembling printable semiconductor elements onto substrate surfaces. Methods, devices and device components of the present invention are capable of generating a wide range of flexible electronic and optoelectronic devices and arrays of devices on substrates comprising polymeric materials. The present invention also provides stretchable semiconductor structures and stretchable electronic devices capable of good performance in stretched configurations.

Nuzzo, Ralph G. (Champaign, IL); Rogers, John A. (Champaign, IL); Menard, Etienne (Durham, NC); Lee, Keon Jae (Daejeon, KR); Khang, Dahl-Young (Urbana, IL); Sun, Yugang (Champaign, IL); Meitl, Matthew (Raleigh, NC); Zhu, Zhengtao (Urbana, IL)

2011-07-19T23:59:59.000Z

486

Cooling of superconducting devices by liquid storage and refrigeration unit  

DOE Patents [OSTI]

A system is disclosed for cooling superconducting devices. The system includes a cryogen cooling system configured to be coupled to the superconducting device and to supply cryogen to the device. The system also includes a cryogen storage system configured to supply cryogen to the device. The system further includes flow control valving configured to selectively isolate the cryogen cooling system from the device, thereby directing a flow of cryogen to the device from the cryogen storage system.

Laskaris, Evangelos Trifon; Urbahn, John Arthur; Steinbach, Albert Eugene

2013-08-20T23:59:59.000Z

487

Cathodoluminescence from a device of carbon nanotube-field emission...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cathodoluminescence from a device of carbon nanotube-field emission display with ZnO nanocluster phosphor. Cathodoluminescence from a device of carbon nanotube-field emission...

488

Advanced, High Power, Next Scale, Wave Energy Conversion Device...  

Broader source: Energy.gov (indexed) [DOE]

Advanced, High Power, Next Scale, Wave Energy Conversion Device Advanced, High Power, Next Scale, Wave Energy Conversion Device Advanced, High Power, Next Scale, Wave Energy...

489

Nanoscale contact engineering for Si/Silicide nanowire devices.  

E-Print Network [OSTI]

??Metal silicides have been used in silicon technology as contacts to achieve high device performance and desired device functions. The growth and applications of silicide (more)

Lin, Yung-Chen

2012-01-01T23:59:59.000Z

490

Nanosized Optoelectronic Devices Based on Photoactivated Proteins Alice Dimonte,*,  

E-Print Network [OSTI]

Nanosized Optoelectronic Devices Based on Photoactivated Proteins Alice Dimonte,*, Stefano Frache gold electrodes have been used to develop optoelectronic devices based on photoactive proteins

De Micheli, Giovanni

491

articular prosthetic device: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Device Analysis CiteSeer Summary: AbstractThe increased usage and proliferation of small scale digital devices, like celluar (mobile) phones has led to the emergence of...

492

Overview of Research on Thermoelectric Materials and Devices...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Research on Thermoelectric Materials and Devices in China Overview of Research on Thermoelectric Materials and Devices in China An overview presentation of R&D projects on...

493

Testing, Training, and Signature Devices | Y-12 National Security...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Testing, Training, and ... Testing, Training, and Signature Devices Y-12 manufactures specialized uranium testing, training, and signature devices to support the nuclear detection...

494

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Rapid Aging Protocols for Diesel Aftertreatment Devices: NOx Abatement Catalysts Poster...

495

Development of a Thermoelectric Device for an Automotive Zonal...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Thermoelectric Device for an Automotive Zonal HVAC System Development of a Thermoelectric Device for an Automotive Zonal HVAC System Presents development of a thermoelectric...

496

High Temperature, High Pressure Devices for Zonal Isolation in...  

Broader source: Energy.gov (indexed) [DOE]

High Temperature, High Pressure Devices for Zonal Isolation in Geothermal Wells High Temperature, High Pressure Devices for Zonal Isolation in Geothermal Wells High Temperature,...

497

High Temperature, High Pressure Devices for Zonal Isolation in...  

Broader source: Energy.gov (indexed) [DOE]

Temperature, High Pressure Devices for Zonal Isolation in Geothermal Wells High Temperature, High Pressure Devices for Zonal Isolation in Geothermal Wells DOE Geothermal Peer...

498

Emission Zone Control in Blue Organic Electrophosphorescent Devices...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Zone Control in Blue Organic Electrophosphorescent Devices Through Chemical Modification of Host Materials . Emission Zone Control in Blue Organic Electrophosphorescent Devices...

499

Theory and fabrication of evanescently-coupled photoluminescent devices  

E-Print Network [OSTI]

This thesis discusses the theory and implementation of evanescently-coupled photoluminescent devices. We demonstrate the feasibility of efficient, spectrally tunable lighting devices through quantum dot photoluminescence. ...

Friend, David Harry

2008-01-01T23:59:59.000Z

500

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z