Sample records for device hid vulnerability

  1. T-547: Microsoft Windows Human Interface Device (HID) Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer.

  2. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  3. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

  4. Study of high frequency & low frequency electronic ballasts for HID lamps

    E-Print Network [OSTI]

    Peng, Hua

    1997-01-01T23:59:59.000Z

    High-intensity discharge (HID) lamp electronic ballasting is receiving increasing attention in the recent years as low wattage HID lighting systems are finding indoor applications. Advantages of high frequency electronic ballast for HID lamps...

  5. Application of vane-type resonator to microwave powered electrodeless HID lamp

    SciTech Connect (OSTI)

    Hochi, Akira; Takeda, Mamoru

    1999-07-01T23:59:59.000Z

    A cavity resonator has been generally used as microwave applicator for an electrodeless high intensity discharge (HID) lamp. The size of a cavity resonator is determined by the wavelength of a microwave applied. For example, for a microwave of 2.45 GHz, an inner diameter of more than about 76 mm is necessary for obtaining a microwave resonant field, and then the size of a plasma arc capable of maintaining a stable discharge is experimentally limited at about 15 mm and above. Accordingly the microwave powered electrodeless HID lamp device using cavity resonator is inappropriate in applications where a point light source is required. A vane-type resonator is generally known as an anode of a magnetron, which decides the oscillation frequency of the magnetron. The authors used 3-D finite element method simulation for a design of a vane-type resonator with parabolic reflector to obtain a desired resonant frequency. According to the results of the simulation, the sizes of a 4-vanes resonator with the parabolic reflector were decided, and the resonator made of aluminum and copper was prepared. An electrodeless lamp with InBr and Ar gas enclosed in a spherical quartz glass tube having an inner diameter of about 4 mm was also prepared, and was set at center portion of the resonator. The total luminous flux was about 2,150 lm at microwave input of 27 W. Incidentally, the CRI and Tc for this lamp were 93 and 10,200 K, respectively. Thus, it becomes possible to efficiently couple microwave energy with a smaller-sized electrodeless HID lamp than conventional.

  6. Electrodeless HID lamp study. Final report. [High intensity discharge

    SciTech Connect (OSTI)

    Anderson, J.M.; Johnson, P.D.; Jones, C.E.; Rautenberg, T.H.

    1985-01-01T23:59:59.000Z

    High intensity discharge lamps excited by solenoidal electric fields (SEF/HID) were examined for their ability to give high brightness, high efficacy and good color. Frequency of operation was 13.56 MHz (ISM Band) and power to the lamp plasma ranged from about 400 to 1000 W. Radio frequency transformers with air cores and with air core complemented by ferrite material in the magnetic path were used to provide the voltage for excitation. Electrical properties of the matching network and the lamp plasma were measured or calculated and total light from the lamp was measured by an integrating sphere. Efficacies calculated from measurement were found to agree well with the positive column efficacies of conventional HID lamps containing only mercury, and with additives of sodium, thallium, and scandium iodide. Recommendations for future work are given.

  7. Plasma spectroscopic study of an electrodeless HID lamp containing Tl and Zn

    SciTech Connect (OSTI)

    Takeda, Mamoru; Horii, Shigeru; Hochi, Akira [Matsushita Electric Industrial Co., Ltd., Kyoto (Japan). Lighting Research Lab.

    1996-12-31T23:59:59.000Z

    Recently the electrodeless HID lamps excited by microwaves have been studied intensively. Tl is well known as a material having strong green emission lines. In this study, Tl spectra excited by microwaves were reported in the cases of Tl only and Tl + Zn. Using the Elenbaas`s method of high pressure Hg lamp, the cause of Tl continuous spectrum was examined. From the ratio of radiative intensities of two lines, an average arc temperature in the bulb was estimated. Then excitation level of the continuous emission spectrum near the 600nm wavelength was calculated from the dependence of the radiative intensities on these arc temperatures.

  8. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01T23:59:59.000Z

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  9. Vulnerability Scanning Policy 1 Introduction

    E-Print Network [OSTI]

    Vulnerability Scanning Policy 1 Introduction Vulnerability scanning is an important and necessary and can alert system administrators to potentially serious problems. However vulnerability scanning also to compromise system security. The following policy details the conditions under which vulnerability scans may

  10. IEEE Power Electronics Specialists Conference, PESC-97, 39-45, St. Louis, 1997. A MHz Electronic Ballast for Automotive-Type HID Lamps

    E-Print Network [OSTI]

    Ballast for Automotive-Type HID Lamps Michael Gulko and Sam Ben-Yaakov* Power Electronics Laboratory lamps designated for automotive headlight applications was investigated theoretically, by simulation and experimentally. The study reveals that a based ballast (CS-PPRI) complies with the automotive requirement of very

  11. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  12. Ecosystem Vulnerability Assessment - Patterns of Climate Change...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

  13. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01T23:59:59.000Z

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  14. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    NONE

    1995-03-01T23:59:59.000Z

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  15. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

    2012-01-01T23:59:59.000Z

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  16. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  17. Nuclear Fuel Cycle & Vulnerabilities

    SciTech Connect (OSTI)

    Boyer, Brian D. [Los Alamos National Laboratory

    2012-06-18T23:59:59.000Z

    The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

  18. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  19. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  20. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01T23:59:59.000Z

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  1. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  2. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  3. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Office of Environmental Management (EM)

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  4. Power Grid Vulnerability to Geographically Correlated Failures

    E-Print Network [OSTI]

    Shepard, Kenneth

    Power Grid Vulnerability to Geographically Correlated Failures ­ Analysis and Control Implications such as telecommunications networks [14]. The power grid is vulnerable to natural disasters, such as earthquakes, hurricanes [17], [34]. Thus, we focus on the vulnerability of the power grid to an outage of several lines

  5. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01T23:59:59.000Z

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  6. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  7. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy...

  8. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01T23:59:59.000Z

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  9. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  10. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01T23:59:59.000Z

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  11. 5/23/13 EBSCOhost ehis.ebscohost.com.libproxy.mit.edu/ehost/delivery?sid=24f6d6e6-10b5-495d-90c9-221fc19a83fe%40sessionmgr114&vid=5&hid=107 1/2

    E-Print Network [OSTI]

    Deutch, John

    technological applications. Secretary of Energy James Watkins has argued that "it takes vision and courage-221fc19a83fe%40sessionmgr114&vid=5&hid=107 1/2 Database: Section: Record: 1 A supercollision of interests. By: Deutch, John M. Technology Review (00401692). Nov/Dec92, Vol. 95 Issue 8, p66. 1p. 1 Black

  12. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  13. SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

  14. SUPERCONDUCTING DEVICES

    E-Print Network [OSTI]

    Clarke, John

    2014-01-01T23:59:59.000Z

    communications. References Superconductor Applications: ~on all aspects of superconducting devices. IEEE Trans.on all aspects vf superconducting devices. The IBM Journal

  15. SUPERCONDUCTING DEVICES

    E-Print Network [OSTI]

    Clarke, John

    2014-01-01T23:59:59.000Z

    on all aspects of superconducting devices. IEEE Trans.on all aspects vf superconducting devices. The IBM JournalJ. Matisoo, The Superconducting Computer," Scientific

  16. attitudes perceived vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Summary: BIODIVERSITY RESEARCH Assessing species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner-...

  17. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  18. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  19. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  20. aquifer contamination vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

  1. V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...

    Broader source: Energy.gov (indexed) [DOE]

    0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

  2. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier, E-mail: jjtoroca@unal.edu.co [Institute of Environmental Studies, National University of Colombia, Bogota (Colombia); Duarte, Oscar, E-mail: ogduartev@unal.edu.co [Department of Electrical and Electronics Engineering, National University of Colombia, Bogota (Colombia); Requena, Ignacio, E-mail: requena@decsai.ugr.es [Department of Computer Science and Artificial Intelligence, University of Granada (Spain); Zamorano, Montserrat, E-mail: zamorano@ugr.es [Department of Civil Engineering, University of Granada (Spain)

    2012-01-15T23:59:59.000Z

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  3. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  4. Structural Vulnerability Assessment of Electric Power Grids

    E-Print Network [OSTI]

    Koç, Yakup; Kooij, Robert E; Brazier, Frances M T

    2013-01-01T23:59:59.000Z

    Cascading failures are the typical reasons of black- outs in power grids. The grid topology plays an important role in determining the dynamics of cascading failures in power grids. Measures for vulnerability analysis are crucial to assure a higher level of robustness of power grids. Metrics from Complex Networks are widely used to investigate the grid vulnerability. Yet, these purely topological metrics fail to capture the real behaviour of power grids. This paper proposes a metric, the effective graph resistance, as a vulnerability measure to de- termine the critical components in a power grid. Differently than the existing purely topological measures, the effective graph resistance accounts for the electrical properties of power grids such as power flow allocation according to Kirchoff laws. To demonstrate the applicability of the effective graph resistance, a quantitative vulnerability assessment of the IEEE 118 buses power system is performed. The simulation results verify the effectiveness of the effect...

  5. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  6. Cancer Vulnerabilities Unveiled by Genomic Loss

    E-Print Network [OSTI]

    Nijhawan, Deepak

    Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

  7. Daydreaming Devices

    E-Print Network [OSTI]

    Da Ponte, Ana Sofia Lopes

    2008-01-01T23:59:59.000Z

    Daydreaming Devices is a project on aspects of daydream and the design of convertible furniture within the context of art. This thesis addresses the concepts and the design of two daydreaming devices developed during my ...

  8. 5/23/13 EBSCOhost ehis.ebscohost.com.libproxy.mit.edu/ehost/delivery?sid=24f6d6e6-10b5-495d-90c9-221fc19a83fe%40sessionmgr114&vid=5&hid=107 1/2

    E-Print Network [OSTI]

    Deutch, John

    -221fc19a83fe%40sessionmgr114&vid=5&hid=107 1/2 Database: Section: Record: 1 Cool thoughts on global warming. By: Deutch, J.M. Technology Review (00401692). May/Jun92, Vol. 95 Issue 4, p73. 1p. 1 Black on actions-such as those encouraging energy efficiency-that cost little and that have other benefits besides

  9. 5/23/13 EBSCOhost ehis.ebscohost.com.libproxy.mit.edu/ehost/delivery?sid=24f6d6e6-10b5-495d-90c9-221fc19a83fe%40sessionmgr114&vid=7&hid=107 1/2

    E-Print Network [OSTI]

    Deutch, John

    strike plan, and the number and types of nuclear delivery systems required to meet future security needs power. U.S. nuclear forces can deter aggression in unstable regions of the world. Saddam Hussein hasd6e6-10b5-495d-90c9-221fc19a83fe%40sessionmgr114&vid=7&hid=107 2/2 hard-line leadership of China

  10. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  11. Assessment of Chemical and Radiological Vulnerabilities

    SciTech Connect (OSTI)

    SETH, S.S.

    2000-05-17T23:59:59.000Z

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities.

  12. Sealing device

    SciTech Connect (OSTI)

    Garcia-Crespo, Andres Jose

    2013-12-10T23:59:59.000Z

    A sealing device for sealing a gap between a dovetail of a bucket assembly and a rotor wheel is disclosed. The sealing device includes a cover plate configured to cover the gap and a retention member protruding from the cover plate and configured to engage the dovetail. The sealing device provides a seal against the gap when the bucket assemply is subjected to a centrifugal force.

  13. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  14. Bluetooth Vulnerabilities ECE 478 Winter 05

    E-Print Network [OSTI]

    Bluetooth Vulnerabilities ECE 478 Winter 05 Victor Yee #12;Topics · What is Bluetooth? · History ­ Automobiles #12;What is Bluetooth? · Short-range (10m-100m) wireless specification · Operating at 2.4GHz radio 2Mb/s #12;History · Named from Danish King Harold Bluetooth from the 10th century ­ instrumental

  15. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  16. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  17. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  18. PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Hultman, Nathan E.

    PNNL-SA-33642 VULNERABILITY TO CLIMATE CHANGE A Quantitative Approach R. H. Moss A. L. Brenkert E@ntis.fedworld.gov Online ordering: http://www.ntis.gov/ordering.htm #12;iii EXECUTIVE SUMMARY The PNNL Vulnerability

  19. Empirical Estimates and Observations of 0Day Vulnerabilities

    SciTech Connect (OSTI)

    Miles A. McQueen; Trevor A. McQueen; Wayne F. Boyer; May R. Chaffin

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to a system from exploit of vulnerabilities which are not generally known to the public or, most importantly, to the owners of the system. Using the 0Day definition given above, we analyzed the 0Day lifespans of 491 vulnerabilities and conservatively estimated that in the worst year there were on average 2500 0Day vulnerabilities in existence on any given day. Then using a small but intriguing set of 15 0Day vulnerability lifespans representing the time from actual discovery to public disclosure, we made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day vulnerabilities in existence on any given day.

  20. DECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL

    E-Print Network [OSTI]

    Wang, Hai

    , telecommunications, water supply, wastewater, electric power and other energy infrastructure. Event databasesDECISION-MAKING AND THE VULNERABILITY OF INTERDEPENDENT CRITICAL INFRASTRUCTURE Zimmerman, R interdependencies, extreme events, vulnerability assessment 1 Introduction The provision of infrastructure services

  1. Cyber Vulnerability Disclosure Policies for the Department of Electrical and

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber Vulnerability Disclosure Policies for the Smart Grid Adam Hahn Department of Electrical ATTRIBUTES The "Vulnerability Disclosure Framework" developed by the National Infrastructure Advisory Council Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Email: gmani

  2. Vulnerability assessment of water supply systems for insufficient fire flows

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15T23:59:59.000Z

    supply systems are vulnerable to many forms of terrorist acts, most of the vulnerability analysis studies on these systems have been for chemical and biological threats. Because of the interdependency of water supply infrastructure and emergency fire...

  3. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  4. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  5. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  6. Electrochromic devices

    DOE Patents [OSTI]

    Allemand, Pierre M. (Tucson, AZ); Grimes, Randall F. (Ann Arbor, MI); Ingle, Andrew R. (Tucson, AZ); Cronin, John P. (Tucson, AZ); Kennedy, Steve R. (Tuscon, AZ); Agrawal, Anoop (Tucson, AZ); Boulton, Jonathan M. (Tucson, AZ)

    2001-01-01T23:59:59.000Z

    An electrochromic device is disclosed having a selective ion transport layer which separates an electrochemically active material from an electrolyte containing a redox active material. The devices are particularly useful as large area architectural and automotive glazings due to there reduced back reaction.

  7. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01T23:59:59.000Z

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  8. Device Performance

    SciTech Connect (OSTI)

    Not Available

    2006-06-01T23:59:59.000Z

    In the Device Performance group, within the National Center for Photovoltaic's Measurements and Characterization Division, we measure the performance of PV cells and modules with respect to standard reporting conditions--defined as a reference temperature (25 C), total irradiance (1000 Wm-2), and spectral irradiance distribution (IEC standard 60904-3). Typically, these are ''global'' reference conditions, but we can measure with respect to any reference set. To determine device performance, we conduct two general categories of measurements: spectral responsivity (SR) and current versus voltage (I-V). We usually perform these measurements using standard procedures, but we develop new procedures when required by new technologies. We also serve as an independent facility for verifying device performance for the entire PV community. We help the PV community solve its special measurement problems, giving advice on solar simulation, instrumentation for I-V measurements, reference cells, measurement procedures, and anomalous results. And we collaborate with researchers to analyze devices and materials.

  9. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15T23:59:59.000Z

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  10. Electrochemical device

    DOE Patents [OSTI]

    Grimes, Patrick G. (Westfield, NJ); Einstein, Harry (Springfield, NJ); Bellows, Richard J. (Westfield, NJ)

    1988-01-12T23:59:59.000Z

    A tunnel protected electrochemical device features channels fluidically communicating between manifold, tunnels and cells. The channels are designed to provide the most efficient use of auxiliary power. The channels have a greater hydraulic pressure drop and electrical resistance than the manifold. This will provide a design with the optimum auxiliary energy requirements.

  11. Detection device

    DOE Patents [OSTI]

    Smith, J.E.

    1981-02-27T23:59:59.000Z

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  12. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01T23:59:59.000Z

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power...

  14. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  15. Antioch University and EPA Webinar: Assessing Vulnerability of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Webinar: Assessing Vulnerability of Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing...

  16. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  17. areas vulnerabilities impacts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

  18. assessing infrastructure vulnerability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

  19. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Broader source: Energy.gov (indexed) [DOE]

    DMZs, the corporate network, and the outside. In an on-site assessment, while scanning for vulnerabilities on the CS network, the assessment team discovered IP addresses...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Belgium) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Belgium Coordinates...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Czech Republic) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Czech Republic...

  5. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

  6. Empirical Estimates of 0Day Vulnerabilities in Control Systems

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Sean M. McBride; Trevor A. McQueen

    2009-01-01T23:59:59.000Z

    We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems the risk contribution from 0Days will have proportionally increased. To aid understanding of how great a risk 0Days may pose to control systems, an estimate of how many are in existence is needed. Consequently, using the 0Day definition given above, we developed and applied a method for estimating how many 0Day vulnerabilities are in existence on any given day. The estimate is made by: empirically characterizing the distribution of the lifespans, measured in days, of 0Day vulnerabilities; determining the number of vulnerabilities publicly announced each day; and applying a novel method for estimating the number of 0Day vulnerabilities in existence on any given day using the number of vulnerabilities publicly announced each day and the previously derived distribution of 0Day lifespans. The method was first applied to a general set of software applications by analyzing the 0Day lifespans of 491 software vulnerabilities and using the daily rate of vulnerability announcements in the National Vulnerability Database. This led to a conservative estimate that in the worst year there were, on average, 2500 0Day software related vulnerabilities in existence on any given day. Using a smaller but intriguing set of 15 0Day software vulnerability lifespans representing the actual time from discovery to public disclosure, we then made a more aggressive estimate. In this case, we estimated that in the worst year there were, on average, 4500 0Day software vulnerabilities in existence on any given day. We then proceeded to identify the subset of software applications likely to be used in some control systems, analyzed the associated subset of vulnerabilities, and characterized their lifespans. Using the previously developed method of analysis, we very conservatively estimated 250 control system related 0Day vulnerabilities in existence on any given day. While reasonable, this first order estimate for control systems is probably far more conservative than those made for general software systems since the estimate did not include vulnerabilities unique to control system specific components. These control system specific vulnerabilities were unable to be included in the estimate for a variety of reasons with the most problematic being that the public announcement of unique control system vulnerabilities is very sparse. Consequently, with the intent to improve the above 0Day estimate for control systems, we first identified the additional, unique to control systems, vulnerability estimation constraints and then investigated new mechanisms which may be useful for estimating the number of unique 0Day software vulnerabilities found in control system components. We proceeded to identify a number of new mechanisms and approaches for estimating and incorporating control system specific vulnerabilities into an improved 0Day estimation method. These new mechanisms and approaches appear promising and will be more rigorously evaluated during the course of the next year.

  7. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14T23:59:59.000Z

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  8. Importance-Scanning Worm Using Vulnerable-Host Distribution

    E-Print Network [OSTI]

    Ji, Chuanyi

    Importance-Scanning Worm Using Vulnerable-Host Distribution Zesheng Chen School of Electrical scanning. The distribution of vulnerable hosts on the Internet, however, is highly non- uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent

  9. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  10. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  11. Defense of Trust Management Vulnerabilities in Distributed Networks

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun , Zhu Han into distributed networks, the vulnerabilities in trust establishment methods, and the defense mechanisms. Five networks inherently rely on cooper- ation among distributed entities. However, coopera- tion is fragile

  12. Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011 The following) section on Chemical-Terrorism Vulnerability Information (CVI) 6 CFR 27.400. The Program Manager's comments.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating

  13. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01T23:59:59.000Z

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  14. Diversionary device

    DOE Patents [OSTI]

    Grubelich, Mark C. (Albuquerque, NM)

    2001-01-01T23:59:59.000Z

    A diversionary device has a housing having at least one opening and containing a non-explosive propellant and a quantity of fine powder packed within the housing, with the powder being located between the propellant and the opening. When the propellant is activated, it has sufficient energy to propel the powder through the opening to produce a cloud of powder outside the housing. An igniter is also provided for igniting the cloud of powder to create a diversionary flash and bang, but at a low enough pressure to avoid injuring nearby people.

  15. OLED devices

    DOE Patents [OSTI]

    Sapochak, Linda Susan [Arlington, VA; Burrows, Paul Edward [Kennewick, WA; Bimalchandra, Asanga [Richland, WA

    2011-02-22T23:59:59.000Z

    An OLED device having an emission layer formed of an ambipolar phosphine oxide host material and a dopant, a hole transport layer in electrical communication with an anode, an electron transport layer in communication with a cathode, wherein the HOMO energy of the hole transport layer is substantially the same as the HOMO energy of the ambipolar host in the emission layer, and the LUMO energy of the electron transport layer is substantially the same as the LUMO energy of the ambipolar host in the emission layer.

  16. Electrochromic device

    SciTech Connect (OSTI)

    Schwendemanm, Irina G. (Wexford, PA); Polcyn, Adam D. (Pittsburgh, PA); Finley, James J. (Pittsburgh, PA); Boykin, Cheri M. (Kingsport, TN); Knowles, Julianna M. (Apollo, PA)

    2011-03-15T23:59:59.000Z

    An electrochromic device includes a first substrate spaced from a second substrate. A first conductive member is formed over at least a portion of the first substrate. A first electrochromic material is formed over at least a portion of the first conductive member. The first electrochromic material includes an organic material. A second conductive member is formed over at least a portion of the second substrate. A second electrochromic material is formed over at least a portion of the second conductive member. The second electrochromic material includes an inorganic material. An ionic liquid is positioned between the first electrochromic material and the second electrochromic material.

  17. HID Laboratories Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEI ReferenceJumpEnergyStrategy | Open Energy Sector:Ergenics Inc

  18. Optoelectronic device

    DOE Patents [OSTI]

    Bonekamp, Jeffrey E.; Boven, Michelle L.; Gaston, Ryan S.

    2014-09-09T23:59:59.000Z

    The invention is an optoelectronic device comprising an active portion which converts light to electricity or converts electricity to light, the active portion having a front side for the transmittal of the light and a back side opposite from the front side, at least two electrical leads to the active portion to convey electricity to or from the active portion, an enclosure surrounding the active portion and through which the at least two electrical leads pass wherein the hermetically sealed enclosure comprises at the front side of the active portion a barrier material which allows for transmittal of light, one or more getter materials disposed so as to not impede the transmission of light to or from the active portion, and a contiguous gap pathway to the getter material which pathway is disposed between the active portion and the barrier material.

  19. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  20. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10T23:59:59.000Z

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  1. Laser device

    DOE Patents [OSTI]

    Scott, Jill R. (Idaho Falls, ID); Tremblay, Paul L. (Idaho Falls, ID)

    2007-07-10T23:59:59.000Z

    A laser device includes a target position, an optical component separated a distance J from the target position, and a laser energy source separated a distance H from the optical component, distance H being greater than distance J. A laser source manipulation mechanism exhibits a mechanical resolution of positioning the laser source. The mechanical resolution is less than a spatial resolution of laser energy at the target position as directed through the optical component. A vertical and a lateral index that intersect at an origin can be defined for the optical component. The manipulation mechanism can auto align laser aim through the origin during laser source motion. The laser source manipulation mechanism can include a mechanical index. The mechanical index can include a pivot point for laser source lateral motion and a reference point for laser source vertical motion. The target position can be located within an adverse environment including at least one of a high magnetic field, a vacuum system, a high pressure system, and a hazardous zone. The laser source and an electro-mechanical part of the manipulation mechanism can be located outside the adverse environment. The manipulation mechanism can include a Peaucellier linkage.

  2. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  3. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01T23:59:59.000Z

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  4. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  5. Assessing the vulnerability of the fiber infrastructure to disasters

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

  6. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  7. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  8. Researchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability

    E-Print Network [OSTI]

    Nagurney, Anna

    , electrical power supply chains and telecommunications networks. University of Massachusetts Amherst components like roads, electrical power stations or transmission lines are destroyed and captures how usersResearchers Develop Tool to Assess Supernetwork Efficiency and Vulnerability Natural disasters

  9. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    , electric power, smart grid, critical infrastructure, emergency and disaster pre- paredness, mergers for the determination of network vulnerability and robustness, since critical infrastructure networks from transportation, telecommunications, supply chains, to financial and electric power ones, provide the ties

  10. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  11. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  12. Assessing node risk and vulnerability in epidemics on networks

    E-Print Network [OSTI]

    Rogers, Tim

    2015-01-01T23:59:59.000Z

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  13. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01T23:59:59.000Z

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  14. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01T23:59:59.000Z

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  15. Medical Device Reliability BIOMATERIALS

    E-Print Network [OSTI]

    NEMI Medical Electronics team to address short- and long-term reliability issues with medical devices. OurMedical Device Reliability BIOMATERIALS Our goal is to provide medical device manufacturers, and consistency of active implantable medical devices. These devices, including pacemakers, cardiac defibrillators

  16. Connector device for building integrated photovoltaic device

    SciTech Connect (OSTI)

    Keenihan, James R.; Langmaid, Joseph A.; Eurich, Gerald K.; Lesniak, Michael J.; Mazor, Michael H.; Cleereman, Robert J.; Gaston, Ryan S.

    2014-06-03T23:59:59.000Z

    The present invention is premised upon a connector device and method that can more easily electrically connect a plurality of PV devices or photovoltaic system components and/or locate these devices/components upon a building structure. It also may optionally provide some additional sub-components (e.g. at least one bypass diode and/or an indicator means) and may enhance the serviceability of the device.

  17. Operated device estimation framework

    E-Print Network [OSTI]

    Rengarajan, Janarthanan

    2009-05-15T23:59:59.000Z

    Protective device estimation is a challenging task because there are numerous protective devices present in a typical distribution system. Among various protective devices, auto-reclosers and fuses are the main overcurrent protection on distribution...

  18. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01T23:59:59.000Z

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  19. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  20. T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |Vulnerability |PROBLEM:

  1. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergyDepartment

  2. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability

  3. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    SciTech Connect (OSTI)

    Kvaerner, Jens [Bioforsk-Norwegian Institute for Agricultural and Environmental Research, Soil and Environmental Division, Frederik A. Dahls vei 20, N-1432 As (Norway)]. E-mail: jens.kvarner@bioforsk.no; Swensen, Grete [NIKU, Norwegian Institute for Cultural Heritage Research, Storgata 2, P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: grete.swensen@niku.no; Erikstad, Lars [NINA, Norwegian Institute for Nature Research, Dronningens gt. 13., P.O. Box 736, Sentrum, N-0105 Oslo (Norway)]. E-mail: lars.erikstad@nina.no

    2006-07-15T23:59:59.000Z

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended.

  4. DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ

    E-Print Network [OSTI]

    Smith, Sean W.

    Chapter 1 DO-IT-YOURSELF SCADA VULNERABILITY TESTING WITH LZFUZZ Rebecca Shapiro, Sergey Bratus, for SCADA software used in critical infrastructure, the widespread use of propri- etary protocols makes't apply in real-world infrastructure such as power SCADA. Domain experts often do not have the time

  5. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  6. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  7. Vulnerability of Hydropower Projects to Climate Change Revision: 20th

    E-Print Network [OSTI]

    Harrison, Gareth

    Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

  8. Cyber-Vulnerability of Power Grid Monitoring and Control Systems

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    Cyber-Vulnerability of Power Grid Monitoring and Control Systems Chee-Wooi Ten Iowa State, and power infrastructures due to the complexity of required compliances [5]. Although the complex outages. Three modes of malicious attacks on the power infrastructure are (i) attack upon the system, (ii

  9. Vulnerability Analysis of Complex Networks from Transportation Networks to

    E-Print Network [OSTI]

    Nagurney, Anna

    and Electric Power Supply Chains Anna Nagurney John F. Smith Memorial Professor Department of Finance to Dynamic Networks · Where Are We Now? An Empirical Case Study to Real-World Electric Power Supply ChainsVulnerability Analysis of Complex Networks from Transportation Networks to the Internet

  10. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01T23:59:59.000Z

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  11. Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability

    E-Print Network [OSTI]

    Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

  12. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

  13. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect (OSTI)

    Vigil, R.A. [Sandia National Labs., Albuquerque, NM (United States)]|[Science and Engineering Associates, Inc., Albuquerque, NM (United States); Nowlen, S.P. [Sandia National Labs., Albuquerque, NM (United States)

    1995-03-01T23:59:59.000Z

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  14. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  15. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom technologically complex society makes knowing the vulnerability of such systems essential to improving their intrinsic reliability/survivability. Our discussion employs the power transmission grid. 1 Introduction

  16. A case study of social vulnerability mapping: issues of scale and aggregation

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15T23:59:59.000Z

    This study uses geographic information systems to determine if the aggregation of census block data are better than census block group data for analyzing social vulnerability. This was done by applying a social vulnerability method that used census...

  17. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

    E-Print Network [OSTI]

    Narasayya, Vivek

    programs by exploiting browser vulnerabilities are a serious emerging threat. In response, we have-management methodology to cybersecurity: instead of directly detecting the acts of vulnerability exploits, the system

  18. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  19. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  20. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  1. Analyses of power system vulnerability and total transfer capability

    E-Print Network [OSTI]

    Yu, Xingbin

    2006-04-12T23:59:59.000Z

    limits. Both steady state and dynamic security assessments are included in the process of obtaining total transfer capability. Particularly, the effect of FACTS (Flexible AC Transmission Systems) devices on TTC is examined. FACTS devices have been shown...

  2. Bipolar thermoelectric devices

    E-Print Network [OSTI]

    Pipe, Kevin P. (Kevin Patrick), 1976-

    2004-01-01T23:59:59.000Z

    The work presented here is a theoretical and experimental study of heat production and transport in bipolar electrical devices, with detailed treatment of thermoelectric effects. Both homojunction and heterojunction devices ...

  3. Organic photosensitive devices

    DOE Patents [OSTI]

    Rand, Barry P; Forrest, Stephen R

    2013-11-26T23:59:59.000Z

    The present invention generally relates to organic photosensitive optoelectronic devices. More specifically, it is directed to organic photosensitive optoelectronic devices having a photoactive organic region containing encapsulated nanoparticles that exhibit plasmon resonances. An enhancement of the incident optical field is achieved via surface plasmon polariton resonances. This enhancement increases the absorption of incident light, leading to a more efficient device.

  4. Articulating feedstock delivery device

    DOE Patents [OSTI]

    Jordan, Kevin

    2013-11-05T23:59:59.000Z

    A fully articulable feedstock delivery device that is designed to operate at pressure and temperature extremes. The device incorporates an articulating ball assembly which allows for more accurate delivery of the feedstock to a target location. The device is suitable for a variety of applications including, but not limited to, delivery of feedstock to a high-pressure reaction chamber or process zone.

  5. Amorphous silicon photovoltaic devices

    DOE Patents [OSTI]

    Carlson, David E.; Lin, Guang H.; Ganguly, Gautam

    2004-08-31T23:59:59.000Z

    This invention is a photovoltaic device comprising an intrinsic or i-layer of amorphous silicon and where the photovoltaic device is more efficient at converting light energy to electric energy at high operating temperatures than at low operating temperatures. The photovoltaic devices of this invention are suitable for use in high temperature operating environments.

  6. INFORMATION DEVICES AND

    E-Print Network [OSTI]

    Mottram, Nigel

    to access or hold sensitive, confidential or personal information on mobile devices, such as laptopsPROTECTION OF INFORMATION HELD ON MOBILE DEVICES AND ENCRYPTION POLICY (V3.5) the place of useful;Protection of Information Held on Mobile Devices and Encryption Policy (v3.5) Page 1 Table of Contents 1

  7. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  8. Physical security and tamper-indicating devices

    SciTech Connect (OSTI)

    Johnston, R.G.; Garcia, A.R.E.

    1997-02-01T23:59:59.000Z

    Computer systems, electronic communications, digital data, and computer storage media are often highly vulnerable to physical tampering. Tamper-indicating devices, also called security seals, are widely used to detect physical tampering or unauthorized access. We studied 94 different security seals, both passive and electronic, developed either commercially or by the US government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low-tech methods. Cost was not a good predictor of seal security. It appears to us that many of these seals can be dramatically improved with minor, low-cost modifications to either the seal or the use protocol.

  9. Abrasion Testing of Critical Components of Hydrokinetic Devices

    SciTech Connect (OSTI)

    Worthington, Monty [ORPC Alaska] [ORPC Alaska; Ali, Muhammad [Ohio University] [Ohio University; Ravens, Tom [University of Alaska Anchorage] [University of Alaska Anchorage

    2013-12-06T23:59:59.000Z

    The objective of the Abrasion Testing of Critical Components of Hydrokinetic Devices (Project) was to test critical components of hydrokinetic devices in waters with high levels of suspended sediment – information that is widely applicable to the hydrokinetic industry. Tidal and river sites in Alaska typically have high suspended sediment concentrations. High suspended sediment also occurs in major rivers and estuaries throughout the world and throughout high latitude locations where glacial inputs introduce silt into water bodies. In assessing the vulnerability of technology components to sediment induced abrasion, one of the greatest concerns is the impact that the sediment may have on device components such as bearings and seals, failures of which could lead to both efficiency loss and catastrophic system failures.

  10. Portable data collection device

    DOE Patents [OSTI]

    French, Patrick D. (Aurora, CO)

    1996-01-01T23:59:59.000Z

    The present invention provides a portable data collection device that has a variety of sensors that are interchangeable with a variety of input ports in the device. The various sensors include a data identification feature that provides information to the device regarding the type of physical data produced by each sensor and therefore the type of sensor itself. The data identification feature enables the device to locate the input port where the sensor is connected and self adjust when a sensor is removed or replaced. The device is able to collect physical data, whether or not a function of a time.

  11. Unitary lens semiconductor device

    DOE Patents [OSTI]

    Lear, Kevin L. (Albuquerque, NM)

    1997-01-01T23:59:59.000Z

    A unitary lens semiconductor device and method. The unitary lens semiconductor device is provided with at least one semiconductor layer having a composition varying in the growth direction for unitarily forming one or more lenses in the semiconductor layer. Unitary lens semiconductor devices may be formed as light-processing devices such as microlenses, and as light-active devices such as light-emitting diodes, photodetectors, resonant-cavity light-emitting diodes, vertical-cavity surface-emitting lasers, and resonant cavity photodetectors.

  12. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  13. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  14. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  15. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01T23:59:59.000Z

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  16. Barrier breaching device

    DOE Patents [OSTI]

    Honodel, C.A.

    1983-06-01T23:59:59.000Z

    A barrier breaching device that is designed primarily for opening holes in interior walls of buildings uses detonating fuse for explosive force. The fuse acts as the ribs or spokes of an umbrella-like device that may be opened up to form a cone. The cone is placed against the wall so that detonating fuse that rings the base of the device and which is ignited by the spoke-like fuses serves to cut a circular hole in the wall.

  17. Barrier breaching device

    DOE Patents [OSTI]

    Honodel, Charles A. (Tracy, CA)

    1985-01-01T23:59:59.000Z

    A barrier breaching device that is designed primarily for opening holes in interior walls of buildings uses detonating fuse for explosive force. The fuse acts as the ribs or spokes of an umbrella-like device that may be opened up to form a cone. The cone is placed against the wall so that detonating fuse that rings the base of the device and which is ignited by the spoke-like fuses serves to cut a circular hole in the wall.

  18. Interconnected semiconductor devices

    DOE Patents [OSTI]

    Grimmer, Derrick P. (White Bear Lake, MN); Paulson, Kenneth R. (North St. Paul, MN); Gilbert, James R. (St. Paul, MN)

    1990-10-23T23:59:59.000Z

    Semiconductor layer and conductive layer formed on a flexible substrate, divided into individual devices and interconnected with one another in series by interconnection layers and penetrating terminals.

  19. High efficiency photovoltaic device

    DOE Patents [OSTI]

    Guha, Subhendu (Troy, MI); Yang, Chi C. (Troy, MI); Xu, Xi Xiang (Findlay, OH)

    1999-11-02T23:59:59.000Z

    An N-I-P type photovoltaic device includes a multi-layered body of N-doped semiconductor material which has an amorphous, N doped layer in contact with the amorphous body of intrinsic semiconductor material, and a microcrystalline, N doped layer overlying the amorphous, N doped material. A tandem device comprising stacked N-I-P cells may further include a second amorphous, N doped layer interposed between the microcrystalline, N doped layer and a microcrystalline P doped layer. Photovoltaic devices thus configured manifest improved performance, particularly when configured as tandem devices.

  20. Mobile Device Management Android Device Enrollment

    E-Print Network [OSTI]

    to manage your device. c. Enter your password. #12;d. Accept the Terms and Conditions e. You have completed. 2. Get Touchdown from Google Play a. Open up the Google Play Store. b. Search for Touchdown. c. Use the application. #12;3. Get Citrix Mobile Connect from Google Play a. Open up the Google Play Store. b. Search

  1. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  2. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19T23:59:59.000Z

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  3. V-062: Asterisk Two Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote

  4. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment of

  5. V-081: Wireshark Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartmentWireshark

  6. V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |Vulnerabilities | DepartmentEnergy

  7. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |Department of

  8. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery

  9. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment of

  10. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment| Department

  11. Capillary interconnect device

    DOE Patents [OSTI]

    Renzi, Ronald F

    2013-11-19T23:59:59.000Z

    An interconnecting device for connecting a plurality of first fluid-bearing conduits to a corresponding plurality of second fluid-bearing conduits thereby providing fluid communication between the first fluid-bearing conduits and the second fluid-bearing conduits. The device includes a manifold and one or two ferrule plates that are held by compressive axial forces.

  12. Device for cutting protrusions

    DOE Patents [OSTI]

    Bzorgi, Fariborz M. (Knoxville, TN)

    2011-07-05T23:59:59.000Z

    An apparatus for clipping a protrusion of material is provided. The protrusion may, for example, be a bolt head, a nut, a rivet, a weld bead, or a temporary assembly alignment tab protruding from a substrate surface of assembled components. The apparatus typically includes a cleaver having a cleaving edge and a cutting blade having a cutting edge. Generally, a mounting structure configured to confine the cleaver and the cutting blade and permit a range of relative movement between the cleaving edge and the cutting edge is provided. Also typically included is a power device coupled to the cutting blade. The power device is configured to move the cutting edge toward the cleaving edge. In some embodiments the power device is activated by a momentary switch. A retraction device is also generally provided, where the retraction device is configured to move the cutting edge away from the cleaving edge.

  13. Fluidic nanotubes and devices

    DOE Patents [OSTI]

    Yang, Peidong (El Cerrito, CA); He, Rongrui (El Cerrito, CA); Goldberger, Joshua (Berkeley, CA); Fan, Rong (El Cerrito, CA); Wu, Yiying (Albany, CA); Li, Deyu (Albany, CA); Majumdar, Arun (Orinda, CA)

    2010-01-10T23:59:59.000Z

    Fluidic nanotube devices are described in which a hydrophilic, non-carbon nanotube, has its ends fluidly coupled to reservoirs. Source and drain contacts are connected to opposing ends of the nanotube, or within each reservoir near the opening of the nanotube. The passage of molecular species can be sensed by measuring current flow (source-drain, ionic, or combination). The tube interior can be functionalized by joining binding molecules so that different molecular species can be sensed by detecting current changes. The nanotube may be a semiconductor, wherein a tubular transistor is formed. A gate electrode can be attached between source and drain to control current flow and ionic flow. By way of example an electrophoretic array embodiment is described, integrating MEMs switches. A variety of applications are described, such as: nanopores, nanocapillary devices, nanoelectrophoretic, DNA sequence detectors, immunosensors, thermoelectric devices, photonic devices, nanoscale fluidic bioseparators, imaging devices, and so forth.

  14. Fluidic nanotubes and devices

    DOE Patents [OSTI]

    Yang, Peidong (Berkeley, CA); He, Rongrui (El Cerrito, CA); Goldberger, Joshua (Berkeley, CA); Fan, Rong (El Cerrito, CA); Wu, Yiying (Albany, CA); Li, Deyu (Albany, CA); Majumdar, Arun (Orinda, CA)

    2008-04-08T23:59:59.000Z

    Fluidic nanotube devices are described in which a hydrophilic, non-carbon nanotube, has its ends fluidly coupled to reservoirs. Source and drain contacts are connected to opposing ends of the nanotube, or within each reservoir near the opening of the nanotube. The passage of molecular species can be sensed by measuring current flow (source-drain, ionic, or combination). The tube interior can be functionalized by joining binding molecules so that different molecular species can be sensed by detecting current changes. The nanotube may be a semiconductor, wherein a tubular transistor is formed. A gate electrode can be attached between source and drain to control current flow and ionic flow. By way of example an electrophoretic array embodiment is described, integrating MEMs switches. A variety of applications are described, such as: nanopores, nanocapillary devices, nanoelectrophoretic, DNA sequence detectors, immunosensors, thermoelectric devices, photonic devices, nanoscale fluidic bioseparators, imaging devices, and so forth.

  15. Planar electrochemical device assembly

    DOE Patents [OSTI]

    Jacobson; Craig P. (Lafayette, CA), Visco; Steven J. (Berkeley, CA), De Jonghe; Lutgard C. (Lafayette, CA)

    2010-11-09T23:59:59.000Z

    A pre-fabricated electrochemical device having a dense electrolyte disposed between an anode and a cathode preferably deposited as thin films is bonded to a porous electrically conductive support. A second porous electrically conductive support may be bonded to a counter electrode of the electrochemical device. Multiple electrochemical devices may be bonded in parallel to a single porous support, such as a perforated sheet to provide a planar array. Planar arrays may be arranged in a stacked interconnected array. A method of making a supported electrochemical device is disclosed wherein the method includes a step of bonding a pre-fabricated electrochemical device layer to an existing porous metal or porous metal alloy layer.

  16. Planar electrochemical device assembly

    DOE Patents [OSTI]

    Jacobson, Craig P. (Lafayette, CA); Visco, Steven J. (Berkeley, CA); De Jonghe, Lutgard C. (Lafayette, CA)

    2007-06-19T23:59:59.000Z

    A pre-fabricated electrochemical device having a dense electrolyte disposed between an anode and a cathode preferably deposited as thin films is bonded to a porous electrically conductive support. A second porous electrically conductive support may be bonded to a counter electrode of the electrochemical device. Multiple electrochemical devices may be bonded in parallel to a single porous support, such as a perforated sheet to provide a planar array. Planar arrays may be arranged in a stacked interconnected array. A method of making a supported electrochemical device is disclosed wherein the method includes a step of bonding a pre-fabricated electrochemical device layer to an existing porous metal or porous metal alloy layer.

  17. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01T23:59:59.000Z

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  18. Vulnerability of nuclear power plant structures to large external fires

    SciTech Connect (OSTI)

    Bennett, D.E.

    1983-08-01T23:59:59.000Z

    This report examines the inherent vulnerability of nuclear power plant structures to the thermal environments arising from large, external fires. The inherent vulnerability is the capacity of the concrete safety-related structures to absorb thermal loads without exceeding the appropriate thermal and structural design criteria. The potential sources of these thermal environments are large, offsite fires arising from accidents involving the transportation or storage of large quantities of flammable gases or liquids. A realistic thermal response analysis of a concrete panel was performed using three limiting criteria: temperature at the first rebar location, erosion and ablation of the front (exterior) surface due to high heat fluxes, and temperature at the back (interior) surface. The results of this analysis yield a relationship between incident heat flux and the maximum allowable exposure duration. Example calculations for the break of a 0.91 m (3') diameter high-pressure natural gas pipeline and a 1 m/sup 2/ hole in a 2-1/2 million gallon gasoline tank show that the resulting fires do not pose a significant hazard for ranges of 500 m or greater.

  19. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  20. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  1. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  2. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  3. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  4. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  6. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  7. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  8. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  9. Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    SciTech Connect (OSTI)

    Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

    2010-05-21T23:59:59.000Z

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

  10. Rain sampling device

    DOE Patents [OSTI]

    Nelson, D.A.; Tomich, S.D.; Glover, D.W.; Allen, E.V.; Hales, J.M.; Dana, M.T.

    1991-05-14T23:59:59.000Z

    The present invention constitutes a rain sampling device adapted for independent operation at locations remote from the user which allows rainfall to be sampled in accordance with any schedule desired by the user. The rain sampling device includes a mechanism for directing wet precipitation into a chamber, a chamber for temporarily holding the precipitation during the process of collection, a valve mechanism for controllably releasing samples of the precipitation from the chamber, a means for distributing the samples released from the holding chamber into vessels adapted for permanently retaining these samples, and an electrical mechanism for regulating the operation of the device. 11 figures.

  11. Rain sampling device

    DOE Patents [OSTI]

    Nelson, Danny A. (Richland, WA); Tomich, Stanley D. (Richland, WA); Glover, Donald W. (Prosser, WA); Allen, Errol V. (Benton City, WA); Hales, Jeremy M. (Kennewick, WA); Dana, Marshall T. (Richland, WA)

    1991-01-01T23:59:59.000Z

    The present invention constitutes a rain sampling device adapted for independent operation at locations remote from the user which allows rainfall to be sampled in accordance with any schedule desired by the user. The rain sampling device includes a mechanism for directing wet precipitation into a chamber, a chamber for temporarily holding the precipitation during the process of collection, a valve mechanism for controllably releasing samples of said precipitation from said chamber, a means for distributing the samples released from the holding chamber into vessels adapted for permanently retaining these samples, and an electrical mechanism for regulating the operation of the device.

  12. Wireless device monitoring systems and monitoring devices, and associated methods

    DOE Patents [OSTI]

    McCown, Steven H; Derr, Kurt W; Rohde, Kenneth W

    2014-05-27T23:59:59.000Z

    Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.

  13. Device control at CEBAF

    SciTech Connect (OSTI)

    Schaffner, S.; Barker, D.; Bookwalter, V. [and others

    1996-08-01T23:59:59.000Z

    CEBAF has undergone a major conversion of its accelerator control system from TACL to EPICS, affecting device control for the RF system, magnets, the machine protection system, the vacuum and valves, and the diagnostic systems including beam position monitors, harps, and the camera and solenoid devices (beam viewers, faraday cups, optical transition radiation viewers, synchrotron radiation monitor, etc.). Altogether these devices require approximately 125,000 EPICS database records. The majority of these devices are controlled through CAMAC; some use embedded microprocessors (RF and magnets), and newer interfaces are in VME. The standard EPICS toolkit was extended to include a driver for CAMAC which supports dual processors on one serial highway, custom database records for magnets and BPMs, and custom data acquisition tasks for the BPMs. 2 refs., 1 tab.

  14. Multimaterial rectifying device fibers

    E-Print Network [OSTI]

    Orf, Nicholas D

    2009-01-01T23:59:59.000Z

    Electronic and optoelectronic device processing is commonly thought to be incompatible with much simpler thermal drawing techniques used in optical fiber production. The incorporation of metals, polymer insulators, and ...

  15. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  16. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  17. Improving energy storage devices | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    energy storage devices Improving energy storage devices Released: April 15, 2014 Lithium-sulfur batteries last longer with nanomaterial-packed cathode A new PNNL-developed...

  18. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04T23:59:59.000Z

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  19. Using vulnerability assessments to design facility safeguards and security systems

    SciTech Connect (OSTI)

    Snell, M.; Jaeger, C.

    1994-08-01T23:59:59.000Z

    The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

  20. VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN

    E-Print Network [OSTI]

    Richner, Heinz

    VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

  1. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  2. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  3. Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data

    E-Print Network [OSTI]

    Mitasova, Helena

    Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

  4. Impact of relief accuracy on flood simulations and road network vulnerability analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

  5. Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to

    E-Print Network [OSTI]

    Melcher, Peter

    nega- tive pressures (Dixon and Joly, 1895; Briggs, 1950) allows plants to power the movement of water to withstand tension-induced cavitation is typ- ically inferred from "vulnerability curves" generatedVulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels

  6. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  7. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  8. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  9. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  10. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  11. Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California

    E-Print Network [OSTI]

    the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

  12. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    SciTech Connect (OSTI)

    HERZOG, K.R.

    1999-09-01T23:59:59.000Z

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

  13. Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii

    E-Print Network [OSTI]

    Herrera, Carlos M.

    vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

  14. Seismic vulnerability analysis of moderate seismicity areas using in situ experimental

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

  15. Spectral tailoring device

    DOE Patents [OSTI]

    Brager, H.R.; Schenter, R.E.; Carter, L.L.; Karnesky, R.A.

    1987-08-05T23:59:59.000Z

    A spectral tailoring device for altering the neutron energy spectra and flux of neutrons in a fast reactor thereby selectively to enhance or inhibit the transmutation rate of a target metrical to form a product isotope. Neutron moderators, neutron filters, neutron absorbers and neutron reflectors may be used as spectral tailoring devices. Depending on the intended use for the device, a member from each of these four classes of materials could be used singularly, or in combination, to provide a preferred neutron energy spectra and flux of the neutrons in the region of the target material. In one embodiment of the invention, an assembly is provided for enhancing the production of isotopes, such as cobalt 60 and gadolinium 153. In another embodiment of the invention, a spectral tailoring device is disposed adjacent a target material which comprises long lived or volatile fission products and the device is used to shift the neutron energy spectra and flux of neutrons in the region of the fission products to preferentially transmute them to produce a less volatile fission product inventory. 6 figs.

  16. Electrical apparatus lockout device

    SciTech Connect (OSTI)

    Gonzales, Rick (Chesapeake, VA)

    1999-01-01T23:59:59.000Z

    A simple lockout device for electrical equipment equipped with recessed power blades is described. The device comprises a face-plate (12) having a threaded member (14) attached thereto and apertures suitable for accommodating the power blades of a piece of electrical equipment, an elastomeric nose (16) abutting the face-plate having a hole for passage of the threaded member therethrough and power blade apertures in registration with those of the face-plate, a block (20) having a recess (34) in its forward face for receiving at least a portion of the hose, a hole therein for receiving the threaded member and an integral extension (26) extending from its rear face. A thumb screw (22) suitable for turning with the hands and having internal threads suitable for engaging the threaded member attached to the face-plate is inserted into a passage in the integral extension to engage the threaded member in such a fashion that when the device is inserted over the recessed power blades of a piece of electrical equipment and the thumb screw (22) tightened, the elastomeric nose (16) is compressed between the face-plate (12) and the block (20) forcing it to expand laterally thereby securing the device in the recess and precluding the accidental or intentional energization of the piece of equipment by attachment of a power cord to the recessed power blades. Means are provided in the interval extension and the thumb screw for the attachment of a locking device (46) which will satisfy OSHA standards.

  17. Electrical apparatus lockout device

    SciTech Connect (OSTI)

    Gonzales, R.

    1999-10-12T23:59:59.000Z

    A simple lockout device for electrical equipment equipped with recessed power blades is described. The device comprises a face-plate (12) having a threaded member (14) attached thereto and apertures suitable for accommodating the power blades of a piece of electrical equipment, an elastomeric nose (16) abutting the face-plate having a hole for passage of the threaded member therethrough and power blade apertures in registration with those of the face-plate, a block (20) having a recess (34) in its forward face for receiving at least a portion of the hose, a hole therein for receiving the threaded member and an integral extension (26) extending from its rear face. A thumb screw (22) suitable for turning with the hands and having internal threads suitable for engaging the threaded member attached to the face-plate is inserted into a passage in the integral extension to engage the threaded member in such a fashion that when the device is inserted over the recessed power blades of a piece of electrical equipment and the thumb screw (22) tightened, the elastomeric nose (16) is compressed between the face-plate (12) and the block (20) forcing it to expand laterally thereby securing the device in the recess and precluding the accidental or intentional energization of the piece of equipment by attachment of a power cord to the recessed power blades. Means are provided in the interval extension and the thumb screw for the attachment of a locking device (46) which will satisfy OSHA standards.

  18. Nonaqueous Electrical Storage Device

    DOE Patents [OSTI]

    McEwen, Alan B. (Melrose, MA); Evans, David A. (Seekonk, MA); Blakley, Thomas J. (Woburn, MA); Goldman, Jay L. (Mansfield, MA)

    1999-10-26T23:59:59.000Z

    An electrochemical capacitor is disclosed that features two, separated, high surface area carbon cloth electrodes sandwiched between two current collectors fabricated of a conductive polymer having a flow temperature greater than 130.degree. C., the perimeter of the electrochemical capacitor being sealed with a high temperature gasket to form a single cell device. The gasket material is a thermoplastic stable at temperatures greater than 100.degree. C., preferably a polyester or a polyurethane, and having a reflow temperature above 130.degree. C. but below the softening temperature of the current collector material. The capacitor packaging has good mechanical integrity over a wide temperature range, contributes little to the device equivalent series resistance (ESR), and is stable at high potentials. In addition, the packaging is designed to be easily manufacturable by assembly line methods. The individual cells can be stacked in parallel or series configuration to reach the desired device voltage and capacitance.

  19. Pendulum detector testing device

    DOE Patents [OSTI]

    Gonsalves, John M. (Modesto, CA)

    1997-01-01T23:59:59.000Z

    A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.

  20. Regenerative combustion device

    DOE Patents [OSTI]

    West, Phillip B.

    2004-03-16T23:59:59.000Z

    A regenerative combustion device having a combustion zone, and chemicals contained within the combustion zone, such as water, having a first equilibrium state, and a second combustible state. Means for transforming the chemicals from the first equilibrium state to the second combustible state, such as electrodes, are disposed within the chemicals. An igniter, such as a spark plug or similar device, is disposed within the combustion zone for igniting combustion of the chemicals in the second combustible state. The combustion products are contained within the combustion zone, and the chemicals are selected such that the combustion products naturally chemically revert into the chemicals in the first equilibrium state following combustion. The combustion device may thus be repeatedly reused, requiring only a brief wait after each ignition to allow the regeneration of combustible gasses within the head space.

  1. Ion manipulation device

    DOE Patents [OSTI]

    Anderson, Gordon A; Smith, Richard D; Ibrahim, Yehia M; Baker, Erin M

    2014-09-16T23:59:59.000Z

    An ion manipulation method and device is disclosed. The device includes a pair of substantially parallel surfaces. An array of inner electrodes is contained within, and extends substantially along the length of, each parallel surface. The device includes a first outer array of electrodes and a second outer array of electrodes. Each outer array of electrodes is positioned on either side of the inner electrodes, and is contained within and extends substantially along the length of each parallel surface. A DC voltage is applied to the first and second outer array of electrodes. A RF voltage, with a superimposed electric field, is applied to the inner electrodes by applying the DC voltages to each electrode. Ions either move between the parallel surfaces within an ion confinement area or along paths in the direction of the electric field, or can be trapped in the ion confinement area.

  2. Fragment capture device

    DOE Patents [OSTI]

    Payne, Lloyd R. (Los Lunas, NM); Cole, David L. (Albuquerque, NM)

    2010-03-30T23:59:59.000Z

    A fragment capture device for use in explosive containment. The device comprises an assembly of at least two rows of bars positioned to eliminate line-of-sight trajectories between the generation point of fragments and a surrounding containment vessel or asset. The device comprises an array of at least two rows of bars, wherein each row is staggered with respect to the adjacent row, and wherein a lateral dimension of each bar and a relative position of each bar in combination provides blockage of a straight-line passage of a solid fragment through the adjacent rows of bars, wherein a generation point of the solid fragment is located within a cavity at least partially enclosed by the array of bars.

  3. Biochip scanner device

    DOE Patents [OSTI]

    Perov, Alexander (Troitsk, RU); Belgovskiy, Alexander I. (Mayfield Heights, OH); Mirzabekov, Andrei D. (Darien, IL)

    2001-01-01T23:59:59.000Z

    A biochip scanner device used to detect and acquire fluorescence signal data from biological microchips or biochips and method of use are provided. The biochip scanner device includes a laser for emitting a laser beam. A modulator, such as an optical chopper modulates the laser beam. A scanning head receives the modulated laser beam and a scanning mechanics coupled to the scanning head moves the scanning head relative to the biochip. An optical fiber delivers the modulated laser beam to the scanning head. The scanning head collects the fluorescence light from the biochip, launches it into the same optical fiber, which delivers the fluorescence into a photodetector, such as a photodiode. The biochip scanner device is used in a row scanning method to scan selected rows of the biochip with the laser beam size matching the size of the immobilization site.

  4. Electrochromic optical switching device

    DOE Patents [OSTI]

    Lampert, C.M.; Visco, S.J.

    1992-08-25T23:59:59.000Z

    An electrochromic cell is disclosed which comprises an electrochromic layer, a polymerizable organo-sulfur layer which comprises the counter electrode of the structure, and an ionically conductive electronically insulating material which comprises the separator between the electrodes. In a preferred embodiment, both the separator and the organo-sulfur electrode (in both its charged and uncharged states) are transparent either to visible light or to the entire solar spectrum. An electrochromic device is disclosed which comprises such electrodes and separator encased in glass plates on the inner surface of each of which is formed a transparent electrically conductive film in respective electrical contact with the electrodes which facilitates formation of an external electrical connection or contact to the electrodes of the device to permit electrical connection of the device to an external potential source. 3 figs.

  5. Pendulum detector testing device

    DOE Patents [OSTI]

    Gonsalves, J.M.

    1997-09-30T23:59:59.000Z

    A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.

  6. Electrochromic optical switching device

    SciTech Connect (OSTI)

    Lampert, Carl M. (El Sobrante, CA); Visco, Steven J. (Berkeley, CA)

    1992-01-01T23:59:59.000Z

    An electrochromic cell is disclosed which comprises an electrochromic layer, a polymerizable organo-sulfur layer which comprises the counter electrode of the structure, and an ionically conductive electronically insulating material which comprises the separator between the electrodes. In a preferred embodiment, both the separator and the organo-sulfur electrode (in both its charged and uncharged states) are transparent either to visible light or to the entire solar spectrum. An electrochromic device is disclosed which comprises such electrodes and separator encased in glass plates on the inner surface of each of which is formed a transparent electrically conductive film in respective electrical contact with the electrodes which facilitates formation of an external electrical connection or contact to the electrodes of the device to permit electrical connection of the device to an external potential source.

  7. Graphene field emission devices

    SciTech Connect (OSTI)

    Kumar, S., E-mail: shishirk@gmail.com; Raghavan, S. [Centre for Nanoscience and Engineering, Indian Institute of Science, Bengaluru (India); Duesberg, G. S. [Centre for Research on Adaptive Nanostructures and Nanodevices (CRANN) and School of Chemistry, Trinity College Dublin, Dublin, D2 (Ireland); Pratap, R. [Centre for Nanoscience and Engineering, Indian Institute of Science, Bengaluru (India); Department of Mechanical Engineering, Indian Institute of Science, Bengaluru (India)

    2014-09-08T23:59:59.000Z

    Graphene field emission devices are fabricated using a scalable process. The field enhancement factors, determined from the Fowler-Nordheim plots, are within few hundreds and match the theoretical predictions. The devices show high emission current density of ?10?nA ?m{sup ?1} at modest voltages of tens of volts. The emission is stable with time and repeatable over long term, whereas the noise in the emission current is comparable to that from individual carbon nanotubes emitting under similar conditions. We demonstrate a power law dependence of emission current on pressure which can be utilized for sensing. The excellent characteristics and relative ease of making the devices promise their great potential for sensing and electronic applications.

  8. Phononic crystal devices

    DOE Patents [OSTI]

    El-Kady, Ihab F. (Albuquerque, NM); Olsson, Roy H. (Albuquerque, NM)

    2012-01-10T23:59:59.000Z

    Phononic crystals that have the ability to modify and control the thermal black body phonon distribution and the phonon component of heat transport in a solid. In particular, the thermal conductivity and heat capacity can be modified by altering the phonon density of states in a phononic crystal. The present invention is directed to phononic crystal devices and materials such as radio frequency (RF) tags powered from ambient heat, dielectrics with extremely low thermal conductivity, thermoelectric materials with a higher ratio of electrical-to-thermal conductivity, materials with phononically engineered heat capacity, phononic crystal waveguides that enable accelerated cooling, and a variety of low temperature application devices.

  9. Dielectrophoretic columnar focusing device

    DOE Patents [OSTI]

    James, Conrad D. (Albuquerque, NM); Galambos, Paul C. (Albuquerque, NM); Derzon, Mark S. (Tijeras, NM)

    2010-05-11T23:59:59.000Z

    A dielectrophoretic columnar focusing device uses interdigitated microelectrodes to provide a spatially non-uniform electric field in a fluid that generates a dipole within particles in the fluid. The electric field causes the particles to either be attracted to or repelled from regions where the electric field gradient is large, depending on whether the particles are more or less polarizable than the fluid. The particles can thereby be forced into well defined stable paths along the interdigitated microelectrodes. The device can be used for flow cytometry, particle control, and other process applications, including cell counting or other types of particle counting, and for separations in material control.

  10. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26T23:59:59.000Z

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  11. Condensate removal device

    DOE Patents [OSTI]

    Maddox, James W. (Newport News, VA); Berger, David D. (Alexandria, VA)

    1984-01-01T23:59:59.000Z

    A condensate removal device is disclosed which incorporates a strainer in unit with an orifice. The strainer is cylindrical with its longitudinal axis transverse to that of the vapor conduit in which it is mounted. The orifice is positioned inside the strainer proximate the end which is remoter from the vapor conduit.

  12. Solar Innovator | Alta Devices

    ScienceCinema (OSTI)

    Mattos, Laila; Le, Minh

    2013-05-29T23:59:59.000Z

    Selected to participate in the Energy Department's SunShot Initiative, Alta Devices produces solar cells that convert sunlight into electricity at world record-breaking levels of efficiency. Through its innovative solar technology Alta is helping bring down the cost of solar. Learn more about the Energy Department's efforts to advance solar technology at energy.gov/solar .

  13. Device Oriented Project Controller

    SciTech Connect (OSTI)

    Dalesio, Leo; Kraimer, Martin

    2013-11-20T23:59:59.000Z

    This proposal is directed at the issue of developing control systems for very large HEP projects. A de-facto standard in accelerator control is the Experimental Physics and Industrial Control System (EPICS), which has been applied successfully to many physics projects. EPICS is a channel based system that requires that each channel of each device be configured and controlled. In Phase I, the feasibility of a device oriented extension to the distributed channel database was demonstrated by prototyping a device aware version of an EPICS I/O controller that functions with the current version of the channel access communication protocol. Extensions have been made to the grammar to define the database. Only a multi-stage position controller with limit switches was developed in the demonstration, but the grammar should support a full range of functional record types. In phase II, a full set of record types will be developed to support all existing record types, a set of process control functions for closed loop control, and support for experimental beam line control. A tool to configure these records will be developed. A communication protocol will be developed or extensions will be made to Channel Access to support introspection of components of a device. Performance bench marks will be made on both communication protocol and the database. After these records and performance tests are under way, a second of the grammar will be undertaken.

  14. Multiple gap photovoltaic device

    DOE Patents [OSTI]

    Dalal, Vikram L. (Newark, DE)

    1981-01-01T23:59:59.000Z

    A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

  15. Cascaded thermoacoustic devices

    DOE Patents [OSTI]

    Swift, Gregory W.; Backhaus, Scott N.; Gardner, David L.

    2003-12-09T23:59:59.000Z

    A thermoacoustic device is formed with a resonator system defining at least one region of high specific acoustic impedance in an acoustic wave within the resonator system. A plurality of thermoacoustic units are cascaded together within the region of high specific acoustic impedance, where at least one of the thermoacoustic units is a regenerator unit.

  16. Liquid mixing device

    SciTech Connect (OSTI)

    O'Leary, R. P.

    1985-08-06T23:59:59.000Z

    A mixing device for mixing at least two liquids to produce a homogenous mixture. The device includes an elongated chamber in which a vertically oriented elongated mixing cavity is located. The cavity is sealed at its lower end and it is open at its upper end and in communication with the interior of the chamber. An elongated conduit extends the length of the cavity and is adapted to receive liquids to be mixed. The conduit includes a plurality of ports located at longitudinally spaced positions therealong and which ports are directed in different directions. The ports create plural streams of liquid which interact and mix with one another within the cavity. The mixed liquids overflow the cavity and out its top end into the chamber 24. The chamber 24 includes an outlet from which the mixed liquids are withdrawn. In accordance with the preferred embodiment gas eductor means are provided in the inlet to the conduit to introduce gas bubbles within the cavity. Gas vent means are also provided in the device to vent any introduced gases from the device so that only the mixed liquids flow out the outlet.

  17. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  18. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L., E-mail: jalonne@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 109 S. Observatory, SPH II, Rm. M6314, Ann Arbor, MI 48109 (United States); Sanchez, Brisa N., E-mail: brisa@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Jolliet, Olivier, E-mail: ojolliet@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Environmental Health Sciences Department, 6622 SPH tower, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Zhang, Zhenzhen, E-mail: zhzh@umich.edu [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States)] [University of Michigan School of Public Health, Biostatistics Department, M4164 SPH II, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Parker, Edith A., E-mail: Edith-Parker@uiowa.edu [University of Michigan School of Public Health, Health Behavior and Health Education Department, 1415 Washington Heights, Ann Arbor, MI 48109-2029 (United States); Timothy Dvonch, J., E-mail: dvonch@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 1415 Washington Heights, 6642 SPH Tower, Ann Arbor, MI 48109 (United States); O'Neill, Marie S., E-mail: marieo@umich.edu [University of Michigan School of Public Health, Environmental Health Sciences Department, 6631 SPH Tower, 1415 Washington Heights, Ann Arbor, MI 48109 (United States)

    2012-01-15T23:59:59.000Z

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  19. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03T23:59:59.000Z

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  20. A graph-based network-vulnerability analysis system

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01T23:59:59.000Z

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  1. A graph-based system for network-vulnerability analysis

    SciTech Connect (OSTI)

    Swiler, L.P.; Phillips, C.

    1998-06-01T23:59:59.000Z

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  2. Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers

    E-Print Network [OSTI]

    Van Oorschot, Paul

    protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user

  3. Non- contacting capacitive diagnostic device

    DOE Patents [OSTI]

    Ellison, Timothy

    2005-07-12T23:59:59.000Z

    A non-contacting capacitive diagnostic device includes a pulsed light source for producing an electric field in a semiconductor or photovoltaic device or material to be evaluated and a circuit responsive to the electric field. The circuit is not in physical contact with the device or material being evaluated and produces an electrical signal characteristic of the electric field produced in the device or material. The diagnostic device permits quality control and evaluation of semiconductor or photovoltaic device properties in continuous manufacturing processes.

  4. Packaging of solid state devices

    DOE Patents [OSTI]

    Glidden, Steven C.; Sanders, Howard D.

    2006-01-03T23:59:59.000Z

    A package for one or more solid state devices in a single module that allows for operation at high voltage, high current, or both high voltage and high current. Low thermal resistance between the solid state devices and an exterior of the package and matched coefficient of thermal expansion between the solid state devices and the materials used in packaging enables high power operation. The solid state devices are soldered between two layers of ceramic with metal traces that interconnect the devices and external contacts. This approach provides a simple method for assembling and encapsulating high power solid state devices.

  5. Course Information --EE 531 Semiconductor Devices and Device Simulation

    E-Print Network [OSTI]

    Hochberg, Michael

    of Semiconductor Devices" by Hess "Si Processing for the VLSI Era: Vol. 3-- The Submicron MOSFET" by Wolf "Advanced: 20% Exam 1: 30% Exam 2: 30% Project: 20% Prerequisite: Semiconductor Devices (EE 482) or equivalent

  6. Support and maneuvering device

    DOE Patents [OSTI]

    Wood, R.L.

    1987-03-23T23:59:59.000Z

    A support and maneuvering device includes an elongated flexible inflatable enclosure having a fixed end and a movable end. The movable end is collapsible toward the fixed end to a contracted position when the enclosure is in a noninflated condition. Upon inflation, the movable end is movable away from the fixed end to an extended position. The movable end includes means for mounting an article such as a solar reflector thereon. The device also includes a plurality of position controlling means disposed about the movable end to effect adjusting movement of portions thereof by predetermined amounts and for controlling an angle at which the article disposed at the movable end is oriented. The plurality of position controlling means limits a suitable number degrees of freedom of the movable end for transmitting a steering motion thereto and for controlling the position thereof. 9 figs.

  7. Nuclear reactor safety device

    DOE Patents [OSTI]

    Hutter, Ernest (Wilmette, IL)

    1986-01-01T23:59:59.000Z

    A safety device is disclosed for use in a nuclear reactor for axially repositioning a control rod with respect to the reactor core in the event of an upward thermal excursion. Such safety device comprises a laminated helical ribbon configured as a tube-like helical coil having contiguous helical turns with slidably abutting edges. The helical coil is disclosed as a portion of a drive member connected axially to the control rod. The laminated ribbon is formed of outer and inner laminae. The material of the outer lamina has a greater thermal coefficient of expansion than the material of the inner lamina. In the event of an upward thermal excursion, the laminated helical coil curls inwardly to a smaller diameter. Such inward curling causes the total length of the helical coil to increase by a substantial increment, so that the control rod is axially repositioned by a corresponding amount to reduce the power output of the reactor.

  8. Support and maneuvering device

    DOE Patents [OSTI]

    Wood, Richard L. (Arvada, CO)

    1988-01-01T23:59:59.000Z

    A support and maneuvering device includes an elongated flexible inflatable enclosure having a fixed end and a movable end. The movable end is collapsible toward the fixed end to a contracted position when the enclosure is in a noninflated condition. Upon inflation, the movable end is movable away from the fixed end to an extended position. The movable end includes means for mounting an article such as a solar reflector thereon. The device also includes a plurality of position controlling means disposed about the movable end to effect adjusting movement of portions thereof by predetermined amounts and for controlling an angle at which the article disposed at the movable end is oriented. The plurality of position controlling means limits a suitable number degrees of freedom of the movable end for transmitting a steering motion thereto and for controlling the position thereof.

  9. Light modulating device

    DOE Patents [OSTI]

    Rauh, R.D.; Goldner, R.B.

    1989-12-26T23:59:59.000Z

    In a device for transmitting light, means for controlling the transmissivity of the device, including a ceramic, reversibly electrochromic, crystalline element having a highly reflective state when injected with electrons and charge compensating ions and a highly transmissive state when the electrons and ions are removed, the crystalline element being characterized as having a reflectivity of at least 50% in the reflective state and not greater than 10% in the transmissive state, and means for modulating the crystalline element between the reflective and transmissive states by injecting ions into the crystalline element in response to an applied electrical current of a first polarity and removing the ions in response to an applied electrical current of a second polarity are disclosed. 1 fig.

  10. Light modulating device

    DOE Patents [OSTI]

    Rauh, R. David (Newton, MA); Goldner, Ronald B. (Lexington, MA)

    1989-01-01T23:59:59.000Z

    In a device for transmitting light, means for controlling the transmissivity of the device, including a ceramic, reversibly electrochromic, crystalline element having a highly reflective state when injected with electrons and charge compensating ions and a highly transmissive state when the electrons and ions are removed, the crystalline element being characterized as having a reflectivity of at least 50% in the reflective state and not greater than 10% in the transmissive state, and means for modulating the crystalline element between the reflective and transmissive states by injecting ions into the crystalline element in response to an applied electrical current of a first polarity and removing the ions in response to an applied electrical current of a second polarity.

  11. Regenerative braking device

    DOE Patents [OSTI]

    Hoppie, Lyle O. (Birmingham, MI)

    1982-01-12T23:59:59.000Z

    Disclosed are several embodiments of a regenerative braking device for an automotive vehicle. The device includes a plurality of rubber rollers (24, 26) mounted for rotation between an input shaft (14) connectable to the vehicle drivetrain and an output shaft (16) which is drivingly connected to the input shaft by a variable ratio transmission (20). When the transmission ratio is such that the input shaft rotates faster than the output shaft, the rubber rollers are torsionally stressed to accumulate energy, thereby slowing the vehicle. When the transmission ratio is such that the output shaft rotates faster than the input shaft, the rubber rollers are torsionally relaxed to deliver accumulated energy, thereby accelerating or driving the vehicle.

  12. Dielectrokinetic chromatography devices

    DOE Patents [OSTI]

    Chirica, Gabriela S; Fiechtner, Gregory J; Singh, Anup K

    2014-12-16T23:59:59.000Z

    Disclosed herein are methods and devices for dielectrokinetic chromatography. As disclosed, the devices comprise microchannels having at least one perturber which produces a non-uniformity in a field spanning the width of the microchannel. The interaction of the field non-uniformity with a perturber produces a secondary flow which competes with a primary flow. By decreasing the size of the perturber the secondary flow becomes significant for particles/analytes in the nanometer-size range. Depending on the nature of a particle/analyte present in the fluid and its interaction with the primary flow and the secondary flow, the analyte may be retained or redirected. The composition of the primary flow can be varied to affect the magnitude of primary and/or secondary flows on the particles/analytes and thereby separate and concentrate it from other particles/analytes.

  13. Hybrid electroluminescent devices

    SciTech Connect (OSTI)

    Shiang, Joseph John (Niskayuna, NY); Duggal, Anil Raj (Niskayuna, NY); Michael, Joseph Darryl (Schenectady, NY)

    2010-08-03T23:59:59.000Z

    A hybrid electroluminescent (EL) device comprises at least one inorganic diode element and at least one organic EL element that are electrically connected in series. The absolute value of the breakdown voltage of the inorganic diode element is greater than the absolute value of the maximum reverse bias voltage across the series. The inorganic diode element can be a power diode, a Schottky barrier diode, or a light-emitting diode.

  14. Residual gas analysis device

    DOE Patents [OSTI]

    Thornberg, Steven M. (Peralta, NM)

    2012-07-31T23:59:59.000Z

    A system is provided for testing the hermeticity of a package, such as a microelectromechanical systems package containing a sealed gas volume, with a sampling device that has the capability to isolate the package and breach the gas seal connected to a pulse valve that can controllably transmit small volumes down to 2 nanoliters to a gas chamber for analysis using gas chromatography/mass spectroscopy diagnostics.

  15. Temperature measuring device

    DOE Patents [OSTI]

    Lauf, Robert J. (Oak Ridge, TN); Bible, Don W. (Clinton, TN); Sohns, Carl W. (Oak Ridge, TN)

    1999-01-01T23:59:59.000Z

    Systems and methods are described for a wireless instrumented silicon wafer that can measure temperatures at various points and transmit those temperature readings to an external receiver. The device has particular utility in the processing of semiconductor wafers, where it can be used to map thermal uniformity on hot plates, cold plates, spin bowl chucks, etc. without the inconvenience of wires or the inevitable thermal perturbations attendant with them.

  16. Biomolecular detection device

    DOE Patents [OSTI]

    Huo, Qisheng (Albuquerque, NM); Liu, Jun (Albuquerque, NM)

    2008-10-21T23:59:59.000Z

    A device for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode.

  17. Plasma jet ignition device

    DOE Patents [OSTI]

    McIlwain, Michael E. (Franklin, MA); Grant, Jonathan F. (Wayland, MA); Golenko, Zsolt (North Reading, MA); Wittstein, Alan D. (Fairfield, CT)

    1985-01-15T23:59:59.000Z

    An ignition device of the plasma jet type is disclosed. The device has a cylindrical cavity formed in insulating material with an electrode at one end. The other end of the cylindrical cavity is closed by a metal plate with a small orifice in the center which plate serves as a second electrode. An arc jumping between the first electrode and the orifice plate causes the formation of a highly-ionized plasma in the cavity which is ejected through the orifice into the engine cylinder area to ignite the main fuel mixture. Two improvements are disclosed to enhance the operation of the device and the length of the plasma plume. One improvement is a metal hydride ring which is inserted in the cavity next to the first electrode. During operation, the high temperature in the cavity and the highly excited nature of the plasma breaks down the metal hydride, liberating hydrogen which acts as an additional fuel to help plasma formation. A second improvement consists of a cavity insert containing a plurality of spaced, metal rings. The rings act as secondary spark gap electrodes reducing the voltage needed to maintain the initial arc in the cavity.

  18. Thermophotovoltaic energy conversion device

    DOE Patents [OSTI]

    Charache, G.W.; Baldasaro, P.F.; Egley, J.L.

    1998-05-19T23:59:59.000Z

    A thermophotovoltaic device and a method for making the thermophotovoltaic device are disclosed. The device includes an n-type semiconductor material substrate having top and bottom surfaces, a tunnel junction formed on the top surface of the substrate, a region of active layers formed on top of the tunnel junction and a back surface reflector (BSR). The tunnel junction includes a layer of heavily doped n-type semiconductor material that is formed on the top surface of the substrate and a layer of heavily doped p-type semiconductor material formed on the n-type layer. An optional pseudomorphic layer can be formed between the n-type and p-type layers. A region of active layers is formed on top of the tunnel junction. This region includes a base layer of p-type semiconductor material and an emitter layer of n-type semiconductor material. An optional front surface window layer can be formed on top of the emitter layer. An optional interference filter can be formed on top of the emitter layer or the front surface window layer when it is used. 1 fig.

  19. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  20. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  1. Seismic vulnerability of older reinforced concrete frame structures in Mid-America

    E-Print Network [OSTI]

    Beason, Lauren Rae

    2004-09-30T23:59:59.000Z

    This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

  2. Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard

    E-Print Network [OSTI]

    Leal, Manuel S.

    Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

  3. A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

  4. UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability

    E-Print Network [OSTI]

    Everest, Graham R

    UEA Water Security Research Centre Climate Change and Variability · Adaptation and Vulnerability · Transboundary Cooperation ­ Conflict · Irrigation Performance and Policy · River Basin Management · Water Allocation · Hydropolitics www.uea.ac.uk/watersecurity #12;The UEA Water Security Research Centre applies

  5. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  6. DNA repair modulates the vulnerability of the developing brain to alkylating agents

    E-Print Network [OSTI]

    Samson, Leona D.

    Neurons of the developing brain are especially vulnerable to environmental agents that damage DNA (i.e., genotoxicants), but the mechanism is poorly understood. The focus of the present study is to demonstrate that DNA ...

  7. Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems

    E-Print Network [OSTI]

    Michaud, David, 1975-

    2005-01-01T23:59:59.000Z

    The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

  8. A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress

    E-Print Network [OSTI]

    Covington, Herbert E.

    Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

  9. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01T23:59:59.000Z

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to further characterise...

  10. Hanford Identification (HID) PIA, Richland Operations Office | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy: Thomas P. D'Agostino,GlenLearning and DevelopmentDepartmentof

  11. RAPID/Roadmap/18-HI-d | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ | Roadmap Jump to: navigation, search RAPIDaUT-abb <HI-d

  12. RAPID/Roadmap/3-HI-d | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ | Roadmap Jump to: navigation, searche < (1)NV-a3ed <

  13. RAPID/Roadmap/6-HI-d | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ | Roadmap Jump to: navigation, searcheWA-a < RAPID‎cd

  14. RAPID/Roadmap/14-HI-d | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I GeothermalPotentialBiopowerSolidGenerationMethodInformation TexasTexas)ID-a <RAPID/Roadmap/14adFD-cad

  15. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E. [and others

    1996-02-15T23:59:59.000Z

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  16. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  17. Children with disabilities in the context of disaster: A social vulnerability perspective

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01T23:59:59.000Z

    through a social vulnerability perspective they all can be seen as lacking access to vital economic and social resources, possessing lim- ited autonomy and power, and having low levels of social capital (Morrow, 1999). They also, for socio- historical... of these socially vulnerable populations, but we do not yet know what parts of the community infrastructure are most critical to support their resilience in the post- disaster context. Given the dearth of empirical studies that actu- ally explore how disaster...

  18. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12T23:59:59.000Z

    and Hydrological Science iii ABSTRACT Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico. (August 2009) Maria del Rosario Sanchez Flores, B.S., Monterrey Tech.; M.S., Instituto Matias Romero Co-Chairs of Advisory Committee: Dr... this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer...

  19. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  20. Thermoelectric Materials, Devices and Systems:

    Broader source: Energy.gov (indexed) [DOE]

    -DRAFT - FOR OFFICIAL USE ONLY - DRAFT Thermoelectric Materials, Devices and Systems: 1 Technology Assessment 2 Contents 3 1. Thermoelectric Generation ......

  1. Improved Thermoelectric Devices: Advanced Semiconductor Materials for Thermoelectric Devices

    SciTech Connect (OSTI)

    None

    2009-12-11T23:59:59.000Z

    Broad Funding Opportunity Announcement Project: Phononic Devices is working to recapture waste heat and convert it into usable electric power. To do this, the company is using thermoelectric devices, which are made from advanced semiconductor materials that convert heat into electricity or actively remove heat for refrigeration and cooling purposes. Thermoelectric devices resemble computer chips, and they manage heat by manipulating the direction of electrons at the nanoscale. These devices aren’t new, but they are currently too inefficient and expensive for widespread use. Phononic Devices is using a high-performance, cost-effective thermoelectric design that will improve the device’s efficiency and enable electronics manufacturers to more easily integrate them into their products.

  2. Nanoscale Josephson Devices

    E-Print Network [OSTI]

    Bell, Chris

    , ferromagnetically (aligned ferromagnetic layers) FIB Focused Ion Beam GL Ginzburg-Landau GPIB General Purpose Interface Bus GMR Giant Magnetoresistance HTS High Temperature Superconductor I Insulator LED Light Emitting Diode LTS Low Temperature Superconductor MR... . The fabrication of intrinsic Josephson junctions in the high temperature superconductor Tl2Ba2CaCu2O8 will then be discussed, as well as Nb/MoSi2/Nb junctions, superconducting quantum interference devices, and finally GaN light emitting diodes. The work on Tl2Ba2...

  3. Micro environmental sensing device

    DOE Patents [OSTI]

    Polosky, Marc A. (Tijeras, NM); Lukens, Laurance L. (Tijeras, NM)

    2006-05-02T23:59:59.000Z

    A microelectromechanical (MEM) acceleration switch is disclosed which includes a proof mass flexibly connected to a substrate, with the proof mass being moveable in a direction substantially perpendicular to the substrate in response to a sensed acceleration. An electrode on the proof mass contacts one or more electrodes located below the proof mass to provide a switch closure in response to the sensed acceleration. Electrical latching of the switch in the closed position is possible with an optional latching electrode. The MEM acceleration switch, which has applications for use as an environmental sensing device, can be fabricated using micromachining.

  4. Multiported storage devices

    E-Print Network [OSTI]

    Grande, Marcus Bryan

    2000-01-01T23:59:59.000Z

    of niultiported storage device 3 Linux file I/O subsystem 4 Windows NT layered I/O driver model 10 15 5 Location of multiported module in I/O stack 17 6 The bulfer cache . . . 20 7 Queuing of I/O requests 8 Processing of I/O requests by smart blkfiltcr 9... Registering of filter applet via Linux stacked module mechanism . 21 22 . . 26 10 Table of registered filter applets (functions) . . 27 11 Overhead due to presence of smart blkfilter alone . 12 Overhead of smart blkfilter using rot13 filter port 31 33...

  5. Nanotube resonator devices

    DOE Patents [OSTI]

    Jensen, Kenneth J; Zettl, Alexander K; Weldon, Jeffrey A

    2014-05-06T23:59:59.000Z

    A fully-functional radio receiver fabricated from a single nanotube is being disclosed. Simultaneously, a single nanotube can perform the functions of all major components of a radio: antenna, tunable band-pass filter, amplifier, and demodulator. A DC voltage source, as supplied by a battery, can power the radio. Using carrier waves in the commercially relevant 40-400 MHz range and both frequency and amplitude modulation techniques, successful music and voice reception has been demonstrated. Also disclosed are a radio transmitter and a mass sensor using a nanotube resonator device.

  6. Stretchable and foldable electronic devices

    DOE Patents [OSTI]

    2013-10-08T23:59:59.000Z

    Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers. Multilayer devices are constructed to position a neutral mechanical surface coincident or proximate to a functional layer having a material that is susceptible to strain-induced failure. Neutral mechanical surfaces are positioned by one or more layers having a property that is spatially inhomogeneous, such as by patterning any of the layers of the multilayer device.

  7. Stretchable and foldable electronic devices

    DOE Patents [OSTI]

    Rogers, John A; Huang, Yonggang; Ko, Heung Cho; Stoykovich, Mark; Choi, Won Mook; Song, Jizhou; Ahn, Jong Hyun; Kim, Dae Hyeong

    2014-12-09T23:59:59.000Z

    Disclosed herein are stretchable, foldable and optionally printable, processes for making devices and devices such as semiconductors, electronic circuits and components thereof that are capable of providing good performance when stretched, compressed, flexed or otherwise deformed. Strain isolation layers provide good strain isolation to functional device layers. Multilayer devices are constructed to position a neutral mechanical surface coincident or proximate to a functional layer having a material that is susceptible to strain-induced failure. Neutral mechanical surfaces are positioned by one or more layers having a property that is spatially inhomogeneous, such as by patterning any of the layers of the multilayer device.

  8. Thermoplastic tape compaction device

    DOE Patents [OSTI]

    Campbell, V.W.

    1994-12-27T23:59:59.000Z

    A device is disclosed for bonding a thermoplastic tape to a substrate to form a fully consolidated composite. This device has an endless chain associated with a frame so as to rotate in a plane that is perpendicular to a long dimension of the tape, the chain having pivotally connected chain links with each of the links carrying a flexible foot member that extends outwardly from the chain. A selected number of the foot members contact the tape, after the heating thereof, to cause the heated tape to bond to the substrate. The foot members are each a thin band of metal oriented transversely to the chain, with a flexibility and width and length to contact the tape so as to cause the tape to conform to the substrate to achieve consolidation of the tape and the substrate. A biased leaf-type spring within the frame bears against an inner surface of the chain to provide the compliant pressure necessary to bond the tape to the substrate. The chain is supported by sprockets on shafts rotatably supported in the frame and, in one embodiment, one of the shafts has a drive unit to produce rotation such that the foot members in contact with the tape move at the same speed as the tape. Cooling jets are positioned along the frame to cool the resultant consolidated composite. 5 figures.

  9. Carbon based prosthetic devices

    SciTech Connect (OSTI)

    Devlin, D.J.; Carroll, D.W.; Barbero, R.S.; Archuleta, T. [Los Alamos National Lab., NM (US); Klawitter, J.J.; Ogilvie, W.; Strzepa, P. [Ascension Orthopedics (US); Cook, S.D. [Tulane Univ., New Orleans, LA (US). School of Medicine

    1998-12-31T23:59:59.000Z

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The project objective was to evaluate the use of carbon/carbon-fiber-reinforced composites for use in endoprosthetic devices. The application of these materials for the metacarpophalangeal (MP) joints of the hand was investigated. Issues concerning mechanical properties, bone fixation, biocompatibility, and wear are discussed. A system consisting of fiber reinforced materials with a pyrolytic carbon matrix and diamond-like, carbon-coated wear surfaces was developed. Processes were developed for the chemical vapor infiltration (CVI) of pyrolytic carbon into porous fiber preforms with the ability to tailor the outer porosity of the device to provide a surface for bone in-growth. A method for coating diamond-like carbon (DLC) on the articulating surface by plasma-assisted chemical vapor deposition (CVD) was developed. Preliminary results on mechanical properties of the composite system are discussed and initial biocompatibility studies were performed.

  10. Fluid flow monitoring device

    DOE Patents [OSTI]

    McKay, M.D.; Sweeney, C.E.; Spangler, B.S. Jr.

    1993-11-30T23:59:59.000Z

    A flow meter and temperature measuring device are described comprising a tube with a body centered therein for restricting flow and a sleeve at the upper end of the tube to carry several channels formed longitudinally in the sleeve to the appropriate axial location where they penetrate the tube to allow pressure measurements and temperature measurements with thermocouples. The high pressure measurement is made using a channel penetrating the tube away from the body and the low pressure measurement is made at a location at the widest part of the body. An end plug seals the end of the device and holes at its upper end allow fluid to pass from the interior of the tube into a plenum. The channels are made by cutting grooves in the sleeve, the grooves widened at the surface of the sleeve and then a strip of sleeve material is welded to the grooves closing the channels. Preferably the sleeve is packed with powdered graphite before cutting the grooves and welding the strips. 7 figures.

  11. Fluid flow monitoring device

    DOE Patents [OSTI]

    McKay, Mark D. (1426 Socastee Dr., North Augusta, SC 29841); Sweeney, Chad E. (3600 Westhampton Dr., Martinez, GA 30907-3036); Spangler, Jr., B. Samuel (2715 Margate Dr., Augusta, GA 30909)

    1993-01-01T23:59:59.000Z

    A flow meter and temperature measuring device comprising a tube with a body centered therein for restricting flow and a sleeve at the upper end of the tube to carry several channels formed longitudinally in the sleeve to the appropriate axial location where they penetrate the tube to allow pressure measurements and temperature measurements with thermocouples. The high pressure measurement is made using a channel penetrating the tube away from the body and the low pressure measurement is made at a location at the widest part of the body. An end plug seals the end of the device and holes at its upper end allow fluid to pass from the interior of the tube into a plenum. The channels are made by cutting grooves in the sleeve, the grooves widened at the surface of the sleeve and then a strip of sleeve material is welded to the grooves closing the channels. Preferably the sleeve is packed with powdered graphite before cutting the grooves and welding the strips.

  12. Opportunistic, collaborative and synchronized, proximal device ecology

    E-Print Network [OSTI]

    Toledano, Eyal

    2013-01-01T23:59:59.000Z

    CoSync is an on-device software framework for coordinating proximal consumer electronic devices in order to create a synchronized, opportunistic and collaborative device ecology. The CoSync device ecology combines multiple ...

  13. Tunable surface plasmon devices

    DOE Patents [OSTI]

    Shaner, Eric A. (Rio Rancho, NM); Wasserman, Daniel (Lowell, MA)

    2011-08-30T23:59:59.000Z

    A tunable extraordinary optical transmission (EOT) device wherein the tunability derives from controlled variation of the dielectric constant of a semiconducting material (semiconductor) in evanescent-field contact with a metallic array of sub-wavelength apertures. The surface plasmon resonance wavelength can be changed by changing the dielectric constant of the dielectric material. In embodiments of this invention, the dielectric material is a semiconducting material. The dielectric constant of the semiconducting material in the metal/semiconductor interfacial region is controllably adjusted by adjusting one or more of the semiconductor plasma frequency, the concentration and effective mass of free carriers, and the background high-frequency dielectric constant in the interfacial region. Thermal heating and/or voltage-gated carrier-concentration changes may be used to variably adjust the value of the semiconductor dielectric constant.

  14. Personal annunciation device

    DOE Patents [OSTI]

    Angelo, Peter (Oak Ridge, TN); Younkin, James (Oak Ridge, TN); DeMint, Paul (Kingston, TN)

    2011-01-25T23:59:59.000Z

    A personal annunciation device (PAD) providing, in an area of interest, compensatory annunciation of the presence of an abnormal condition in a hazardous area and accountability of the user of the PAD. Compensatory annunciation supplements primary annunciation provided by an emergency notification system (ENS). A detection system detects an abnormal condition, and a wireless transmission system transmits a wireless transmission to the PAD. The PAD has a housing enclosing the components of the PAD including a communication module for receiving the wireless transmission, a power supply, processor, memory, annunciation system, and RFID module. The RFID module has an RFID receiver that listens for an RFID transmission from an RFID reader disposed in a portal of an area of interest. The PAD identifies the transmission and changes its operating state based on the transmission. The RFID readers recognize, record, and transmit the state of the PAD to a base station providing accountability of the wearer.

  15. Nuclear reactor safety device

    DOE Patents [OSTI]

    Hutter, E.

    1983-08-15T23:59:59.000Z

    A safety device is described for use in a nuclear reactor for axially repositioning a control rod with respect to the reactor core in the event of a thermal excursion. It comprises a laminated strip helically configured to form a tube, said tube being in operative relation to said control rod. The laminated strip is formed of at least two materials having different thermal coefficients of expansion, and is helically configured such that the material forming the outer lamina of the tube has a greater thermal coefficient of expansion than the material forming the inner lamina of said tube. In the event of a thermal excursion the laminated strip will tend to curl inwardly so that said tube will increase in length, whereby as said tube increases in length it exerts a force on said control rod to axially reposition said control rod with respect to said core.

  16. False color viewing device

    DOE Patents [OSTI]

    Kronberg, J.W.

    1991-05-08T23:59:59.000Z

    This invention consists of a viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching, the user`s eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

  17. False color viewing device

    DOE Patents [OSTI]

    Kronberg, James W. (108 Independent Blvd., Aiken, SC 29801)

    1992-01-01T23:59:59.000Z

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

  18. False color viewing device

    DOE Patents [OSTI]

    Kronberg, J.W.

    1992-10-20T23:59:59.000Z

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage. 7 figs.

  19. Multichannel optical sensing device

    DOE Patents [OSTI]

    Selkowitz, Stephen E. (Piedmont, CA)

    1990-01-01T23:59:59.000Z

    A multichannel optical sensing device is disclosed, for measuring the outr sky luminance or illuminance or the luminance or illuminance distribution in a room, comprising a plurality of light receptors, an optical shutter matrix including a plurality of liquid crystal optical shutter elements operable by electrical control signals between light transmitting and light stopping conditions, fiber optic elements connected between the receptors and the shutter elements, a microprocessor based programmable control unit for selectively supplying control signals to the optical shutter elements in a programmable sequence, a photodetector including an optical integrating spherical chamber having an input port for receiving the light from the shutter matrix and at least one detector element in the spherical chamber for producing output signals corresponding to the light, and output units for utilizing the output signals including a storage unit having a control connection to the microprocessor based programmable control unit for storing the output signals under the sequence control of the programmable control unit.

  20. Multichannel optical sensing device

    DOE Patents [OSTI]

    Selkowitz, S.E.

    1985-08-16T23:59:59.000Z

    A multichannel optical sensing device is disclosed, for measuring the outdoor sky luminance or illuminance or the luminance or illuminance distribution in a room, comprising a plurality of light receptors, an optical shutter matrix including a plurality of liquid crystal optical shutter elements operable by electrical control signals between light transmitting and light stopping conditions, fiber optical elements connected between the receptors and the shutter elements, a microprocessor based programmable control unit for selectively supplying control signals to the optical shutter elements in a programmable sequence, a photodetector including an optical integrating spherical chamber having an input port for receiving the light from the shutter matrix and at least one detector element in the spherical chamber for producing output signals corresponding to the light, and output units for utilizing the output signals including a storage unit having a control connection to the microprocessor based programmable control unit for storing the output signals under the sequence control of the programmable control unit.

  1. Electrical safety device

    DOE Patents [OSTI]

    White, David B. (Greenock, PA)

    1991-01-01T23:59:59.000Z

    An electrical safety device for use in power tools that is designed to automatically discontinue operation of the power tool upon physical contact of the tool with a concealed conductive material. A step down transformer is used to supply the operating power for a disconnect relay and a reset relay. When physical contact is made between the power tool and the conductive material, an electrical circuit through the disconnect relay is completed and the operation of the power tool is automatically interrupted. Once the contact between the tool and conductive material is broken, the power tool can be quickly and easily reactivated by a reset push button activating the reset relay. A remote reset is provided for convenience and efficiency of operation.

  2. Light emitting ceramic device

    DOE Patents [OSTI]

    Valentine, Paul; Edwards, Doreen D.; Walker, Jr., William John; Slack, Lyle H.; Brown, Wayne Douglas; Osborne, Cathy; Norton, Michael; Begley, Richard

    2010-05-18T23:59:59.000Z

    A light-emitting ceramic based panel, hereafter termed "electroceramescent" panel, is herein claimed. The electroceramescent panel is formed on a substrate providing mechanical support as well as serving as the base electrode for the device. One or more semiconductive ceramic layers directly overlay the substrate, and electrical conductivity and ionic diffusion are controlled. Light emitting regions overlay the semiconductive ceramic layers, and said regions consist sequentially of a layer of a ceramic insulation layer and an electroluminescent layer, comprised of doped phosphors or the equivalent. One or more conductive top electrode layers having optically transmissive areas overlay the light emitting regions, and a multi-layered top barrier cover comprising one or more optically transmissive non-combustible insulation layers overlay said top electrode regions.

  3. Module isolation devices

    SciTech Connect (OSTI)

    Carolan, Michael Francis; Cooke, John Albert; Buzinski, Michael David

    2010-04-27T23:59:59.000Z

    A gas flow isolation device includes a gas flow isolation valve movable from an opened condition to a closed condition. The module isolation valve in one embodiment includes a rupture disk in flow communication with a flow of gas when the module isolation valve is in an opened condition. The rupture disk ruptures when a predetermined pressure differential occurs across it causing the isolation valve to close. In one embodiment the valve is mechanically linked to the rupture disk to maintain the valve in an opened condition when the rupture disk is intact, and which permits the valve to move into a closed condition when the rupture disk ruptures. In another embodiment a crushable member maintains the valve in an open condition, and the flow of gas passed the valve upon rupturing of the rupture disk compresses the crushable member to close the isolation valve.

  4. Air bag restraint device

    DOE Patents [OSTI]

    Marts, D.J.; Richardson, J.G.

    1995-10-17T23:59:59.000Z

    A rear-seat air bag restraint device is disclosed that prevents an individual, or individuals, from continuing violent actions while being transported in a patrol vehicle`s rear seat without requiring immediate physical contact by the law enforcement officer. The air bag is activated by a control switch in the front seat and inflates to independently restrict the amount of physical activity occurring in the rear seat of the vehicle while allowing the officer to safely stop the vehicle. The air bag can also provide the officer additional time to get backup personnel to aid him if the situation warrants it. The bag is inflated and maintains a constant pressure by an air pump. 8 figs.

  5. An interactive teaching device simulating intussusception reduction

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    1764-x TECHNICAL INNOVATION An interactive teaching deviceIRB. We developed an interactive teaching device to simulate

  6. Single-word multiple-bit upsets in static random access devices

    SciTech Connect (OSTI)

    Koga, R.; Pinkerton, S.D.; Lie, T.J.; Crawford, K.B. (Aerospace Corp., Los Angeles, CA (United States))

    1993-12-01T23:59:59.000Z

    Energetic ions and protons can cause single event upsets (SEUs) in static random access memory (SRAM) cells. In some cases multiple bits may be upset as the result of a single event. Space-borne electronics systems incorporating high-density SRAM are vulnerable to single-word multiple-bit upsets (SMUs). The authors review here recent observations of SMU, present the results of a systematic investigation of the physical cell arrangements employed in several currently available SRAM device types, and discuss implications for the occurrence and mitigation of SMU.

  7. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  8. Microbiopsy/precision cutting devices

    DOE Patents [OSTI]

    Krulevitch, P.A.; Lee, A.P.; Northrup, M.A.; Benett, W.J.

    1999-07-27T23:59:59.000Z

    Devices are disclosed for performing tissue biopsy on a small scale (microbiopsy). By reducing the size of the biopsy tool and removing only a small amount of tissue or other material in a minimally invasive manner, the risks, costs, injury and patient discomfort associated with traditional biopsy procedures can be reduced. By using micromachining and precision machining capabilities, it is possible to fabricate small biopsy/cutting devices from silicon. These devices can be used in one of four ways (1) intravascularly, (2) extravascularly, (3) by vessel puncture, and (4) externally. Additionally, the devices may be used in precision surgical cutting. 6 figs.

  9. Microbiopsy/precision cutting devices

    DOE Patents [OSTI]

    Krulevitch, Peter A. (Pleasanton, CA); Lee, Abraham P. (Walnut Creek, CA); Northrup, M. Allen (Berkeley, CA); Benett, William J. (Livermore, CA)

    1999-01-01T23:59:59.000Z

    Devices for performing tissue biopsy on a small scale (microbiopsy). By reducing the size of the biopsy tool and removing only a small amount of tissue or other material in a minimally invasive manner, the risks, costs, injury and patient discomfort associated with traditional biopsy procedures can be reduced. By using micromachining and precision machining capabilities, it is possible to fabricate small biopsy/cutting devices from silicon. These devices can be used in one of four ways 1) intravascularly, 2) extravascularly, 3) by vessel puncture, and 4) externally. Additionally, the devices may be used in precision surgical cutting.

  10. Structured wafer for device processing

    SciTech Connect (OSTI)

    Okandan, Murat; Nielson, Gregory N

    2014-11-25T23:59:59.000Z

    A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

  11. Structured wafer for device processing

    DOE Patents [OSTI]

    Okandan, Murat; Nielson, Gregory N

    2014-05-20T23:59:59.000Z

    A structured wafer that includes through passages is used for device processing. Each of the through passages extends from or along one surface of the structured wafer and forms a pattern on a top surface area of the structured wafer. The top surface of the structured wafer is bonded to a device layer via a release layer. Devices are processed on the device layer, and are released from the structured wafer using etchant. The through passages within the structured wafer allow the etchant to access the release layer to thereby remove the release layer.

  12. Calculating Nuclear Power Plant Vulnerability Using Integrated Geometry and Event/Fault-Tree Models

    SciTech Connect (OSTI)

    Peplow, Douglas E. [Oak Ridge National Laboratory (United States); Sulfredge, C. David [Oak Ridge National Laboratory (United States); Sanders, Robert L. [Oak Ridge National Laboratory (United States); Morris, Robert H. [Oak Ridge National Laboratory (United States); Hann, Todd A. [Defense Threat Reduction Agency (United States)

    2004-01-15T23:59:59.000Z

    Since the events of September 11, 2001, the vulnerability of nuclear power plants to terrorist attacks has become a national concern. The results of vulnerability analysis are greatly influenced by the computational approaches used. Standard approximations used in fault-tree analysis are not applicable for attacks, where high component failure probabilities are expected; two methods that do work with high failure probabilities are presented. Different blast modeling approaches can also affect the end results. Modeling the structural details of facility buildings and the geometric layout of components within the buildings is required to yield meaningful results.

  13. Department of Energy Plutonium ES&H Vulnerability Assessment Savannah River Site interim compensatory measures

    SciTech Connect (OSTI)

    Bickford, W.E.

    1994-09-15T23:59:59.000Z

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES&H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES&H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public.

  14. Automatic Mechetronic Wheel Light Device

    DOE Patents [OSTI]

    Khan, Mohammed John Fitzgerald (Silver Spring, MD)

    2004-09-14T23:59:59.000Z

    A wheel lighting device for illuminating a wheel of a vehicle to increase safety and enhance aesthetics. The device produces the appearance of a "ring of light" on a vehicle's wheels as the vehicle moves. The "ring of light" can automatically change in color and/or brightness according to a vehicle's speed, acceleration, jerk, selection of transmission gears, and/or engine speed. The device provides auxiliary indicator lights by producing light in conjunction with a vehicle's turn signals, hazard lights, alarm systems, and etc. The device comprises a combination of mechanical and electronic components and can be placed on the outer or inner surface of a wheel or made integral to a wheel or wheel cover. The device can be configured for all vehicle types, and is electrically powered by a vehicle's electrical system and/or battery.

  15. Arctic sea ice trends and narwhal vulnerability Kristin L. Laidre a,*, Mads Peter Heide-Jrgensen b

    E-Print Network [OSTI]

    Laidre, Kristin L.

    risk assess- ments as this may exceed the natural response capacity of the species. Ó 2004 Elsevier Ltd; Risk assessment; Vulnerability 1. Introduction Significant physical and biological shifts have recently climate change require that species vulnerability be incorporated into population risk models, especially

  16. More information from http://www.researchandmarkets.com/reports/1054243/ Fragile Networks: Identifying Vulnerabilities and Synergies in an

    E-Print Network [OSTI]

    Nagurney, Anna

    and Links in Financial Networks. Chapter 7: Dynamic Networks, the Internet, and Electric Power. Chapter 8: Identifying Vulnerabilities and Synergies in an Uncertain World Description: A unified treatment of the vulnerabilities that exist in real-world network systems?--with tools to identify synergies for mergers

  17. Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    (river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

  18. A graph-theoretical characterization of power network vulnerabilities Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo

    E-Print Network [OSTI]

    Bullo, Francesco

    of vulnerabilities that are inherent to the power network interconnection structure. From a system theoretic-time descriptor system. We adopt the framework of structural control theory, and we associate a digraph in the power network model. The study of dynamical systems in descriptor form has received sensible attention

  19. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

  20. Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard

    E-Print Network [OSTI]

    Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

  1. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  2. Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1

    E-Print Network [OSTI]

    and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

  3. Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass

    E-Print Network [OSTI]

    '. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

  4. TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory was supported by Electric Power Research Center (EPRC) at Iowa State University. C.-W. Ten, C.-C. Liu, and M

  5. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack was supported by the Electric Power Research Center (EPRC) at Iowa State University. Paper no. TPWRS-00963- 2007

  6. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  7. Vulnerability of national economies to the impacts of climate change on fisheries

    E-Print Network [OSTI]

    Reynolds, John D.

    economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

  8. Vulnerability of the New York City Metropolitan Area to Coastal Hazards,

    E-Print Network [OSTI]

    moved from a manufacturing to a service industry-based economy. Mid-town and Lower Manhattan are two on Long Island, NY, and the north- ern New Jersey shore. Beaches and coastal wetlands provide recreational at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

  9. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies, NM, USA Abstract--Modern power grids rely heavily on their control systems operating over and blackouts remain possible if the initial disturbances in the power grid are accompanied by other system

  10. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  11. Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste

    E-Print Network [OSTI]

    Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

  12. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08T23:59:59.000Z

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  13. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

  14. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

  15. American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE

    E-Print Network [OSTI]

    Pockman, William T.

    1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

  16. Seismic vulnerability assessment to slight dam-age based on experimental modal parameters

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

  17. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  18. From Sustainability to Transformation: dynamics and diversity in reflexive governance of vulnerability, Andy Stirling

    E-Print Network [OSTI]

    Sussex, University of

    of vulnerability, Andy Stirling From "Broadening Out" Appraisal to "Opening Up" Commitments This chapter turns our-technical choice (Stirling, 2008a). Organizational, cultural, political, and economic forces structure our implications (Stirling, 2008b). In this way, we can extend attention to alternative trajectories reflecting

  19. Diamonds are an Electronic Device’s Best Friend

    Broader source: Energy.gov [DOE]

    Researchers at Argonne National Lab recently devised a way to use diamonds to brighten the performance of electronic devices, which could put a bit more sparkle in everyone’s day.

  20. Split ring containment attachment device

    DOE Patents [OSTI]

    Sammel, Alfred G. (Pittsburgh, PA)

    1996-01-01T23:59:59.000Z

    A containment attachment device 10 for operatively connecting a glovebag 200 to plastic sheeting 100 covering hazardous material. The device 10 includes an inner split ring member 20 connected on one end 22 to a middle ring member 30 wherein the free end 21 of the split ring member 20 is inserted through a slit 101 in the plastic sheeting 100 to captively engage a generally circular portion of the plastic sheeting 100. A collar potion 41 having an outer ring portion 42 is provided with fastening means 51 for securing the device 10 together wherein the glovebag 200 is operatively connected to the collar portion 41.

  1. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01T23:59:59.000Z

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  2. APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation

    E-Print Network [OSTI]

    Brownstone, Rob

    on built infrastructure. It will examine the evolution of the term vulnerability and explore current infrastructure vulnerabilities (potential for increased moisture damage to buildings or interruptions in electrical power generation) (Berry et al., 2008; Canadian Council of Professional Engineers, 2008

  3. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

  4. Polymer electronic devices and materials.

    SciTech Connect (OSTI)

    Schubert, William Kent; Baca, Paul Martin; Dirk, Shawn M.; Anderson, G. Ronald; Wheeler, David Roger

    2006-01-01T23:59:59.000Z

    Polymer electronic devices and materials have vast potential for future microsystems and could have many advantages over conventional inorganic semiconductor based systems, including ease of manufacturing, cost, weight, flexibility, and the ability to integrate a wide variety of functions on a single platform. Starting materials and substrates are relatively inexpensive and amenable to mass manufacturing methods. This project attempted to plant the seeds for a new core competency in polymer electronics at Sandia National Laboratories. As part of this effort a wide variety of polymer components and devices, ranging from simple resistors to infrared sensitive devices, were fabricated and characterized. Ink jet printing capabilities were established. In addition to promising results on prototype devices the project highlighted the directions where future investments must be made to establish a viable polymer electronics competency.

  5. Personal cooling air filtering device

    DOE Patents [OSTI]

    Klett, James (Knoxville, TN); Conway, Bret (Denver, NC)

    2002-08-13T23:59:59.000Z

    A temperature modification system for modifying the temperature of fluids includes at least one thermally conductive carbon foam element, the carbon foam element having at least one flow channel for the passage of fluids. At least one temperature modification device is provided, the temperature modification device thermally connected to the carbon foam element and adapted to modify the temperature of the carbon foam to modify the temperature of fluids flowing through the flow channels. Thermoelectric and/or thermoionic elements can preferably be used as the temperature modification device. A method for the reversible temperature modification of fluids includes the steps of providing a temperature modification system including at least one thermally conductive carbon foam element having flow channels and at least one temperature modification device, and flowing a fluid through the flow channels.

  6. Sketch Recognition on Mobile Devices

    E-Print Network [OSTI]

    Lucchese, George 1987-

    2012-11-29T23:59:59.000Z

    Sketch recognition allows computers to understand and model hand drawn sketches and diagrams. Traditionally sketch recognition systems required a pen based PC interface, but powerful mobile devices such as tablets and smartphones can provide a new...

  7. Optical and optoelectronic fiber devices

    E-Print Network [OSTI]

    Shapira, Ofer, Ph. D. Massachusetts Institute of Technology

    2007-01-01T23:59:59.000Z

    The ability to integrate materials with disparate electrical, thermal, and optical properties into a single fiber structure enabled the realization of fiber devices with diverse and complex functionalities. Amongst those, ...

  8. OCDR guided laser ablation device

    DOE Patents [OSTI]

    Dasilva, Luiz B. (Danville, CA); Colston, Jr., Bill W. (Livermore, CA); James, Dale L. (Tracy, CA)

    2002-01-01T23:59:59.000Z

    A guided laser ablation device. The device includes a mulitmode laser ablation fiber that is surrounded by one or more single mode optical fibers that are used to image in the vicinity of the laser ablation area to prevent tissue damage. The laser ablation device is combined with an optical coherence domain reflectometry (OCDR) unit and with a control unit which initializes the OCDR unit and a high power laser of the ablation device. Data from the OCDR unit is analyzed by the control unit and used to control the high power laser. The OCDR images up to about 3 mm ahead of the ablation surface to enable a user to see sensitive tissue such as a nerve or artery before damaging it by the laser.

  9. Devices for collecting chemical compounds

    DOE Patents [OSTI]

    Scott, Jill R; Groenewold, Gary S

    2013-12-24T23:59:59.000Z

    A device for sampling chemical compounds from fixed surfaces and related methods are disclosed. The device may include a vacuum source, a chamber and a sorbent material. The device may utilize vacuum extraction to volatilize the chemical compounds from a fixed surface so that they may be sorbed by the sorbent material. The sorbent material may then be analyzed using conventional thermal desorption/gas chromatography/mass spectrometry (TD/GC/MS) instrumentation to determine presence of the chemical compounds. The methods may include detecting release and presence of one or more chemical compounds and determining the efficacy of decontamination. The device may be useful in collection and analysis of a variety of chemical compounds, such as residual chemical warfare agents, chemical attribution signatures and toxic industrial chemicals.

  10. Sketch Recognition on Mobile Devices 

    E-Print Network [OSTI]

    Lucchese, George 1987-

    2012-11-29T23:59:59.000Z

    Sketch recognition allows computers to understand and model hand drawn sketches and diagrams. Traditionally sketch recognition systems required a pen based PC interface, but powerful mobile devices such as tablets and smartphones can provide a new...

  11. Device-transparent personal storage

    E-Print Network [OSTI]

    Strauss, Jacob A. (Jacob Alo), 1979-

    2010-01-01T23:59:59.000Z

    Users increasingly store data collections such as digital photographs on multiple personal devices, each of which typically presents the user with a storage management interface isolated from the contents of all other ...

  12. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    DOE Patents [OSTI]

    McCown, Steven H. (Rigby, ID); Derr, Kurt W. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID)

    2012-05-08T23:59:59.000Z

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  13. Assistive Devices for the Home

    E-Print Network [OSTI]

    Harris, Janie

    2002-01-31T23:59:59.000Z

    , contact a physical therapist or occupational therapist through a home health agency or your local hospital. The following Web sites have information about devices that can make your home safer and more functional: http...Assistive Devices for the Home Janie Harris Extension Specialist, Housing and Environment The Texas A&M University System If you were to become impaired or disabled from an accident or illness, how ?user-friendly? would your home be? There are many...

  14. Piezo-phototronic effect devices

    DOE Patents [OSTI]

    Wang, Zhong L.; Yang, Qing

    2013-09-10T23:59:59.000Z

    A semiconducting device includes a piezoelectric structure that has a first end and an opposite second end. A first conductor is in electrical communication with the first end and a second conductor is in electrical communication with the second end so as to form an interface therebetween. A force applying structure is configured to maintain an amount of strain in the piezoelectric member sufficient to generate a desired electrical characteristic in the semiconducting device.

  15. Lih thermal energy storage device

    DOE Patents [OSTI]

    Olszewski, Mitchell (Knoxville, TN); Morris, David G. (Knoxville, TN)

    1994-01-01T23:59:59.000Z

    A thermal energy storage device for use in a pulsed power supply to store waste heat produced in a high-power burst operation utilizes lithium hydride as the phase change thermal energy storage material. The device includes an outer container encapsulating the lithium hydride and an inner container supporting a hydrogen sorbing sponge material such as activated carbon. The inner container is in communication with the interior of the outer container to receive hydrogen dissociated from the lithium hydride at elevated temperatures.

  16. SLAC All Access: Vacuum Microwave Device Department

    ScienceCinema (OSTI)

    Haase, Andy

    2014-06-13T23:59:59.000Z

    The Vacuum Microwave Device Department (VMDD) builds the devices that make SLAC's particle accelerators go. These devices, called klystrons, generate intense waves of microwave energy that rocket subatomic particles up to nearly the speed of light.

  17. DISSERTATION DEVICE CHARACTERIZATION OF CADMIUM TELLURIDE PHOTOVOLTAICS

    E-Print Network [OSTI]

    Sites, James R.

    DISSERTATION DEVICE CHARACTERIZATION OF CADMIUM TELLURIDE PHOTOVOLTAICS Submitted by Russell M Reserved #12;ABSTRACT DEVICE CHARACTERIZATION OF CADMIUM TELLURIDE PHOTOVOLTAICS Thin-film photovoltaics

  18. Recent Device Developments with Advanced Bulk Thermoelectric...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Device Developments with Advanced Bulk Thermoelectric Materials at RTI Recent Device Developments with Advanced Bulk Thermoelectric Materials at RTI Reviews work in engineered...

  19. Functionalized Graphene Nanoroads for Quantum Well Device. |...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nanoroads for Quantum Well Device. Functionalized Graphene Nanoroads for Quantum Well Device. Abstract: Using density functional theory, a series of calculations of structural and...

  20. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    SciTech Connect (OSTI)

    Tran, Liem T., E-mail: ltran1@utk.edu [Department of Geography, University of Tennessee, Knoxville, TN (United States); O& #x27; Neill, Robert V. [OTIE and Associates, Oak Ridge, TN (United States); Smith, Elizabeth R. [U.S. Environmental Protection Agency, Office of Research and Development, National Exposure Research Laboratory, Research Triangle Park, NC (United States)

    2012-04-15T23:59:59.000Z

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of 'self-/peer-appraisal' of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: Black-Right-Pointing-Pointer We present a method for regional environmental vulnerability assessment. Black-Right-Pointing-Pointer It is based on the self-/peer-appraisal concept in term of vulnerability. Black-Right-Pointing-Pointer The analysis is facilitated by two separate linear optimization programs. Black-Right-Pointing-Pointer The method provides insights on the regional relative vulnerability pattern.

  1. Semiconductor-based, large-area, flexible, electronic devices

    DOE Patents [OSTI]

    Goyal, Amit (Knoxville, TN)

    2011-03-15T23:59:59.000Z

    Novel articles and methods to fabricate the same resulting in flexible, large-area, triaxially textured, single-crystal or single-crystal-like, semiconductor-based, electronic devices are disclosed. Potential applications of resulting articles are in areas of photovoltaic devices, flat-panel displays, thermophotovoltaic devices, ferroelectric devices, light emitting diode devices, computer hard disc drive devices, magnetoresistance based devices, photoluminescence based devices, non-volatile memory devices, dielectric devices, thermoelectric devices and quantum dot laser devices.

  2. Dual control active superconductive devices

    DOE Patents [OSTI]

    Martens, Jon S. (Albuquerque, NM); Beyer, James B. (Madison, WI); Nordman, James E. (Madison, WI); Hohenwarter, Gert K. G. (Madison, WI)

    1993-07-20T23:59:59.000Z

    A superconducting active device has dual control inputs and is constructed such that the output of the device is effectively a linear mix of the two input signals. The device is formed of a film of superconducting material on a substrate and has two main conduction channels, each of which includes a weak link region. A first control line extends adjacent to the weak link region in the first channel and a second control line extends adjacent to the weak link region in the second channel. The current flowing from the first channel flows through an internal control line which is also adjacent to the weak link region of the second channel. The weak link regions comprise small links of superconductor, separated by voids, through which the current flows in each channel. Current passed through the control lines causes magnetic flux vortices which propagate across the weak link regions and control the resistance of these regions. The output of the device taken across the input to the main channels and the output of the second main channel and the internal control line will constitute essentially a linear mix of the two input signals imposed on the two control lines. The device is especially suited to microwave applications since it has very low input capacitance, and is well suited to being formed of high temperature superconducting materials since all of the structures may be formed coplanar with one another on a substrate.

  3. Aerosol can waste disposal device

    DOE Patents [OSTI]

    O'Brien, M.D.; Klapperick, R.L.; Bell, C.

    1993-12-21T23:59:59.000Z

    Disclosed is a device for removing gases and liquid from containers. The device punctures the bottom of a container for purposes of exhausting gases and liquid from the container without their escaping into the atmosphere. The device includes an inner cup or cylinder having a top portion with an open end for receiving a container and a bottom portion which may be fastened to a disposal or waste container in a substantially leak-proof manner. A piercing device is mounted in the lower portion of the inner cylinder for puncturing the can bottom placed in the inner cylinder. An outer cylinder having an open end and a closed end fits over the top portion of the inner cylinder in telescoping engagement. A force exerted on the closed end of the outer cylinder urges the bottom of a can in the inner cylinder into engagement with the piercing device in the bottom of the inner cylinder to form an opening in the can bottom, thereby permitting the contents of the can to enter the disposal container. 7 figures.

  4. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20T23:59:59.000Z

    in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Chair of Committee, Gary Wingenbach Committee Members, Theresa P. Murphrey Leonardo Lombardini Head of Department, John Elliot December 2014 Major Subject...; (c) health; (d) social networks; (e) food; (f) water; and (g) natural disasters and climate variability (Hahn et al., 2009). The Hahn et al. (2009) study took this vulnerability framework a step further by determining which secondary components...

  5. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01T23:59:59.000Z

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  6. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4;DepartmentVulnerabilities |Department

  7. Bad data packet capture device

    DOE Patents [OSTI]

    Chen, Dong; Gara, Alan; Heidelberger, Philip; Vranas, Pavlos

    2010-04-20T23:59:59.000Z

    An apparatus and method for capturing data packets for analysis on a network computing system includes a sending node and a receiving node connected by a bi-directional communication link. The sending node sends a data transmission to the receiving node on the bi-directional communication link, and the receiving node receives the data transmission and verifies the data transmission to determine valid data and invalid data and verify retransmissions of invalid data as corresponding valid data. A memory device communicates with the receiving node for storing the invalid data and the corresponding valid data. A computing node communicates with the memory device and receives and performs an analysis of the invalid data and the corresponding valid data received from the memory device.

  8. Microelectroporation device for genomic screening

    DOE Patents [OSTI]

    Perroud, Thomas D.; Renzi, Ronald F.; Negrete, Oscar; Claudnic, Mark R.

    2014-09-09T23:59:59.000Z

    We have developed an microelectroporation device that combines microarrays of oligonucleotides, microfluidic channels, and electroporation for cell transfection and high-throughput screening applications (e.g. RNA interference screens). Microarrays allow the deposition of thousands of different oligonucleotides in microscopic spots. Microfluidic channels and microwells enable efficient loading of cells into the device and prevent cross-contamination between different oligonucleotides spots. Electroporation allows optimal transfection of nucleic acids into cells (especially hard-to-transfect cells such as primary cells) by minimizing cell death while maximizing transfection efficiency. This invention has the advantage of a higher throughput and lower cost, while preventing cross-contamination compared to conventional screening technologies. Moreover, this device does not require bulky robotic liquid handling equipment and is inherently safer given that it is a closed system.

  9. Device Independent Random Number Generation

    E-Print Network [OSTI]

    Mataj Pivoluska; Martin Plesch

    2015-02-23T23:59:59.000Z

    Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide randomness certified by classical statistical tests -- Device Independent Quantum Random Number Generators. In this paper we review the most relevant results in this field, which allow the production of almost perfect randomness with help of quantum devices, supplemented with an arbitrary weak source of additional randomness. This is in fact the best one could hope for to achieve, as with no starting randomness (corresponding to no free will in a different concept) even a quantum world would have a fully deterministic description.

  10. Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA

    SciTech Connect (OSTI)

    Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

    1992-10-01T23:59:59.000Z

    This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

  11. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01T23:59:59.000Z

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  12. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  13. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15T23:59:59.000Z

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  14. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01T23:59:59.000Z

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  15. INSTITUTE for QUANTUM STRUCTURES AND DEVICES

    E-Print Network [OSTI]

    Plotkin, Steven S.

    , and #12;the design and fabrication of quantum devices based on magnetic, quantum dot, and superconducting

  16. Inertial impaction air sampling device

    DOE Patents [OSTI]

    Dewhurst, K.H.

    1990-05-22T23:59:59.000Z

    An inertial impactor is designed which is to be used in an air sampling device for collection of respirable size particles in ambient air. The device may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry. 3 figs.

  17. Gas sensing with acoustic devices

    SciTech Connect (OSTI)

    Martin, S.J.; Frye, G.C. [Sandia National Labs., Albuquerque, NM (United States); Spates, J.J. [Ktech Corp., Albuquerque, NM (United States); Butler, M.A. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31T23:59:59.000Z

    A survey is made of acoustic devices that are suitable as gas and vapor sensors. This survey focuses on attributes such as operating frequency, mass sensitivity, quality factor (Q), and their ability to be fabricated on a semiconductor substrate to allow integration with electronic circuitry. The treatment of the device surface with chemically-sensitive films to detect species of interest is discussed. Strategies for improving discrimination are described, including sensor arrays and species concentration and separation schemes. The advantages and disadvantages of integrating sensors with microelectronics are considered, along with the effect on sensitivity of scaling acoustic gas sensors to smaller size.

  18. Template attacks on different devices

    E-Print Network [OSTI]

    Choudary, Omar; Kuhn, Markus G.

    2014-08-15T23:59:59.000Z

    the devices from a battery via a 3.3 V linear regulator and supplied a 1 MHz sine wave clock signal. We used a Tektronix TDS 7054 8-bit oscilloscope with P6243 active probe, at 250 MS/s, with 500 MHz bandwidth in SAMPLE mode. Devices Alpha and Beta used a CPU... the value zero, meaning that in our traces none of the variability should be caused by variable data in other nearby instructions that may be processed concurrently in various pipeline stages. This approach, also used in other studies [8,13,17], provides a...

  19. Beta ray flux measuring device

    DOE Patents [OSTI]

    Impink, Jr., Albert J. (Murrysville, PA); Goldstein, Norman P. (Murrysville, PA)

    1990-01-01T23:59:59.000Z

    A beta ray flux measuring device in an activated member in-core instrumentation system for pressurized water reactors. The device includes collector rings positioned about an axis in the reactor's pressure boundary. Activated members such as hydroballs are positioned within respective ones of the collector rings. A response characteristic such as the current from or charge on a collector ring indicates the beta ray flux from the corresponding hydroball and is therefore a measure of the relative nuclear power level in the region of the reactor core corresponding to the specific exposed hydroball within the collector ring.

  20. Surface-micromachined microfluidic devices

    DOE Patents [OSTI]

    Galambos, Paul C. (Albuquerque, NM); Okandan, Murat (Albuquerque, NM); Montague, Stephen (Albuquerque, NM); Smith, James H. (Redmond, WA); Paul, Phillip H. (Livermore, CA); Krygowski, Thomas W. (Cortlandt Manor, NY); Allen, James J. (Albuquerque, NM); Nichols, Christopher A. (Hauppauge, NY); Jakubczak, II, Jerome F. (Rio Rancho, NM)

    2003-01-01T23:59:59.000Z

    Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators.

  1. Implantable biomedical devices on bioresorbable substrates

    DOE Patents [OSTI]

    Rogers, John A; Kim, Dae-Hyeong; Omenetto, Fiorenzo; Kaplan, David L; Litt, Brian; Viventi, Jonathan; Huang, Yonggang; Amsden, Jason

    2014-03-04T23:59:59.000Z

    Provided herein are implantable biomedical devices, methods of administering implantable biomedical devices, methods of making implantable biomedical devices, and methods of using implantable biomedical devices to actuate a target tissue or sense a parameter associated with the target tissue in a biological environment. Each implantable biomedical device comprises a bioresorbable substrate, an electronic device having a plurality of inorganic semiconductor components supported by the bioresorbable substrate, and a barrier layer encapsulating at least a portion of the inorganic semiconductor components. Upon contact with a biological environment the bioresorbable substrate is at least partially resorbed, thereby establishing conformal contact between the implantable biomedical device and the target tissue in the biological environment.

  2. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  3. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  4. Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but

    E-Print Network [OSTI]

    Mencuccini, Maurizio

    Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

  5. Encapsulation methods for organic electrical devices

    DOE Patents [OSTI]

    Blum, Yigal D.; Chu, William Siu-Keung; MacQueen, David Brent; Shi, Yijian

    2013-06-18T23:59:59.000Z

    The disclosure provides methods and materials suitable for use as encapsulation barriers in electronic devices. In one embodiment, for example, there is provided an electroluminescent device or other electronic device encapsulated by alternating layers of a silicon-containing bonding material and a ceramic material. The encapsulation methods provide, for example, electronic devices with increased stability and shelf-life. The invention is useful, for example, in the field of microelectronic devices.

  6. Interdigitated photovoltaic power conversion device

    DOE Patents [OSTI]

    Ward, J.S.; Wanlass, M.W.; Gessert, T.A.

    1999-04-27T23:59:59.000Z

    A photovoltaic power conversion device has a top surface adapted to receive impinging radiation. The device includes at least two adjacent, serially connected cells. Each cell includes a semi-insulating substrate and a lateral conductivity layer of a first doped electrical conductivity disposed on the substrate. A base layer is disposed on the lateral conductivity layer and has the same electrical charge conductivity thereof. An emitter layer of a second doped electrical conductivity of opposite electrical charge is disposed on the base layer and forms a p-n junction therebetween. A plurality of spaced channels are formed in the emitter and base layers to expose the lateral conductivity layer at the bottoms thereof. A front contact grid is positioned on the top surface of the emitter layer of each cell. A first current collector is positioned along one outside edge of at least one first cell. A back contact grid is positioned in the channels at the top surface of the device for engagement with the lateral conductivity layer. A second current collector is positioned along at least one outside edge of at least one oppositely disposed second cell. Finally, an interdigitation mechanism is provided for serially connecting the front contact grid of one cell to the back contact grid of an adjacent cell at the top surface of the device. 15 figs.

  7. High performance thermoelectric nanocomposite device

    DOE Patents [OSTI]

    Yang, Jihui (Lakeshore, CA); Snyder, Dexter D. (Birmingham, MI)

    2011-10-25T23:59:59.000Z

    A thermoelectric device includes a nanocomposite material with nanowires of at least one thermoelectric material having a predetermined figure of merit, the nanowires being formed in a porous substrate having a low thermal conductivity and having an average pore diameter ranging from about 4 nm to about 300 nm.

  8. Aerosol can waste disposal device

    DOE Patents [OSTI]

    O'Brien, Michael D. (Las Vegas, NV); Klapperick, Robert L. (Las Vegas, NV); Bell, Chris (Las Vegas, NV)

    1993-01-01T23:59:59.000Z

    Disclosed is a device for removing gases and liquid from containers. The ice punctures the bottom of a container for purposes of exhausting gases and liquid from the container without their escaping into the atmosphere. The device includes an inner cup or cylinder having a top portion with an open end for receiving a container and a bottom portion which may be fastened to a disposal or waste container in a substantially leak-proof manner. A piercing device is mounted in the lower portion of the inner cylinder for puncturing the can bottom placed in the inner cylinder. An outer cylinder having an open end and a closed end fits over the top portion of the inner cylinder in telescoping engagement. A force exerted on the closed end of the outer cylinder urges the bottom of a can in the inner cylinder into engagement with the piercing device in the bottom of the inner cylinder to form an opening in the can bottom, thereby permitting the contents of the can to enter the disposal container.

  9. Mechanical scriber for semiconductor devices

    DOE Patents [OSTI]

    Lin, P.T.

    1985-03-05T23:59:59.000Z

    A mechanical scriber using a scribing tip, such as a diamond, provides controlled scriber forces with a spring-loaded compound lever arrangement. The scribing force and range of scribing depth are adjusted by a pair of adjustable micrometer heads. A semiconductor device, such as a multilayer solar cell, can be formed into scribed strips at each layer. 5 figs.

  10. Mechanical scriber for semiconductor devices

    DOE Patents [OSTI]

    Lin, Peter T. (East Brunswick, NJ)

    1985-01-01T23:59:59.000Z

    A mechanical scriber using a scribing tip, such as a diamond, provides controlled scriber forces with a spring-loaded compound lever arrangement. The scribing force and range of scribing depth are adjusted by a pair of adjustable micrometer heads. A semiconductor device, such as a multilayer solar cell, can be formed into scribed strips at each layer.

  11. Surface-Micromachined Microfluidic Devices

    DOE Patents [OSTI]

    Galambos, Paul C. (Albuquerque, NM); Okandan, Murat (Albuquerque, NM); Montague, Stephen (Albuquerque, NM); Smith, James H. (Redmond, WA); Paul, Phillip H. (Livermore, CA); Krygowski, Thomas W. (Coutlandt Manor, NY); Allen, James J. (Albuquerque, NM); Nichols, Christopher A. (Hauppauge, NY); Jakubczak, II, Jerome F. (Rio Rancho, NM)

    2004-09-28T23:59:59.000Z

    Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators. Microfluidic devices are disclosed which can be manufactured using surface-micromachining. These devices utilize an electroosmotic force or an electromagnetic field to generate a flow of a fluid in a microchannel that is lined, at least in part, with silicon nitride. Additional electrodes can be provided within or about the microchannel for separating particular constituents in the fluid during the flow based on charge state or magnetic moment. The fluid can also be pressurized in the channel. The present invention has many different applications including electrokinetic pumping, chemical and biochemical analysis (e.g. based on electrophoresis or chromatography), conducting chemical reactions on a microscopic scale, and forming hydraulic actuators.

  12. Interdigitated photovoltaic power conversion device

    DOE Patents [OSTI]

    Ward, James Scott (Englewood, CO); Wanlass, Mark Woodbury (Golden, CO); Gessert, Timothy Arthur (Conifer, CO)

    1999-01-01T23:59:59.000Z

    A photovoltaic power conversion device has a top surface adapted to receive impinging radiation. The device includes at least two adjacent, serially connected cells. Each cell includes a semi-insulating substrate and a lateral conductivity layer of a first doped electrical conductivity disposed on the substrate. A base layer is disposed on the lateral conductivity layer and has the same electrical charge conductivity thereof. An emitter layer of a second doped electrical conductivity of opposite electrical charge is disposed on the base layer and forms a p-n junction therebetween. A plurality of spaced channels are formed in the emitter and base layers to expose the lateral conductivity layer at the bottoms thereof. A front contact grid is positioned on the top surface of the emitter layer of each cell. A first current collector is positioned along one outside edge of at least one first cell. A back contact grid is positioned in the channels at the top surface of the device for engagement with the lateral conductivity layer. A second current collector is positioned along at least one outside edge of at least one oppositely disposed second cell. Finally, an interdigitation mechanism is provided for serially connecting the front contact grid of one cell to the back contact grid of an adjacent cell at the top surface of the device.

  13. In situ biofilm coupon device

    DOE Patents [OSTI]

    Peyton, B.M.; Truex, M.J.

    1997-06-24T23:59:59.000Z

    An apparatus is disclosed for characterization of in-situ microbial biofilm populations in subsurface groundwater. The device permits biofilm-forming microorganisms to adhere to packing material while emplaced in a groundwater strata, so that the packing material can be later analyzed for quantity and type of microorganisms, growth rate, and nutrient requirements. 3 figs.

  14. In situ biofilm coupon device

    DOE Patents [OSTI]

    Peyton, Brent M. (Kennewick, WA); Truex, Michael J. (Richland, WA)

    1997-01-01T23:59:59.000Z

    An apparatus for characterization of in-situ microbial biofilm populations in subsurface groundwater. The device permits biofilm-forming microorganisms to adhere to packing material while emplaced in a groundwater strata, so that the packing material can be later analyzed for quantity and type of microorganisms, growth rate, and nutrient requirements.

  15. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  16. MIT Device Simulation WebLab : an online simulator for microelectronic devices

    E-Print Network [OSTI]

    Solis, Adrian (Adrian Orbita)

    2005-01-01T23:59:59.000Z

    In the field of microelectronics, a device simulator is an important engineering tool with tremendous educational value. With a device simulator, a student can examine the characteristics of a microelectronic device described ...

  17. Recombination device for storage batteries

    DOE Patents [OSTI]

    Kraft, Helmut (Liederbach, DE); Ledjeff, Konstantin (Bad Krozingen, DE)

    1985-01-01T23:59:59.000Z

    A recombination device including a gas-tight enclosure connected to receive he discharge gases from a rechargeable storage battery. Catalytic material for the recombination of hydrogen and oxygen to form water is supported within the enclosure. The enclosure is sealed from the atmosphere by a liquid seal including two vertical chambers interconnected with an inverted U-shaped overflow tube. The first chamber is connected at its upper portion to the enclosure and the second chamber communicates at its upper portion with the atmosphere. If the pressure within the enclosure differs as overpressure or vacuum by more than the liquid level, the liquid is forced into one of the two chambers and the overpressure is vented or the vacuum is relieved. The recombination device also includes means for returning recombined liquid to the battery and for absorbing metal hydrides.

  18. Recombination device for storage batteries

    DOE Patents [OSTI]

    Kraft, H.; Ledjeff, K.

    1984-01-01T23:59:59.000Z

    A recombination device including a gas-tight enclosure connected to receive the discharge gases from a rechargeable storage battery. Catalytic material for the recombination of hydrogen and oxygen to form water is supported within the enclosure. The enclosure is sealed from the atmosphere by a liquid seal including two vertical chambers interconnected with an inverted U-shaped overflow tube. The first chamber is connected at its upper portion to the enclosure and the second chamber communicates at its upper portion with the atmosphere. If the pressure within the enclosure differs as overpressure or vacuum by more than the liquid level, the liquid is forced into one of the two chambers and the overpressure is vented or the vacuum is relieved. The recombination device also includes means for returning recombined liquid to the battery and for absorbing metal hydrides.

  19. Variable ratio regenerative braking device

    DOE Patents [OSTI]

    Hoppie, Lyle O. (Birmingham, MI)

    1981-12-15T23:59:59.000Z

    Disclosed is a regenerative braking device (10) for an automotive vehicle. The device includes an energy storage assembly (12) having a plurality of rubber rollers (26, 28) mounted for rotation between an input shaft (36) and an output shaft (42), clutches (38, 46) and brakes (40, 48) associated with each shaft, and a continuously variable transmission (22) connectable to a vehicle drivetrain and to the input and output shafts by the respective clutches. The rubber rollers are torsionally stressed to accumulate energy from the vehicle when the input shaft is clutched to the transmission while the brake on the output shaft is applied, and are torsionally relaxed to deliver energy to the vehicle when the output shaft is clutched to the transmission while the brake on the input shaft is applied. The transmission ratio is varied to control the rate of energy accumulation and delivery for a given rotational speed of the vehicle drivetrain.

  20. RFQ device for accelerating particles

    DOE Patents [OSTI]

    Shepard, K.W.; Delayen, J.R.

    1995-06-06T23:59:59.000Z

    A superconducting radio frequency quadrupole (RFQ) device includes four spaced elongated, linear, tubular rods disposed parallel to a charged particle beam axis, with each rod supported by two spaced tubular posts oriented radially with respect to the beam axis. The rod and post geometry of the device has four-fold rotation symmetry, lowers the frequency of the quadrupole mode below that of the dipole mode, and provides large dipole-quadrupole mode isolation to accommodate a range of mechanical tolerances. The simplicity of the geometry of the structure, which can be formed by joining eight simple T-sections, provides a high degree of mechanical stability, is insensitive to mechanical displacement, and is particularly adapted for fabrication with superconducting materials such as niobium. 5 figs.

  1. Neutron-absorber release device

    DOE Patents [OSTI]

    VAN Erp, Jan B. (Hinsdale, IL); Kimont, Edward L. (Evergreen Park, IL)

    1976-01-01T23:59:59.000Z

    A resettable device is provided for supporting an object, sensing when an environment reaches a critical temperature and releasing the object when the critical temperature is reached. It includes a flexible container having a material inside with a melting point at the critical temperature. The object's weight is supported by the solid material which gives rigidity to the container until the critical temperature is reached at which point the material in the container melts. The flexible container with the now fluid material inside has insufficient strength to support the object which is thereby released. Biasing means forces the container back to its original shape so that when the temperature falls below the melting temperature the material again solidifies, and the object may again be supported by the device.

  2. Nanowire structures and electrical devices

    DOE Patents [OSTI]

    Bezryadin, Alexey (Champaign, IL); Remeika, Mikas (Urbana, IL)

    2010-07-06T23:59:59.000Z

    The present invention provides structures and devices comprising conductive segments and conductance constricting segments of a nanowire, such as metallic, superconducting or semiconducting nanowire. The present invention provides structures and devices comprising conductive nanowire segments and conductance constricting nanowire segments having accurately selected phases including crystalline and amorphous states, compositions, morphologies and physical dimensions, including selected cross sectional dimensions, shapes and lengths along the length of a nanowire. Further, the present invention provides methods of processing nanowires capable of patterning a nanowire to form a plurality of conductance constricting segments having selected positions along the length of a nanowire, including conductance constricting segments having reduced cross sectional dimensions and conductance constricting segments comprising one or more insulating materials such as metal oxides.

  3. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K.; Grey, Alan E.

    1994-04-05T23:59:59.000Z

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  4. Detection device for hazardous materials

    DOE Patents [OSTI]

    Partin, Judy K. (Idaho Falls, ID); Grey, Alan E. (Idaho Falls, ID)

    1994-01-01T23:59:59.000Z

    A detection device that is activated by the interaction of a hazardous chcal with a coating interactive with said chemical on an optical fiber thereby reducing the amount of light passing through the fiber to a light detector. A combination of optical filters separates the light into a signal beam and a reference beam which after detection, appropriate amplification, and comparison with preset internal signals, activates an alarm means if a predetermined level of contaminant is observed.

  5. Encapsulant materials and associated devices

    DOE Patents [OSTI]

    Kempe, Michael D (Littleton, CO); Thapa, Prem (Lima, OH)

    2011-03-08T23:59:59.000Z

    Compositions suitable for use as encapsulants are described. The inventive compositions include a high molecular weight polymeric material, a curing agent, an inorganic compound, and a coupling agent. Optional elements include adhesion promoting agents, colorants, antioxidants, and UV absorbers. The compositions have desirable diffusivity properties, making them suitable for use in devices in which a substantial blocking of moisture ingress is desired, such as photovoltaic (PV) modules.

  6. Encapsulant materials and associated devices

    DOE Patents [OSTI]

    Kempe, Michael D (Littleton, CO); Thapa, Prem (Lima, OH)

    2012-05-22T23:59:59.000Z

    Compositions suitable for use as encapsulants are described. The inventive compositions include a high molecular weight polymeric material, a curing agent, an inorganic compound, and a coupling agent. Optional elements include adhesion promoting agents, colorants, antioxidants, and UV absorbers. The compositions have desirable diffusivity properties, making them suitable for use in devices in which a substantial blocking of moisture ingress is desired, such as photovoltaic (PV) modules.

  7. Release strategies for making transferable semiconductor structures, devices and device components

    DOE Patents [OSTI]

    Rogers, John A. (Champaign, IL); Nuzzo, Ralph G. (Champaign, IL); Meitl, Matthew (Raleigh, NC); Ko, Heung Cho (Urbana, IL); Yoon, Jongseung (Urbana, IL); Menard, Etienne (Durham, NC); Baca, Alfred J. (Urbana, IL)

    2011-04-26T23:59:59.000Z

    Provided are methods for making a device or device component by providing a multilayer structure having a plurality of functional layers and a plurality of release layers and releasing the functional layers from the multilayer structure by separating one or more of the release layers to generate a plurality of transferable structures. The transferable structures are printed onto a device substrate or device component supported by a device substrate. The methods and systems provide means for making high-quality and low-cost photovoltaic devices, transferable semiconductor structures, (opto-)electronic devices and device components.

  8. Release strategies for making transferable semiconductor structures, devices and device components

    DOE Patents [OSTI]

    Rogers, John A; Nuzzo, Ralph G; Meitl, Matthew; Ko, Heung Cho; Yoon, Jongseung; Menard, Etienne; Baca, Alfred J

    2014-11-25T23:59:59.000Z

    Provided are methods for making a device or device component by providing a multilayer structure having a plurality of functional layers and a plurality of release layers and releasing the functional layers from the multilayer structure by separating one or more of the release layers to generate a plurality of transferable structures. The transferable structures are printed onto a device substrate or device component supported by a device substrate. The methods and systems provide means for making high-quality and low-cost photovoltaic devices, transferable semiconductor structures, (opto-)electronic devices and device components.

  9. Infrared emitting device and method

    DOE Patents [OSTI]

    Kurtz, Steven R. (Albuquerque, NM); Biefeld, Robert M. (Albuquerque, NM); Dawson, L. Ralph (Albuquerque, NM); Howard, Arnold J. (Albuquerque, NM); Baucom, Kevin C. (Albuquerque, NM)

    1997-01-01T23:59:59.000Z

    An infrared emitting device and method. The infrared emitting device comprises a III-V compound semiconductor substrate upon which are grown a quantum-well active region having a plurality of quantum-well layers formed of a ternary alloy comprising InAsSb sandwiched between barrier layers formed of a ternary alloy having a smaller lattice constant and a larger energy bandgap than the quantum-well layers. The quantum-well layers are preferably compressively strained to increase the threshold energy for Auger recombination; and a method is provided for determining the preferred thickness for the quantum-well layers. Embodiments of the present invention are described having at least one cladding layer to increase the optical and carrier confinement in the active region, and to provide for waveguiding of the light generated within the active region. Examples have been set forth showing embodiments of the present invention as surface- and edge-emitting light emitting diodes (LEDs), an optically-pumped semiconductor laser, and an electrically-injected semiconductor diode laser. The light emission from each of the infrared emitting devices of the present invention is in the midwave infrared region of the spectrum from about 2 to 6 microns.

  10. Editorial: Photovoltaic Materials and Devices

    SciTech Connect (OSTI)

    Sopori, B.; Tan, T.; Rupnowski, P.

    2012-01-01T23:59:59.000Z

    As the global energy needs grow, there is increasing interest in the generation of electricity by photovoltaics (PVs) devices or solar cells - devices that convert sunlight to electricity. Solar industry has seen an enormous growth during the last decade. The sale of PV modules has exceeded 27 GW in 2011, with significant contributions to the market share from all technologies. While the silicon technology continues to have the dominant share, the other thin film technologies (CdTe, CIGS, a-Si, and organic PV) are experiencing fast growth. Increased production of silicon modules has led to a very rapid reduction in their price and remains as benchmark for other technologies. The PV industry is in full gear to commercialize new automated equipment for solar cell and module production, instrumentation for process monitoring technologies, and for implementation of other cost-reduction approaches, and extensive research continues to be carried out in many laboratories to improve the efficiency of solar cells and modules without increasing the production costs. A large variety of solar cells, which differ in the material systems used, design, PV structure, and even the principle of PV conversion, are designed to date. This special issue contains peer-reviewed papers in the recent developments in research related to broad spectrum of photovoltaic materials and devices. It contains papers on many aspects of solar cells-the growth and deposition, characterization, and new material development.

  11. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    SciTech Connect (OSTI)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01T23:59:59.000Z

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

  12. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01T23:59:59.000Z

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  13. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01T23:59:59.000Z

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  14. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department

  15. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |

  16. V-061: IBM SPSS Modeler XML Document Parsing Vulnerability | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |Remote Users

  17. V-080: Apple iOS Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilitiesDepartment

  18. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCodeCode |

  19. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department of Energy Cisco|

  20. T-597: WordPress Multiple Security Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment ofWordPress

  1. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | DepartmentDepartment|Adobe

  2. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartmentRemoteVulnerabilityApple has

  3. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59CapabilityVulnerabilities | Department1: IBM

  4. Pressure Driven Pump for Portable Microfluidic Devices 

    E-Print Network [OSTI]

    Nguyen, Vincent

    2014-09-20T23:59:59.000Z

    Microfluidic devices have become interesting areas of research for their ability to create high throughput chemical analysis and other functions. In some microfluidic devices, fluids are actively moved through the valves to maintain a characteristic...

  5. Implementation for simplifying Bluetooth device connection methods

    E-Print Network [OSTI]

    Wan, Tehyih Debbie, 1981-

    2004-01-01T23:59:59.000Z

    This thesis provides a way for users to easily add and remove devices to secure groups, allowing for a more intuitive way of making connections between devices. These groups allow users to seamlessly make connections between ...

  6. Rapid prototyping method for a microfluidics device

    E-Print Network [OSTI]

    Klauber, Kameron L

    2012-01-01T23:59:59.000Z

    The product design process can be described as a number of steps taken to turn an idea into a reality. One particular design process of creating a microfluidics device was studied and analyzed. A device containing channels ...

  7. Environmental Effects on Power Electronic Devices

    Broader source: Energy.gov (indexed) [DOE]

    the complex relationship between environment (temperature, humidity, and vibration) and automotive power electronic device (PED) performance through materials characterization...

  8. Organic electrophosphorescence device having interfacial layers

    SciTech Connect (OSTI)

    Choulis, Stelios A. (San Jose, CA); Mathai, Mathew (Santa Clara, CA); Choong, Vi-En (San Jose, CA); So, Franky (Gainesville, FL)

    2010-08-10T23:59:59.000Z

    Techniques are described for forming an organic light emitting diode device with improved device efficiency. Materials having at least one energy level that is similar to those of a phosphorescent light emitting material in the diode are incorporated into the device to directly inject holes or electrons to the light emitting material.

  9. Sensor device and methods for using same

    DOE Patents [OSTI]

    Rothgeb, Timothy Michael; Gansle, Kristina Marie Rohal; Joyce, Jonathan Livingston; Jordan, James Madison; Rohwer, Tedd Addison; Lockhart, Randal Ray; Smith, Christopher Lawrence; Trinh, Toan; Cipollone, Mark Gary

    2005-10-25T23:59:59.000Z

    A sensor device and method of employment is provided. More specifically, a sensor device adapted to detect, identify and/or measure a chemical and/or physical characteristic upon placement of the device into an environment, especially a liquid medium for which monitoring is sought is provided.

  10. Medical Devices and Systems PRECISE Center

    E-Print Network [OSTI]

    Rajkumar, Ragunathan "Raj"

    that are not likely to be met by research in your field alone? ­ Advances in medical devices domain requires12/16/2008 1 Medical Devices and Systems Insup Lee PRECISE Center Department Computer and Information Science University of Pennsylvania 12/15/08 CPS Information Day Medical Devices Containing

  11. Tunable circuit for tunable capacitor devices

    SciTech Connect (OSTI)

    Rivkina, Tatiana; Ginley, David S.

    2006-09-19T23:59:59.000Z

    A tunable circuit (10) for a capacitively tunable capacitor device (12) is provided. The tunable circuit (10) comprises a tunable circuit element (14) and a non-tunable dielectric element (16) coupled to the tunable circuit element (16). A tunable capacitor device (12) and a method for increasing the figure of merit in a tunable capacitor device (12) are also provided.

  12. Multi-reflective acoustic wave device

    DOE Patents [OSTI]

    Andle, Jeffrey C.

    2006-02-21T23:59:59.000Z

    An acoustic wave device, which utilizes multiple localized reflections of acoustic wave for achieving an infinite impulse response while maintaining high tolerance for dampening effects, is disclosed. The device utilized a plurality of electromechanically significant electrodes disposed on most of the active surface. A plurality of sensors utilizing the disclosed acoustic wave mode device are also described.

  13. Portable control device for networked mobile robots

    DOE Patents [OSTI]

    Feddema, John T. (Albuquerque, NM); Byrne, Raymond H. (Albuquerque, NM); Bryan, Jon R. (Edgewood, NM); Harrington, John J. (Albuquerque, NM); Gladwell, T. Scott (Albuquerque, NM)

    2002-01-01T23:59:59.000Z

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  14. 1-ID: Sector 1, Insertion Device Beamline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A No. of Poles 72 Undulator Period 3.3 cm Device Length 2.4 m Minimum Gap 11 mm Downstream insertion device No. of Poles 72 Undulator Period 2.3 cm Device Length 2.4 m Minimum...

  15. Low Frequency Noise in Nano-Devices

    E-Print Network [OSTI]

    useless as a result. Extremely small devices are also prone to the large device to device variations and Technology, Leningrad, in 1996. From 1977 he is a research fellow of A. F. Ioffe Institute of Physics and Technology, St. Petersburg, Russia. From 1999 he is with the Rensselaer Polytechnic Institute (RPI). His

  16. Device Selection by a Personal Proxy Agent

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Device Selection by a Personal Proxy Agent N. Hadibi, K. El-khatib, Eric Z. Zhang, Ken Chan, G. v user to access communication devices currently present in his Personal Area Network (PAN) Performs PreferencesDevice Capability An example Scenario: Connecting Alice and Bob w/o a Personal Proxy Internet Home

  17. The Simplicity Device: Your Personal Mobile Representative

    E-Print Network [OSTI]

    The Simplicity Device: Your Personal Mobile Representative Giovanni Bartolomeo1, Francesca Martire1 mobile phone that stores and handles personal information about the user. The Simplicity Device can be connected (e.g. via Bluetooth) to several other devices thus allowing personalization of services

  18. SECURITY FOR WIRELESS NETWORKS AND DEVICES

    E-Print Network [OSTI]

    connections. Users of handheld devices such as personal digital assis tants (PDAs) and cell phones can synMarch 2003 SECURITY FOR WIRELESS NETWORKS AND DEVICES Shirley Radack, Editor, Computer Security organizations and users have found that wireless communications and devices are convenient, flexible, and easy

  19. Manual authentication for wireless devices Christian Gehrmann

    E-Print Network [OSTI]

    Mitchell, Chris

    is to examine how these services might best be achieved for personal wireless-enabled devices. Using the terminology of Stajano [12], the problem is that of securely `imprinting' a personal device. That is, suppose a user has two wireless-enabled devices, e.g. a mobile phone and a Personal Digital Assistant (PDA

  20. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30T23:59:59.000Z

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  1. Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability 

    E-Print Network [OSTI]

    Crossley, Janet Ruth

    2008-01-01T23:59:59.000Z

    needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

  2. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C. (Lawrence Berkeley National Laboratory); Pinar, Ali; Lesieutre, Bernard (Lawrence Berkeley National Laboratory); Donde, Vaibhav (ABB Inc., Raleigh NC)

    2009-03-01T23:59:59.000Z

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  3. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13T23:59:59.000Z

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  4. Inertial impaction air sampling device

    DOE Patents [OSTI]

    Dewhurst, K.H.

    1987-12-10T23:59:59.000Z

    An inertial impactor to be used in an air sampling device for collection of respirable size particles in ambient air which may include a graphite furnace as the impaction substrate in a small-size, portable, direct analysis structure that gives immediate results and is totally self-contained allowing for remote and/or personal sampling. The graphite furnace collects suspended particles transported through the housing by means of the air flow system, and these particles may be analyzed for elements, quantitatively and qualitatively, by atomic absorption spectrophotometry. 3 figs.

  5. Protective laser beam viewing device

    DOE Patents [OSTI]

    Neil, George R.; Jordan, Kevin Carl

    2012-12-18T23:59:59.000Z

    A protective laser beam viewing system or device including a camera selectively sensitive to laser light wavelengths and a viewing screen receiving images from the laser sensitive camera. According to a preferred embodiment of the invention, the camera is worn on the head of the user or incorporated into a goggle-type viewing display so that it is always aimed at the area of viewing interest to the user and the viewing screen is incorporated into a video display worn as goggles over the eyes of the user.

  6. Waveguide device and method for making same

    DOE Patents [OSTI]

    Forman, Michael A. (San Francisco, CA)

    2007-08-14T23:59:59.000Z

    A monolithic micromachined waveguide device or devices with low-loss, high-power handling, and near-optical frequency ranges is set forth. The waveguide and integrated devices are capable of transmitting near-optical frequencies due to optical-quality sidewall roughness. The device or devices are fabricated in parallel, may be mass produced using a LIGA manufacturing process, and may include a passive component such as a diplexer and/or an active capping layer capable of particularized signal processing of the waveforms propagated by the waveguide.

  7. Fabrication and Characterization of Organic/Inorganic Photovoltaic Devices

    E-Print Network [OSTI]

    Guvenc, Ali Bilge

    2012-01-01T23:59:59.000Z

    J. W. Yu, Organic photovoltaic devices with a crosslinkablein Nanostructured Photovoltaic Devices, Recent Patents oninterfaces in organic photovoltaic devices, Solar Energy

  8. Infrared emitting device and method

    DOE Patents [OSTI]

    Kurtz, S.R.; Biefeld, R.M.; Dawson, L.R.; Howard, A.J.; Baucom, K.C.

    1997-04-29T23:59:59.000Z

    The infrared emitting device comprises a III-V compound semiconductor substrate upon which are grown a quantum-well active region having a plurality of quantum-well layers formed of a ternary alloy comprising InAsSb sandwiched between barrier layers formed of a ternary alloy having a smaller lattice constant and a larger energy bandgap than the quantum-well layers. The quantum-well layers are preferably compressively strained to increase the threshold energy for Auger recombination; and a method is provided for determining the preferred thickness for the quantum-well layers. Embodiments of the present invention are described having at least one cladding layer to increase the optical and carrier confinement in the active region, and to provide for waveguiding of the light generated within the active region. Examples have been set forth showing embodiments of the present invention as surface- and edge-emitting light emitting diodes (LEDs), an optically-pumped semiconductor laser, and an electrically-injected semiconductor diode laser. The light emission from each of the infrared emitting devices of the present invention is in the midwave infrared region of the spectrum from about 2 to 6 microns. 8 figs.

  9. Passive fault current limiting device

    DOE Patents [OSTI]

    Evans, Daniel J. (Wheeling, IL); Cha, Yung S. (Darien, IL)

    1999-01-01T23:59:59.000Z

    A passive current limiting device and isolator is particularly adapted for use at high power levels for limiting excessive currents in a circuit in a fault condition such as an electrical short. The current limiting device comprises a magnetic core wound with two magnetically opposed, parallel connected coils of copper, a high temperature superconductor or other electrically conducting material, and a fault element connected in series with one of the coils. Under normal operating conditions, the magnetic flux density produced by the two coils cancel each other. Under a fault condition, the fault element is triggered to cause an imbalance in the magnetic flux density between the two coils which results in an increase in the impedance in the coils. While the fault element may be a separate current limiter, switch, fuse, bimetal strip or the like, it preferably is a superconductor current limiter conducting one-half of the current load compared to the same limiter wired to carry the total current of the circuit. The major voltage during a fault condition is in the coils wound on the common core in a preferred embodiment.

  10. Passive fault current limiting device

    DOE Patents [OSTI]

    Evans, D.J.; Cha, Y.S.

    1999-04-06T23:59:59.000Z

    A passive current limiting device and isolator is particularly adapted for use at high power levels for limiting excessive currents in a circuit in a fault condition such as an electrical short. The current limiting device comprises a magnetic core wound with two magnetically opposed, parallel connected coils of copper, a high temperature superconductor or other electrically conducting material, and a fault element connected in series with one of the coils. Under normal operating conditions, the magnetic flux density produced by the two coils cancel each other. Under a fault condition, the fault element is triggered to cause an imbalance in the magnetic flux density between the two coils which results in an increase in the impedance in the coils. While the fault element may be a separate current limiter, switch, fuse, bimetal strip or the like, it preferably is a superconductor current limiter conducting one-half of the current load compared to the same limiter wired to carry the total current of the circuit. The major voltage during a fault condition is in the coils wound on the common core in a preferred embodiment. 6 figs.

  11. V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability

    Broader source: Energy.gov [DOE]

    Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security.

  12. Analysis of Cross-layer Vulnerability to Variations: An Adaptive Instruction-level to

    E-Print Network [OSTI]

    Gupta, Rajesh

    conditions such as tempera- ture fluctuations and supply voltage droops; and 3) device aging mechanisms of these types of variations include dynamic voltage droop, on-die hot spots, and aging-induced performance

  13. Electro-optic component mounting device

    DOE Patents [OSTI]

    Gruchalla, M.E.

    1994-09-13T23:59:59.000Z

    A technique is provided for integrally mounting a device such as an electro-optic device in a transmission line to avoid series resonant effects. A center conductor of the transmission line has an aperture formed therein for receiving the device. The aperture splits the center conductor into two parallel sections on opposite sides of the device. For a waveguide application, the center conductor is surrounded by a conductive ground surface which is spaced apart from the center conductor with a dielectric material. One set of electrodes formed on the surface of the electro-optic device is directly connected to the center conductor and an electrode formed on the surface of the electro-optic device is directly connected to the conductive ground surface. The electrodes formed on the surface of the electro-optic device are formed on curved sections of the surface of the device to mate with correspondingly shaped electrodes on the conductor and ground surface to provide a uniform electric field across the electro-optic device. The center conductor includes a passage formed therein for passage of optical signals to an electro-optic device. 10 figs.

  14. Medical Device Integration Copyright 2010 The University of Vermont

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Case Study Medical Device Integration Copyright© 2010 The University of Vermont Physiologic Monitor232 Portable Device Patient Patient Patient Clinician Clinician ICU Biomedical EHR Device Integration. Challenge: Determine the feasibility of biomedical device integration to the electronic health record

  15. A Brief Survey of Physical Activity Monitoring Devices1

    E-Print Network [OSTI]

    Helal, Abdelsalam

    on their mechanisms, measurements, product forms, and data portability. and 3) the role of personal devices both conventional standalone pedometer devices and personal digital devices integrated A Brief Survey of Physical Activity Monitoring Devices1 Technical Report MPCL-08

  16. Cryogenic vacuumm RF feedthrough device

    DOE Patents [OSTI]

    Wu, Genfa (Yorktown, VA); Phillips, Harry Lawrence (Hayes, VA)

    2008-12-30T23:59:59.000Z

    A cryogenic vacuum rf feedthrough device comprising: 1) a probe for insertion into a particle beam; 2) a coaxial cable comprising an inner conductor and an outer conductor, a dielectric/insulating layer surrounding the inner conductor, the latter being connected to the probe for the transmission of higher mode rf energy from the probe; and 3) a high thermal conductivity stub attached to the coaxial dielectric about and in thermal contact with the inner conductor which high thermal conductivity stub transmits heat generated in the vicinity of the probe efficiently and radially from the area of the probe and inner conductor all while maintaining useful rf transmission line characteristics between the inner and outer coaxial conductors.

  17. Heating device for semiconductor wafers

    DOE Patents [OSTI]

    Vosen, S.R.

    1999-07-27T23:59:59.000Z

    An apparatus for heat treating semiconductor wafers is disclosed. The apparatus includes a heating device which contains an assembly of light energy sources for emitting light energy onto a wafer. In particular, the light energy sources are positioned such that many different radial heating zones are created on a wafer being heated. For instance, in one embodiment, the light energy sources form a spiral configuration. In an alternative embodiment, the light energy sources appear to be randomly dispersed with respect to each other so that no discernible pattern is present. In a third alternative embodiment of the present invention, the light energy sources form concentric rings. Tuning light sources are then placed in between the concentric rings of light. 4 figs.

  18. Heating device for semiconductor wafers

    DOE Patents [OSTI]

    Vosen, Steven R. (Berkeley, CA)

    1999-01-01T23:59:59.000Z

    An apparatus for heat treating semiconductor wafers is disclosed. The apparatus includes a heating device which contains an assembly of light energy sources for emitting light energy onto a wafer. In particular, the light energy sources are positioned such that many different radial heating zones are created on a wafer being heated. For instance, in one embodiment, the light energy sources form a spiral configuration. In an alternative embodiment, the light energy sources appear to be randomly dispersed with respect to each other so that no discernable pattern is present. In a third alternative embodiment of the present invention, the light energy sources form concentric rings. Tuning light sources are then placed in between the concentric rings of light.

  19. Haptic device for telerobotic surgery

    DOE Patents [OSTI]

    Salisbury, Curt; Salisbury, Jr., J. Kenneth

    2014-12-30T23:59:59.000Z

    A haptic device for telerobotic surgery, including a base; a linkage system having first and second linkage members coupled to the base; a motor that provides a motor force; a transmission including first and second driving pulleys arranged such that their faces form an angle and their axes form a plane, first and second idler pulleys offset from the plane and arranged between the first and second driving pulleys such that their axes divide the angle between the first and second driving pulleys, and a cable that traverses the first and second driving pulleys and the set of idler pulleys and transfers the motor force to the linkage system; an end effector coupled to distal ends of the first and second linkage members and maneuverable relative to the base; and a controller that modulates the motor force to simulate a body part at a point portion of the end effector.

  20. Seal device for ferromagnetic containers

    DOE Patents [OSTI]

    Meyer, Ross E. (Los Alamos, NM); Jason, Andrew J. (Los Alamos, NM)

    1994-01-01T23:59:59.000Z

    A temporary seal or patch assembly prevents the escape of contents, e.g., fluids and the like, from within a container having a breach therethrough until the contents can be removed and/or a repair effected. A frame that supports a sealing bladder can be positioned over the breach and the frame is then attached to the container surface, which must be of a ferromagnet material, by using switchable permanent magnets. The permanent magnets are designed to have a first condition that is not attracted to the ferromagnetic surface and a second conditions whereby the magnets are attracted to the surface with sufficient force to support the seal assembly on the surface. Latching devices may be attached to the frame and engage the container surface with hardened pins to prevent the lateral movement of the seal assembly along the container surface from external forces such as fluid drag or gravity.

  1. Seal device for ferromagnetic containers

    DOE Patents [OSTI]

    Meyer, R.E.; Jason, A.J.

    1994-10-18T23:59:59.000Z

    A temporary seal or patch assembly prevents the escape of contents, e.g., fluids and the like, from within a container having a breach there through until the contents can be removed and/or a repair effected. A frame that supports a sealing bladder can be positioned over the breach and the frame is then attached to the container surface, which must be of a ferromagnet material, by using switchable permanent magnets. The permanent magnets are designed to have a first condition that is not attracted to the ferromagnetic surface and a second conditions whereby the magnets are attracted to the surface with sufficient force to support the seal assembly on the surface. Latching devices may be attached to the frame and engage the container surface with hardened pins to prevent the lateral movement of the seal assembly along the container surface from external forces such as fluid drag or gravity. 10 figs.

  2. The effects of aging on the fire vulnerability of nuclear power plant components

    SciTech Connect (OSTI)

    Nowlen, S.P.

    1988-01-01T23:59:59.000Z

    Sandia National Laboratories, under the sponsorship of the US Nuclear Regulatory Commission, has initiated an effort to identify and investigate potential nuclear power plant fire safety issues associated with plant aging. The issues of potential concern, which have been identified are the effects of aging on (1) the vulnerability of electrical equipment to fire induced damage; (2) the propensity with which electrical equipment will initiate, or contribute to the severity of, fires; and (3) the integrity of passive fire protection features. Efforts in this program were initiated late in fiscal year 1988. For fiscal year 1989 efforts will focus on the investigation of the effects of aging on cable damageability and cable flammability. This paper presents the findings of a limited review of past electrical equipment fire aging research and a summary of planned activities for fiscal year 1989. 11 refs., 4 figs.

  3. System vulnerability as a concept to assess power system dynamic security

    SciTech Connect (OSTI)

    Fouad, A.A.; Qin Zhou; Vittal, V. (Iowa State Univ., Ames, IA (United States))

    1994-05-01T23:59:59.000Z

    The concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. This new concept combines information on the level of security and its trend with changing system condition. In this paper the transient energy function (TEF) method is used as a tool of analysis. The energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity ([partial derivative][Delta]V/[partial derivative]p) to a changing system parameter p as an indicator of its trend. The thresholds for acceptable levels of the security indicator ([Delta]V) and its trend ([partial derivative][Delta]V/[partial derivative]p) are related to the stability limits of a critical system parameter. A method is proposed to determine these thresholds using heuristic techniques derived from operating practices and policies for a change in plant generation. Results from the IEEE 50 generator test system are presented to illustrate the procedure.

  4. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26T23:59:59.000Z

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  5. Acceptable Information Technology Devices | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    without limitation, cellular telephones, smart phones, personal digital assistants, personal electronic devices, pagers, and flash memory storage devices. Examples include...

  6. LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis

    SciTech Connect (OSTI)

    Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

    1986-01-01T23:59:59.000Z

    At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

  7. Dynamic Analysis of Mobile Device Applications

    SciTech Connect (OSTI)

    Corey Thuen

    2013-01-01T23:59:59.000Z

    The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the “computer” as possible, the user’s ability to assess the software running on their system is limited. The research team chose Google’s Android platform for this initial research because it is open source and it would give us freedom in our approach, including the ability to modify the mobile device’s operating system itself. The research team concluded that a Privileged Application was the right approach, and the result was ODAMA. This project is an important piece of the work to secure the expanding use of mobile devices with our nation’s critical infrastructure.

  8. Microfabricated fuel heating value monitoring device

    DOE Patents [OSTI]

    Robinson, Alex L. (Albuquerque, NM); Manginell, Ronald P. (Albuquerque, NM); Moorman, Matthew W. (Albuquerque, NM)

    2010-05-04T23:59:59.000Z

    A microfabricated fuel heating value monitoring device comprises a microfabricated gas chromatography column in combination with a catalytic microcalorimeter. The microcalorimeter can comprise a reference thermal conductivity sensor to provide diagnostics and surety. Using microfabrication techniques, the device can be manufactured in production quantities at a low per-unit cost. The microfabricated fuel heating value monitoring device enables continuous calorimetric determination of the heating value of natural gas with a 1 minute analysis time and 1.5 minute cycle time using air as a carrier gas. This device has applications in remote natural gas mining stations, pipeline switching and metering stations, turbine generators, and other industrial user sites. For gas pipelines, the device can improve gas quality during transfer and blending, and provide accurate financial accounting. For industrial end users, the device can provide continuous feedback of physical gas properties to improve combustion efficiency during use.

  9. Viewing device for electron-beam equipment

    SciTech Connect (OSTI)

    Nasyrov, R.S.

    1985-06-01T23:59:59.000Z

    Viewing devices are used to observe melting, welding, and so on in vacuum systems, an it is necessary to protect the windows from droplets and vapor. A viewing device for electron-beam equipment is described in which the viewing tube and mounting flange are made as a tubular ball joint enclosed in a steel bellows, which render the viewing device flexible. Bending the viewing tube in the intervals between observations protects the viewing window from sputtering and from drops of molten metal.

  10. Stable blue phosphorescent organic light emitting devices

    DOE Patents [OSTI]

    Forrest, Stephen R.; Thompson, Mark; Giebink, Noel

    2014-08-26T23:59:59.000Z

    Novel combination of materials and device architectures for organic light emitting devices is provided. An organic light emitting device, is provided, having an anode, a cathode, and an emissive layer disposed between the anode and the cathode. The emissive layer includes a host and a phosphorescent emissive dopant having a peak emissive wavelength less than 500 nm, and a radiative phosphorescent lifetime less than 1 microsecond. Preferably, the phosphorescent emissive dopant includes a ligand having a carbazole group.

  11. Holographic Point-of-Care Diagnostic Devices

    E-Print Network [OSTI]

    Yetisen, Ali Kemal

    2014-11-29T23:59:59.000Z

    and characterisation of nanoparticle-based tuneable photonic crystal sensors. RSC Adv 4 (21):10454–10461 7. Yetisen AK, Akram MS, Lowe CR (2013) Paper-based microfluidic point-of- care diagnostic devices. Lab Chip 13 (12):2210–2251 Supervisor’s Foreword As the world... 7.3 Multiplexing Holographic Sensors with Microfluidic Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 7.4 Readouts with Smartphones and Wearable Devices . . . . . . . . . 156 7.5 The Vision for Holographic...

  12. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  13. Running Head: Ecosystem Energy and Conservation1 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3

    E-Print Network [OSTI]

    Hansen, Andrew J.

    1 Running Head: Ecosystem Energy and Conservation1 2 Ecosystem Energy as a Framework for Prioritizing Conservation Vulnerabilities and3 Management Strategies4 5 Andrew James Hansen6 Ecology property, ecosystem energy levels, which,14 while once widely recognized as important, has received little

  14. Abstract--This paper looks into the vulnerabilities of the electric power grid and associated communication network, in the

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Abstract--This paper looks into the vulnerabilities of the electric power grid and associated analysis of interdependencies in a critical infrastructure (CI), i.e. the smart grid for electricity in the functionality of the communication system yields a faulty condition in the electric power grid, and find

  15. Silicon Materials and Devices (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-06-01T23:59:59.000Z

    This National Center for Photovoltaics sheet describes the capabilities of its silicon materials and devices research. The scope and core competencies and capabilities are discussed.

  16. Sandia National Laboratories: improve MHK device management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MHK device management Sandia Funded to Model Power Pods for Utility-Scale Wave-Energy Converter On September 16, 2014, in Computational Modeling & Simulation, Energy, News, News &...

  17. Sandia National Laboratories: micro-optical devices

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    micro-optical devices Sandia and EMCORE: Solar Photovoltaics, Fiber Optics, MODE, and Energy Efficiency On March 29, 2013, in Concentrating Solar Power, Energy, Partnership,...

  18. Generic device controller for accelerator control systems

    SciTech Connect (OSTI)

    Mariotti, R.; Buxton, W.; Frankel, R.; Hoff, L.

    1987-01-01T23:59:59.000Z

    A new distributed intelligence control system has become operational at the AGS for transport, injection, and acceleration of heavy ions. A brief description of the functionality of the physical devices making up the system is given. An attempt has been made to integrate the devices for accelerator specific interfacing into a standard microprocessor system, namely, the Universal Device Controller (UDC). The main goals for such a generic device controller are to provide: local computing power; flexibility to configure; and real time event handling. The UDC assemblies and software are described. (LEW)

  19. Low temperature proton conducting oxide devices

    DOE Patents [OSTI]

    Armstrong, Timothy R. (Clinton, TN); Payzant, Edward A. (Oak Ridge, TN); Speakman, Scott A. (Oak Ridge, TN); Greenblatt, Martha (Highland Park, NJ)

    2008-08-19T23:59:59.000Z

    A device for conducting protons at a temperature below 550.degree. C. includes a LAMOX ceramic body characterized by an alpha crystalline structure.

  20. Sandia National Laboratories: remote sensing devices

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    remote sensing devices Sandia, Endicott Interconnect Technologies, EMCORE, International Micro Industries, NREL, Universal Instruments: Solar Glitter On March 21, 2013, in...

  1. Fabrication of microfluidic devices for artificial respiration

    E-Print Network [OSTI]

    Park, Hyesung, Ph. D. Massachusetts Institute of Technology

    2007-01-01T23:59:59.000Z

    We are developing elastomeric polydimethylsiloxane (PDMS) microfluidic devices incorporated with photoactive thin films to create an implantable artificial respiration platform. Whereas state-of-the-art respiration support ...

  2. Robotic device for manipulating human stepping

    E-Print Network [OSTI]

    Emken, J L; Wynne, J H; Harkema, S J; Reinkensmeyer, D J

    2006-01-01T23:59:59.000Z

    Upper and lower extremity robotic devices for rehabilitationrehabilitation with a 4-DOF robotic orthosis,” IEEE Trans.and S. J. Harkema, “A robotic tool for studying locomotor

  3. Impacts of Biodiesel on Emission Control Devices

    Broader source: Energy.gov (indexed) [DOE]

    Biodiesel on Emission Control Devices Todd J. Toops and Bruce G. Bunting Oak Ridge National Laboratory D. William Brookshear and Ke Nguyen University of Tennessee - Knoxville DEER...

  4. Passive gas separator and accumulator device

    DOE Patents [OSTI]

    Choe, H.; Fallas, T.T.

    1994-08-02T23:59:59.000Z

    A separation device employing a gas separation filter and swirler vanes for separating gas from a gas-liquid mixture is provided. The cylindrical filter utilizes the principle that surface tension in the pores of the filter prevents gas bubbles from passing through. As a result, the gas collects in the interior region of the filter and coalesces to form larger bubbles in the center of the device. The device is particularly suited for use in microgravity conditions since the swirlers induce a centrifugal force which causes liquid to move from the inner region of the filter, pass the pores, and flow through the outlet of the device while the entrained gas is trapped by the filter. The device includes a cylindrical gas storage screen which is enclosed by the cylindrical gas separation filter. The screen has pores that are larger than those of the filters. The screen prevents larger bubbles that have been formed from reaching and interfering with the pores of the gas separation filter. The device is initially filled with a gas other than that which is to be separated. This technique results in separation of the gas even before gas bubbles are present in the mixture. Initially filling the device with the dissimilar gas and preventing the gas from escaping before operation can be accomplished by sealing the dissimilar gas in the inner region of the separation device with a ruptured disc which can be ruptured when the device is activated for use. 3 figs.

  5. Passive gas separator and accumulator device

    DOE Patents [OSTI]

    Choe, Hwang (Saratoga, CA); Fallas, Thomas T. (Berkeley, CA)

    1994-01-01T23:59:59.000Z

    A separation device employing a gas separation filter and swirler vanes for separating gas from a gasliquid mixture is provided. The cylindrical filter utilizes the principle that surface tension in the pores of the filter prevents gas bubbles from passing through. As a result, the gas collects in the interior region of the filter and coalesces to form larger bubbles in the center of the device. The device is particularly suited for use in microgravity conditions since the swirlers induce a centrifugal force which causes liquid to move from the inner region of the filter, pass the pores, and flow through the outlet of the device while the entrained gas is trapped by the filter. The device includes a cylindrical gas storage screen which is enclosed by the cylindrical gas separation filter. The screen has pores that are larger than those of the filters. The screen prevents larger bubbles that have been formed from reaching and interfering with the pores of the gas separation filter. The device is initially filled with a gas other than that which is to be separated. This technique results in separation of the gas even before gas bubbles are present in the mixture. Initially filling the device with the dissimilar gas and preventing the gas from escaping before operation can be accomplished by sealing the dissimilar gas in the inner region of the separation device with a ruptured disc which can be ruptured when the device is activated for use.

  6. Method and system for reducing device performance degradation of organic devices

    DOE Patents [OSTI]

    Teague, Lucile C.

    2014-09-02T23:59:59.000Z

    Methods and systems for reducing the deleterious effects of gate bias stress on the drain current of an organic device, such as an organic thin film transistor, are provided. In a particular aspect, the organic layer of an organic device is illuminated with light having characteristics selected to reduce the gate bias voltage effects on the drain current of the organic device. For instance, the wavelength and intensity of the light are selected to provide a desired recovery of drain current of the organic device. If the characteristics of the light are appropriately matched to the organic device, recovery of the deleterious effects caused by gate bias voltage stress effects on the drain current of the organic device can be achieved. In a particular aspect, the organic device is selectively illuminated with light to operate the organic device in multiple modes of operation.

  7. Towards the manufacturing of microfluidic devices : fluid flow in multilayer devices as a test case

    E-Print Network [OSTI]

    Korb, Samuel N. (Samuel Noaa), 1984-

    2006-01-01T23:59:59.000Z

    In this work, the area of microfluidics is analyzed for advances that could be made in the manufacturing of a microfluidic device, and then one area - the alignment of multilayer devices - is selected for greater focus. ...

  8. A biomedical device business plan for Medicraften Devices Inc. to develop a fluid medication dispenser

    E-Print Network [OSTI]

    Louison, Charles Davidson

    2006-01-01T23:59:59.000Z

    This thesis surrounds an analysis to understand what it would take for a company to successfully launch a prescription fluid dispensing device. This device would in theory be able to dispense medication at any time daily ...

  9. Apparatus for making photovoltaic devices

    DOE Patents [OSTI]

    Foote, James B. (Toledo, OH); Kaake, Steven A. F. (Perrysburg, OH); Meyers, Peter V. (Bowling Green, OH); Nolan, James F. (Sylvania, OH)

    1994-12-13T23:59:59.000Z

    A process and apparatus (70) for making a large area photovoltaic device (22) that is capable of generating low cost electrical power. The apparatus (70) for performing the process includes an enclosure (126) providing a controlled environment in which an oven (156) is located. At least one and preferably a plurality of deposition stations (74,76,78) provide heated vapors of semiconductor material within the oven (156) for continuous elevated temperature deposition of semiconductor material on a sheet substrate (24) including a glass sheet (26) conveyed within the oven. The sheet substrate (24) is conveyed on a roller conveyor (184) within the oven (156) and the semiconductor material whose main layer (82) is cadmium telluride is deposited on an upwardly facing surface (28) of the substrate by each deposition station from a location within the oven above the roller conveyor. A cooling station (86) rapidly cools the substrate (24) after deposition of the semiconductor material thereon to strengthen the glass sheet of the substrate.

  10. EELE408 Photovoltaics Lecture 15 Photovoltaic Devices

    E-Print Network [OSTI]

    Kaiser, Todd J.

    1 EELE408 Photovoltaics Lecture 15 Photovoltaic Devices Dr. Todd J. Kaiser tjkaiser) · Demonstrated the photovoltaic effect · Best results with UV or blue light 2 g · Electrodes covered with light of photovoltaic effect in an all solid state device · Several decades before the effect could be explained Fritts

  11. Contacts Integration into functional nanoscale devices

    E-Print Network [OSTI]

    Metlushko, Vitali

    from the very beginning of the design process. While the properties of nano-scale magnetic devices by magnetoresistive random- access memory (MRAM). The design challenges faced by CMOS and MRAM are very similar of this, the topographical influence of contacts on the overlying magnetic device must be taken account

  12. Development of Microfluidic Devices Incorporating Electrochemical Detection

    E-Print Network [OSTI]

    Regel, Anne

    2014-05-31T23:59:59.000Z

    Development of Microfluidic Devices Incorporating Electrochemical Detection Anne Regel Submitted to the Department of Chemistry and the Graduate School of the University of Kansas in partial fulfillment of the requirements for the degree... _______________________________ Karen Nordheden Dissertation Defense: August 21, 2013 ii The Dissertation Committee for Anne Regel certifies that this is the approved version of the following dissertation: Development of Microfluidic Devices Incorporating...

  13. Integration of Storage Devices into Power Systems

    E-Print Network [OSTI]

    Integration of Storage Devices into Power Systems with Renewable Energy Sources Final Project System #12;Integration of Storage Devices into Power Systems with Renewable Energy Sources Final Project report for the Power Systems Engineering Research Center (PSERC) research project titled "Integration

  14. Semiconducting compounds and devices incorporating same

    SciTech Connect (OSTI)

    Marks, Tobin J; Facchetti, Antonio; Boudreault, Pierre-Luc; Miyauchi, Hiroyuki

    2014-06-17T23:59:59.000Z

    Disclosed are molecular and polymeric compounds having desirable properties as semiconducting materials. Such compounds can exhibit desirable electronic properties and possess processing advantages including solution-processability and/or good stability. Organic transistor and photovoltaic devices incorporating the present compounds as the active layer exhibit good device performance.

  15. Radiation sensitivity of microelectromechanical system devices

    E-Print Network [OSTI]

    Floreano, Dario

    them soonest. MEMS can also encounter a high radiation environment in nuclear reactors. Since nearly of space missions rather than of operation in nuclear re- actors. As a purely structural material, silicon to the impact on device operation of radiation-induced trapped charge in dielectrics. MEMS devices operating

  16. Protection of microelectronic devices during packaging

    DOE Patents [OSTI]

    Peterson, Kenneth A. (Albuquerque, NM); Conley, William R. (Tijeras, NM)

    2002-01-01T23:59:59.000Z

    The present invention relates to a method of protecting a microelectronic device during device packaging, including the steps of applying a water-insoluble, protective coating to a sensitive area on the device; performing at least one packaging step; and then substantially removing the protective coating, preferably by dry plasma etching. The sensitive area can include a released MEMS element. The microelectronic device can be disposed on a wafer. The protective coating can be a vacuum vapor-deposited parylene polymer, silicon nitride, metal (e.g. aluminum or tungsten), a vapor deposited organic material, cynoacrylate, a carbon film, a self-assembled monolayered material, perfluoropolyether, hexamethyldisilazane, or perfluorodecanoic carboxylic acid, silicon dioxide, silicate glass, or combinations thereof. The present invention also relates to a method of packaging a microelectronic device, including: providing a microelectronic device having a sensitive area; applying a water-insoluble, protective coating to the sensitive area; providing a package; attaching the device to the package; electrically interconnecting the device to the package; and substantially removing the protective coating from the sensitive area.

  17. Multicolored Electrochromism in Polymers: Structures and Devices

    E-Print Network [OSTI]

    Tanner, David B.

    Multicolored Electrochromism in Polymers: Structures and Devices Avni A. Argun, Pierre-Henri Aubert May 12, 2004 A review of electrochromic (EC) polymers and their applications in absorption/transmission, reflective, and patterned electrochromic devices (ECDs) is presented. Fundamental properties of EC materials

  18. Performance of Installed Cooking Exhaust Devices

    SciTech Connect (OSTI)

    Singer, Brett C.; Delp, William W.; Apte, Michael G.; Price, Philip N.

    2011-11-01T23:59:59.000Z

    The performance metrics of airflow, sound, and combustion product capture efficiency (CE) were measured for a convenience sample of fifteen cooking exhaust devices, as installed in residences. Results were analyzed to quantify the impact of various device- and installation-dependent parameters on CE. Measured maximum airflows were 70% or lower than values noted on product literature for 10 of the devices. Above-the-cooktop devices with flat bottom surfaces (no capture hood) – including exhaust fan/microwave combination appliances – were found to have much lower CE at similar flow rates, compared to devices with capture hoods. For almost all exhaust devices and especially for rear-mounted downdraft exhaust and microwaves, CE was substantially higher for back compared with front burner use. Flow rate, and the extent to which the exhaust device extends over the burners that are in use, also had a large effect on CE. A flow rate of 95 liters per second (200 cubic feet per minute) was necessary, but not sufficient, to attain capture efficiency in excess of 75% for the front burners. A-weighted sound levels in kitchens exceeded 57 dB when operating at the highest fan setting for all 14 devices evaluated for sound performance.

  19. Investigational Drug/Device Accountability Policy Introduction

    E-Print Network [OSTI]

    Subramanian, Venkat

    2/11/08 Investigational Drug/Device Accountability Policy Introduction: Good clinical research investigational drug or device used in a research trial at Washington University. This is true whether the study-initiated trial using department funds. Our institutional responsibility requires that any investigational drug

  20. Chapter 9: Photovoltaic DevicesChapter 9: Photovoltaic Devices Solar energy spectrumSolar energy spectrum

    E-Print Network [OSTI]

    Wang, Jianfang

    Chapter 9: Photovoltaic DevicesChapter 9: Photovoltaic Devices Solar energy spectrumSolar energy Solar Energy? · Clean · Nearly unlimited PHYS5320 Chapter Nine 3 #12;S l ll l t PHYS5320 Chapter Nine 4 Solar cell plant #12;Cars powered by photovoltaic devices PHYS5320 Chapter Nine 5 #12;Solar Energy