National Library of Energy BETA

Sample records for disaster management vulnerability

  1. Decision support for disaster management

    E-Print Network [OSTI]

    Rolland, Erik; Patterson, Raymond A.; Ward, Keith; Dodin, Bajis

    2010-01-01

    of the disaster management organizations. Therefore, thishybrid meta-heuristics. Keywords Disaster management . Meta-heuristics . Project management . Scheduling . Decision

  2. Utility of geo-informatics for disaster risk management: linking structural damage

    E-Print Network [OSTI]

    Utility of geo-informatics for disaster risk management: linking structural damage assessment) Geoinformatics for disaster risk management (hazard/risk/vulnerability/damage) www.unu-drm.nl Training of disaster risk management (my focus is on post-disaster response/ recovery) Use of object-oriented image

  3. Vulnerability and social risk management in India and Mexico

    E-Print Network [OSTI]

    Flores Ballesteros, Luis

    2008-01-01

    The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. Hazard & Disaster Management College of Science

    E-Print Network [OSTI]

    Hickman, Mark

    Hazard & Disaster Management College of Science 09 For further information about the University Postgraduate Programmes #12;PostgraduateProgrammes in Hazard & Disaster Management Postgraduate Diploma - BSc by risk management. These programmes aim to develop skills of hazard and disaster management through

  6. Children with disabilities in the context of disaster: A social vulnerability perspective 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    that various factors may con- tribute to the physical, psychological, and educational vulnerability of children with disabilities in disaster, including higher poverty rates, elevated risk exposure, greater vulnerability to traumatic loss or separation from...- tions of the article draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a...

  7. Disaster case management: Disaster case management and individuals with disabilities following Hurricane Katrina 

    E-Print Network [OSTI]

    Stough, Laura

    2011-01-01

    stream_source_info Disaster case management- Disaster case management and individuals with disabilities following Hurricane Katrina.pdf.txt stream_content_type text/plain stream_size 9509 Content-Encoding UTF-8 stream_name Disaster... case management- Disaster case management and individuals with disabilities following Hurricane Katrina.pdf.txt Content-Type text/plain; charset=UTF-8 BRAIN INJURY PROFESSIONAL18 This article, submitted for inclusion in an upcoming issue...

  8. Disaster waste management: A review article

    SciTech Connect (OSTI)

    Brown, Charlotte; Milke, Mark; Seville, Erica

    2011-06-15

    Depending on their nature and severity, disasters can create large volumes of debris and waste. The waste can overwhelm existing solid waste management facilities and impact on other emergency response and recovery activities. If poorly managed, the waste can have significant environmental and public health impacts and can affect the overall recovery process. This paper presents a system overview of disaster waste management based on existing literature. The main literature available to date comprises disaster waste management plans or guidelines and isolated case studies. There is ample discussion on technical management options such as temporary storage sites, recycling, disposal, etc.; however, there is little or no guidance on how these various management options are selected post-disaster. The literature does not specifically address the impact or appropriateness of existing legislation, organisational structures and funding mechanisms on disaster waste management programmes, nor does it satisfactorily cover the social impact of disaster waste management programmes. It is envisaged that the discussion presented in this paper, and the literature gaps identified, will form a basis for future comprehensive and cohesive research on disaster waste management. In turn, research will lead to better preparedness and response to disaster waste management problems.

  9. Health Disaster Humanitarian Systems Management Operations

    E-Print Network [OSTI]

    Li, Mo

    Health Disaster Humanitarian Systems Management Operations Models and intervention strategies Professional Certificate program in Health & Humanitarian Supply Chain Management HHS@isye.gatech.edu HHSGATech HHS Georgia Tech Annual International Conference on Health and Humanitarian Logistics 6-day

  10. Disaster SitRep -A Vertical Search Engine and Information Analysis Tool in Disaster Management Domain

    E-Print Network [OSTI]

    Chen, Shu-Ching

    together to apply world class computing tools to deliver the right information to the right people at the right time. Needs for heterogeneous information integration in disaster management domain: People haveDisaster SitRep - A Vertical Search Engine and Information Analysis Tool in Disaster Management

  11. Emergency Animal Management during Disasters 

    E-Print Network [OSTI]

    Dement, Angela

    2006-10-23

    This publication explains how communities and counties can incorporate animal issues into their emergency management plans. It explains what local plans should include, what role county Extension agents can play, and how animal management plans can...

  12. Stress in Adults after a Disaster: Warning Signs and Management 

    E-Print Network [OSTI]

    Warren, Judith L.

    2005-09-30

    performance. Stress in Adults after a Disaster: Warning Signs and Management Avoidance ? Adults may want to avoid places or things that remind them of the event. Such remind- ers bring back the strong emotions they experienced during the disaster... thoughts of the disaster and worry about the future. Impaired work performance ? It is common for work performance and productivity to drop after a disaster. Occupational achievement may seem less important after a tragedy. Relationships and work...

  13. Object-oriented image analysis methods in disaster risk management

    E-Print Network [OSTI]

    Object-oriented image analysis methods in disaster risk management Dr. Norman Kerle #12;2 Lecture-grouphttp://www.itc.nl/about_itc/resumes/kerle.aspx #12;6 Object-oriented analysis for disaster risk management DRM OOA Univ Innsbruck - 17 June 2013 @ ITC #12;4 ITC/University Twente Houses the United Nations University- ITC Centre for Spatial Analysis

  14. Utility of geo-informatics for disaster risk management: linking structural damage

    E-Print Network [OSTI]

    Utility of geo-informatics for disaster risk management: linking structural damage assessment/ Volcano remote sensing (Uni Cambridge) Geoinformatics for disaster risk management (hazard

  15. Object-oriented image analysis methods in disaster risk management state-of-the-art

    E-Print Network [OSTI]

    Object-oriented image analysis methods in disaster risk management ­ state-of-the-art and prospects for disaster risk management Disaster Risk Object-oriented Management (DRM) Analysis (OOA) UP Diliman - OOA in the Philippines UP Diliman - OOA for DRM - 2014 5 Taught courses with GIZ and UPVTC on disaster risk management

  16. Using Remote Sensing for Natural Disaster Management Tara Srihari

    E-Print Network [OSTI]

    Using Remote Sensing for Natural Disaster Management Tara Srihari Department of Computing Sciences these losses. Remote sensing images can be used to provide information about the landscape and environment is focused on developing an infrastructure to make the data collected with remote sensing more widely

  17. Disaster case management and individuals with disabilities 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    may also incor- porate advocacy functions when case managers solicit agencies for services on the behalf of their clients (Compton, Galaway, & Cournoyer, 2005). A common objective of case management is to provide cost-effective services while... of disability-related knowledge. In addition, the interviewers used a critical incident technique (see Flanagan, 1954) for two of the interview questions. Critical inci- dent technique is used to interview participants within a workplace or organizational...

  18. Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices

    E-Print Network [OSTI]

    Chen, Shu-Ching

    and Management shows that 40% of companies that were shut down by a disaster for three days failed within 36 South Florida Emergency Management and industry partnership, such as Wal-Mart, Office Depot, Wachovia, T

  19. Job Stress in Disaster Case Managers Working with Hurricane Ike Recovery 

    E-Print Network [OSTI]

    Forman, Megan Hajecate

    2011-10-21

    Hurricane Ike struck the coast of Texas on September 13, 2008. The Federal Emergency Management Agency (FEMA), a branch of the United States Department of Homeland Security, implemented a Disaster Case Management Pilot (DCM-P) project to help...

  20. Mobile medical disaster relief technology : enhancing communication, medical logistics, data creation, and crisis mapping for vulnerable communities

    E-Print Network [OSTI]

    Intrator, Kira (Kira Rachel)

    2012-01-01

    This thesis explores the field of disaster relief and recovery, and the application of emerging technologies that are both used by, and use the data generated by communities affected by natural disaster. This thesis analyzes ...

  1. Automatic building extraction from laser scanning data: an input tool for disaster management

    E-Print Network [OSTI]

    Singh, Ramesh P.

    mitigation process. To enhance the relief and rescue operation in the affected area it is required to get the occurrence of natural disaster but its prediction and preparedness along with an effective post disaster management pro- gramme can minimise the risk (Jayaraman et al., 1997). Remote sensing techniques either

  2. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  3. How risk management can prevent future wildfire disasters in the wildland-urban interface

    E-Print Network [OSTI]

    How risk management can prevent future wildfire disasters in the wildland-urban interface David E, ecosystems, and lives is not. We propose the principles of risk analysis to provide land management agencies: turn to the principles of decision science and risk management. Similar to other forms of risk

  4. Managing the risks of extreme events and disasters to advance climate change adaptation. Special report of the Intergovernmental Panel on Climate Change (IPCC)

    SciTech Connect (OSTI)

    Field, C.B.; Barros, V.; Stocker, T.F.

    2012-07-01

    This Special Report on Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation (SREX) has been jointly coordinated by Working Groups I (WGI) and II (WGII) of the Intergovernmental Panel on Climate Change (IPCC). The report focuses on the relationship between climate change and extreme weather and climate events, the impacts of such events, and the strategies to manage the associated risks. This Special Report, in particular, contributes to frame the challenge of dealing with extreme weather and climate events as an issue in decision making under uncertainty, analyzing response in the context of risk management. The report consists of nine chapters, covering risk management; observed and projected changes in extreme weather and climate events; exposure and vulnerability to as well as losses resulting from such events; adaptation options from the local to the international scale; the role of sustainable development in modulating risks; and insights from specific case studies. (LN)

  5. Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies

    E-Print Network [OSTI]

    Hansen, Andrew J.

    Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies - trophic structure - evolutionary processes - available energy. Theoretical Roots of Conservation Biology - habitat area - trophic structure - evolutionary processes - available energy Theoretical Roots

  6. Business Intelligence Modeling: A Case Study of Disaster Management Organization in Pakistan

    E-Print Network [OSTI]

    Fong, Chi Chiu "Simon"

    Business Intelligence Modeling: A Case Study of Disaster Management Organization in Pakistan Sohail Asghar Department of Computer Science Mohammad Ali Jinnah University, Islamabad, Pakistan e-mail: sohail@umac.mo Touqeer Hussain Shaheed Zulfikar Ali Bhutto Institute of Science and Technology, Islamabad, Pakistan e

  7. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  8. EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European

    E-Print Network [OSTI]

    Wehenkel, Louis

    EXaMINE - Experimentation of a Monitoring and Control System for Managing Vulnerabilities). The general objective of the project is to design, prototype and test novel monitor- ing systems supporting-border energy trade. A system with unlimited ca- pacity of interconnection between State, Regional or even Zonal

  9. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  10. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  11. Proceedings of the International Conference on Information and Automation, December 15-17, 2006, Colombo, Sri Lanka. 1 Sahana: Overview of a Disaster Management

    E-Print Network [OSTI]

    Daume III, Hal

    , Colombo, Sri Lanka. 1 Sahana: Overview of a Disaster Management System Mifan Careem, Chamindra De Silva. it then describes the anatomy of the Sahana system. We follow up with a case study of Sahana deployment and lessons learned. I. INTRODUCTION Recent disasters such as the 2003 SARS outbreak, the 2004 Asian tsunami, the 2005

  12. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  13. Disaster risk management in prospect mining area Blitar district, East Java, using microtremor analysis and ANP (analytical network processing) approach

    SciTech Connect (OSTI)

    Parwatiningtyas, Diyan E-mail: erlinunindra@gmail.com; Ambarsari, Erlin Windia E-mail: erlinunindra@gmail.com; Marlina, Dwi E-mail: erlinunindra@gmail.com; Wiratomo, Yogi E-mail: erlinunindra@gmail.com

    2014-03-24

    Indonesia has a wealth of natural assets is so large to be managed and utilized, either from its own local government and local communities, especially in the mining sector. However, mining activities can change the state of the surface layer of the earth that have a high impact disaster risk. This could threaten the safety and disrupt human life, environmental damage, loss of property, and the psychological impact, sulking to the rule of law no 24 of 2007. That's why we strive to manage and minimize the risk of mine disasters in the region, how to use the method of calculation of Amplification Factor (AF) from the analysis based microtremor sulking Kanai and Nakamura, and decision systems were tested by analysis of ANP. Based on the amplification factor and Analytical Network Processing (ANP) obtained, some points showed instability in the surface layer of a mining area include the site of the TP-7, TP-8, TP-9, TP-10, (Birowo2). If in terms of structure, location indicated unstable due to have a sloping surface layer, resulting in the occurrence of landslides and earthquake risk is high. In the meantime, other areas of the mine site can be said to be a stable area.

  14. Review of disaster management implementation for the community safety in the vicinity of oil and gas field

    SciTech Connect (OSTI)

    Musa, R. Abdullah; Heni, Siti; Harjanto, Meddy

    2015-04-24

    Sukowati site which is operated by Production Sharing Contract (PSC) Joint Operating Body Pertamina Petrochina East Java (JOB P-PEJ) located at Bojonegoro regency East Java Province. This site is close to densely populated settlements with approximately 6,010 people within a radius less than 600 m. The fluid produced have a dangerous potential to the above mention community, due to accompanying of hydrogen sulphide gas (H2S) with a concentration about 0.6% – 2% from the total gas produced. In 2006, there was incident of gas leak from drilling development well of Sukowati # 5. The incident made the surrounding community panic due to lack of preparedness and awareness. Learning from the incident, the company together with the government and local communities initiated to make improvements through the disaster management system approach. The efforts are carried out in accordance with the 4 (four) periods in a continuous cycle consist of (1) mitigation; (2) preparation; (3) response and (4) recovery. Emergency response drills conducted regularly at least once a year, its main purpose is to find out the results of the implementation of the existing disaster management. The results of the drills showed an increase in public awareness and responsiveness to emergency situations caused by the operational failures of oil and gas exploration and production activities near their settlement.

  15. Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third

    E-Print Network [OSTI]

    Columbia University

    1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J of Madras and Faculty of Environmental Studies, York University. Pages 451 ­ 464. SOLID WASTE MANAGEMENT the responsibility of solid waste management remains primarily with the municipal bodies, several other stakeholder

  16. Corporate involvement in disaster response and recovery : an analysis of the Gujarat Earthquake

    E-Print Network [OSTI]

    Sayegh, Tracy, 1976-

    2004-01-01

    Disaster vulnerability is a serious issue in developing countries where globalization, development patterns, poverty and environmental degradation are placing more people at risk to natural disasters. Recent appeals for ...

  17. The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario

    E-Print Network [OSTI]

    Picco, Gian Pietro

    scenario involves fire management in a road tunnel that is instrumented with networked sensor and actuator (Reconfigurable Ubiq- uitous Network Embedded Systems) project1 , involves a road tunnel that is instrumented with networked embedded sensors, actuators, and larger, more powerful, devices. The latter act as gateways

  18. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  19. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  20. Real-time Crisis Mapping of Natural Disasters using

    E-Print Network [OSTI]

    Middleton, Stuart E.

    and volunteered geographic information (VGI) sources for areas at risk of disaster and match them to geo Geographic Information; VGI; Natural Disaster; Crisis Management ACM Classification Keywords H.2.8 [Database

  1. MALI CLIMATE VULNERABILITY JANUARY 2014

    E-Print Network [OSTI]

    Columbia University

    MALI CLIMATE VULNERABILITY MAPPING JANUARY 2014 This report is made possible by the support at Columbia University Cover Photo: Overall vulnerability map of Mali (quintile map legend), CIESIN, 2013 Project Manager Burlington, Vermont Tel.: 802-658-3890 Anna.Farmer@tetratech.com #12;MALI CLIMATE

  2. Proceedings Hazards and Disasters

    E-Print Network [OSTI]

    Wang, Hai

    Proceedings Hazards and Disasters Researchers Meeting of the Boulder, Colorado July 11­12, 2007 #12;Hazards and Disasters Researchers Meeting Beginning in 1997, hazards and disaster researchers gathered in the field of hazards and disasters. As a new feature of this year's meeting, short papers based

  3. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  4. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  5. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  6. Pre-Disaster Mitigation Plan Montana State University -Bozeman

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ) - Bozeman PDM Plan identifies the potential hazards that the campus faces and assesses the vulnerability Projects Database and FCI Reports as they relate to life safety issues #12;Pre-Disaster Mitigation Plan-structural mitigation practices. Install seismic shut-off valves on buildings with natural gas. Develop plans

  7. Transforming health and humanitarian Health Disaster Humanitarian

    E-Print Network [OSTI]

    Li, Mo

    Transforming health and humanitarian Health Disaster Humanitarian Systems Management Operations.humanitarian.scl.gatech.edu@HHSGATech · · · · · · · · · systems through education, outreach, and applied research 6-day Professional Certificate program in Health & Humanitarian Supply Chain Management HHS@isye.gatech.edu HHSGATech HHS Georgia Tech Annual Health

  8. Nowcasting Disaster Damage

    E-Print Network [OSTI]

    Kryvasheyeu, Yury; Obradovich, Nick; Moro, Esteban; Van Hentenryck, Pascal; Fowler, James; Cebrian, Manuel

    2015-01-01

    Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy's path and hurricane-related social media activity. We show that real and perceived threats -- together with the physical disaster effects -- are directly observable through the intens...

  9. Disaster Tolerant Computer and Communication Systems Stephen A. SZYGENDA

    E-Print Network [OSTI]

    Thornton, Mitchell

    Disaster Tolerant Computer and Communication Systems Stephen A. SZYGENDA Department of Engineering Management, Information and Systems, SMU Department of Computer Science and Engineering, SMU Dallas, Texas of normality. Disaster tolerance of computer and communication systems is described and methods for modeling

  10. Towards a Business Continuity Information Network for Rapid Disaster Recovery

    E-Print Network [OSTI]

    Chen, Shu-Ching

    }@cis.fiu.edu ABSTRACT Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and economical losses to the state of Florida. Lack of preparation before the storm and post-storm delayed and their failure would impart economic and job losses to disaster struck communities. Studies have shown that 80

  11. Disabilities and disaster 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    stream_source_info Disabilities and disaster.pdf.txt stream_content_type text/plain stream_size 3 Content-Encoding ISO-8859-1 stream_name Disabilities and disaster.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ...

  12. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  13. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program Multi-Year...

  14. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Broader source: Energy.gov (indexed) [DOE]

    and Theif Associated Mitigations (2006) More Documents & Publications Introduction SCADA Security for Managers and Operators TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND...

  15. Information Technology and Management 4, 5567, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands.

    E-Print Network [OSTI]

    Qian, Lianfen

    Information Technology and Management 4, 55­67, 2003 2003 Kluwer Academic Publishers. Manufactured for environmental hazards, · disaster avoidance and disaster recovery situations, · utilities management, · troops

  16. Assessing the Vulnerability of the Fiber Infrastructure to Disasters

    E-Print Network [OSTI]

    Cohen, Reuven

    , as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real-world events-optic, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by any- thing from Electromagnetic Pulse (EMP) attacks [14], [15], [31] to dragging anchors [8], [36

  17. Design after Disaster

    E-Print Network [OSTI]

    Cuff, Dana

    2009-01-01

    sense of the term. The design professions have been accusedDesign after Disaster Dana Cuff In the past decade, asAre we to conclude that design is inherently emasculated

  18. Coordinating Energy Efficiency with Other Disaster Resiliency...

    Energy Savers [EERE]

    Energy Efficiency with Other Disaster Resiliency Services Coordinating Energy Efficiency with Other Disaster Resiliency Services Better Buildings Residential Network Program...

  19. Incorporating Energy Efficiency into Disaster Recovery Efforts...

    Energy Savers [EERE]

    Incorporating Energy Efficiency into Disaster Recovery Efforts Incorporating Energy Efficiency into Disaster Recovery Efforts Better Buildings Residential Network Program...

  20. WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE

    E-Print Network [OSTI]

    WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

  1. wind engineering & natural disaster mitigation

    E-Print Network [OSTI]

    Denham, Graham

    wind engineering & natural disaster mitigation #12;wind engineering & natural disaster mitigation Investment WindEEE Dome at Advanced Manufacturing Park $31million Insurance Research Lab for Better Homes $8million Advanced Facility for Avian Research $9million #12;wind engineering & natural disaster mitigation

  2. Applications of Solar Technology for Catastrophe Response, Claims Management, and Loss Prevention

    SciTech Connect (OSTI)

    Deering, A.; Thornton, J.P.

    1999-02-17

    Today's insurance industry strongly emphasizes developing cost-effective hazard mitigation programs, increasing and retaining commercial and residential customers through better service, educating customers on their exposure and vulnerabilities to natural disasters, collaborating with government agencies and emergency management organizations, and exploring the use of new technologies to reduce the financial impact of disasters. In June of 1998, the National Renewable Energy Laboratory (NREL) and the National Association of Independent Insurers (NAII) sponsored a seminar titled, ''Solar Technology and the Insurance Industry.'' Presentations were made by insurance company representatives, insurance trade groups, government and state emergency management organizations, and technology specialists. The meeting was attended by insurers, brokers, emergency managers, and consultants from more than 25 US companies. Leading insurers from the personal line and commercial carriers were shown how solar technology can be used in underwriting, claims, catastrophe response, loss control, and risk management. Attendees requested a follow-up report on solar technology, cost, and applications in disasters, including suggestions on how to collaborate with the utility industry and how to develop educational programs for business and consumers. This report will address these issues, with an emphasis on pre-disaster planning and mitigation alternatives. It will also discuss how energy efficiency and renewable technologies can contribute to reducing insurance losses.

  3. Recovery and Resilience After a Nuclear Power Plant Disaster: A Medical Decision model for Managing an Effective, Timely, and Balanced Response

    SciTech Connect (OSTI)

    Coleman, C. Norman; Blumenthal, Daniel J.

    2013-05-01

    Based on experiences in Tokyo responding to the Fukushima Daiichi nuclear power plant crisis, a real-time, medical decision model is presented by which to make key health-related decisions given the central role of health and medical issues in such disasters. Focus is on response and recovery activities that are safe, timely, effective, and well-organized. This approach empowers on-site decision makers to make interim decisions without undue delay using readily available and high-level scientific, medical, communication, and policy expertise. Key features of this approach include ongoing assessment, consultation, information, and adaption to the changing conditions. This medical decision model presented is compatible with the existing US National Response Framework structure.

  4. A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES

    E-Print Network [OSTI]

    Gilbes, Fernando

    A HIERARCHICAL ASSESSMENT OF THE VULNERABILITY TO TSUNAMIS OF PUERTO RICAN COASTAL CITIES Juan of a disaster. Unfortunately, that is not the case for Puerto Rican coastal cities when it comes to tsunamis. Over 55% of all cities in Puerto Rico have territories in tsunami evacuation zones (TEZ); nevertheless

  5. Disaster and disabilities 

    E-Print Network [OSTI]

    Stough, Laura

    2014-01-01

    when schools were closed and programs were reorganized (McAdams Ducy & Stough, 2011). Individuals with disabilities in the United States are entitled to equal access to emergency services, such as evacuation procedures and sheltering. The Stafford Act...; McAdams Ducy, & Stough, 2011) have doc- umented that teachers can provide effective emotional, as well as instrumental, support to students with disabili- ties during disasters. Similarly, employers who provide supported work environments need...

  6. HUD National Disaster Resilience Competition

    Broader source: Energy.gov [DOE]

    The U.S. Department of Housing and Urban Development (HUD) is making $1 billion in HUD Disaster Recovery funds available to eligible communities.

  7. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

  8. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

  9. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

  10. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

  11. Review: The Great Lead Water Pipe Disaster

    E-Print Network [OSTI]

    Karalus, Daniel E

    2010-01-01

    Review: The Great Lead Water Pipe Disaster By WernerUSA Troesken, Werner. The Great Lead Water Pipe Disaster.paper. Alkaline paper. Lead poisoning usually conjures

  12. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  13. Children with disabilities in disaster 

    E-Print Network [OSTI]

    Stough, Laura

    2012-01-01

    stream_source_info Children with disabilities in disaster.pdf.txt stream_content_type text/plain stream_size 2 Content-Encoding ISO-8859-1 stream_name Children with disabilities in disaster.pdf.txt Content-Type text/plain; charset...

  14. Wind Engineering & Natural Disaster Mitigation

    E-Print Network [OSTI]

    Lennard, William N.

    Wind Engineering & Natural Disaster Mitigation For more than 45 years, Western University has been internationally recognized as the leading university for wind engineering and wind- related research. Its of environmental disaster mitigation, with specific strengths in wind and earthquake research. Boundary Layer Wind

  15. Climate change vulnerability

    E-Print Network [OSTI]

    Hilderbrand, Robert H.

    Climate change vulnerability assessment of the Verde Island Passage, Philippines #12;ii This document should be cited as: R. Boquiren, G. Di Carlo, and M.C. Quibilan (Eds). 2010. Climate Change, Marine Climate Change Program Conservation International­Global Marine Division epidgeon

  16. Sandia Energy - SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Vulnerability Assessments Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  17. The effects of disaster on the mental health of individuals with disabilities 

    E-Print Network [OSTI]

    Stough, Laura

    2009-01-01

    , that aff ects an individual increases their level of vulnera- bility to a disaster. Individuals with disabilities are at risk for many of these factors, potentially making them one of the groups most vulnera- ble to the economic and psychological eff... emergency manag- ers. Findings supported those found previously in that emergency managers were inadequately trained on the needs of people with disabilities during and following disaster . Th e study also included focus groups with 18 people with uncat...

  18. Winter, snow : an inquiry into vulnerability

    E-Print Network [OSTI]

    Orme, Wanda

    2012-01-01

    snow} ..SAN DIEGO Winter, Snow. An Inquiry into Vulnerability. AOF THE THESIS Winter, Snow. An Inquiry into Vulnerability by

  19. V-132: IBM Tivoli System Automation Application Manager Multiple...

    Broader source: Energy.gov (indexed) [DOE]

    IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

  20. V-180: IBM Application Manager For Smart Business Multiple Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (GSKit). 8) Multiple vulnerabilities are caused due to a bundled vulnerable version of Java. IMPACT: IBM Application Manager For Smart Business can be exploited by malicious...

  1. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials...

  2. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  3. T-566: Citrix Secure Gateway Unspecified Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system.

  4. IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 43, NO. 5, SEPTEMBER 2013 451 Data Mining Meets the Needs of Disaster

    E-Print Network [OSTI]

    Li, Tao

    - tingency Planning and Management shows that 40% of compa- nies that were shut down by a disaster for three, response, recovery, and mitigation [4], [30]. In the United States, the Federal Emergency Management Agency

  5. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  6. MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,

    E-Print Network [OSTI]

    MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

  7. Preventing Fraud Following a Disaster 

    E-Print Network [OSTI]

    Cavanagh, Joyce

    2005-10-11

    , do not give your information. You should examine your bank statements, credit card statements, and other statements closely for unauthorized purchases or withdrawals. About 60 days after the disaster, you should request copies of your credit... with contractors and others to re- pair your home, you may be asked for personal information so a credit check can be performed. Be certain the business is legitimate before you give out your Social Security number and other personal information. If in doubt...

  8. Historical and projected costs of natural disasters

    SciTech Connect (OSTI)

    Engi, D.

    1995-04-01

    Natural disasters cause billions of dollars of damage and thousands Of deaths globally each year. While the magnitude is clear, the exact costs (in damage and fatalities) are difficult to clearly identify. This document reports on the results of a survey of data on the costs associated with significant natural disasters. There is an impressive amount of work and effort going into natural disaster research, mitigation, and relief. However, despite this effort, there are surprisingly few consistent and reliable data available regarding the effects of natural disasters. Even lacking consistent and complete data, it is clear that the damage and fatalities from natural disasters are increasing, both in the United States, and globally. Projections using the available data suggest that, in the United States alone, the costs of natural disasters between 1995 and 2010 will be in the range of $90 billion (94$) and 5000 lives.

  9. From Tragedy to Triumph - Rebuilding Green Buildings after Disaster...

    Office of Environmental Management (EM)

    Rebuilding Green Buildings after Disaster, EERE (Fact Sheet) From Tragedy to Triumph - Rebuilding Green Buildings after Disaster, EERE (Fact Sheet) Fact sheet offering practical...

  10. The Path to Disaster The Deepwater Horizon

    E-Print Network [OSTI]

    Pym, David J.

    was not disconnected · The escaping gas ignited · 11 dead · The drilling rig Deepwater Horizon sank after 2 days #1221/08/2013 1 The Path to Disaster The Deepwater Horizon BP's disaster in the Gulf of Mexico Industrial Psychology Research Centre 14th August, 2013 Transocean Deepwater Horizon #12;21/08/2013 2

  11. CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND

    E-Print Network [OSTI]

    CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

  12. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  13. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Development of cyber security architectures and frameworks, including some for microgrids. Detailed vulnerability assessment of systems, devices, components, and procedures....

  14. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Infrastructure Protection Cyber Vulnerability Assessment More Documents & Publications Wireless System Considerations When Implementing NERC Critical Infrastructure Protection...

  15. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  16. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced (2008)] #12;Natural Disaster Trend and Number of People Affected (1975 ­ 2008) Natural Disaster Trend conflicting criteria used in decision-making; · constraints on resources: natural, human, financial, time, etc

  17. VULCAN: Vulnerability Assessment Framework for Cloud Computing

    E-Print Network [OSTI]

    Kavi, Krishna

    services on Cloud is complex because the security depends on the vulnerability of infrastructure, platform services on Cloud is complex because the security depends on the vulnerability of infrastruc- ture?". Or "I want to host this software application in this cloud environment, what security vulnerabilities I

  18. APPROACHES TO VULNERABILITY TO CLIMATE CHANGE

    E-Print Network [OSTI]

    Bateman, Ian J.

    APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger CSERGE Working Paper GEC 96-05 #12;APPROACHES TO VULNERABILITY TO CLIMATE CHANGE by W. Neil Adger Centre for Social and Economic Research and Physical Approaches to Vulnerability to Climate Change in Vietnam' is also gratefully acknowledged. ISSN

  19. SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW

    E-Print Network [OSTI]

    Columbia University

    SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA, METHODS, AND ISSUES AUGUST 2014: A Review of Data, Methods, and Issues i SPATIAL CLIMATE CHANGE VULNERABILITY ASSESSMENTS: A REVIEW OF DATA Climate Change Vulnerability Assessments: A Review of Data, Methods, and Issues ii TABLE OF CONTENTS

  20. SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA Seismic hazard and vulnerability

    E-Print Network [OSTI]

    SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA I Seismic hazard and vulnerability assessment in Turrialba, Costa Rica Rafael German Urban Lamadrid March 2002 #12;SEISMIC HAZARD AND VULNERABILITY ASSESSMENT IN TURRIALBA, COSTA RICA II Seismic hazard and vulnerability assessment in Turrialba

  1. Uncovering the factors that can support and impede post-disaster EIA practice in developing countries: The case of Aceh Province, Indonesia

    SciTech Connect (OSTI)

    Gore, Tom; Fischer, Thomas B., E-mail: fischer@liverpool.ac.uk

    2014-01-15

    The close relationship between environmental degradation and the occurrence and severity of disaster events has in recent years raised the profile of environmental assessment (EA) in the disaster management field. EA has been identified as a potentially supportive tool in the global effort to reduce disaster risk. As a component of this, attention has been brought specifically to the importance of the application of EA in the aftermath of disaster events in order to help prevent recurrence and promote sustainability. At the same time, however, it has also been recognised that post-disaster environments may be unfavourable to such practices. Looking at the practice of environmental impact assessment (EIA), this paper reports on a study which sought to identify more specifically the factors which can both support and hinder such practice following disaster events in a developing country context. Analysing the situation in Aceh Province, Indonesia, after the impact of two tsunamigenic earthquakes in late 2004 and early 2005, it is concluded that if EIA is to have a central role in the post-disaster period, pre-disaster preparation could be a key. -- Highlights: • Close relationship between environmental degradation and occurrence/severity of disaster events has raised profile of EA. • EA as a potentially supportive tool in the global effort to reduce disaster risk • Application of EA in the aftermath of disaster events to help prevent recurrence and promote sustainability • The paper looks at factors which can both support and hinder EA following disaster events in a developing country context. • We analyse the situation in Aceh Province, Indonesia, after the impact of two tsunamigenic earthquakes in 2004 and 2005.

  2. Choosing agency in the midst of vulnerability: Using critical disability theory to examine a disaster narrative 

    E-Print Network [OSTI]

    Stough, Laura

    2012-01-01

    and Cynthia Werner at the Texas A&M Department of Anthropology, and the Institute of Nautical Archaeology all provided critical financial support for travel, research, and writing. Their generous assistance enabled me to realize the full potential... standards challenged me and elevated my scholarship. Donny Hamilton and Frederic Parke provided critical guidance, support, and perspective that strengthened this dissertation. vi The tireless staff of the Sterling C. Evans Library at Texas A...

  3. Disaster and social vulnerability: The case of undocumented Mexican migrant workers 

    E-Print Network [OSTI]

    Stough, Laura

    2010-01-01

    assessments were used to examine changes in participants' knowledge, skills, and dispositions, before and after the workshop: the spatial concepts test, the teaching spatial thinking disposition survey, and participant-produced lesson plans. Individual...

  4. Prices and Supply Disruptions during Natural Disasters

    E-Print Network [OSTI]

    Cavallo, Eduardo

    We study the daily behavior of supermarket prices and product availability following two recent natural disasters: the 2010 earthquake in Chile and the 2011 earthquake in Japan. In both cases there was an immediate and ...

  5. Optimal redundancy against disjoint vulnerabilities in networks

    E-Print Network [OSTI]

    Krause, Sebastian M; Zlati?, Vinko

    2015-01-01

    Redundancy is commonly used to guarantee continued functionality in networked systems. However, often many nodes are vulnerable to the same failure or adversary. A "backup" path is not sufficient if both paths depend on nodes which share a vulnerability.For example, if two nodes of the Internet cannot be connected without using routers belonging to a given untrusted entity, then all of their communication-regardless of the specific paths utilized-will be intercepted by the controlling entity.In this and many other cases, the vulnerabilities affecting the network are disjoint: each node has exactly one vulnerability but the same vulnerability can affect many nodes. To discover optimal redundancy in this scenario, we describe each vulnerability as a color and develop a "color-avoiding percolation" which uncovers a hidden color-avoiding connectivity. We present algorithms for color-avoiding percolation of general networks and an analytic theory for random graphs with uniformly distributed colors including critic...

  6. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts,...

  7. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New YorkNew Jersey Metro Region to Hurricane Destruction - A New Perspective Based on...

  8. U-116: IBM Tivoli Provisioning Manager Express for Software Distributi...

    Broader source: Energy.gov (indexed) [DOE]

    IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities PLATFORM: IBM Tivoli Provisioning Manager Express for Software Distribution 4.x ABSTRACT:...

  9. What You Need to Apply for Disaster Rehabilitation Assistance 1

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    DH206 What You Need to Apply for Disaster Rehabilitation Assistance 1 Michael T. Olexa and Travis the necessary information before you meet with any agents. Applying for Disaster Rehabilitation Assistance What

  10. UNEP MOOC Disasters and Ecosystems: Resilience in a Changing Climate

    Broader source: Energy.gov [DOE]

    The United Nations Environment Programme (UNEP) is launching the first Massive Open Online Course (MOOC) on Disasters and Ecosystems, which features ecosystem-based solutions for disaster risk reduction and climate change adaptation, case studies, guest speakers, etc.

  11. Patents to the Rescue - Disasters and Patent Law

    E-Print Network [OSTI]

    Torrance, Andrew W.

    2007-01-01

    The patent system can play a vital role in preparing for, mitigating, reacting to, and preventing disasters. In the far term, it ensures that society continually improves its technological capacity to deal with disasters. In the near term...

  12. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  13. Nuclear Catastrophe, Disaster-Related Environmental Injustice, and Fukushima, Japan

    E-Print Network [OSTI]

    Shrader-Frechette, Kristin

    Nuclear Catastrophe, Disaster-Related Environmental Injustice, and Fukushima, Japan: Prima the 2011 Japanese Fukushima-Daiichi nuclear disaster (FD) as a preliminary case study-- despite the limits Fukushima-Daiichi (FD) nuclear accident to explain disaster-related environmental injustice (DREI

  14. Obtaining Disaster Assistance for Public Infrastructure 

    E-Print Network [OSTI]

    Taylor, Greg

    2005-10-10

    stream_source_info pdf_2241.pdf.txt stream_content_type text/plain stream_size 7983 Content-Encoding ISO-8859-1 stream_name pdf_2241.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ER-031 5-06 Obtaining Disaster... and Recov- ery Grant http://www.orca.state.tx.us/whatsNew/pdf Rural%20Health%20Disaster%20Relief% 2%20Recovery%20Grant.pdf Those eligible for this program include: ? rural hospitals in counties with popula- tions of 150,000 or fewer and that have...

  15. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  16. Vulnerable Strong Farm Finance Scorecard

    E-Print Network [OSTI]

    risk and borrowing capacity of the business. 9. Rate of return on farm equity - represents the interest farm income - represents return to 3 things, · Your labor, · Your management and · Your equity, that you have invested in the business. It is the reward for investing your unpaid family labor, management

  17. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  18. Mathematics of Planet Earth: Natural Disasters

    E-Print Network [OSTI]

    1 Mathematics of Planet Earth: Natural Disasters Fred Roberts Rutgers University #12;2 Mathematics the world · www.mpe2013.org #12;3 Mathematics of Planet Earth 2013 · Activities world-wide throughout 2013 lectures, educational programs #12;4 Mathematics of Planet Earth Beyond 2013 · Problems of the planet

  19. Disaster Resiliency and Recovery: Capabilities (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-11-01

    The National Renewable Energy Laboratory (NREL) is the nation's leader in energy efficient and renewable energy technologies, practices, and strategies. For the last 15 years, NREL has provided expertise, tools, and innovations to private industry; federal, state, and local governments; non-profit organizations; and communities during the planning, recovery, and rebuilding stages after disaster strikes.

  20. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  1. UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of

    E-Print Network [OSTI]

    Sorin, Eric J.

    UNCORRECTEDPROOF Diet, resource partitioning and gear vulnerability of Hawaiian jacks captured tournaments can provide synoptic data on diet and gear vulnerability that would otherwise be very dif

  2. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  3. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  4. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  5. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of...

  6. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities...

  7. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  8. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  9. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  10. Disaster: would your community bounce back?

    SciTech Connect (OSTI)

    Sims, Benjamin H [Los Alamos National Laboratory

    2011-01-12

    What makes some communities or organizations able to quickly bounce back from a disaster, while others take a long time to recover? This question has become very important for emergency planners in federal, state, and local government - particularly since the 9/11 attacks and Hurricane Katrina, which nearly destroyed New Orleans five years ago. These events have made people aware that we can't always prevent disasters, but might be able to improve the ability of communities and regions to respond to and bounce back from major disruptions. Social scientists have found that most communities are, in fact, quite resilient to most disasters. People tend to work together, overcome divisions, identify problems, and develop improvised solutions. This often leads to a greater sense of community and a sense of personal accomplishment. Long-term recovery can be harder, but rebuilding can create jobs and stimulate economies. Communities may even end up better than they were before. But there are some disturbing exceptions to this trend, including Hurricane Katrina. The hurricane killed many people, the federal and local emergency response was not effective, people who could not evacuate were housed in the Superdome and Convention Center in terrible conditions, crime was prevalent, and local government did not appear to have control over the situation. A significant portion of the population was eventually evacuated to other cities. Even five years later, many people have not returned, and large parts of the city have not been rebuilt. Clearly, New Orleans lacked sufficient resilience to overcome a disaster of the magnitude of Katrina. There are four factors that social scientists are beginning to agree are important for community resilience: (1) A strong, diverse economy - Stable jobs, good incomes, diversity of industries, personal savings; (2) Robust social networks - Community members know each other, help each other, and have connections outside the community; (3) Competent organizations - Government, health care, community service, and religious organizations are competent and trustworthy, and have resources to handle community needs; and (4) High-quality infrastructure - Road, power, and water systems (etc.) are in good condition and are designed to provide service even if some connections are destroyed. To explore how these factors make communities resilient, I will tell two stories of disasters. The first is the Buffalo Creek flood, which wiped out a coal mining community in West Virginia in 1972. This is a classic example of community that was not resilient in the aftermath of a disaster. The second example is the Vietnamese immigrant community in the Versailles neighborhood of New Orleans. In spite of being relatively poor and culturally isolated, this community was one of the first to fully rebound following Hurricane Katrina.

  11. Needs for Robotic Assessments of Nuclear Disasters

    SciTech Connect (OSTI)

    Victor Walker; Derek Wadsworth

    2012-06-01

    Following the nuclear disaster at the Fukushima nuclear reactor plant in Japan, the need for systems which can assist in dynamic high-radiation environments such as nuclear incidents has become more apparent. The INL participated in delivering robotic technologies to Japan and has identified key components which are needed for success and obstacles to their deployment. In addition, we are proposing new work and methods to improve assessments and reactions to such events in the future. Robotics needs in disaster situations include phases such as: Assessment, Remediation, and Recovery Our particular interest is in the initial assessment activities. In assessment we need collection of environmental parameters, determination of conditions, and physical sample collection. Each phase would require key tools and efforts to develop. This includes study of necessary sensors and their deployment methods, the effects of radiation on sensors and deployment, and the development of training and execution systems.

  12. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  13. After the Disaster: Considerations for Older Adults 

    E-Print Network [OSTI]

    Crocker, Andrew

    2005-10-07

    that monthly payments get to beneficiaries and that other vital Social Security services are provided. If the United States Postal Service (USPS) suspends mail service in areas affected by a disaster, paper checks cannot be delivered. But the USPS usually... establishes temporary mail delivery stations where you can pick up your Social Security check. To help prevent identity fraud, USPS will ask you for a photo ID. If Social Security benefits are deposited directly into your bank account you will continue...

  14. Modeling Dynamics of Post Disaster Recovery 

    E-Print Network [OSTI]

    Nejat, Ali

    2012-10-19

    : Civil Engineering MODELING DYNAMICS OF POST DISASTER RECOVERY A Dissertation by ALI NEJAT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR... OF PHILOSOPHY Approved by: Chair of Committee, Ivan Damnjanovic Committee Members, Stuart D. Anderson Kenneth F. Reinschmidt Sergiy Butenko Arnold Vedlitz Head of Department, John Niedzwecki August 2011 Major Subject: Civil Engineering...

  15. After a Disaster: Recovery Safety Tips 

    E-Print Network [OSTI]

    FCS Project Team - FDRM UNIT

    2005-09-30

    after a disaster. That is why you never turn gas back on by yourself. Contact your local utility company for a trained professional to restore your gas service. ? Prevent carbon monoxide poisoning. Carbon monoxide is an odorless, colorless gas... area ? even if the area has ventilation. Opening doors and windows or using fans will not prevent carbon monoxide from building up in the home. If you start to feel sick, dizzy, or weak while using a generator or other gasoline/ charcoal burning...

  16. (Dis)ability and (dis)aster 

    E-Print Network [OSTI]

    Stough, Laura; Kelman, Ilan

    2015-01-01

    and Pothier, 2006; Oliver, 1986, 1996). Others argue that conceptualizing disability as completely social in nature overlooks or minimizes the corporeal experiences and physical sensations of people with 9781137485991_02_c01.indd 5 disabilities (see... and Disasters 31(3): 384–402. Van Willigen, M., T. Edwards, B. Edwards, and S. Hessee. 2002. Riding out the storm: Experiences of the physically disabled during Hurricanes Bonnie, Dennis, and Floyd. Natural Hazards Review 3(3): 98–106. Wisner, B., P...

  17. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  18. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  19. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Broader source: Energy.gov (indexed) [DOE]

    Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

  20. Cizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially flooded

    E-Print Network [OSTI]

    Cizelj, Leon

    flooded PWR reactor cavity to a steam explosion Leon Cizelj, Bostjan Koncar, Matjaz Leskovar "Jozef StefanCizelj, Koncar, Leskovar: Vulnerability of a partially flooded.... Vulnerability of a partially 5885 215; fax + 386 1 5885 377; e-mail: Leon.Cizelj@ijs.si Keywords Steam explosion, reactor cavity

  1. Problems and Solutions: Training Disaster Organizations of the...

    Energy Savers [EERE]

    Soft Costs Author Florida Solar Energy Center j-fsec-pf-371-03.pdf More Documents & Publications Florida's Emergency Shelters Go Solar Disasters: Photovoltaics for Special Needs...

  2. Rochester's plan to downgrade mathematics: a recipe for disaster?

    E-Print Network [OSTI]

    Mar 1, 1996 ... U. of Rochester Plan to Cut Mathematics Is Recipe for Disaster. By Arthur Jaffe, Joseph Lipman, and Morton Lowengrub. Financially ...

  3. Becoming Resilient: Disaster Planning and Recovery: NREL Experts Assist Before and After a Disaster (Fact Sheet)

    SciTech Connect (OSTI)

    Hotchkiss, E.

    2014-08-01

    This fact sheet provides information on how private industry; federal, state, and local governments; non-profit organizations; and communities can utilize NREL's expertise, tools, and innovations to incorporate energy efficiency and renewable energy into the planning, recovery, and rebuilding stages of disaster.

  4. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  5. Disaster Recovery in Wireless Networks: A Homology-Based Algorithm

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Disaster Recovery in Wireless Networks: A Homology-Based Algorithm A. Vergne, I. Flint, L of wireless networks after a disaster. Considering a damaged wireless network, presenting coverage holes or cover problem. I. INTRODUCTION Wireless networks are present everywhere, must it be sensor networks

  6. Homology based algorithm for disaster recovery in wireless networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Homology based algorithm for disaster recovery in wireless networks A. Vergne, I. Flint, L for disaster recovery of wireless networks. We consider a damaged wireless network presenting coverage holes the performances between each other and with known methods. I. INTRODUCTION Wireless networks are present

  7. Rebuilding After Disaster: Going Green from the Ground Up

    SciTech Connect (OSTI)

    none,

    2009-10-01

    This how-to guide describes ways to turn a disaster into an opportunity to rebuild with greener energy technologies. Covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

  8. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  9. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  10. Characterizing Application Memory Error Vulnerability to

    E-Print Network [OSTI]

    Mutlu, Onur

    -reliability memory (HRM) Store error-tolerant data in less-reliable lower-cost memory Store error-vulnerable data an application Observation 2: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM: Data can be recovered by software ·Heterogeneous-Reliability Memory (HRM) ·Evaluation 4 #12;Server

  11. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The Cisco Video Surveillance Manager (VSM) allows...

  12. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco...

  13. The Challenges of Dynamic Water Management in the American West

    E-Print Network [OSTI]

    Doremus, Holly; Hanemann, Michael

    2008-01-01

    The Challenges of Dynamic Water Management in the AmericanWESTERN WATER PROJECTS ARE HIGHLY VULNERABLE TO GLOBALTO REDISTRIBUTING WATER . INSTITUTIONAL BARRIERS

  14. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  15. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  16. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  17. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  18. Enhancing Risk Management Partnerships for Catastrophic Natural Disasters in Europe

    E-Print Network [OSTI]

    Oxford, University of

    Agreement number 308438 Deliverable 7.3: RISK SCENARIOS AND ANALYSIS LONDON CASE STUDY: FLOOD RISK ii Title RISK SCENARIOS AND ANALYSIS: LONDON CASE STUDY: FLOOD RISK AND CLIMATE CHANGE IMPLICATIONS and is listed as a major risk on England's National Risk Register. Floods can take various forms, such as river

  19. Managing the risks of extreme events and disasters to advance...

    Office of Scientific and Technical Information (OSTI)

    NY (United States) Research Org: Intergovernmental Panel on Climate Change, Geneva (Switzerland); Cambridge University Press, New York, NY (United States) Country of Publication:...

  20. Ontology-enriched Multi-Document Summarization in Disaster Management

    E-Print Network [OSTI]

    Li, Tao

    an ontology, then links the given query to a specific node in the ontology, and finally ex- tracts the summary summariza- tion results. As a byproduct, the final summary generated by OMS can be represented as a tree, the summaries we finally acquire can be represented as a tree showing the hierarchical relationships

  1. Managing Risk in Disaster Scenarios with Autonomous Robots

    E-Print Network [OSTI]

    Allan, Vicki H.

    in 2001. Photograph by the Center for Robot-Assisted Search and Rescue Fig. 2. Robots in use in Iraq robots deployed to Iraq [3] and the robot was the center of a widespread controversy when it was claimed-Miller SWORDS robots. The middle robot is the type that was deployed to Iraq. Photograph by US Army. Fig. 4

  2. COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS

    E-Print Network [OSTI]

    1 COMMUNICATION VULNERABILITIES AND MITIGATIONS IN WIND POWER SCADA SYSTEMS American Wind Energy/ Abstract This paper focuses on securing wind power Supervisory Control And Data Acquisition (SCADA) systems security vulnerabilities. To address these new vulnerabilities in wind power SCADA systems, we apply

  3. FAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    models for the related processes. A few vulnerability discovery models (VDMs) have been proposed recently that attempt to model the vulnerability discovery process during the lifecycle of a given software productFAST ABSTRACT: Vulnerability Discovery Modeling using Weibull Distribution HyunChul Joh, Jinyoo Kim

  4. Modeling Learningless Vulnerability Discovery using a Folded Distribution

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    model is logistic, and thus the increase and decrease in the discovery process is assumedModeling Learningless Vulnerability Discovery using a Folded Distribution Awad A. Younis1 , Hyun, CO 80523, USA Abstract ­ A vulnerability discovery model describes the vulnerability discovery rate

  5. On automated prepared statement generation to remove SQL injection vulnerabilities

    E-Print Network [OSTI]

    Xie, Tao

    On automated prepared statement generation to remove SQL injection vulnerabilities Stephen Thomas in revised form 5 August 2008 Accepted 8 August 2008 Available online 27 September 2008 Keywords: SQL vulnerabilities were SQL injection vulnerabilities (SQLIVs). This paper presents an algorithm of prepared

  6. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  7. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting

  8. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-SiteDepartment ofDepartment

  9. T-731:Symantec IM Manager Code Injection Vulnerability | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|ofSessions | Department

  10. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:Department|

  11. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeploymentDepartment ofUsers|

  12. Lights, camera, emergency : preemptive planning for disaster relief

    E-Print Network [OSTI]

    Weiss, Erica A

    2010-01-01

    With increasing frequency and accuracy, the prediction of natural disasters and their effects are being charted. Their impendence is a certainty and yet we ignore the warnings, the lessons of the past, and the prominence ...

  13. Community isolation and disaster recovery: the case of two colonias 

    E-Print Network [OSTI]

    Kamel, Nabil Mohsen Osman

    1993-01-01

    model for understanding disaster recovery and related developmental issues in the light of the vertical and horizontal integration patterns. Specific indicators for testing the model were developed and guidelines for addressing issues of environmental...

  14. Strategic planning for disaster recovery with stochastic last mile distribution

    SciTech Connect (OSTI)

    Bent, Russell Whitford [Los Alamos National Laboratory; Van Hentenryck, Pascal [BROWN UNIV.; Coffrin, Carleton [BROWN UNIV.

    2010-01-01

    This paper considers the single commodity allocation problem (SCAP) for disaster recovery, a fundamental problem faced by all populated areas. SCAPs are complex stochastic optimization problems that combine resource allocation, warehouse routing, and parallel fleet routing. Moreover, these problems must be solved under tight runtime constraints to be practical in real-world disaster situations. This paper formalizes the specification of SCAPs and introduces a novel multi-stage hybrid-optimization algorithm that utilizes the strengths of mixed integer programming, constraint programming, and large neighborhood search. The algorithm was validated on hurricane disaster scenarios generated by Los Alamos National Laboratory using state-of-the-art disaster simulation tools and is deployed to aid federal organizations in the US.

  15. A Rapid Method for Detecting Geographically Disconnected Areas after Disasters

    E-Print Network [OSTI]

    Chen, Ling-Jyh

    ), and the Tohoku earthquake and tsunami in Japan (at least 15,365 deaths, USD300 billion damage, and the release of radiation from the damaged Fukushima nuclear plant). Appropriate disaster response strategies

  16. Tsunami Research Tsunami Science after 2004 Sumatra Disaster

    E-Print Network [OSTI]

    Tsunami Research Tsunami Science after 2004 Sumatra Disaster Vasily Titov NOAA Center for Tsunami Research #12;NOAA Center for Tsunami Research NCTR Personnel September 2009 Develop methods and tools to reduce tsunami hazard and protect life. Testbed new tsunami forecast

  17. Perspectives on plant vulnerabilities & other plant and containment improvements

    SciTech Connect (OSTI)

    LaChance, J.; Kolaczkowski, A.; Kahn, J. [and others

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for {open_quotes}vulnerability{close_quotes} was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of {open_quotes}vulnerability{close_quotes} used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed.

  18. Sandia Energy - Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)Geothermal Energy & Drilling Technology HomeGrid Cyber Vulnerability

  19. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  20. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  6. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  7. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  8. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  9. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change...

  10. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  11. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  12. The application of Intelligent Transportation Systems (ITS) and Information Technology systems to disaster response

    E-Print Network [OSTI]

    Pinelis, Lev

    2006-01-01

    Disaster response operations during recent terrorist attacks and natural disasters have been a cause for concern. Lack of planning is one source of difficulties with these operations, but even if a perfect plan is agreed ...

  13. Rights-based evaluation of government responses to a given 'natural' disaster : Katrina as case study

    E-Print Network [OSTI]

    Haeffner, Melissa (Melissa Ann)

    2010-01-01

    Disaster impacts human mobility and a rights-based approach to disaster response is needed to protect the human rights of those who seek migration as an adaptation strategy. This paper deals with returning to a place after ...

  14. Towards an Understanding of the Root Causes of Forced Migration: The Political Economy of "Natural" Disasters

    E-Print Network [OSTI]

    Cohen, Charles

    Natural disasters occur in a political space. Although events beyond our control may trigger a disaster, the level of government preparedness and response greatly determines the extent of suffering incurred by the affected ...

  15. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  16. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  17. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  18. Climate Change: Conflict, Security and Vulnerability Professor of Climate Change

    E-Print Network [OSTI]

    Hulme, Mike

    Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict and Security University of Sussex, 18-19 October 2012 1 #12;Weather and climate ... vulnerability and security

  19. The Haiti Earthquake: Disaster Lessons and Response from an Emergency Medicine Perspective

    E-Print Network [OSTI]

    Lee, Sharon; Tenny, Montessa

    2010-01-01

    solution” Dr. Koenig notes. ACEP’s policy advises againstcreating safety issues. The ACEP section on Disaster

  20. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    SciTech Connect (OSTI)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  1. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

    E-Print Network [OSTI]

    State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University Experimental for energy dissipation mechanism. State Key Laboratory of Disaster Reduction in Civil Engineering #12;· Scope on Horizontal connection. State Key Laboratory of Disaster Reduction in Civil Engineering, Tongji University

  2. Adaptive management: a paradigm for remediation of public facilities

    SciTech Connect (OSTI)

    Janecky, David R; Whicker, Jeffrey J; Doerr, Ted B

    2009-01-01

    Public facility restoration planning traditionally focused on response to natural disasters and hazardous materials accidental releases. These plans now need to integrate response to terrorist actions. Therefore, plans must address a wide range of potential vulnerabilities. Similar types of broad remediation planning are needed for restoration of waste and hazardous material handling areas and facilities. There are strong similarities in damage results and remediation activities between unintentional and terrorist actions; however, the uncertainties associated with terrorist actions result in a re-evaluation of approaches to planning. Restoration of public facilities following a release of a hazardous material is inherently far more complex than in confined industrial settings and has many unique technical, economic, social, and political challenges. Therefore, they arguably involve a superset of drivers, concerns and public agencies compared to other restoration efforts. This superset of conditions increases complexity of interactions, reduces our knowledge of the initial conditions, and even condenses the timeline for restoration response. Therefore, evaluations of alternative restoration management approaches developed for responding to terrorist actions provide useful knowledge for large, complex waste management projects. Whereas present planning documents have substantial linearity in their organization, the 'adaptive management' paradigm provides a constructive parallel operations paradigm for restoration of facilities that anticipates and plans for uncertainty, multiple/simUltaneous public agency actions, and stakeholder participation. Adaptive management grew out of the need to manage and restore natural resources in highly complex and changing environments with limited knowledge about causal relationships and responses to restoration actions. Similarities between natural resource management and restoration of a facility and surrounding area(s) after a disruptive event suggest numerous advantages over preset linearly-structured plans by incorporating the flexibility and overlap of processes inherent in effective facility restoration. We discuss three restoration case studies (e.g., the Hart Senate Office Building anthrax restoration, Rocky Flats actinide remediation, and hurricane destruction restoration), that implement aspects of adaptive management but not a formal approach. We propose that more formal adoption of adaptive management principles could be a basis for more flexible standards to improve site-specific remediation plans under conditions of high uncertainty.

  3. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  4. Int. J. Risk Assessment and Management, Vol. X, No. X, xxxx 1 Copyright 200x Inderscience Enterprises Ltd.

    E-Print Network [OSTI]

    McCarl, Bruce A.

    Int. J. Risk Assessment and Management, Vol. X, No. X, xxxx 1 Copyright © 200x Inderscience Enterprises Ltd. Risk assessment and management of animal disease- related biosecurity Yanhong Jin* Department threats; preparedness; prevention; recovery; response; risk assessment; risk management; vulnerability

  5. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  6. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience...

  7. Global Warming Time Bomb:* Actions Needed to Avert Disaster

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming Time Bomb:* Actions Needed to Avert Disaster James Hansen 26 October 2009 Club statements relating to policy are personal opinion Global Warming Status 1. Knowledge Gap Between - What Benefits of Solution Despite the publicity that global warming has received, there is a large gap between

  8. EDIM Earthquake Disaster Information System for the Marmara Region, Turkey

    E-Print Network [OSTI]

    ­ Earthquake Disaster Information System for the Marmara Region, Turkey Wenzel F. (1)*; Erdik, M. (6); Köhler NH, Bonn e-mail: kiehle@lat-lon.de (6) Kandilli Observatory and Earthquake Research Institute (KOERI ----------------------------------------------------------------------------------------------------------------- 1. Introduction The main objectives of EDIM were to enhance the Istanbul earthquake early warning

  9. NASA ACTS SATELLITE: A DISASTER RECOVERY TEST Dr. Hans Kruse

    E-Print Network [OSTI]

    Kruse, Hans

    NASA ACTS SATELLITE: A DISASTER RECOVERY TEST Dr. Hans Kruse School of Communications Systems In September 1993, NASA launched its long- awaited Advanced Communication Technology (ACTS) satellite. ACTS and opening of the Ka frequency band. Among the earliest of the tests on the new satellite was a NASA

  10. Water is Vital--Especially after a Disaster 

    E-Print Network [OSTI]

    Crocker, Andrew

    2005-10-10

    Dehydration can be a serious threat after a disaster, when supplies of clean drinking water may be limited. Learn how you can find and use hidden sources of water in your home and purify water to make it safe for drinking....

  11. Disaster-Tolerant Storage with SDN Vincent Gramoli 1

    E-Print Network [OSTI]

    Gramoli, Vincent

    puts services at risk in the face of disasters, such as earthquakes or nuclear power plant explosions, which can af- fect large geographical regions. Few years ago, these risks motivated Wall Street financial institutions to build datacentres outside the blast radius of a nuclear attack on New York City

  12. English version UNISDR Terminology on Disaster Risk Reduction (2009)

    E-Print Network [OSTI]

    2009-01-01

    version "Terminology: Basic terms of disaster risk reduction" was published in "Living with risk: a global that a society or community considers acceptable given existing social, economic, political, cultural, technical and environmental conditions. Comment: In engineering terms, acceptable risk is also used to assess and define

  13. Digital Disaster, Cyber Security, and the Copenhagen School

    E-Print Network [OSTI]

    Nissenbaum, Helen

    Digital Disaster, Cyber Security, and the Copenhagen School Lene Hansen University of Copenhagen and Helen Nissenbaum New York University This article is devoted to an analysis of cyber security, a concept is devoted to an analysis of ``cyber security,'' a concept that arrived on the post-Cold War agenda

  14. Mountain Lake Biological Station University of Virginia DISASTER PLAN

    E-Print Network [OSTI]

    McGlothlin, Joel W.

    such as computers. Power failures are common and may last for many hours. Electrical generators are available. For all NON-EMERGENCY Disasters (minor accident, electrical failure, etc.) contact any MLBS staff member for emergency use and powering of critical equipment (e.g. freezers). Following a power failure, critical

  15. Approaching Urban Disaster Reality: The ResQ Firesimulator

    E-Print Network [OSTI]

    Nebel, Bernhard

    on a realistic physical model of heat development and heat transport in urban fires. It allows to simulate threeApproaching Urban Disaster Reality: The ResQ Firesimulator Timo A. N¨ussle, Alexander Kleiner different ways of heat transport (radiation, convection, direct transport) and the influence of wind

  16. http://texashelp.tamu.edu/ 606 After a Disaster

    E-Print Network [OSTI]

    Tips When natural disasters strike, you must take care of yourself and your family first a professional electrician or power company to report a down power line or power outage. · Beware of gas leaks on by yourself. Contact your local utility company for a trained professional to restore your gas service

  17. Exploring and exchanging (dis)ability and (dis)aster 

    E-Print Network [OSTI]

    Stough, Laura; Kelman, Ilan

    2015-01-01

    and deal with, leaving them less energy for dealing with less frequent hazards. Some chapters point out that disasters can also lead to disability, from Ferreira losing her leg in a nightclub fire to Mr. HP and Mrs. KB experiencing the Gujarat...

  18. AOML Hurricane Underwater Gliders A project funded by the Disaster

    E-Print Network [OSTI]

    AOML Hurricane Underwater Gliders A project funded by the Disaster Relief Appropriations Act known towards helping improve hurricane forecast Hurricane Gonzalo IR-NHC: CIMSS IR-NHC: CIMSS Tropical Storm dissolved oxygen Strategy: because underwater gliders are fully operational under hurricane wind conditions

  19. DISASTER RECOVERY APPLICATIONS FOR SATELLITE COMMUNICATIONS SYSTEMS

    E-Print Network [OSTI]

    Kruse, Hans

    in the ACTS system. Finally, we project possible applications for satellite based data communication services and possibly cooling systems) are backed up with in-house standby systems. Critical data bases are backed up Young, Chris Washburn J. Warren McClure School of Communication Systems Management Don Flournoy School

  20. Texas Water Resources: Vulnerability from Contaminants 

    E-Print Network [OSTI]

    Dwivedi, Dipankar

    2012-10-02

    Numerical models of flow and transport are commonly applied for the sustainable management of water resources and for the selection of appropriate remediation techniques. However, these numerical models are not always ...

  1. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  2. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  3. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  4. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  5. FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities

    E-Print Network [OSTI]

    Fung, Adonis P H; Wong, T Y

    2012-01-01

    Modern HTML forms are designed to generate form controls dynamically and submit over AJAX as a result of recent advances in Javascript programming techniques. Existing scanners are constrained by interacting only with traditional forms, and vulnerabilities are often left undetected even after scrutiny. In this paper, we overcome a number of client-side challenges that used to make automated fuzzing of form submissions difficult and unfaithful. We build FAITH, a pragmatic scanner for uncovering parameter tampering vulnerabilities in real-world rich web applications. It is the first scanner that enables fuzzing in most kinds of form submissions while faithfully preserving the required user actions, HTML 5, AJAX, anti-CSRF tokens and dynamic form updates. The importance of this work is demonstrated by the severe vulnerabilities uncovered, including a way to bypass the most-trusted One-Time Password (OTP) in one of the largest multinational banks. These vulnerabilities cannot be detected by existing scanners.

  6. VULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS

    E-Print Network [OSTI]

    Atkinson, Robert C

    be routed around electricity substation compounds wirelessly. Furthermore, wireless communication with the deployment of Bluetooth (and other similar wireless technologies) in electricity substations for controlVULNERABILITY OF BLUETOOTH TO IMPULSIVE NOISE IN ELECTRICITY TRANSMISSION SUBSTATIONS S A Bhattil

  7. Vulnerability assessment of water supply systems for insufficient fire flows 

    E-Print Network [OSTI]

    Kanta, Lufthansa Rahman

    2009-05-15

    Water supply systems’ vulnerability towards physical, chemical, biological, and cyber threats was recognized and was under study long before September 11, 2001. But greater attention toward security measures for water ...

  8. Ethical Issues in Research with "Vulnerable" and "HardtoReach"

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    are interdependentinterdependent · One can be vulnerable w/o being harmed or d ( d i )wronged (and vice versa) #12;2 Ways women (Subpart B) ADDITIONAL SAFEGUARDS? · handicapped persons · Prisoners (Subpart C) · Children

  9. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  10. Systematic Techniques for Finding and Preventing Script Injection Vulnerabilities

    E-Print Network [OSTI]

    Saxena, Prateek

    2012-01-01

    HTML content of the blog. HTML and other web languages lackmecha- nisms in HTML and other web languages to separateHTML pseudocode generated by a vulnerable social networking web

  11. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  12. Guide to Using Vulnerability Naming Schemes

    E-Print Network [OSTI]

    welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL the development of technical, physical, administrative, and management standards and guidelines for the cost Institute of Standards and Technology David Waltermire Karen Scarfone Daniel Owens C O M P U T E R S E C U R

  13. NIST Interagency Report 7435 The Common Vulnerability

    E-Print Network [OSTI]

    by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 August 2007 U

  14. Privacy Vulnerability of Published Anonymous Mobility Traces

    E-Print Network [OSTI]

    2010-07-07

    Sep 20, 2010 ... a function of the nodal mobility (captured in both real and synthetic traces), the ... Systems; K.6.5 [Management of Computing and Infor- mation Systems]: Security and ..... We first describe them for case A1: (1) MLE Approach ...

  15. Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    1 Modeling the Vulnerability Discovery Process O. H. Alhazmi and Y. K. Malaiya Computer Science models for the vulnerability discovery process have just been published recently. Such models will allow of vulnerability exploitation. Here we examine these models for the vulnerability discovery process. The models

  16. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  17. HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services Effective: December 2005

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management & Services the confidentiality, integrity and availability of Health Science Center electronic information resources. Policy and vulnerabilities #12;HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES Chapter 5 Information Management

  18. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  19. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were...

  20. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability...

  1. Post-Disaster Mental Health Among Parent–Child Dyads After a Major Earthquake in Indonesia

    E-Print Network [OSTI]

    2015-01-01

    disasters in Yogyakarta, Indonesia: A study of elementaryU.S. Geological Survey: Significant Earthquakes– Indonesia.Magnitude 6.3-Java, Indonesia. Retrieved from: http://

  2. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  3. Rebuilding After Disaster: Going Green from the Ground Up (Revised) (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2009-10-01

    20-page "how-to" guide describing ways to turn a disaster into an opportunity to rebuild with greener energy technologies. It covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

  4. UCL Institute for Risk & Disaster Reduction Magnitude 9.0 (JMA scale) earthquake

    E-Print Network [OSTI]

    Guillas, Serge

    #12;UCL Institute for Risk & Disaster Reduction · Magnitude 9.0 (JMA scale) earthquake · Occurred at 02:46:23 pm local time near the east coast of Honshu, Japan · Subduction zone megathrust earthquake in and around Japan Coseismic slip model #12;UCL Institute for Risk & Disaster Reduction · Earthquakes expected

  5. Climate Change and the Sendai Framework for Disaster Risk Ilan Kelman1,2

    E-Print Network [OSTI]

    Jones, Peter JS

    ARTICLE Climate Change and the Sendai Framework for Disaster Risk Reduction Ilan Kelman1 at Springerlink.com Abstract This article reviews climate change within the Sendai Framework for Disaster Risk Reduction 2015­2030 (SFDRR), analyzing how climate change is mentioned in the framework's text

  6. Introduction Physics Environmental Issues Social Justice Disasters Activity: Income Inequality How to Mathematize the World

    E-Print Network [OSTI]

    Lega, Joceline

    Introduction Physics Environmental Issues Social Justice Disasters Activity: Income Inequality How Rincon High School University of Arizona 1/22/11 #12;Introduction Physics Environmental Issues Social Justice Disasters Activity: Income Inequality Outline Introduction Who are We? Why are We Here? Physics

  7. Hurricane/Disaster Preparedness Plan Hurricane Preparedness Emergency Plans for Laboratories

    E-Print Network [OSTI]

    Nicholson, Bruce J.

    Hurricane/Disaster Preparedness Plan 1/22/2010 Hurricane Preparedness ­ Emergency Plans.e. hurricane, flood). Background: Hurricanes, floods, and other natural disasters can pose challenges laboratory that are not addressed here. Emergency Preparedness ­ June 1 Beginning of Hurricane Season: Below

  8. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding

    E-Print Network [OSTI]

    Breaux, Travis D.

    , as applied to criminal court records to identify mitigating requirements that improve privacy protectionsIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceeding Travis D,jdlewis,pnotto,anton}@ncsu.edu ABSTRACT Information systems governed by laws and regulations are subject to civil and criminal violations

  9. Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings

    E-Print Network [OSTI]

    Young, R. Michael

    and goal models, as applied to criminal court records to identify mitigating requirements. In a sustainableIdentifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings Travis D,jdlewis,pnotto,anton}@ncsu.edu Abstract Information systems governed by laws and regulations are subject to both civil and criminal

  10. Flood Vulnerability and Flood Protection North and Baltic Seas

    E-Print Network [OSTI]

    Vries, Hans de

    G G G G Flood Vulnerability and Flood Protection North and Baltic Seas Meteorological Forcings for the Dutch Continental Shelf Model Hans de Vries KNMI, Weather Service Research and Development G G G G control forecast 50 perturbed forecasts 240 hours 2 per day Not enough spread for tf

  11. Predicting Cancer-Specific Vulnerability via Data-Driven

    E-Print Network [OSTI]

    Ruppin, Eytan

    Resource Predicting Cancer-Specific Vulnerability via Data-Driven Detection of Synthetic LethalityCancer Research UK, The Beatson Institute for Cancer Research, Switchback Road, Glasgow G61 1BD, Scotland the inhibition of each single gene is not. It can be harnessed to selectively treat cancer by identifying

  12. Pretty Good Piggy-backing Parsing vulnerabilities in PGP Desktop

    E-Print Network [OSTI]

    Verheul, Eric

    Guard (GPG). Despite the long established PGP open source policy these vulnerabilities were apparently find their basis in PGP, the most prominent being the GNU Privacy Guard or GPG. PGP was also. These specifications are adhered to by all `PGP' implementations most notably GPG and the PGP products developed by PGP

  13. Flooding of Industrial Facilities -Vulnerability Reduction in Practice

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    any improvement. As human activities historically developed in river areas and floodplains, industrial-use planning in flood-prone areas and vulnerability reduction in flood-prone facilities. This paper focuses of hazardous material, soil or water pollutions by hazardous substances for the environment, fires, explosions

  14. Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware

    E-Print Network [OSTI]

    Miller, Barton P.

    systems, i.e. SCADA systems. The use of automated tools for vulnerability assessment is quite attractive in most existing Grid and Cloud projects, and even in "Supervisory Control and Data Acquisition (SCADA]. Nowadays security is one of the most desirable features of the computational Grid, Cloud, and SCADA systems

  15. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  16. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot­ tleneck in mobile devices (the battery power

  17. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery

    E-Print Network [OSTI]

    Chen, Hao

    Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery Radmilo Racic' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bot- tleneck in mobile devices (the battery power

  18. European biofuel plans could spell disaster -environmentalresearchweb A community website from IOP Publishing Sign in Forgotten your password? Sign

    E-Print Network [OSTI]

    European biofuel plans could spell disaster - environmentalresearchweb A community website from IOP. Corporate Partners Sustainable Futures Dec 17, 2007 European biofuel plans could spell disaster European Union plans to increase the use of biofuels could spell disaster for some of the world's poorest people

  19. U.S. Energy Sector Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather This report-part of the...

  20. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud

    E-Print Network [OSTI]

    Ryder, Barbara G.

    CloudSafe: Securing Data Processing within Vulnerable Virtualization Environments in the Cloud large-scale cloud applications. Index Terms--cloud security, outsourced computation, side- channel, newly discovered vulnerabilities in cloud virtualization envi- ronment have threatened the security

  1. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  2. About the relevance ofthe concept of risk acceptability in the risk analysis and risk management process: A decisional

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    About the relevance ofthe concept of« risk acceptability » in the risk analysis and risk management analysis and risk management are taken. This can be introduced by: ft) giving an image ofwhat are involved and participate to the risk management process. In France, the Toulouse disaster has revealed

  3. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  4. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  5. Vulnerability Discovery in Multi-Version Software Systems Jinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray

    E-Print Network [OSTI]

    Ray, Indrakshi

    a model of the discovery process that can predict the number of vulnerabilities that are likely to be discovered in a given time frame. Recent studies have produced vulnerability discovery process models a new approach for quantitatively modeling the vulnerability discovery process, based on shared source

  6. Impacts of Control and Communication System Vulnerabilities on Power Systems Under

    E-Print Network [OSTI]

    Hayat, Majeed M.

    1 Impacts of Control and Communication System Vulnerabilities on Power Systems Under Contingencies vulnerabilities such as failures of the communication and control systems that transmit and implement critical smart grids. In this paper the vulnerabilities in the control and communication system are coupled

  7. GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    GMO, CONSUMPTION AND CONSUMER VULNERABILITY IN BRAZILIAN CONSUMER LAW: THE RIGHT TO BE DULY genetically modified organisms. Key words: Consumer. Vulnerability. Lacking of resources. GMO Résumé - Le : France (2010)" #12;GMO, consumption and consumer vulnerability in Brazilian Consumer Law: the right

  8. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  9. Structural Vulnerability Analysis of Electric Power Distribution Grids

    E-Print Network [OSTI]

    Koc, Yakup; Warnier, Martijn; Kumar, Tarun

    2015-01-01

    Power grid outages cause huge economical and societal costs. Disruptions in the power distribution grid are responsible for a significant fraction of electric power unavailability to customers. The impact of extreme weather conditions, continuously increasing demand, and the over-ageing of assets in the grid, deteriorates the safety of electric power delivery in the near future. It is this dependence on electric power that necessitates further research in the power distribution grid security assessment. Thus measures to analyze the robustness characteristics and to identify vulnerabilities as they exist in the grid are of utmost importance. This research investigates exactly those concepts- the vulnerability and robustness of power distribution grids from a topological point of view, and proposes a metric to quantify them with respect to assets in a distribution grid. Real-world data is used to demonstrate the applicability of the proposed metric as a tool to assess the criticality of assets in a distribution...

  10. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  11. Classification ofAttributes and Behavior in Risk Management Using Bayesian Networks

    E-Print Network [OSTI]

    Akl, Robert

    Classification ofAttributes and Behavior in Risk Management Using Bayesian Networks Ram Dantu path from the root to the end node suitable vulnerability analysis and risk management strategies-Attack Graphs, Behavior, Risk Management and risk management with these graph transitions. For many years

  12. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  13. Building & Enhancing Interorganizational Relationships for Disaster Preparedness and Response Capacity: a Study of Community-based Organizations Serving Vulnerable Populations: a Focus on the Homeless

    E-Print Network [OSTI]

    Nilsen, Donata Christiane

    2012-01-01

    e.g. food, water, shelter, hot meals), Functional Needs (Food Water Shelter/Housing Sanitation Clothing Protection* Functional

  14. I-Rescue: A Coalition Based System to Support Disaster Relief Operations 

    E-Print Network [OSTI]

    Siebra, C; Tate, Austin

    I-Rescue is a research programme that aims to develop knowledge-based tools for disaster relief domains. One important aspect of the I-Rescue development is to highlight the requirements regarding the collaborative activities ...

  15. Development of Algorithms to Estimate Post-Disaster Population Dislocation--A Research-Based Approach 

    E-Print Network [OSTI]

    Lin, Yi-Sz

    2010-10-12

    This study uses an empirical approach to develop algorithms to estimate population dislocation following a natural disaster. It starts with an empirical reexamination of the South Dade Population Impact Survey data, ...

  16. Event Modeling in Social Media with Application to Disaster Damage Assessment 

    E-Print Network [OSTI]

    Liang, Yuan

    2013-07-16

    This thesis addresses the modeling of events in social media, with an emphasis on the detection, tracking, and analysis of disaster-related events like the 2011 Tohuku Earthquake in Japan. Successful event modeling is ...

  17. Picking up the pieces : transitional shelters for disaster relief in the northern mountainous regions of Pakistan

    E-Print Network [OSTI]

    Lee, Weifeng Victoria

    2006-01-01

    This thesis seeks to tackle a complex problem - disaster housing relief - from the angle of architecture design discipline and attempts to find a logical approach to solve such a problem via an in depth examination of a ...

  18. Taming Nuclear Power. What have we learned from the Fukushima disaster?

    E-Print Network [OSTI]

    CERN. Geneva

    2011-01-01

    We analyze the main causes and consequences of the Fukushima nuclear disaster, in comparison with the previous major accidents of Three Mile Island and Chernobyl (among a total of 30 civilian nuclear accidents).

  19. Alternatives for reducing the environmental risks associated with natural disasters and their effects on pipelines 

    E-Print Network [OSTI]

    Wellborn, Michael Wayne

    1996-01-01

    Past pipeline failure reports have typically focused on corrosion and third party related events. However, natural disasters pose a substantial risk to pipeline integrity as well. Therefore, it was the objective of this thesis to analyze the risks...

  20. The Dynamic Effects of Hurricanes in the US: The Role of Non-Disaster Transfer Payments

    E-Print Network [OSTI]

    Deryugina, Tatyana

    We know little about the dynamic economic impacts of natural disasters. I examine the effect of hurricanes on US counties’ economies 0-10 years after landfall. Overall, I find no substantial changes in county population, ...

  1. Archiving Disaster: A Comparative Study of September 11, 2001 and Hurricane Katrina

    E-Print Network [OSTI]

    Rivard, Courtney J.

    2012-01-01

    writes simply, “I lost everything in Hurricane Katrina. I'mlost everything in southeastern Louisiana during Hurricaneslost. However, the same goal of focusing on the devastation of the disaster of Hurricane

  2. National Disaster Resilience Competition Webinar Series: Long-Term Commitment Factor

    Broader source: Energy.gov [DOE]

    In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

  3. World Report on Disability, Intellectual Disabilities, and Disaster Preparedness: Costa Rica as a Case Example 

    E-Print Network [OSTI]

    Stough, Laura

    2015-01-01

    , Costa Rica. Risk, Hazards & Crisis in Public Policy, 3, 77–104. International Federation of Red Cross and Red Crescent Societies. (2007). World disasters report: Focus on discrimination. Satigny/ Verner, Switzerland: ATAR Roto Presse. Kailes, J. (2008...

  4. National Disaster Resilience Competition Webinar Series- Q&A Session: Review Completeness Requirements

    Office of Energy Efficiency and Renewable Energy (EERE)

    In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

  5. National Disaster Resilience Competition Webinar Series- Q&A Session: Walk through FAQ's

    Office of Energy Efficiency and Renewable Energy (EERE)

    In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

  6. Rare booms and disasters in a multi-sector endowment economy

    E-Print Network [OSTI]

    Kahana, Michael J.

    Rare booms and disasters in a multi-sector endowment economy Jerry Tsai University of Oxford to booms than for those that are not. We build a general equilibrium endowment economy in which growth

  7. Strategies for an integrated US industry response to a humanitarian disaster

    E-Print Network [OSTI]

    Lam, Sheau Kai

    2007-01-01

    This thesis focuses on developing strategies to improve coordination between private businesses, relief agencies, and the government in order to deliver more efficient and effective disaster relief during major national ...

  8. Stochastic modeling to allocate and assess disaster response capacity in logistics networks

    E-Print Network [OSTI]

    Seelbach, Lauren A

    2015-01-01

    When a disaster occurs in the United States, individuals in the impacted areas look to the local, state and federal government agencies to provide aid in the form of food, water, shelter, and other essential commodities. ...

  9. Suggested strategies and best practices in private supply chain disaster response

    E-Print Network [OSTI]

    Budhiraj, Karn

    2010-01-01

    In times of disaster, demand for goods and services in affected areas spikes. Private companies generally have contingencies in place for business continuity; however, most lack a strategic approach to join the general ...

  10. o I would like to make a donation to the Center for Refugee and Disaster Response

    E-Print Network [OSTI]

    Scharfstein, Daniel

    o I would like to make a donation to the Center for Refugee and Disaster Response in the amount Affairs 615 N. Wolfe Street / Suite W1600 Baltimore, MD 21205-2179 You can also donate online at www.jhsph.edu/refugee/make_a_gift o I would like to receive e-mail updates The Center for Refugee and Disaster Response works with its

  11. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Office of Energy Efficiency and Renewable Energy (EERE)

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  12. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

  13. V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilities have been

  14. V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  15. V-208: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department of Energy

  16. V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergyMultiple

  17. V-224: Google Chrome Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities

  18. DOE Hanford Network Upgrades and Disaster Recovery Exercise Support the Cleanup Mission Now and into the Future

    SciTech Connect (OSTI)

    Eckman, Todd J.; Hertzel, Ali K.; Lane, James J.

    2013-11-07

    In 2013, the U.S. Department of Energy's (DOE) Hanford Site, located in Washington State, funded an update to the critical network infrastructure supporting the Hanford Federal Cloud (HFC). The project, called ET-50, was the final step in a plan that was initiated five years ago called "Hanford's IT Vision, 2015 and Beyond." The ET-50 project upgraded Hanford's core data center switches and routers along with a majority of the distribution layer switches. The upgrades allowed HFC the network intelligence to provide Hanford with a more reliable and resilient network architecture. The culmination of the five year plan improved network intelligence and high performance computing as well as helped to provide 10 Gbps capable links between core backbone devices (10 times the previous bandwidth). These improvements allow Hanford the ability to further support bandwidth intense applications, such as video teleconferencing. The ET-50 switch upgrade, along with other upgrades implemented from the five year plan, have prepared Hanford's network for the next evolution of technology in voice, video, and data. Hand-in-hand with ET-50's major data center outage, Mission Support Alliance's (MSA) Information Management (IM) organization executed a disaster recovery (DR) exercise to perform a true integration test and capability study. The DR scope was planned within the constraints of ET-50's 14 hour datacenter outage window. This DR exercise tested Hanford's Continuity of Operations (COOP) capability and failover plans for safety and business critical Hanford Federal Cloud applications. The planned suite of services to be tested was identified prior to the outage and plans were prepared to test the services ability to failover from the primary Hanford data center to the backup data center. The services tested were: Core Network (backbone, firewall, load balancers); Voicemail; Voice over IP (VoIP); Emergency Notification; Virtual desktops; and, Select set of production applications and data. The primary objective of the exercise was to test COOP around the emergency operations at Hanford to provide information on capabilities and dependencies of the current system to insure improved focus of emergency, safety and security capacity in a disaster situation. The integration of the DR test into the ET-50 project allowed the testing of COOP at Hanford and allowed the lessons learned to be defined. These lessons learned have helped improve the understanding of Hanford's COOP capabilities and will be critical for future planning. With the completion of the Hanford Federal Cloud network upgrades and the disaster recovery exercise, the MSA has a clearer path forward for future technology implementations as well as network improvements to help shape the usability and reliability of the Hanford network in support of the cleanup mission.

  19. Columbia Campus Emergency Management Plan

    E-Print Network [OSTI]

    Almor, Amit

    .....................................................................................30 · Natural Gas Leak. Natural Disasters · Earthquake Parcels and Letters..............................................................26 K. Transportation

  20. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  1. Seismic Vulnerability and Performance Level of confined brick walls

    SciTech Connect (OSTI)

    Ghalehnovi, M.; Rahdar, H. A. [University of Sistan and Baluchestan, Zahedan (Iran, Islamic Republic of)

    2008-07-08

    There has been an increase on the interest of Engineers and designers to use designing methods based on displacement and behavior (designing based on performance) Regarding to the importance of resisting structure design against dynamic loads such as earthquake, and inability to design according to prediction of nonlinear behavior element caused by nonlinear properties of constructional material.Economically speaking, easy carrying out and accessibility of masonry material have caused an enormous increase in masonry structures in villages, towns and cities. On the other hand, there is a necessity to study behavior and Seismic Vulnerability in these kinds of structures since Iran is located on the earthquake belt of Alpide.Different reasons such as environmental, economic, social, cultural and accessible constructional material have caused different kinds of constructional structures.In this study, some tied walls have been modeled with software and with relevant accelerator suitable with geology conditions under dynamic analysis to research on the Seismic Vulnerability and performance level of confined brick walls. Results from this analysis seem to be satisfactory after comparison of them with the values in Code ATC40, FEMA and standard 2800 of Iran.

  2. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Thermoelectric power generation is vulnerable to increasing temperatures and reduced water availability in most regions, particularly in the Midwest, Great Plains, and southern...

  3. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  4. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  5. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  6. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  7. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  8. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  9. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    code analysis to detect software security vulnerabilities—A systematic review of software fault prediction studies.47] Noopur Davis. Secure Software Development Life Cycle

  10. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  11. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  12. Role Of Informal Solid Waste Management Sector And Possibilities Of Integration; The

    E-Print Network [OSTI]

    Columbia University

    Role Of Informal Solid Waste Management Sector And Possibilities Of Integration; The Case religion. Attracts tourist from all over the globe. #12;Municipal Solid Waste management : Current Formal;Social-Economic Vulnerability #12;Major Solid Waste management Options for the city Incineration based

  13. The extreme vulnerability of interdependent spatially embedded networks

    E-Print Network [OSTI]

    Bashan, Amir; Buldyrev, Sergey V; Havlin, Shlomo

    2015-01-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, while below this "critical dependency" (CD) a failure of few nodes leads only to small damage to the system. So far, the research has been focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically analyze the stability of systems consisting of interdependent spatially embedded networks modeled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no CD and \\textit{any} small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of t...

  14. On a Flood of Words: On A Flood of Words: Race and Ethnicity in the Language of Disaster in Early Twentieth-Century Texas 

    E-Print Network [OSTI]

    Roe, Robin L

    2015-07-27

    will include diversity in the disaster types, geographical areas, and the victims’ race, ethnicity, gender, and class. As weather-related natural disasters, particularly hurricanes, often extend over large geographic areas, I track the reporting of such storms...

  15. A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS Metrics

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    430 A Framework for Software Security Risk Evaluation using the Vulnerability Lifecycle and CVSS if the discovery is made by a black-hat finder. Here, a framework for software risk evaluation with respect to the vulnerability lifecycle is proposed. Risk can be evaluated using the likelihood of a security breach

  16. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  17. Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State University

    E-Print Network [OSTI]

    Malaiya, Yashwant K.

    Prediction Capabilities of Vulnerability Discovery Models Omar H. Alhazmi, Colorado State Discovery Models (VDMs) have been proposed to model vulnerability discovery and have has been fitted discovery process, presenting a static approach to estimating the initial values of one of the VDM

  18. VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA RICA

    E-Print Network [OSTI]

    VULNERABILITY ANALYSIS AND RISK ASSESSMENT FOR SEISMIC AND FLOOD HAZARD IN TURIALBA CITY, COSTA and Earth Observation (ITC) Enschede Netherlands Figure 5.4. Damage maps for #12;Vulnerability Analysis And Risk Assessment For Seismic And Flood Hazard In Turialba City, Costa Rica By Muh Aris Marfai and Jacob

  19. Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset-based approach

    E-Print Network [OSTI]

    Krivobokova, Tatyana

    Vulnerability and household livelihoods in small scale fishing areas in Africa: An asset vulnerability to poverty and livelihood choices in small-scale fishing areas. The use of an asset on natural resources for their livelihoods, such as fishing, are often marginalized or ignored in national

  20. Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion Suppression and Reappraisal

    E-Print Network [OSTI]

    Gross, James J.

    Emotion Regulation and Vulnerability to Depression: Spontaneous Versus Instructed Use of Emotion vulnerability is related to difficulties with emotion regulation by comparing recovered-depressed and never of emotion regulation strategies. In the second phase, sad mood was induced using a film clip, and the degree

  1. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    Acquisition (SCADA) systems that allows us to calculate device vulnerability and help power substation and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack, SCADA. 1. Introduction Today's electric power substations are becoming more automated and connected

  2. 1836 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 23, NO. 4, NOVEMBER 2008 Vulnerability Assessment of Cybersecurity

    E-Print Network [OSTI]

    Hu, Fei

    of Cybersecurity for SCADA Systems Chee-Wooi Ten, Student Member, IEEE, Chen-Ching Liu, Fellow, IEEE on supervisory control and data acquisition (SCADA) systems. Compliance of the require- ment to meet the standard a vulnerability assessment framework to systemat- ically evaluate the vulnerabilities of SCADA systems at three

  3. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  4. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  5. OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

    E-Print Network [OSTI]

    Pinar, Ali

    OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID ALI PINAR, JUAN would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming

  6. Experimental Studies of Vulnerabilities in Devices and On-Chip Protection

    E-Print Network [OSTI]

    Anlage, Steven

    ). · Identify most prominent vulnerabilities of the units to RF direct injection and irradiation, and examine and fabricated and the packaged chips were placed on the boards with matching elements for RF injection. The RF vulnerabilities are examined both by simulation and experimental injection of RF at the MOSFETGate, Drain, Source

  7. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Assessment Methods for SCADA Security Introduction SCADA Security for Managers and Operators Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks...

  8. Disaster incubation, cumulative impacts and the urban/ex-urban/rural dynamic

    SciTech Connect (OSTI)

    Mulvihill, Peter R. . E-mail: prm@yorku.ca; Ali, S. Harris . E-mail: hali@yorku.ca

    2007-05-15

    This article explores environmental impacts and risks that can accumulate in rural and ex-urban areas and regions and their relation to urban and global development forces. Two Southern Ontario cases are examined: an area level water disaster and cumulative change at the regional level. The role of disaster incubation analysis and advanced environmental assessment tools are discussed in terms of their potential to contribute to more enlightened and effective assessment and planning processes. It is concluded that conventional approaches to EA and planning are characteristically deficient in addressing the full range of impacts and risks, and particularly those originating from pathogens, dispersed and insidious sources. Rigorous application of disaster incubation analysis and more advanced forms of EA has considerable potential to influence a different pattern of planning and decision making.

  9. The Environmental Management Project Manager`s Handbook for improved project definition

    SciTech Connect (OSTI)

    NONE

    1995-02-01

    The United States Department of Energy (DOE) is committed to providing high quality products that satisfy customer needs and are the associated with this goal, DOE personnel must possess the knowledge, skills, and abilities to ensure successful job performance. In addition, there must be recognition that the greatest obstacle to proper project performance is inadequate project definition. Without strong project definition, DOE environmental management efforts are vulnerable to fragmented solutions, duplication of effort, and wastes resources. The primary means of ensuring environmental management projects meet cost and schedule milestones is through a structured and graded approach to project definition, which is the focus of this handbook.

  10. Re: response to oil disaster; spoil islands and Army Corps Haze, Pam K, Gould, Rowan , Ashe, Dan,

    E-Print Network [OSTI]

    History: Re: response to oil disaster; spoil islands and Army Corps t Haze, Pam K, Gould, Rowan:59:082010 Subject: FW: response to oil disaster; spoil islands and Army Corps at sure who to ask abou this to so some dredging and fortify the Chandeleur Islands or other areas in the oil impact zone

  11. 29.01.03.M1.32 Information Resources Disaster Recovery Planning Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURES

    E-Print Network [OSTI]

    29.01.03.M1.32 Information Resources ­ Disaster Recovery Planning Page 1 of 2 STANDARD ADMINISTRATIVE PROCEDURES 29.01.03.M1.32 Information Resources ­ Disaster Recovery Planning Revised November 5 and predictable manner. Definitions Information Resources (IR) - the procedures, equipment, and software

  12. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Network management and QoS provisioning - 1Andrea of this license visit: http://creativecommons.org/licenses/by-nc- /3 0/ Network management and QoS provisioning ­ Chapter 9, Network Management, of the book Jim Kurose, Keith Ross, Computer Networking, A Top Down

  13. Management Plan Management Plan

    E-Print Network [OSTI]

    Management Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids in the Deschutes River. The Management Plan consists of five elements described in the Council's program: 1

  14. Ontology-based Integration of Sensor Web Services in Disaster Management

    E-Print Network [OSTI]

    Hoffmann, Jörg -FR 6.2

    .Bergweiler@dfki.de 3 Itelligence AG, K¨oln, Germany daniel.schoen@itelligence.de 4 Institute for Geoinformatics, M

  15. AFFILIATIONS: Gall--Stephenson Disaster Management Institute, Louisiana State University, Baton Rouge, Louisiana;

    E-Print Network [OSTI]

    (Cutter et al. 2008; National Research Council 1999). Currently, only a few U.S. agencies gather loss Research Council 1999), none currently exists. To make matters worse, existing loss data exhibit numerous on direct, in- direct, insured, and/or uninsured losses caused by natural hazards is stored (Cutter et al

  16. Stress in Adults after a Disaster: Warning Signs and Management (Spanish) 

    E-Print Network [OSTI]

    Warren, Judith L.

    2007-10-08

    ?s luego de un desastre puede disminuir sus sentimientos de angustia. A continuaci?n, se describen diferentes acciones que pueden ayudarlo a aliviar el estr?s: Cu?dese a usted mismo: Este enfoque lo ayudar? a lidiar con los factores de estr?s... recuperaci?n del desastre. Es posible que desee brindar apoyo escuchando las experiencias del desastre de otros. Sin embargo, para evitar sentirse ?agotado? por involucrarse tanto, debe reconocer sus propios l?mites. Busque el tiempo y el apoyo...

  17. Disaster debris management and recovery of housing stock in San Francisco, CA

    E-Print Network [OSTI]

    Saiyed, Zahraa Nazim

    2012-01-01

    This thesis investigates the potential effects of a 7.2 magnitude earthquake in San Francisco City, particularly the implications on San Francisco's residential housing stock and impacts on the construction and demolition ...

  18. A multinational SDI-based system to facilitate disaster risk management in the Andean Community

    E-Print Network [OSTI]

    Molina, Martín

    Martin Molina a,n , Salvador Bayarri b a Department of Artificial Intelligence, Facultad de Informa´tica

  19. Managing the risks of extreme events and disasters to advance climate

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield MunicipalTechnical Report:Speeding accessby aLED Street LightingFrom theHighI _s - "U N C- . .

  20. In the past, disaster management used to only include support for hurricanes, floods, tornados, and earthquakes

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelBConservation StandardsEnergy In Case You Missed It:EnergytoIn

  1. 13 Dec 1997 ESF VEG Digital Data for Engineering Geology; Disaster or Benefit 1 Digital Data for EngineeringDigital Data for Engineering

    E-Print Network [OSTI]

    Hack, Robert

    13 Dec 1997 ESF VEG Digital Data for Engineering Geology; Disaster or Benefit 1 Digital Data for EngineeringDigital Data for Engineering Geology: Disaster or BenefitGeology: Disaster or Benefit Robert Hack Section Engineering Geology Centre for Technical Geosciences International Institute for Aerospace Survey

  2. The Sendai Framework for Disaster Risk Reduction and Persons with Disabilities 

    E-Print Network [OSTI]

    Stough, Laura; Kang, Donghyun

    2015-01-01

    Reduction and persons with disabilities.pdf.txt Content-Type text/plain; charset=UTF-8 ARTICLE The Sendai Framework for Disaster Risk Reduction and Persons with Disabilities Laura M. Stough1 • Donghyun Kang1 Published online: 13 June 2015... ? The Author(s) 2015. This article is published with open access at Springerlink.com Abstract In this paper, the Sendai Framework for Disaster Risk Reduction 2015–2030 (SFDRR) is evaluated with respect to its ramifications for persons with disabili- ties...

  3. New HANE Fireball Physics: Implications for US Infrastructure Vulnerability

    SciTech Connect (OSTI)

    Hewett, D W; Larson, D J; Eng, C; Tarwater, A E; Brecht, S H

    2009-01-26

    The vulnerability of the US infrastructure to High altitude Nuclear Explosions (HANEs) continues to be the object of studies by a number of blue-ribbon panels and commissions. In particular, studies suggest an alarming sensitivity of our electronic infrastructure to some types of ElectroMagnetic Pulse (EMP) while other types of EMP threaten our power distribution systems. Equally or perhaps more important is the concern that a large percentage of our satellites will experience 'upsets' or worse from these same HANE effects. Such studies, however, are all based on the sparse data obtained during the last HANE tests conducted in the early 1960's. A weakness in our present understanding is that almost all the conclusions about distributed-electric-current-driven EMP, with time scales 1/2 second or longer, are interpretations of old data guided by the computational MHD/fluid models available at the time. Fluid models make the assumption that the mean-free-path is zero and thus miss important physics regardless of the model used to couple ion motion to the magnetic field. Even when planetary length scales are modeled so that the gyro radius becomes negligible, the early dynamics of the fireball are not properly captured. The facts are, at relevant altitudes, the explosion expansion is almost unimpeded by the tenuous ionospheric background-particle mean-free-paths are of order 10,000 km. The primary impediment to the debris expansion is the earth's magnetic field bending the energetic ion trajectories emanating from the explosion into circular orbits with typical radii that range from 200 km for heavy ions to 10 km or less for the lighter ions in the debris. These particles thus gyrate many times before they are stopped by a collision with the background atmosphere. Only models that track ion gyro-motion can recover the myriad possibilities through which the complicated, energetic, 'fireball' of debris may evolve. Fireball evolution is important because it determines debris distribution (crucial in satellite vulnerability studies) and generation of low frequency EMP. With the previous considerations as motivation, we have recently reconsidered the early fireball dynamics to see if more appropriate physics models would reveal new insight into some long-standing problems, such as the apparent need for 'jetting' of debris particles to high altitude to explain the observed satellite damage. Additionally, we hoped that the additional physics might reveal new aspects of the early fireball dynamics that could augment the rather incomplete understanding we now have of the EMP generated by such tests.

  4. Sustainable shelters for post disaster reconstruction : an integrated approach for reconstruction after the South Asia earthquake

    E-Print Network [OSTI]

    Ali, Zehra (Zehra Hyder)

    2007-01-01

    A year after the South Asia earthquake, over 60% of the survivors are still vulnerable due to the lack of adequate shelter, the absence of basic facilities for water and sanitation and livelihood restoration. The harsh ...

  5. Managing Secure Survivable Critical Infrastructures To Avoid Vulnerabilities Frederick Sheldon, Tom Potok, Andy Loebl

    E-Print Network [OSTI]

    Krings, Axel W.

    for the strategic and economic well being of the Nation. The blackout of August 14, 2003 affected 8 states and fifty 3 The DOE/NERC reports are at https://reports.energy.gov/ and ftp://www.nerc.com/pub/sys/all_updl/docs/pressrel/Blackout

  6. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site ScriptingDepartment|

  7. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  8. Variations in disaster aid acquisitions among ethnic groups in a rural community 

    E-Print Network [OSTI]

    Galindo, Kim Blanca

    2009-06-02

    was proportionally hit the hardest of all towns in this flood, the devastation did not stop there. The Presidential disaster declaration originally covered twenty counties in central Texas, including DeWitt County, where Switchback is located, and brought................................................ 5 II THE SETTING ......................................................................... 8 Flood history of the Guadalupe River in Central Texas ... 8 The 1998 flood............................................................... 10 III...

  9. FEMA: Family Basic Disaster Supplies There are six basics you should stock in your home

    E-Print Network [OSTI]

    Su, Xiao

    directions below on filling the container with water. If you choose to use your own storage containers the bottle to the top with regular tap water. If the tap water has been commercially treated from a waterFEMA: Family Basic Disaster Supplies There are six basics you should stock in your home: Water

  10. Burn Disaster Response Planning in New York City: Updated Recommendations for Best Practices

    E-Print Network [OSTI]

    Chan, Carri W.

    Burn Disaster Response Planning in New York City: Updated Recommendations for Best Practices Nicole inception in 2006, the New York City (NYC) Task Force for Patients with Burns has continued to develop Plan. (J Burn Care Res 2012;X:000­000) Beginning in 2005, the New York City Department of Health

  11. MULTIPATH HYBRID AD HOC NETWORKS FOR AVIONICS APPLICATIONS IN DISASTER AREA

    E-Print Network [OSTI]

    Atiquzzaman, Mohammed

    helicopters up in the sky and first responders on the ground. However, transmitting video and running high for rapidly establishing communication among the helicopters and first responders in a disaster area, among helicopters and ground responders to carry out necessary relief efforts. Our proposed network

  12. Gulf oil spill's ripples still a worry Warranted or not, disaster fears loom

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Gulf oil spill's ripples still a worry Warranted or not, disaster fears loom BY JIM WAYMER from the nation's worst-ever oil mess. Oceanographers want to know the paths of underwater oil plumes. Biologists wonder if nesting sea turtles that accidentally gulped oil will lay viable eggs or whether eggs

  13. Disaster mitigation and recovery planning for historic buildings: Guam as a case study 

    E-Print Network [OSTI]

    Cepeda, Ricarda P

    2002-01-01

    Fig. 3. 9 The Lujan House ? An Example of One of the Homes Saved from Demolition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ???, . . .. . . . . . . . . . . . . . . ?. . .. . ???. ?,. . . . . . . . . ? 26 LIST OF TABLES Page... will be unnecessarily condemned and demolished. Thus, needless demolition of historic buildings may be avoided if disaster recovery plans are developed ahead of time. Saving historic structures in a rapidly changing society is problematic due to a lack...

  14. NATURAL HAZARDS ON ALLUVIAL FANS: THE VENEZUELA DEBRIS FLOW AND FLASH FLOOD DISASTER

    E-Print Network [OSTI]

    Eaton, L. Scott

    NATURAL HAZARDS ON ALLUVIAL FANS: THE VENEZUELA DEBRIS FLOW AND FLASH FLOOD DISASTER In December Venezuela. Rainfall on December 2-3 totaled 200 millimeters (8 inches) and was followed by a major storm, Denver, Colorado, Naples, Italy, and Vargas, Venezuela. In time scales spanning thousands of years

  15. Option prices in a model with stochastic disaster risk Sang Byung Seo

    E-Print Network [OSTI]

    Kahana, Michael J.

    Option prices in a model with stochastic disaster risk Sang Byung Seo University of Pennsylvania Mellon University, Cornell University and the Wharton school for helpful comments. #12;Option prices. Thus it is of interest to know whether these models have the potential to explain option prices as well

  16. International Conference on Urban Disaster Reduction November 27~29, 2007

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    2nd International Conference on Urban Disaster Reduction November 27~29, 2007 * Corresponding. They would stand steadily during normal weather conditions including wind, rain, and water flow. They would to debris flow monitoring. WSNs are small electronic systems that can contain various types of sensors

  17. 5) Management 5) Management

    E-Print Network [OSTI]

    Nowak, Robert S.

    5) Management c) Control #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken & Thieret (1997) · Types of information utilized Ecological impacts #12;5) Management c) Control impacts Economic impacts #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken

  18. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network management and QoS provisioning - 1Andrea Bianco ­ TNG group - Politecnico di Torino Telecommunication management and QoS provisioning - 2Andrea Bianco ­ TNG group - Politecnico di Torino Stanford, California

  19. EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site

    Broader source: Energy.gov [DOE]

    This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

  20. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    1994-09-01

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  1. Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Title draft: Complexity and vulnerability of Smartgrid systems Elizaveta Kuznetsova1 , Keith of Smartgrids. Typical characteristics of complex systems, such as self-organization, emergence, chaotic behavior and evolution, are considered with respect to Smartgrids as future energy infrastructures

  2. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  3. Agricultural Livelihoods and Climate Change: Employing the Livelihood Vulnerability Index in Bluefields, Jamaica 

    E-Print Network [OSTI]

    Fath, Kevin

    2014-08-20

    relationships between selected characteristics of adopter innovativeness and farmer vulnerability level. Random sampling was used to select participants (N=52). Personal interviews were conducted with farmers using an instrument consisting of LVI components...

  4. Vulnerability of ex vivo ?-motor nerve terminals to hypoxia-reperfusion injury. 

    E-Print Network [OSTI]

    Baxter, Rebecca L.

    2010-01-01

    A growing body of evidence shows that presynaptic nerve terminals throughout the nervous system are vulnerable to a range of traumatic, toxic and disease-related neurodegenerative stimuli. The aim of this study was to ...

  5. Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

    E-Print Network [OSTI]

    Finifter, Matthew Smith

    2013-01-01

    C Lisp Scala Scheme Erlang SQL Lua 17.  Please enter your Ernst. Automatic Creation of SQL Injection and Cross-SiteXSS and first-order SQL injection vulnerabilities (i.e. ,

  6. Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian Universities

    E-Print Network [OSTI]

    Causes of Vulnerability in the Implementation of Scientific Research Among Students in Jordanian universities, among these causes of weaknesses was: weak interest in the Arab world in general scientific

  7. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    Write Error Lets Remote Users Execute Arbitrary Code V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities JC3 Contact: Voice:Hotline at 1-866-941-2472 World Wide Web:...

  8. In vivo Raman spectral pathology of human atherosclerosis and vulnerable plaque

    E-Print Network [OSTI]

    Motz, Jason T.

    The rupture of vulnerable atherosclerotic plaque accounts for the majority of clinically significant acute cardiovascular events. Because stability of these culprit lesions is directly related to chemical and morphological ...

  9. Public health implications of hot summer days and vulnerability indexes in Massachusetts

    E-Print Network [OSTI]

    Reeves, Halley Brunsteter

    2015-01-01

    Due to ever-increasing summer temperatures and a population with minimal technological adaptations to help them cope, extreme heat events will likely have a large impact on vulnerable populations in Massachusetts. As such, ...

  10. Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss Model

    E-Print Network [OSTI]

    Chen, Shu-Ching

    Commercial-Residential Buildings' Vulnerability Component of the Florida Public Hurricane Loss to be surveyed and defined. Within this context the State of Florida has created the Florida Public Hurricane

  11. A case study of social vulnerability mapping: issues of scale and aggregation 

    E-Print Network [OSTI]

    Burns, Gabriel Ryan

    2009-05-15

    phenomena to anthropogenic calamities (Burton, Kates, and White 1993). The effects of these environmental hazards can change where and how a population develops (Van der Veen and Logtmeijer 2005). A challenge for geographers is locating vulnerable... populations, and calculating what makes these populations susceptible to harm from environmental hazards before a calamity happens. This study examines the challenges of mapping and calculating social vulnerability by expanding on concepts and knowledge...

  12. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  13. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  14. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  15. Columbia University, EE Technical Report #2008-08-26, Aug. 2008 Assessing the Vulnerability of

    E-Print Network [OSTI]

    Zussman, Gil

    disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse, Electromagnetic Pulse (EMP). I. INTRODUCTION The global communications infrastructure is primarily based on fiber by anything from Electromagnetic Pulse (EMP) attacks [14], [24] to dragging anchors [6], [27]. Such real

  16. Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience Report Now Available

    Broader source: Energy.gov [DOE]

    The Office of Electricity Delivery and Energy Reliability has released a report that examines the key risks confronting critical energy infrastructure and ways in which the insurance industry can help manage these risks. In most developed countries, insurance is one of the principal risk management instruments for aiding in recovery after a disaster and for encouraging future investments that are more resilient to potential hazards.

  17. Sustainability Index for Water Resources Planning and Management

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    demonstrating the use of the index. Tailor-made sustainability indexes are defined for water users in Mexico, environmental and hydrological integrity." Although this concept is still valid, water management policies of systems to actual or expected future changes. Vulnerability is the magnitude of an adverse impact

  18. Protogynous species require special management considerations when fish-

    E-Print Network [OSTI]

    232 Protogynous species require special management considerations when fish- ing reduces). However, pro- togyny does not automatically imply elevated vulnerability to fishing if the population, to predict stock dynam- ics and a species' response to fishing pressure, it is important not only

  19. ORNL is managed by UT-Battelle for the US Department of Energy

    E-Print Network [OSTI]

    Weston, Ken

    ORNL is managed by UT-Battelle for the US Department of Energy Climate Change Science Institute to micrometer scales. #12;System Vulnerabilities to Extreme Events Prepare, Respond, Recover · Energy. Managing, their impact on human and natural land-energy-water systems, and maintain a stable climate. #12;Extreme Events

  20. Voice over IP: Risks, Threats and Vulnerabilities Angelos D. Keromytis

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    , as well as the potential for lower cost through equipment consolidation and, for the con- sumer market reinforced this trend. In this envi- ronment of constant innovation, individuals, governments un- derstanding and managing their risks. In this struggle, cost reductions, convenience and new

  1. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain Age

    E-Print Network [OSTI]

    Nagurney, Anna

    Amherst, Massachusetts 01003 Qiang Qiang Management Division Pennsylvania State University Great Valley School of Graduate Professional Studies Malvern, Pennsylvania 19355 April 2010; revised May 2010 and the identification of the importance of network components, such as nodes and links. We demonstrated how rigorously

  2. Virginia coastal resources management program

    SciTech Connect (OSTI)

    Not Available

    1985-08-01

    Approval of a coastal management plan for coastal land and water use activities on the coast of Virginia is proposed. The coastal management area would embrace all of Tidewater Virginia, approximately 5000 miles long, and would extend to the three-mile outer limit of the United States territorial sea. The core regulatory program would include fisheries management, subaqueous lands management, wetland management, dunes management, nonpoint source pollution control, point source pollution control, shoreline sanitation, and air pollution control. Geographic areas of particular concern would be designated as worthy of special consideration in any planning or management process. These areas would include natural resource areas, such as wetlands, spawning areas, coastal sand dunes, barrier islands, and special wildlife management areas. Natural hazard areas would include areas vulnerable to erosion and areas subject to damage from wind, tides, and storm-related events. Geographic areas of special concern would include those with particular conservation, recreational, ecological, and aesthetic values. Waterfront development areas would include ports, commercial fishing piers, and community waterfronts. Shorefront access planning would provide access to the shoreline and water for recreational activities. Each year, two additional boat ramps would be planned for construction. Energy facility planning would focus on facilities involved in the production of electricity and petroleum, and in the export of coal. Shoreline erosion mitigation planning would identify, control, and mitigate erosion.

  3. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  4. Making Sense of New Orleans Flood Trauma Recovery: Ethics, Research Design, and Policy Considerations for Future Disasters

    E-Print Network [OSTI]

    Kunkel, Adrianne; Dennis, Michael Robert; Woods, Gillian; Schrodt, Paul

    2006-12-01

    1 Citation: Dennis, M. R., Kunkel, A. D., Woods, G., & Schrodt, P. (2006). Making sense of New Orleans flood trauma recovery: Ethics, research design, and policy considerations for future disasters. Analyses of Social Issues and Public Policy...

  5. The 1,000 dollar home : a scalable business model to build disaster relief dwellings and upgrade slums

    E-Print Network [OSTI]

    Cañzio, Luis (Del Cañzio)

    2006-01-01

    This thesis proposes a new model for the private markets to build disaster relief dwellings or to upgrade degraded neighborhoods of very low income communities. The study offers a way to empower the dwellers of very poor ...

  6. Managing Risk in a Dynamic World Economy 

    E-Print Network [OSTI]

    Harris, Harold M.; Benson, Geoffrey A.; Rosson, C. Parr

    1999-06-23

    understanding of risk and how to manage it. Sources of Risk At least four major sources of risk are important to U.S. agriculture. Each con- tains a crucial linkage to the world economy, leading to greater risk for the U.S. farmer. 1. Weather and Natural... Disasters. Normal fluctuations in global weather pat- terns affect world production of farm products, which in turn affects the prices of these products. Livestock producers are affected directly through weather impacts on forage crops and indirectly through...

  7. Quantifying the evolution of a scientific topic: reaction of the academic community to the Chornobyl disaster

    E-Print Network [OSTI]

    Mryglod, Olesya; Kenna, Ralph; Berche, Bertrand

    2015-01-01

    We analyze the reaction of academic communities to a particular urgent topic which abruptly arises as a scientific problem. To this end, we have chosen the disaster that occurred in 1986 in Chornobyl (Chernobyl), Ukraine, considered as one of the most devastating nuclear power plant accidents in history. The academic response is evaluated using scientific-publication data concerning the disaster using the Scopus database to present the picture on an international scale and the bibliographic database "Ukrainika naukova" to consider it on a national level. We measured distributions of papers in different scientific fields, their growth rates and properties of co-authorship networks. {The elements of descriptive statistics and the tools of the complex network theory are used to highlight the interdisciplinary as well as international effects.} Our analysis allows to compare contributions of the international community to Chornobyl-related research as well as integration of Ukraine in the international research o...

  8. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  9. Organizational Identification and Volunteer Workers: A Study of Red Cross Disaster Volunteers

    E-Print Network [OSTI]

    Wolf, Nan M.

    2009-04-17

    ), committed volunteers are in high demand. As could be expected in a society that emphasizes workers' market value, the contributions of volunteers are frequently undervalued or overlooked. Defined as ?work performed without monetary recompense? (Freeman... their commitment. Disaster volunteers are required to take a minimum of 40 hours of training before they are first called to respond, even on a local basis. They are expected to attend regular team meetings and to keep apprised of current policies, regulations...

  10. Racial Geography, Economic Growth and Natural Disaster Resilience

    SciTech Connect (OSTI)

    Li, Huiping; Fernandez, Steven J.; Ganguly, Auroop

    2014-03-01

    Recent development of National Response Plans and National Incident Management Plans has emphasized the need for interoperability of plans, systems, technology, and command structures. However, much less emphasis has been placed on equally important elements such as the at-risk populations’ response to those plans, systems, and directions. The community-wide consequences of Hurricane Katrina demonstrated that the protection of communities should no longer be considered only a function of public organizations. Private organizations, nonprofit organizations and individual households have significant roles to play in these plans (Comfort 2006, Salamon 2002). This study is a first attempt to characterize the effect on the resilience (recovery) of metropolitan areas by the presence (or absence) of separate small communities within a larger jurisdiction. These communities can be based on many different social cleavages (ethnic, racial, economic, social, geographic, linguistic, etc.).

  11. Supporting data for: "The Lifetime of Android API vulnerabilities:case study on the JavaScript-to-Java interface"

    E-Print Network [OSTI]

    Thomas, Daniel R.; Coudray, Thomas; Sutcliffe, Tom

    2015-05-26

    _norm(vulnerable, total_file, condition, prefix, installed, prob, vulnerability_discovered, data_collected): norm_file = '{prefix}_{condition}_{installed}_{prob}-norm.csv'.format( prefix=prefix, condition=condition, prob=prob, installed=installed) with open... (total_file) as f: total = count_total(f) norm = OrderedDict() averagable_values = [] for day, count in vulnerable.items(): normed_value = count / total[day] if day >= vulnerability_discovered and day = data_collected: averagable_values.append(normed_value) norm...

  12. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |Vulnerabilities

  13. 11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-are-vulnerable-to-slackers/#comment-8042

    E-Print Network [OSTI]

    West, Stuart

    11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers « Not Exactly Rocket Science Page 1 of 5http://notexactlyrocketscience.wordpress.com/2007/11/15/cooperating-bacteria-NonCommercial- ShareAlike 2.5 License. Carnivals #12;11/17/2007 05:21 PMCooperating bacteria are vulnerable to slackers

  14. Computing and Informatics, Vol. , , 113, V 2011-May-18 VULNERABILITY ASSESSMENT ENHANCEMENT

    E-Print Network [OSTI]

    Miller, Barton P.

    systems usually do not undergo a thorough vulnerability assessment during their life cycle or after de FOR MIDDLEWARE FOR COMPUTING AND INFORMATICS Jairo Serrano, Elisa Heymann, Eduardo Cesar Computer Architecture that is insufficiently addressed in most ex- isting grid and cloud projects, even SCADA systems. Such projects use

  15. Climate change vulnerability of forest biodiversity: climate and competition tracking of demographic rates

    E-Print Network [OSTI]

    Teskey, Robert O.

    al., 2002; Thomas et al., 2004; Jetz et al., 2007). Some experts argue that responses will depend insight regarding vulnerability to any one (Streng et al., 1989; Elliott & Baker, 2004; Iba´n~ez et al., 2006; Yang et al., 2006; Canham & Thomas, 2010). CIS are further complicated by the fact that current

  16. On the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design

    E-Print Network [OSTI]

    Hopper, Nicholas J.

    , the Tor network consists of roughly 2000 "Onion Routers" that voluntarily relay traffic between who can observe a Tor client's network connections and even control some Onion Routers shouldOn the risks of serving whenever you surf Vulnerabilities in Tor's blocking resistance design Jon

  17. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  18. American Journal of Botany 89(12): 19161924. 2002. THE VULNERABILITY TO FREEZING-INDUCED XYLEM

    E-Print Network [OSTI]

    Pockman, William T.

    1916 American Journal of Botany 89(12): 1916­1924. 2002. THE VULNERABILITY TO FREEZING, Albuquerque, New Mexico 87131-1091 USA The temperature dependence of freezing-induced xylem cavitation- rated the previously observed relationship between minimum freezing temperature and embolism. The area

  19. How a butterfly's wing can bring down Goliath / Chaos theories calculate the vulnerability of megasystems

    E-Print Network [OSTI]

    and computer expert Vickie Lynch have been computer-modeling the vulnerability of electrical grids for several ever-larger power networks to transmit electricity, experts said Thursday. When a system becomes super-power failures. "The whole grid is very strongly coupled, and when you do something in one point

  20. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  1. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire

    E-Print Network [OSTI]

    Xu, Wenyuan

    Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System companies to collect data ­ "iChange" controls the car via an iPhone ­ More in-car wireless sensor networks. Virtually, all new cars sold or manufactured after 2007 in US are equipped with wireless TPMS. Computer

  2. Assessment of U.S. Agriculture Sector and Human Vulnerability to a Rift Valley Fever Outbreak 

    E-Print Network [OSTI]

    Hughes, Randi Catherine

    2011-08-08

    on the assessment of the U.S. agricultural sector and human vulnerability to a Rift Valley Fever (RVF) outbreak and the value of a select set of alternative disease control strategies. RVF is a vector-borne, zoonotic disease that affects both livestock and humans...

  3. Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez

    E-Print Network [OSTI]

    Mejia-Alvarez, Pedro

    that the population of a city grows, new problems arise, which include scarcity of resources, pollution, and traffic [1]. However, bigger cities generate new kinds of problems, such as scarcity of resources, pollutionDetection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz

  4. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  5. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  6. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  7. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse

    SciTech Connect (OSTI)

    Kruse, V.J. (Westinghouse Electric Corp., Pittsburgh, PA (USA). Advanced Systems Technology Div.); Tesche, F.M. (E-Systems, Inc., Greenville, TX (USA)); Liu, T.K. (Lutech, Inc., Oakland, CA (US)); Barnes, P.R. (Oak Ridge National Lab., TN (USA))

    1990-04-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength.

  8. Software mitigations to hedge AES against cachebased software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache­based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat­ forms, software side channels have become a subject of interest. Recent publications discussed cache­based software side channel

  9. Software mitigations to hedge AES against cache-based software side channel vulnerabilities

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Software mitigations to hedge AES against cache-based software side channel vulnerabilities Ernie goals of improving the software isolation properties of PC plat- forms, software side channels have become a subject of interest. Recent publications discussed cache-based software side channel

  10. Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams

    E-Print Network [OSTI]

    Young, R. Michael

    are built with traditional metrics of complexity, code churn, and fault history. We have performed to the code [17]. Hence, complexity metrics and code churn metrics have been used for fault prediction [5, 17 fault prediction metrics ­ complexity, code churn, and fault history metrics for vulnerability

  11. Resources for Pet, Poultry and Livestock Owners Affected by Natural Disasters 

    E-Print Network [OSTI]

    Faries Jr., Floron C.

    2008-09-02

    of Agriculture can help producers locate hay for sale and pastures for lease. Call 877-429- 1998, or go to www.agr.state.tx.us and check the ?Links/Resources? sec- tion. Resources for Pet, Poultry and Livestock Owners Affected by Natural Disasters Livestock... stream_source_info pdf_2228.pdf.txt stream_content_type text/plain stream_size 3611 Content-Encoding ISO-8859-1 stream_name pdf_2228.pdf.txt Content-Type text/plain; charset=ISO-8859-1 ER-022 9-08 Floron C. Faries, Jr...

  12. Rebuilding After Disaster: Going Green from the Ground Up (Revised) (Brochure), U.S. Department of Energy (DOE), Energy Efficiency & Renewable Energy (EERE)

    Office of Energy Efficiency and Renewable Energy (EERE)

    20-page “how-to” guide describing ways to turn a disaster into an opportunity to rebuild with greener energy technologies. It covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

  13. Hierarchical Disaster Image Classification for Situation Report Enhancement Yimin Yang, Hsin-Yu Ha, Fausto Fleites, Shu-Ching Chen, Steven Luis

    E-Print Network [OSTI]

    Chen, Shu-Ching

    . In order to obtain images for the disaster domain (i.e., hurricane, oil spill, and earthquake), we of combining MCA-based data fusion method with the hierarchical classification approach. There are two main, classification of high-resolution disaster images facilitates the process of damage assessment after

  14. 2011: A Year of Extremes In 2011, the United States of America has already seen a record 12 disasters that each inflicted

    E-Print Network [OSTI]

    at well over $50 billion. Nearly 650 lives were lost in these disasters. Winter Storm Groundhog Day-dollar weather/climate event of the year. This 10th U.S. billion-dollar disaster officially breaks the annual to evacuate Minot, North #12;Dakota due to the record high water level of the Souris River, where 4,000 homes

  15. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  16. Study: Exposure to crude oil from the Deepwater Horizon disaster causes swimming deficiencies in juvenile mahi mahi

    E-Print Network [OSTI]

    Grosell, Martin

    Study: Exposure to crude oil from the Deepwater Horizon disaster causes swimming deficiencies of large fish Crude oil spreads across a wide swath of the Gulf of Mexico during the 2010 Deepwater Horizon. The four million barrels of crude oil that spewed into the Gulf of Mexico from BP's failed oil drilling

  17. Disaster Mitigation of Debris Flows, Slope Failures and Landslides 159 Estimating Magnitude-Frequency Relationships for Debris Flows on Forested

    E-Print Network [OSTI]

    Butler, David R. - Department of Geography, Texas State University

    Disaster Mitigation of Debris Flows, Slope Failures and Landslides 159 Estimating Magnitude for the assessment of hazards and risks as well as for the design of e.g., torrent control works or retention basins. 2005a). However, data from tree-ring records have only exceptionally been coupled with data from ground

  18. Media Summary 18-24 April Reuters India Pee-powered toilet to light up disaster zone

    E-Print Network [OSTI]

    Aickelin, Uwe

    Media Summary 18- 24 April Coverage Reuters India ­ Pee-powered toilet to light up disaster zone The Globe and Mail ­ Army base where Canadians trained in the great war faces wrecking ball South West by BBC News Channel about the electoral profile of the Bristol West seat. Lisa was also interviewed

  19. Impacts of Radioactive 137Cs on Marine Bacterioplankton: Effects of the Fukushima Disaster on Hawaii's Kaneohe Bay Bacterial Communities

    E-Print Network [OSTI]

    Heller, Paul

    Impacts of Radioactive 137Cs on Marine Bacterioplankton: Effects of the Fukushima Disaster such catastrophe, a tsunami off the coast of Japan, occurred on March 11, 2011. The tsunami caused the Fukushima on the bacterioplankton community of Kaneohe Bay in Oahu, Hawaii. The bay is in the direct path of Fukushima's radioactive

  20. he chain of calamity now known as Japan's Triple Disaster began with a massive rupture in the ocean floor.

    E-Print Network [OSTI]

    Anderson, Donald M.

    . At the Fukushima Dai-ichi nuclear power plant, commissioned in 1971 on the coast 140 miles north of Tokyo, reaching heights up to 49 feet. minuTes LaTer In Fukushima, the Dai-ichi nuclear plant withstood shaking nuclear disaster since Chernobyl in 1986. Without their cooling systems, three of the plant's six re

  1. Natural Disasters and Adaptation to Climate Change Edited by Sarah Boulter, Jean Palutikof, David Karoly, and Daniela Guitart

    E-Print Network [OSTI]

    Batterbury, Simon

    wave: impacts, public health adaptation and response in France 189 Mathilde Pascal, Alain Le Tertre cyclone Sidr in Bangladesh 264 Bimal K. Paul and Munshi K. Rahman 18 Coffee, disasters, and social-ecological resilience in Guatemala and Chiapas, Mexico 276 Hallie Eakin, Helda Morales, Edwin Castellanos, Gustavo Cruz

  2. 14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association

    E-Print Network [OSTI]

    Rohs, Remo

    ) exposure to air pollution, and (3) social and health vulnerability. These three scores are then added and playgrounds because these are land uses where air pollution sensitive populations (very young, elderly14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association em · feature Whether

  3. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety Santosh) to become the root cause of exploitable security vulnerabilities. This paper proposes Watchdog, a hardware full hardware-enforced memory safety at low overheads. 1. Introduction Languages such as C and C

  4. ISDA 2010, Montpellier, June 28-30, 2010 1 HOUSEHOLDS' RISK MANAGEMENT STRAGIES

    E-Print Network [OSTI]

    Boyer, Edmond

    TO POVERTY IN RURAL CHINA Tai Xiujun* , Li Shuzhuo**, Feldman W. Marcus***, Gretchen C. Daily **** *School and vulnerability to poverty, we propose a new model based on qualitative data analysis and test it using, precautionary financial saving, and informal social supports are major risk management strategies, which can

  5. NASA is currently experiencing impacts from a changing climate... and is applying its risk management process to identify risks and possible

    E-Print Network [OSTI]

    Waliser, Duane E.

    : Managing Climate Risks & Adapting to a Changing Climate I. Introduction II. Strategic Analysis III. Risks and vulnerabilities to manage the effects of climate change on the agency's operations and mission in both the shortNASA is currently experiencing impacts from a changing climate... and is applying its risk

  6. Exploring vulnerability and interdependency of UK infrastructure using key-linkages analysis

    E-Print Network [OSTI]

    Kelly, Scott; Tyler, Peter; Crawford-Brown, Douglas

    2015-07-27

    ) Waste (£5.8 bn) Water (£29.5 bn) Grand Total (£467 bn) Public Public/Private Private 3 Figure 1: Future source of funding for different infrastructure categories in the UK 60 Source: UK National infrastructure pipeline (2013) 61... Scientist 2012). With increasing risks from extreme weather events caused by the 65 onset of climate change and a concentration of populations now living in vulnerable 66 coastal cities, river deltas and along earth quake fault-lines, the risks of damage...

  7. Flashover vulnerability of transmission and distribution lines to high-altitude electromagnetic pulse (HEMP)

    SciTech Connect (OSTI)

    Kruse, V.J.; Liu, T.K.; Tesche, F.M.; Barnes, P.R.

    1989-01-01

    This paper estimates the vulnerability of transmission and distribution lines to flashover from the electromagnetic pulse generated by a nuclear detonation 400 kilometers above the earth. The analysis consists of first determining the cumulative probability of induced-voltage on three-phase lines, including shield and neutral conductors, for four operating voltages and then comparing these stresses to estimates of line insulation strength. 11 refs., 9 figs., 5 tabs.

  8. U-117: Potential security vulnerability has been identified with certain HP

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent atMultiple Vulnerabilities

  9. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEventScriptingVulnerabilityURLDepartment

  10. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram: Report1538-1950 TimelineUtility-Scale Solar throughVulnerabilityLogin|

  11. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore »to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  12. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  13. Vulnerability in Holstein-Friesian dairy cows : risk factors for culling and effect of temperament on oestrus 

    E-Print Network [OSTI]

    Chiumia, Daniel

    2011-11-25

    The general aims of the work were to determine the factors associated with vulnerability in Holstein- Friesian dairy cows in two scenarios: A) culling and B) the effect of temperament on days to first recorded oestrus ...

  14. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  15. Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer

    E-Print Network [OSTI]

    Ren, Yin

    A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

  16. Vulnerability of crops and native grasses to summer drying in the U.S. Southern Great Plains

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Raz-Yaseef, Naama; Billesbach, Dave P.; Fischer, Marc L.; Biraud, Sebastien C.; Gunter, Stacey A.; Bradford, James A.; Torn, Margaret S.

    2015-08-31

    The Southern Great Plains are characterized by a fine-scale mixture of different land-cover types, predominantly winter-wheat and grazed pasture, with relatively small areas of other crops, native prairie, and switchgrass. Recent droughts and predictions of increased drought in the Southern Great Plains, especially during the summer months, raise concern for these ecosystems. We measured ecosystem carbon and water fluxes with eddy-covariance systems over cultivated cropland for 10 years, and over lightly grazed prairie and new switchgrass fields for 2 years each. Growing-season precipitation showed the strongest control over net carbon uptake for all ecosystems, but with a variable effect: grassesmore »(prairie and switchgrass) needed at least 350 mm of precipitation during the growing season to become net carbon sinks, while crops needed only 100 mm. In summer, high temperatures enhanced evaporation and led to higher likelihood of dry soil conditions. Therefore, summer-growing native prairie species and switchgrass experienced more seasonal droughts than spring-growing crops. For wheat, the net reduction in carbon uptake resulted mostly from a decrease in gross primary production rather than an increase in respiration. Flux measurements suggested that management practices for crops were effective in suppressing evapotranspiration and decomposition (by harvesting and removing secondary growth), and in increasing carbon uptake (by fertilizing and conserving summer soil water). In light of future projections for wetter springs and drier and warmer summers in the Southern Great Plains, our study indicates an increased vulnerability in native ecosystems and summer crops over time.« less

  17. Energy Management in Microgrids: Algorithms and System

    E-Print Network [OSTI]

    Shi, Wenbo

    2015-01-01

    Energy Management . . . . . . . . . . . . . . . . . . . . .Distributed Energy Management . . . . . . . . . . . . . . .Energy Management . . . . . . . . . . . . . . . . . . . . .

  18. EP&R Standards Project Report: Technical Review of National Incident Management Standards

    SciTech Connect (OSTI)

    Stenner, Robert D.

    2007-04-24

    The importance and necessity for a fully developed and implemented National Incident Management System (NIMS) has been demonstrated in recent years by the impact of national events such as Hurricane Katrina in 2005. Throughout the history of emergency response to major disasters, especially when multiple response organizations are involved, there have been systemic problems in the consistency and uniformity of response operations. Identifying national standards that support the development and implementation of NIMS is key to helping solve these systemic problems. The NIMS seeks to provide uniformity and consistency for incident management by using common terminology and protocols that will enable responders to coordinate their efforts to ensure an efficient response.

  19. LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions

    SciTech Connect (OSTI)

    Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

    1998-08-01

    A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

  20. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultiple vulnerabilitiesApple has

  1. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | Department ofMultiple

  2. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities | DepartmentEnergy

  3. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilitiesService | Department

  4. Unmet Needs for Emergency Organizations During Disaster: Red Cross and Salvation Army Referrals in Texas During Katrina-Rita, 2005 

    E-Print Network [OSTI]

    Norman, Alexandria

    2012-07-11

    stream_source_info Norman.pdf.txt stream_content_type text/plain stream_size 76797 Content-Encoding UTF-8 stream_name Norman.pdf.txt Content-Type text/plain; charset=UTF-8 UNMET NEEDS FOR EMERGENCY... of the requirements for the designation as UNDERGRADUATE RESEARCH SCHOLAR A Senior Scholars Thesis by ALEXANDRIA NORMAN UNMET NEEDS FOR EMERGENCY ORGANIZATIONS DURING DISASTER: RED CROSS AND SALVATION ARMY REFERRALS IN TEXAS DURING KATRINA...

  5. Method of assessing severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.; Okrent, D.; Jae, M.; Lim, H.; Milici, T.; Park, H.; Swider, J.; Xing, L.; Yu, D. (Univ. of California, Los Angeles (United States))

    1991-01-01

    Accident management can be defined as the innovative use of existing and or alternative resources, systems, and actions to prevent or mitigate a severe accident. A significant number of probabilistic safety assessments (PSAs) have been completed that yield the principal plant vulnerabilities. These vulnerabilities can be categorized as (1) dominant sequences with respect to core-melt frequency. (2) dominant sequences with respect to various risk measures. (3) dominant threats that challenge safety functions. (4) dominant threats with respect to failure of safety systems. For each sequence/threat and each combination of strategy, there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These considerations include uncertainties in key phenomena, operator behavior, system availability and behavior, and available information. This paper presents a methodology for assessing severe accident management strategies given the key uncertainties delineated at two workshops held at the University of California, Los Angeles. Based on decision trees and influence diagrams, the methodology is currently being applied to two case studies: cavity flooding in a pressurized water reactor (PWR) to prevent vessel penetration or failure, and drywell flooding in a boiling water reactor to prevent vessel and/or containment failure.

  6. LAVA/CIS Version 2. 0: A software system for vulnerability and risk assessment

    SciTech Connect (OSTI)

    Smith, S.T.

    1990-01-01

    LAVA (the Los Alamos Vulnerability/Risk Assessment system) is an original systematic approach to risk assessment developed at the Los Alamos National Laboratory. It is an alternative to existing quantitative methods, providing an approach that is both objective and subjective, and producing results that are both quantitative and qualitative. LAVA was developed as a tool to help satisfy federal requirements for periodic vulnerability and risk assessments of a variety of systems and to satisfy the resulting need for an inexpensive, reusable, automated risk assessment tool firmly rooted in science. LAVA is a three-part systematic approach to risk assessment that can be used to model a variety of application systems such as computer security systems, communications security systems, information security systems, and others. The first part of LAVA is the mathematical model based on classical risk assessment, hierarchical multilevel system theory, decision theory, fuzzy possibility theory, expert system theory, utility theory, and cognitive science. The second part is the implementation of the mathematical risk model as a general software engine executed on a large class of personal computers. The third part is the application data sets written for a specific application system. The user of a LAVA application is not required to have knowledge of formal risk assessment techniques. All the technical expertise and specialized knowledge are built into the software engine and the application system itself. 36 refs., 5 figs.

  7. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  8. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  9. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  10. Of Disasters and Dragon Kings: A Statistical Analysis of Nuclear Power Incidents & Accidents

    E-Print Network [OSTI]

    Wheatley, Spencer; Sornette, Didier

    2015-01-01

    We provide, and perform a risk theoretic statistical analysis of, a dataset that is 75 percent larger than the previous best dataset on nuclear incidents and accidents, comparing three measures of severity: INES (International Nuclear Event Scale), radiation released, and damage dollar losses. The annual rate of nuclear accidents, with size above 20 Million US$, per plant, decreased from the 1950s until dropping significantly after Chernobyl (April, 1986). The rate is now roughly stable at 0.002 to 0.003, i.e., around 1 event per year across the current fleet. The distribution of damage values changed after Three Mile Island (TMI; March, 1979), where moderate damages were suppressed but the tail became very heavy, being described by a Pareto distribution with tail index 0.55. Further, there is a runaway disaster regime, associated with the "dragon-king" phenomenon, amplifying the risk of extreme damage. In fact, the damage of the largest event (Fukushima; March, 2011) is equal to 60 percent of the total damag...

  11. Lecturer, Management Lally School of Management

    E-Print Network [OSTI]

    Salama, Khaled

    Lecturer, Management Lally School of Management Rensselaer Polytechnic Institute The enterprise management and organization area of The Lally School of Management at Rensselaer Polytechnic Institute degree equivalent in management, strategy, organization behavior, or an appropriate related field

  12. FEMA Emergency Management Performance Grant Program

    Broader source: Energy.gov [DOE]

    The Emergency Management Performance Grant (EMPG) Program provides federal funds to assist state, local, tribal and territorial governments in preparing for all hazards, as authorized by Section 662 of the Post Katrina Emergency Management Reform Act (6 U.S.C. sect. 762) and the Robert T. Stafford Disaster Relief and Emergency Assistance Act, as amended (42 U.S.C. sect. 5121 et seq.). Title VI of the Stafford Act authorizes FEMA to make grants for the purpose of providing a system of emergency preparedness for the protection of life and property in the United States from hazards and to vest responsibility for emergency preparedness jointly in the federal government and the states and their political subdivisions. The FY 2015 EMPG will provide federal funds to assist state, local, tribal and territorial emergency management agencies to obtain the resources required to support the National Preparedness Goal's (NPG's) associated mission areas and core capabilities. The federal government, through the EMPG Program, provides necessary direction, coordination, and guidance, and provides necessary assistance, as authorized in this title, to support a comprehensive all hazards emergency preparedness system.

  13. project management

    National Nuclear Security Administration (NNSA)

    3%2A en Project Management and Systems Support http:www.nnsa.energy.govaboutusouroperationsapmprojectmanagementandsystemssupport

  14. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  15. Uncertainties and severe-accident management

    SciTech Connect (OSTI)

    Kastenberg, W.E. (Univ. of California, Los Angeles (United States))

    1991-01-01

    Severe-accident management can be defined as the use of existing and or alternative resources, systems, and actions to prevent or mitigate a core-melt accident. Together with risk management (e.g., changes in plant operation and/or addition of equipment) and emergency planning (off-site actions), accident management provides an extension of the defense-indepth safety philosophy for severe accidents. A significant number of probabilistic safety assessments have been completed, which yield the principal plant vulnerabilities, and can be categorized as (a) dominant sequences with respect to core-melt frequency, (b) dominant sequences with respect to various risk measures, (c) dominant threats that challenge safety functions, and (d) dominant threats with respect to failure of safety systems. Severe-accident management strategies can be generically classified as (a) use of alternative resources, (b) use of alternative equipment, and (c) use of alternative actions. For each sequence/threat and each combination of strategy, there may be several options available to the operator. Each strategy/option involves phenomenological and operational considerations regarding uncertainty. These include (a) uncertainty in key phenomena, (b) uncertainty in operator behavior, (c) uncertainty in system availability and behavior, and (d) uncertainty in information availability (i.e., instrumentation). This paper focuses on phenomenological uncertainties associated with severe-accident management strategies.

  16. Disastrous Response to Natural and Man-Made Disasters: An Environmental Justice Analysis Twenty-Five Years after Warren County

    E-Print Network [OSTI]

    Bullard, Robert D.; Wright, Beverly

    2008-01-01

    Division of Solid Waste Management, Tennessee Department ofDivision of Solid and Hazardous Waste Management (2002),

  17. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  18. Thermal Analysis of the Vulnerability of the Spacesuit Battery Design to Short-Circuit Conditions (Presentation)

    SciTech Connect (OSTI)

    Kim, G. H.; Chaney, L.; Smith, K.; Pesaran, A.; Darcy, E.

    2010-04-22

    NREL researchers created a mathematical model of a full 16p-5s spacesuit battery for NASA that captures electrical/thermal behavior during shorts to assess the vulnerability of the battery to pack-internal (cell-external) shorts. They found that relocating the short from battery pack-external (experimental validation) to pack-internal (modeling study) causes substantial additional heating of cells, which can lead to cell thermal runaway. All three layers of the bank-to-bank separator must fail for the pack-internal short scenario to occur. This finding emphasizes the imperative of battery pack assembly cleanliness. The design is tolerant to pack-internal shorts when stored at 0% state of charge.

  19. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  20. Constrained marine resource management

    E-Print Network [OSTI]

    Murray, Jason Hastings

    2007-01-01

    areas as a risk management tool A. Introduction . . . . .1. Effort management without Technologicalwith Technological Progress Under Effort Management F.

  1. New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one

    E-Print Network [OSTI]

    Gilbes, Fernando

    New USGS Reports Describe Groundwater Vulnerability to Contamination One in every five samples of groundwater used as a source for drinking contains at least one contaminant at a level of concern for human contaminants in groundwater. Regional summaries of where and why groundwater is vulnerable to contamination now

  2. Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation (DGT): Proposal of a Spatial

    E-Print Network [OSTI]

    Boyer, Edmond

    Vulnerability and Resilience of the Territory Concerning Risk of Dangerous Goods Transportation.garbolino@mines-paristech.fr Each year millions of tons of Dangerous Goods are transported between France and Italy using especially for the territory Dangerous Goods Transportation (DGT) is a crucial activity that participates to the development

  3. AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications

    E-Print Network [OSTI]

    Yin, Heng

    Hijacking Attacks in Android Applications Mu Zhang Department of EECS Syracuse University muzhang of vulnerabilities commonly appearing in Android applications. When these vul- nerabilities are triggered on Android devices, on behalf of the attackers. It is often unrealis- tic to purely rely on developers to fix

  4. Water, culture and environmental health : : understanding community based planning to improve health outcomes in vulnerable populations

    E-Print Network [OSTI]

    Stigler, Paula E.

    2013-01-01

    new options for improved water management. Paper presentedSan Diego Foundation. PI. Water quality as an environmentalProject Lead. Border water infrastructure program. Pala Band

  5. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  6. A Mean-Variance Disaster Relief Supply Chain Network Model for Risk Reduction

    E-Print Network [OSTI]

    Nagurney, Anna

    of Management University of Massachusetts Amherst, Massachusetts 01003 2Department of Electrical and Computer, Nigeria, the US and Mali. The total number of reported cases is more than 27,275. This isAnna and Ladimer

  7. Accident management then and now: Progress since Di Salvo's work

    SciTech Connect (OSTI)

    Shotkin, L.M.

    1991-01-01

    The nuclear industry is now initiating a serious effort to define the elements of an accident management program at each utility with an operating reactor, which is a significant change in conditions from those in 1985, when the work of Di Salvo et al. was published. Each utility is now conducting an individual plant examination (IPE) to uncover plant vulnerabilities to severe accidents. In conjunction with the IPE program, the Nuclear Utility Management and Resources committee, the Electric Power Research Institute, and owners' groups are developing an accident management program. This program is emphasizing the management program. This program is emphasizing the management of severe accidents (i.e., accidents that proceed to significant core melt) including strategies for managing ex-vessel events. Attention is also being paid to interfacing any severe accident management strategies with existing emergency operating procedures already in place at utilities. The industry program is addressing the five elements define by the US Nuclear Regulatory Commission (NRC): (1) strategies; (2) instrumentation; (3) guidance and computational aids; (4) organization and decision making; and (5) training. It will also be able to accept new information as it becomes available from ongoing efforts to better understand severe accidents and how to manage them effectively.

  8. Time Management Managing Time and Tasks

    E-Print Network [OSTI]

    Kunkle, Tom

    Time Management Managing Time and Tasks What is time management? Time can't be managed ­ but you can manage the amount of time you use each day for fun, work, rest, and time spent with others. Why is time management important? You have responsibilities to yourself, to your family and friends, to your

  9. Palouse Subbasin Management Plan 3. Management Plan

    E-Print Network [OSTI]

    Palouse Subbasin Management Plan 3. Management Plan FINAL DRAFT ~ May 2004 Project Lead: Palouse-Rock Lake Conservation District Trevor Cook, Project Manager PO Box 438 St. John WA 99171 (509) 648;Palouse Subbasin Plan: MANAGEMENT PLAN Management Plan: Page 3 - 1 3. Management Plan 3.1 Background

  10. Recommended Practice for Patch Management of Control Systems

    SciTech Connect (OSTI)

    Steven Tom; Dale Christiansen; Dan Berrett

    2008-12-01

    A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

  11. Managing the Management: CORBAbased Instrumentation of Management Systems

    E-Print Network [OSTI]

    Managing the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network Management Team Department of Computer Science, TU MË? unchen Arcisstr. 21, D­80333 Munich, Germany akeller@ieee.org Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM'99), Boston

  12. Florida Emergency Information Line (Only activated during disasters). . . . . . . . . . . . . . . . . . . . . . . . . . . 1-800-342-3557 Florida Division of Emergency Management (www.FloridaDisaster.org) . . . . . . . . . . . Non-Emergencies 850-413-9900

    E-Print Network [OSTI]

    .fpl.com) . . . . . . . . . . . . . . . . . . . . . . . . . . . Outage 1-800-4-OUTAGE (1-800-468-8243) Florida Keys Electric Cooperative (www.fkec.com) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Outage 1-800-858-8845 Keys Energy Services (http://keysenergy.com/). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Outage 305-295-1000 Florida Keys Aqueduct

  13. A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies

    E-Print Network [OSTI]

    Kindy, Diallo Abdoulaye

    2012-01-01

    In today's world, Web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions are done online with the aid of different Web applications. Though these applications are used by hundreds of people, in many cases the security level is weak, which makes them vulnerable to get compromised. In most of the scenarios, a user has to be identified before any communication is established with the backend database. An arbitrary user should not be allowed access to the system without proof of valid credentials. However, a crafted injection gives access to unauthorized users. This is mostly accomplished via SQL Injection input. In spite of the development of different approaches to prevent SQL injection, it still remains an alarming threat to Web applications. In this paper, we present a detailed ...

  14. V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability

    Broader source: Energy.gov [DOE]

    Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security.

  15. Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico 

    E-Print Network [OSTI]

    Sanchez Flores, Maria Del Rosario

    2010-10-12

    This dissertation examined declining groundwater availability and management strategies for addressing water shortages in the Laguna region located in the states of Coahuila and Durango. Excessive pumping of groundwater ...

  16. Evaluation of methodologies for estimating vulnerability to electromagnetic pulse effects. Final report 28 August 1982-30 April 1984

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    Estimation of vulnerability to high-altitude electromagnetic pulse (EMP) effects is essential for strategic and tactical decisions affecting national security. Both the design and the assessment of protection against EMP are inherently subject to uncertainty. The reason is that these processes must be conducted without exposure to actual EMP, in contrast to the situation for other forms of electrical overstress. Estimating vulnerability of systems to EMP effects depends greatly on the nature of the system. The soundest results can be obtained where stress within the system is controlled, through integral shielding and penetration-control devices, to well known values. In this case, one can rely on engineering analysis and systematic testing of a predominantly deterministic nature. Where control and knowledge of stress, as well as of strength, are not possible because of system design, complexity, or uncontrolled changes, probabilistic estimates become necessary. Statistical methods for estimating and combining uncertai

  17. Uncorrected)Ch.5)in)))Earthquake)Hazard,)Risk,)and)Disasters,)Ed)M.)Wyss,)Elsevier)2014)ISBN: 978-0-12-Aggravated)Earthquake)Risk)in)South)Asia:))

    E-Print Network [OSTI]

    Bilham, Roger

    Uncorrected)Ch.5)in)))Earthquake)Hazard,)Risk,)and)Disasters,)Ed)M.)Wyss,)Elsevier)2014)ISBN: 978-0-12- 394848-9) 1) Aggravated)Earthquake)Risk)in)South)Asia:)) ))))))))))))))))))))))))))Engineering.4) million) people) to) earthquake) deaths) in) the) past) 12) years,) and) more) than) 2) million) in) the

  18. The Effect of Climate Change on Natural Disasters: A College Student Perspective MELISSA C. K. PHILLIPS, ADAM B. CINDERICH, JENNIFER L. BURRELL, JENNIFER L. RUPER,

    E-Print Network [OSTI]

    Sheridan, Scott

    The Effect of Climate Change on Natural Disasters: A College Student Perspective MELISSA C. K) ABSTRACT Climate change is currently a topic of debate that is discussed not only within the physical, often not seeking out climate change research, but rather ingesting information interpreted by a third

  19. Beef cattle numbers have been on the decline over past decades, being dwindled by drought, natural disasters, and feedlots holding onto cattle

    E-Print Network [OSTI]

    Rock, Chris

    Beef cattle numbers have been on the decline over past decades, being dwindled by drought, natural disasters, and feedlots holding onto cattle longer before sending them to market. In January 2014 on researching the effects of adding amino acids to the diet of feedlot cattle supplemented with beta agonists

  20. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01

    management assessments. Management assessment results mustbe documented. WMG management must take prompt action tolegal advice to Laboratory management, periodically conducts

  1. Management'': Sunderraman

    E-Print Network [OSTI]

    Brass, Stefan

    INFSCI 2710 ``Database Management'': B. Oracle SQL*Plus B­1 Appendix B: Oracle SQL*Plus I have used: Oracle/SQL Tutorial, 1999. http://www.db.cs.ucdavis.edu/teaching/sqltutorial/ . Stefan Brass: Skript zur Vorlesung Informationssysteme (in German), UniversitË? at Hildesheim, 1996/97. . SQL*Plus User's Guide

  2. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  3. Privacy Management Plan 1 Privacy Management Plan

    E-Print Network [OSTI]

    University of Technology, Sydney

    Privacy Management Plan 1 Privacy Management Plan Abstract The Privacy Management Plan outlines how Impact Assessment Tool (.docm) (staff only) Records Management Vice-Chancellor's Directive Handling Management Plan 2 Legislation Privacy and Personal Information Protection Act 1998 (NSW) (PPIPIA) Health

  4. Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope2, Marta M. Jankowska3, Christopher Funk4, Gregory Husak1 and

    E-Print Network [OSTI]

    Lopez-Carr, David

    Mapping population vulnerability and climate change in Africa David Lopez-Carr1, Narcisa G. Pricope, and environmental degradation reduce adaptive capacity (Bremner, Lopez-Carr et al. 2010). In such a volatile context

  5. Environmental Engineering and Management

    E-Print Network [OSTI]

    Mirza, Umar Karim

    2001-01-01

    Review: Environmental Engineering and Management By J.M.H. Power (Eds. ). Environmental Engineering and Management.Conference on Environmental Engineering and Management,

  6. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    OIA/OCA/assurance-sys/IA/index.html Management Program, R-3 • Environmental Management System Plan References 30.targets, and Environmental Management Programs 6. Structure

  7. ORISE: Emergency Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management Emergency Management Effective emergency management relies on thorough integration of preparedness plans at all levels of government. The Oak Ridge Institute for Science...

  8. Presented by FACILITIES MANAGEMENT

    E-Print Network [OSTI]

    Meyers, Steven D.

    Presented by FACILITIES MANAGEMENT TRANSFORMING USF'S TAMPA CAMPUS SUMMER 2011 #12; WELCOME Facili:es Management #12; Facili:es Management #12; NEW CONSTRUCTION Facili

  9. Stargate: Energy Management Techniques

    E-Print Network [OSTI]

    Vijay Raghunathan; Mani Srivastava; Trevor Pering; Roy Want

    2004-01-01

    Stargate: Energy Management Techniques Vijay Raghunathan,Platform specific energy management is crucial for longSolution: System level energy management techniques and

  10. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    430.2B mandates an energy management program that considersSTAR® or Federal Energy Management Programs, and USDA-Environmental, Energy, and Transportation Management (

  11. Environmental Management System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

  12. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  13. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  14. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  15. Reorganized OSHA poses greater criminal threat to managers, EEI counsel warns

    SciTech Connect (OSTI)

    Not Available

    1980-09-01

    Power company managers will be more vulnerable to criminal charges under the reorganized Occupational Safety and Health Administration (OSHA) standards, according to an Edison Electric Institute lawyer. The number of willful citations and penalties for employee fatalities is increasing because OSHA is holding corporate executives criminally responsible for deliberate failure to meet the standards. Each company should have an adequate safety program that it can document. A four-step safety program should include a public commitment by management, records, documentation monitoring, and discretion in providing information to OSHA inspectors. Utilities will need to reallocate resources in response to OSHA's new focus on health standards, especially in cancer policy. (DCK)

  16. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    #12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines

  17. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23

    ), nitrogen (fertilizer), pesticides, oil and grease, concrete truck washout, and construction chemicals. Who Applies for Permits? Managers should designate an employee to be responsible for applying for the proper construction permits. The USEPA has labeled... of flowing water. When materials impervious to water, such as pavement and concrete, cover the ground or when soils are compacted, runoff increases. Differences between areas with natural ground cover (before urban development) and those with impervious...

  18. Environmental Management

    SciTech Connect (OSTI)

    2014-11-12

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  19. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  20. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....