Powered by Deep Web Technologies
Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

2

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

3

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

4

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

5

Disaster case management and individuals with disabilities  

E-Print Network [OSTI]

following the 9/11 Twin Towers disaster. Individuals receiving disability- related services were found to require case management for a longer length of time during the long-term recovery period and to be more likely to need housing or financial assistance... disaster case management program in U.S. history. Method Participants Case managers. Two groups of participants were used for data collection. The first group consisted of case managers at NDRN affiliate offices who provided direct support, such as lo...

Stough, Laura

2010-01-01T23:59:59.000Z

6

Evolutionary Document Summarization for Disaster Management  

E-Print Network [OSTI]

Evolutionary Document Summarization for Disaster Management Dingding Wang Li Zheng Tao Li Yi Deng,deng}@cs.fiu.edu ABSTRACT In this poster, we develop an evolutionary document summa- rization system for discovering the changes and differences in each phase of a disaster evolution. Given a collection of document streams

Li, Tao

7

Strategies for managing an environmental disaster  

SciTech Connect (OSTI)

The threat of an environmental disaster is a very real concern for chemical/petrochemical plants, or any corporation that moves or markets chemicals. This presentation is concerned with the top ten tips for managing an environmental disaster, including liability, debriefing employees, and cooperation with environmental agencies.

Carlson, J.E. [Brobeck, Phleger & Harrison, San Francisco, CA (United States)

1995-12-31T23:59:59.000Z

8

Workforce management strategies in a disaster scenario.  

SciTech Connect (OSTI)

A model of the repair operations of the voice telecommunications network is used to study labor management strategies under a disaster scenario where the workforce is overwhelmed. The model incorporates overtime and fatigue functions and optimizes the deployment of the workforce based on the cost of the recovery and the time it takes to recover. The analysis shows that the current practices employed in workforce management in a disaster scenario are not optimal and more strategic deployment of that workforce is beneficial.

Kelic, Andjelka; Turk, Adam L.

2008-08-01T23:59:59.000Z

9

Emergency Animal Management during Disasters  

E-Print Network [OSTI]

This publication explains how communities and counties can incorporate animal issues into their emergency management plans. It explains what local plans should include, what role county Extension agents can play, and how animal management plans can...

Dement, Angela

2006-10-23T23:59:59.000Z

10

Disaster case management: Disaster case management and individuals with disabilities following Hurricane Katrina  

E-Print Network [OSTI]

collected data from two groups; 47 case managers, who provided direct case management services to disaster survivors, and 12 case management supervisors, who oversaw the admin- istrative and managerial components of the program. All partici- pants were.... The telephone surveys conducted with each of the case man- agers and included 9 open-ended questions and 12 demographic questions. As part of the open-ended questions, case managers were asked to describe the biggest challenges that their clients...

Stough, Laura

2011-01-01T23:59:59.000Z

11

CONFIGURING A COLLABORATIVE VIRTUAL WORKSPACE FOR DISASTER MANAGEMENT OF  

E-Print Network [OSTI]

a strong impact on business. Oil & gas companies are thus continuously seeking to employ processesCONFIGURING A COLLABORATIVE VIRTUAL WORKSPACE FOR DISASTER MANAGEMENT OF OIL & GAS OFFSHORE workspace. Finally a prototype for oil & gas offshore structures disaster management based on our multi

Barbosa, Alberto

12

Emergency managers' perspectives of recruiting, training, and integrating volunteers for a disaster.  

E-Print Network [OSTI]

?? Disasters are increasing in intensity and frequency throughout the world, causing public safety organizations to become more involved in disaster management. The purpose of… (more)

Carley, Willie K.

2015-01-01T23:59:59.000Z

13

A Context Driven Information Retrieval for Online Urban Disaster Management System  

E-Print Network [OSTI]

A Context Driven Information Retrieval for Online Urban Disaster Management System Khaldoun ZREIK of Disaster Managing Approaches depends firmly on information and communication management system. Due to the interactive decision board, an optimised Data Base Management System, a light Geographical Information System

Paris-Sud XI, Université de

14

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

15

Mobile medical disaster relief technology : enhancing communication, medical logistics, data creation, and crisis mapping for vulnerable communities  

E-Print Network [OSTI]

This thesis explores the field of disaster relief and recovery, and the application of emerging technologies that are both used by, and use the data generated by communities affected by natural disaster. This thesis analyzes ...

Intrator, Kira (Kira Rachel)

2012-01-01T23:59:59.000Z

16

Managing the risks of extreme events and disasters to advance climate change adaptation. Special report of the Intergovernmental Panel on Climate Change (IPCC)  

SciTech Connect (OSTI)

This Special Report on Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation (SREX) has been jointly coordinated by Working Groups I (WGI) and II (WGII) of the Intergovernmental Panel on Climate Change (IPCC). The report focuses on the relationship between climate change and extreme weather and climate events, the impacts of such events, and the strategies to manage the associated risks. This Special Report, in particular, contributes to frame the challenge of dealing with extreme weather and climate events as an issue in decision making under uncertainty, analyzing response in the context of risk management. The report consists of nine chapters, covering risk management; observed and projected changes in extreme weather and climate events; exposure and vulnerability to as well as losses resulting from such events; adaptation options from the local to the international scale; the role of sustainable development in modulating risks; and insights from specific case studies. (LN)

Field, C.B.; Barros, V.; Stocker, T.F. (and others)

2012-07-01T23:59:59.000Z

17

Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile Devices  

E-Print Network [OSTI]

Applying Data Mining Techniques to Address Disaster Information Management Challenges on Mobile a collaborative solution on a mobile platform using advanced data mining and information retrieval techniques.8 [Database Applications]: Data mining; H.3.3 [Information Search and Retrieval]: Clustering; H.3.5 [Online

Chen, Shu-Ching

18

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

19

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

20

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

22

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

23

Counting on Solar Power for Disaster Relief: Federal Energy Management Program (FEMP) Technical Assistance Fact Sheet  

SciTech Connect (OSTI)

When disaster strikes, electric power is usually the first critically important service to be lost. After several years of research and development, portable electric generator sets (gensets) are now entering the marketplace. The new gensets make use of solar electric panels known as photovoltaics (PV) to produce electricity. These gensets are reliable, safe to operate, highly mobile and will supply much-needed power for emergency response teams.

NONE

1999-04-01T23:59:59.000Z

24

Climate Vulnerability, Risk assessment and management in a Post-Kyoto PI: Gunter Stephan  

E-Print Network [OSTI]

the industrialized to the developing countries are viewed as key elements in combating climate change, since change? How do climate change, discounting and population growth interact? What disasters, and (2) how insurance companies act in order to cope with the risk of climate change. Based upon

Richner, Heinz

25

E-Print Network 3.0 - accelerator disaster scenarios Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

resilience as function of losses... , communities, regions, etc.) are vulner- able to natural disasters of various kinds such as human errors... and organizations in face of...

26

Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework  

SciTech Connect (OSTI)

In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

2012-07-01T23:59:59.000Z

27

Puerto Rico Disaster Decision Support Tool  

E-Print Network [OSTI]

Puerto Rico Disaster Decision Support Tool: An innovative step towards community resilience Support Tool Pilot Internet-based scalable mapping server Emergency management geo-referenced information for all municipalities in Puerto Rico #12;Disaster Decision Support Tool (DDST) What is a GIS

Firestone, Jeremy

28

International cooperation for disaster management -- Romanian-American experience in the achievement of a joint exercise using decision support tools for radiological emergency  

SciTech Connect (OSTI)

International coordination and cooperation is rewarding but at the same time very challenging. This paper will discuss the Romanian perspective on technology transfer, its problems and its advantages. Further, the discussion will take place in the context of preparing for an international conference while at the same time exchanging civil defense expertise. The American perspective on the same subject will also be presented with healthy doses of mutual explanations. The final portion of the paper will present the joint lessons learned from the newly created interfaces and what it holds for the future. The paper aims to present the Romanian and American experts` opinion about the demonstration of using computer technology for helping the international cooperation in the field of disaster management.

Qualls, J.R. [Army Space and Strategic Defense Command, Huntsville, AL (United States); Botirca, R.; Gabor, A.; Miron, A. [Civil Defense Command, Bucharest (Romania)

1995-12-31T23:59:59.000Z

29

On the robustness of network infrastructures to disasters and physical attacks  

E-Print Network [OSTI]

Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

Neumayer, Sebastian James

2013-01-01T23:59:59.000Z

30

Towards a Business Continuity Information Network for Rapid Disaster Recovery  

E-Print Network [OSTI]

study. Categories and Subject Descriptors H.3.4 [Information Storage and Retrieval]: Systems conducted for crisis management under terrorist attacks and emergency management services under natural propose a model for pre-disaster preparation and post-disaster business continuity/rapid recovery

Chen, Shu-Ching

31

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

32

Proceedings Hazards and Disasters  

E-Print Network [OSTI]

Liang-Chun Chen, Jie-Ying Wu, Yi-Chung Liu, Sung-Ying Chien HAZARDS EDUCATION BY GEOGRAPHERS: A DECADE-DISASTER CONDOMINIUM HOUSING RECONSTRUCTION AND HOUSEHOLD CHARACTERISTICS............. 35 Jie-Ying Wu, Liang-Chun Chen

Wang, Hai

33

wind engineering & natural disaster mitigation  

E-Print Network [OSTI]

wind engineering & natural disaster mitigation #12;wind engineering & natural disaster mitigation Investment WindEEE Dome at Advanced Manufacturing Park $31million Insurance Research Lab for Better Homes $8million Advanced Facility for Avian Research $9million #12;wind engineering & natural disaster mitigation

Denham, Graham

34

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

35

When Materials Matter--Analyzing, Predicting, and Preventing Disasters  

SciTech Connect (OSTI)

The mission of the Architectural Surety{trademark} program at Sandia National Laboratories is to assure the performance of buildings, facilities, and other infrastructure systems under normal, abnormal, and malevolent threat conditions. Through educational outreach efforts in the classroom, at conferences, and presentations such as this one, public and professional awareness of the need to defuse and mitigate such threats is increased. Buildings, airports, utilities, and other kinds of infrastructure deteriorate over time, as evidenced most dramatically by the crumbling cities and aging buildings, bridges, and other facility systems. Natural disasters such as tornadoes, earthquakes, hurricanes, and flooding also stress the materials and structural elements of the built environment. In addition, criminals, vandals, and terrorists attack federal buildings, dams, bridges, tunnels, and other public and private facilities. Engineers and architects are beginning to systematically consider these threats during the design, construction, and retrofit phases of buildings and infrastructures and are recommending advanced research in new materials and techniques. Existing building codes and standards do not adequately address nor protect the infrastructure or the public from many of these emerging threats. The activities in Sandia National Laboratories' Architectural Surety{trademark} efforts take a risk management approach to enhancing the safety, security, and reliability of the constructed environment. The technologies and techniques developed during Sandia's 50 years as the nation's lead laboratory for nuclear weapons surety are now being applied to assessing and reducing the vulnerability of dams, to enhancing the safety and security of staff in foreign embassies, and assuring the reliability of other federal facilities. High consequence surety engineering and design brings together technological advancements, new material requirements, systems integration, and risk management to improve the safety, security, and reliability of the as-built environment. The thrust of this paper is the role that new materials can play in protecting the infrastructure. Retrofits of existing buildings, innovative approaches to the design and construction of new facilities, and the mitigation of consequences in the event of an unpreventable disaster are some of the areas that new construction materials can benefit the Architectural Surety{trademark} of the constructed environment.

MATALUCCI,RUDOLPH V.; O'CONNOR,SHARON

2000-08-24T23:59:59.000Z

36

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

37

Role of Mass Media in the Disaster Preparedness and Sustainable Development of Society  

SciTech Connect (OSTI)

Better understanding of the causes and effects of large earthquakes can assists in mitigation of damage and loss of lives as a result of destructive natural events. Well-informed and educated population living in geological hazard-prone regions can reduce catastrophic consequences of natural disasters and guaranty the sustainable development of healthy society. A development of information service for disaster management is of importance in reduction of the disaster's consequences.

Seid-Aliyeva, Dinara E. [Geology Institute, Azerbaijan National Academy of Sciences, 29A, H. Javid Ave., Baku 1143 (Azerbaijan)

2006-03-23T23:59:59.000Z

38

Recovery and Resilience After a Nuclear Power Plant Disaster: A Medical Decision model for Managing an Effective, Timely, and Balanced Response  

SciTech Connect (OSTI)

Based on experiences in Tokyo responding to the Fukushima Daiichi nuclear power plant crisis, a real-time, medical decision model is presented by which to make key health-related decisions given the central role of health and medical issues in such disasters. Focus is on response and recovery activities that are safe, timely, effective, and well-organized. This approach empowers on-site decision makers to make interim decisions without undue delay using readily available and high-level scientific, medical, communication, and policy expertise. Key features of this approach include ongoing assessment, consultation, information, and adaption to the changing conditions. This medical decision model presented is compatible with the existing US National Response Framework structure.

Coleman, C. Norman [National Cancer Institute, NIH; Blumenthal, Daniel J. [National Nuclear Security Administration (NNSA), Department of Energy

2013-05-01T23:59:59.000Z

39

HUD National Disaster Resilience Competition  

Broader source: Energy.gov [DOE]

The U.S. Department of Housing and Urban Development (HUD) is making $1 billion in HUD Disaster Recovery funds available to eligible communities.

40

Preventing Fraud Following a Disaster  

E-Print Network [OSTI]

After a natural disaster, people may be susceptible to price gouging, home repair fraud and identity theft. This publication explains how to protect yourself from these problems....

Cavanagh, Joyce

2005-10-11T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Obtaining Disaster Assistance  

E-Print Network [OSTI]

? call TTY: 1-800-462-7585). You also may apply online at www.fema.gov (by clicking on ?Online Individual As- sistance Center?). FEMA does not accept applications through the mail; nor can they be completed at Disaster Recovery Centers (unless a Center...). If FEMA determines you are not eligible for assistance, you will receive a letter explaining why you were denied and how to appeal. Appeals must be made in writing and mailed within 60 days of FEMA?s decision. If you have insurance, you should contact...

Cavanagh, Joyce

2008-09-24T23:59:59.000Z

42

Wind Engineering & Natural Disaster Mitigation  

E-Print Network [OSTI]

Wind Engineering & Natural Disaster Mitigation For more than 45 years, Western University has been internationally recognized as the leading university for wind engineering and wind- related research. Its of environmental disaster mitigation, with specific strengths in wind and earthquake research. Boundary Layer Wind

Denham, Graham

43

V-125: Cisco Connected Grid Network Management System Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

44

T-614: Cisco Unified Communications Manager Database Security...  

Energy Savers [EERE]

614: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

45

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

46

National Disaster Resilience Competition Webinar  

Broader source: Energy.gov [DOE]

Communities recovering from natural disasters have an important choice: rebuild damaged areas as they were, or put investments and policy changes in place that help them to be more resilient to...

47

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

48

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

49

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Broader source: Energy.gov (indexed) [DOE]

Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli...

50

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Broader source: Energy.gov (indexed) [DOE]

IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation...

51

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

52

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

53

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

54

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

55

Historical and projected costs of natural disasters  

SciTech Connect (OSTI)

Natural disasters cause billions of dollars of damage and thousands Of deaths globally each year. While the magnitude is clear, the exact costs (in damage and fatalities) are difficult to clearly identify. This document reports on the results of a survey of data on the costs associated with significant natural disasters. There is an impressive amount of work and effort going into natural disaster research, mitigation, and relief. However, despite this effort, there are surprisingly few consistent and reliable data available regarding the effects of natural disasters. Even lacking consistent and complete data, it is clear that the damage and fatalities from natural disasters are increasing, both in the United States, and globally. Projections using the available data suggest that, in the United States alone, the costs of natural disasters between 1995 and 2010 will be in the range of $90 billion (94$) and 5000 lives.

Engi, D.

1995-04-01T23:59:59.000Z

56

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

57

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

58

Vulnerability, Risk Management, and Agricultural Development  

E-Print Network [OSTI]

P. (1980). “Attitudes Towards Risk: Experimental MeasurementIncentive Flexibility, and Risk. ” Americal Journal ofCaria, A. S. (2009), Risk Attitudes and The Formation of

Fafchamps, Marcel

2009-01-01T23:59:59.000Z

59

From Tragedy to Triumph - Rebuilding Green Buildings after Disaster...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Rebuilding Green Buildings after Disaster, EERE (Fact Sheet) From Tragedy to Triumph - Rebuilding Green Buildings after Disaster, EERE (Fact Sheet) Fact sheet offering practical...

60

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Australia's Humanitarian Action Policy and Disaster Risk Reduction Policy  

E-Print Network [OSTI]

to get more information Disaster Risk Reduction Team Disaster Prevention and Risk Reduction Section GrantAustralia's Humanitarian Action Policy and Disaster Risk Reduction Policy A Commitment: · Disaster risk reduction is integrated into the Australian aid program · Capacity of partner governments

Botea, Adi

62

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

63

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

64

Modeling Dynamics of Post Disaster Recovery  

E-Print Network [OSTI]

Subject: Civil Engineering iii ABSTRACT Modeling Dynamics of Post Disaster Recovery. (August 2011) Ali Nejat, B.S., Zanjan University, Zanjan, Iran; M.S., Islamic Azad University, Tehran, Iran Chair of Advisory Committee: Dr. Ivan Damnjanovic... MODELING DYNAMICS OF POST DISASTER RECOVERY A Dissertation by ALI NEJAT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Nejat, Ali

2012-10-19T23:59:59.000Z

65

Do Disaster Expectations Explain Household Portfolios?  

E-Print Network [OSTI]

durable ex- penditure information; and ?nally, the Panel Study of Income Dynamics (1983-1994) that allows me to calibrate group speci?c income process parameters. Limited het- 3 erogeneity in all parameters is allowed for by estimating the structural... innovations to excess return to be correlated with innovations to per- manent or transitory income in normal market times. Allowing for such a correlation is straightforward and would reduce the ex-ante disaster probability and disaster size needed to match...

Alan, Sule

66

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

67

School Disaster Needs for Students with Disabilities: Voices from the Field  

E-Print Network [OSTI]

10 School Disaster Planning ………………………………………………………. ……… 15about Knowledge of School Disaster Preparedness … 59STEPS, Los Angeles Unified School District. Borum, R. ,

Barnes, Jill M.

2013-01-01T23:59:59.000Z

68

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

69

attack disaster preparedness: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and other disaster-specific information. The app is free to download 12 Climate change in the Western Cape : a disaster risk assessment of the impact on human health. Open...

70

UNEP MOOC Disasters and Ecosystems: Resilience in a Changing Climate  

Broader source: Energy.gov [DOE]

The United Nations Environment Programme (UNEP) is launching the first Massive Open Online Course (MOOC) on Disasters and Ecosystems, which features ecosystem-based solutions for disaster risk reduction and climate change adaptation, case studies, guest speakers, etc.

71

The AROUND project: Adapting robotic disaster response to developing countries  

E-Print Network [OSTI]

Reduction (WCDR) [20] stresses this necessity in points no 89 ("Advanced technologies for disaster reduction hazards. As a consequence, in cities like Hanoi, not only are disasters (floods, storms, cyclones, fires

Boyer, Edmond

72

Patents to the Rescue - Disasters and Patent Law  

E-Print Network [OSTI]

The patent system can play a vital role in preparing for, mitigating, reacting to, and preventing disasters. In the far term, it ensures that society continually improves its technological capacity to deal with disasters. In the near term...

Torrance, Andrew W.

2007-01-01T23:59:59.000Z

73

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

74

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

75

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

76

Nuclear Catastrophe, Disaster-Related Environmental Injustice, and Fukushima, Japan  

E-Print Network [OSTI]

Nuclear Catastrophe, Disaster-Related Environmental Injustice, and Fukushima, Japan: Prima the 2011 Japanese Fukushima-Daiichi nuclear disaster (FD) as a preliminary case study-- despite the limits Fukushima-Daiichi (FD) nuclear accident to explain disaster-related environmental injustice (DREI

Shrader-Frechette, Kristin

77

After a Disaster: Recovery Safety Tips  

E-Print Network [OSTI]

. Natural gas leaks are the top cause of fires after a disaster. That is why you never turn gas back on by yourself. Contact your local utility company for a trained professional to restore your gas service. ? Prevent carbon monoxide poisoning. Carbon... Disaster: Recovery Safety Tips enclosed area ? even if the area has ventilation. Opening doors and windows or using fans will not prevent carbon monoxide from building up in the home. If you start to feel sick, dizzy, or weak while using a generator...

FCS Project Team - FDRM UNIT

2005-09-30T23:59:59.000Z

78

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

79

A longitudinal study of emerging networks during natural disaster  

E-Print Network [OSTI]

We present longitudinal analysis of the evolution of inter-organizational disaster coordination networks during natural disasters. We suggest that social networks are a useful paradigm for exploring this complex phenomenon from both theoretical and methodological perspective aiming to develop a quantitative assessment framework which could aid in developing a better understanding of the optimal functioning of these emerging inter-organizational networks during natural disasters. We highlight the importance of network metrics in order to investigate disaster response coordination networks. Results suggest that in disasters, rate of communication increases and creates the conditions where organizational structures need to move at that same pace to exchange new information.

Abbasi, Alireza; Kapucu, Naim

2015-01-01T23:59:59.000Z

80

Hurricane/Disaster Checklist Stockpile Water!!  

E-Print Network [OSTI]

with water, including heavy contractor garbage bags o Purchase bottled water for drinking o Fill the (clean1 Hurricane/Disaster Checklist · Stockpile Water!! o Fill up as many containers as possible) bath tubs and sinks with fresh water · Get $cash, enough for food and flights out of Oahu, etc. · Gas

Wang, Yuqing

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Obtaining Disaster Assistance for Public Infrastructure (Spanish)  

E-Print Network [OSTI]

%20Health%20Disaster%20Relief% 2%20Recovery%20Grant.pdf Algunos de los elegibles para este programa son: ? Hospitales rurales en condados con poblaciones de 150,000 o menos y que han sido designadas como ?reas de Escasos Recursos M?dicos (MUA) o...

Taylor, Greg

2007-10-08T23:59:59.000Z

82

Disaster Resiliency and Recovery: Capabilities (Fact Sheet)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) is the nation's leader in energy efficient and renewable energy technologies, practices, and strategies. For the last 15 years, NREL has provided expertise, tools, and innovations to private industry; federal, state, and local governments; non-profit organizations; and communities during the planning, recovery, and rebuilding stages after disaster strikes.

Not Available

2012-11-01T23:59:59.000Z

83

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

84

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

85

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

86

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

87

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

88

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

89

Disaster: would your community bounce back?  

SciTech Connect (OSTI)

What makes some communities or organizations able to quickly bounce back from a disaster, while others take a long time to recover? This question has become very important for emergency planners in federal, state, and local government - particularly since the 9/11 attacks and Hurricane Katrina, which nearly destroyed New Orleans five years ago. These events have made people aware that we can't always prevent disasters, but might be able to improve the ability of communities and regions to respond to and bounce back from major disruptions. Social scientists have found that most communities are, in fact, quite resilient to most disasters. People tend to work together, overcome divisions, identify problems, and develop improvised solutions. This often leads to a greater sense of community and a sense of personal accomplishment. Long-term recovery can be harder, but rebuilding can create jobs and stimulate economies. Communities may even end up better than they were before. But there are some disturbing exceptions to this trend, including Hurricane Katrina. The hurricane killed many people, the federal and local emergency response was not effective, people who could not evacuate were housed in the Superdome and Convention Center in terrible conditions, crime was prevalent, and local government did not appear to have control over the situation. A significant portion of the population was eventually evacuated to other cities. Even five years later, many people have not returned, and large parts of the city have not been rebuilt. Clearly, New Orleans lacked sufficient resilience to overcome a disaster of the magnitude of Katrina. There are four factors that social scientists are beginning to agree are important for community resilience: (1) A strong, diverse economy - Stable jobs, good incomes, diversity of industries, personal savings; (2) Robust social networks - Community members know each other, help each other, and have connections outside the community; (3) Competent organizations - Government, health care, community service, and religious organizations are competent and trustworthy, and have resources to handle community needs; and (4) High-quality infrastructure - Road, power, and water systems (etc.) are in good condition and are designed to provide service even if some connections are destroyed. To explore how these factors make communities resilient, I will tell two stories of disasters. The first is the Buffalo Creek flood, which wiped out a coal mining community in West Virginia in 1972. This is a classic example of community that was not resilient in the aftermath of a disaster. The second example is the Vietnamese immigrant community in the Versailles neighborhood of New Orleans. In spite of being relatively poor and culturally isolated, this community was one of the first to fully rebound following Hurricane Katrina.

Sims, Benjamin H [Los Alamos National Laboratory

2011-01-12T23:59:59.000Z

90

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

91

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

92

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

93

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

94

Needs for Robotic Assessments of Nuclear Disasters  

SciTech Connect (OSTI)

Following the nuclear disaster at the Fukushima nuclear reactor plant in Japan, the need for systems which can assist in dynamic high-radiation environments such as nuclear incidents has become more apparent. The INL participated in delivering robotic technologies to Japan and has identified key components which are needed for success and obstacles to their deployment. In addition, we are proposing new work and methods to improve assessments and reactions to such events in the future. Robotics needs in disaster situations include phases such as: Assessment, Remediation, and Recovery Our particular interest is in the initial assessment activities. In assessment we need collection of environmental parameters, determination of conditions, and physical sample collection. Each phase would require key tools and efforts to develop. This includes study of necessary sensors and their deployment methods, the effects of radiation on sensors and deployment, and the development of training and execution systems.

Victor Walker; Derek Wadsworth

2012-06-01T23:59:59.000Z

95

Policy Network Approach to Coordinated Disaster Response  

E-Print Network [OSTI]

In this paper, we explore the formation of network relationships among disaster relief agencies during the process of responding to an unexpected event. The relationship is investigated through variables derived from the policy network theory, and four cases from three developed countries such as (i) Hurricane Katrina in the US; (ii) Typhoon Maemi in South Korea; (iii) Kobe; and, (iv) Tohoku Earthquake in Japan that failed to cope with extreme events forms the basis for case study presented here. We argue that structural characteristics of multi-jurisdictional coordination may facilitate or impede in responding to a complex nature of recent disaster. We further highlight the promise of policy network approach in facilitating the development of multi-jurisdictional coordination process which may provide new avenue to improve the communication and coordination of hierarchical command control driven organizations with the local community. Our proposed novel approach in investigating the usefulness of network app...

Kim, Kwang Deok

2013-01-01T23:59:59.000Z

96

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

97

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

98

Crowd Disasters as Systemic Failures: Analysis of the Love Parade Disaster  

E-Print Network [OSTI]

Each year, crowd disasters happen in different areas of the world. How and why do such disasters happen? Are the fatalities caused by relentless behavior of people or a psychological state of panic that makes the crowd 'go mad'? Or are they a tragic consequence of a breakdown of coordination? These and other questions are addressed, based on a qualitative analysis of publicly available videos and materials, which document the planning and organization of the Love Parade in Duisburg, Germany, and the crowd disaster on July 24, 2010. Our analysis reveals a number of misunderstandings that have widely spread. We also provide a new perspective on concepts such as 'intentional pushing', 'mass panic', 'stampede', and 'crowd crushs'. The focus of our analysis is on the contributing causal factors and their mutual interdependencies, not on legal issues or the judgment of personal or institutional responsibilities. Video recordings show that, in Duisburg, people stumbled and piled up due to a 'domino effect', resulting from a phenomenon called 'crowd turbulence' or 'crowd quake'. Crowd quakes are a typical reason for crowd disasters, to be distinguished from crowd disasters resulting from 'panic stampedes' or 'crowd crushes'. In Duisburg, crowd turbulence was the consequence of amplifying feedback and cascading effects, which are typical for systemic instabilities. Accordingly, things can go terribly wrong in spite of no bad intentions from anyone. Comparing the incident in Duisburg with others, we give recommendations to help prevent future crowd disasters. In particular, we introduce a new scale to assess the criticality of conditions in the crowd. This may allow preventative measures to be taken earlier on. Furthermore, we discuss the merits and limitations of citizen science for public investigation, considering that today, almost every event is recorded and reflected in the World Wide Web.

Dirk Helbing; Pratik Mukerji

2012-06-25T23:59:59.000Z

99

Data-driven resource allocation decisions : FEMA's disaster recovery centers  

E-Print Network [OSTI]

Resource allocation decisions in post-disaster operations are challenging because of situational dynamics, insufficient information, organizational culture, political context, and urgency. We propose a methodology to create ...

Moline, Julia N. (Julia Nessa)

2014-01-01T23:59:59.000Z

100

Disaster Response and Recovery Webinar | Department of Energy  

Energy Savers [EERE]

Department of Health and Human Services to evaluate, assess, and mitigate the impacts of climate change on their disaster recovery and response programs. Under the Stafford Act,...

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

102

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

103

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Broader source: Energy.gov (indexed) [DOE]

Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS:...

104

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

105

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

106

E-Print Network 3.0 - amsterdam air disaster Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and the "human error" can cause technological disasters (such as air crashes, automobile... hazard and risk assessment" Abstract. Almost every natural disaster is...

107

National Disaster Resilience Competition Webinar Series: Long-Term Commitment Factor  

Broader source: Energy.gov [DOE]

The U.S. Department of Housing and Urban Development (HUD) is hosting the National Disaster Resilience Competition Webinar Series to foster awareness about the National Disaster Resilience...

108

Becoming Resilient: Disaster Planning and Recovery: NREL Experts Assist Before and After a Disaster (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet provides information on how private industry; federal, state, and local governments; non-profit organizations; and communities can utilize NREL's expertise, tools, and innovations to incorporate energy efficiency and renewable energy into the planning, recovery, and rebuilding stages of disaster.

Hotchkiss, E.

2014-08-01T23:59:59.000Z

109

American Red Cross VOLUNTEER SERVICE AGREEMENT FOR DISASTER OPERATIONS  

E-Print Network [OSTI]

American Red Cross VOLUNTEER SERVICE AGREEMENT FOR DISASTER OPERATIONS I and maintenance costs will be reimbursed by the American Red Cross, pursuant to Staff Reimbursement Procedures the American Red Cross while I am performing disaster relief work. Furthermore, I understand and accept that

Wu, Shin-Tson

110

Collaborative Post-Disaster Damage Mapping via Geo Web Services  

E-Print Network [OSTI]

with geospatial services that can interact in a loosely coupled envir- onment and be used to create more suitable architecture for a collaborative post-disaster damage mapping system. We focus particularly on satellite image-based post-disaster support situations, and present our ideas for a prototype based on this architecture

Köbben, Barend

111

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

112

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

113

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

114

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

115

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

116

Probabilistic Management of Slope Disaster Detection Systems for  

E-Print Network [OSTI]

will be sent to a base station through wireless interactions between the nodes, and each sensor node can also with lithium-ion batteries and is expected to work for more than two years. However, the running life is still

Hespanha, Joăo Pedro

117

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

118

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

119

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

120

Ecological disaster in Kuwait; A burning question  

SciTech Connect (OSTI)

Six million barrels of oil are going up in smoke each day in Kuwait, dumping 3.7 million pounds of toxic gases, soot, and smoke - including cancer-causing compounds - into the air each hour. This paper reports that the prognosis for the situation is dim. Even as specialized firefighting companies from the United States and Canada began arriving in Kuwait in March, oil officials there predicted dousing the fires would take at least two years and pumping up oil production to pre-war levels would take between five and 10 years. An oil well fire is a disaster. The effect on the ozone, the ecology, the marine life is massive. We aren't even breathing air here, we're just breathing smog.

Wray, T.K. (Waste Away Services, Perrysburg, OH (US))

1991-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

122

Healthcare MBA Prepare to Find Healthcare Management Solutions  

E-Print Network [OSTI]

.5 Macroeconomics for the Global Economy 1.5 International Management 1.5 Management of Information Systems 1 and Healthcare 1.5 Disaster Management in Healthcare Organizations 1.5 Quality and Performance Improvement 1Healthcare MBA onLine #12;Prepare to Find Healthcare Management Solutions Healthcare is changing

Vertes, Akos

123

Leading a lean transformation in the wake of a disaster  

E-Print Network [OSTI]

Through a disaster, a company is presented with an opportunity to leverage the momentum from recovery efforts to drastically change the way business is conducted. In the case of Raytheon's Solid State Microwave division, ...

Caballero, Christian G. (Christian Gabriel)

2005-01-01T23:59:59.000Z

124

Lights, camera, emergency : preemptive planning for disaster relief  

E-Print Network [OSTI]

With increasing frequency and accuracy, the prediction of natural disasters and their effects are being charted. Their impendence is a certainty and yet we ignore the warnings, the lessons of the past, and the prominence ...

Weiss, Erica A

2010-01-01T23:59:59.000Z

125

Cytogenetic study of population three years after the Chernobyl disaster  

SciTech Connect (OSTI)

Studies after the Chernobyl Disaster revealed an increased level of chromosome aberrations in cultured lymphocytes of the inhabitants of the radiation-polluted regions. This work estimates the resolution capacity of a method of accounting for chromosomal aberrations in human lymphocyte culture. The results reveal population effects of low-dose chronic irradiation by radioactive sediments three and more years after the Chernobyl Disaster. 13 refs., 2 tabs.

Bochkov, N.P.; Katosova, L.D.; Platonova, V.I. [Research Center for Medical Genetics, Moscow (Russian Federation)] [and others

1995-11-01T23:59:59.000Z

126

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

127

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:|

128

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery7:| Department

129

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthenticationEnergy

130

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |

131

V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is aDepartmentDepartment

132

LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS  

SciTech Connect (OSTI)

The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

Ray Fink

2006-10-01T23:59:59.000Z

133

Health consequences of Chernobyl disaster in Europe in general and in Norway in particular. Literature review and ecological study.  

E-Print Network [OSTI]

??Health costs of Chernobyl disaster are still not clear.Main goal of this paper therefore is to investigate health consequences of Chernobyl disaster in Europe (outside… (more)

Fedorov, Roman

2012-01-01T23:59:59.000Z

134

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

135

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

136

The application of Intelligent Transportation Systems (ITS) and Information Technology systems to disaster response  

E-Print Network [OSTI]

Disaster response operations during recent terrorist attacks and natural disasters have been a cause for concern. Lack of planning is one source of difficulties with these operations, but even if a perfect plan is agreed ...

Pinelis, Lev

2006-01-01T23:59:59.000Z

137

Rights-based evaluation of government responses to a given 'natural' disaster : Katrina as case study  

E-Print Network [OSTI]

Disaster impacts human mobility and a rights-based approach to disaster response is needed to protect the human rights of those who seek migration as an adaptation strategy. This paper deals with returning to a place after ...

Haeffner, Melissa (Melissa Ann)

2010-01-01T23:59:59.000Z

138

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

139

Emergency Medical Services Management (EMSM) is an online bachelor's degree that prepares emergency medical service providers for management, educational  

E-Print Network [OSTI]

Operations Management in EHS Systems EHS 4111 Leadership Concepts in EHS EHS 4112 Special Operations & Disaster Management EHS 4144 Seminar in EHS Leadership HSCI 2103 Health Policy and the Health Care System HSCI 2104 Management of Health Science Services HSCI 2108 Quality Improvement in Health Care HSCI 2112W

Vertes, Akos

140

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

142

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

143

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

144

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

145

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

146

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

147

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

148

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

149

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

150

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

151

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

152

T-581: Novell Access Manager Java Double Literal Denial of Service...  

Broader source: Energy.gov (indexed) [DOE]

Vulnerability Report: Novell Access Manager 3.x Oracle FPUpdater Tool IMPACT ASSESSMENT: Medium Discussion: The Double.parseDouble method in Java Runtime Environment in Oracle...

153

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

154

T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

155

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

156

Adaptive management: a paradigm for remediation of public facilities  

SciTech Connect (OSTI)

Public facility restoration planning traditionally focused on response to natural disasters and hazardous materials accidental releases. These plans now need to integrate response to terrorist actions. Therefore, plans must address a wide range of potential vulnerabilities. Similar types of broad remediation planning are needed for restoration of waste and hazardous material handling areas and facilities. There are strong similarities in damage results and remediation activities between unintentional and terrorist actions; however, the uncertainties associated with terrorist actions result in a re-evaluation of approaches to planning. Restoration of public facilities following a release of a hazardous material is inherently far more complex than in confined industrial settings and has many unique technical, economic, social, and political challenges. Therefore, they arguably involve a superset of drivers, concerns and public agencies compared to other restoration efforts. This superset of conditions increases complexity of interactions, reduces our knowledge of the initial conditions, and even condenses the timeline for restoration response. Therefore, evaluations of alternative restoration management approaches developed for responding to terrorist actions provide useful knowledge for large, complex waste management projects. Whereas present planning documents have substantial linearity in their organization, the 'adaptive management' paradigm provides a constructive parallel operations paradigm for restoration of facilities that anticipates and plans for uncertainty, multiple/simUltaneous public agency actions, and stakeholder participation. Adaptive management grew out of the need to manage and restore natural resources in highly complex and changing environments with limited knowledge about causal relationships and responses to restoration actions. Similarities between natural resource management and restoration of a facility and surrounding area(s) after a disruptive event suggest numerous advantages over preset linearly-structured plans by incorporating the flexibility and overlap of processes inherent in effective facility restoration. We discuss three restoration case studies (e.g., the Hart Senate Office Building anthrax restoration, Rocky Flats actinide remediation, and hurricane destruction restoration), that implement aspects of adaptive management but not a formal approach. We propose that more formal adoption of adaptive management principles could be a basis for more flexible standards to improve site-specific remediation plans under conditions of high uncertainty.

Janecky, David R [Los Alamos National Laboratory; Whicker, Jeffrey J [Los Alamos National Laboratory; Doerr, Ted B [NON LANL

2009-01-01T23:59:59.000Z

157

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

158

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

159

Exploring Humanoid Robots Locomotion Capabilities in Virtual Disaster Response Scenarios  

E-Print Network [OSTI]

since the Fukushima Daiichi nuclear power plant accident that followed the 2011 Great East JapanExploring Humanoid Robots Locomotion Capabilities in Virtual Disaster Response Scenarios Karim-like motor skills to be achieved. We use virtual scenes under the fully- 3D-modeled-environment assumption

Paris-Sud XI, Université de

160

Water is Vital--Especially after a Disaster  

E-Print Network [OSTI]

Dehydration can be a serious threat after a disaster, when supplies of clean drinking water may be limited. Learn how you can find and use hidden sources of water in your home and purify water to make it safe for drinking....

Crocker, Andrew

2005-10-10T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Natural Disaster Survey Report Ft. Smith and Van Buren, Arkansas,  

E-Print Network [OSTI]

and conversations with volunteer amateur radio operators, members of the print and broadcast media in Ft. Smith to the U.S. Congress, to local government officials in Ft. Smith and Van Buren, and to the media on May 21Natural Disaster Survey Report Ft. Smith and Van Buren, Arkansas, Tornado of April 21, 1996 U

162

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

of California. This paper describes the development and results from an integrated water resource management application includes management of reservoirs, run-of-river hydropower plants, water supply demand locations. Reservoir operations adapt to capture earlier and greater runoff volumes that result from earlier

163

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

164

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

165

Obtaining Disaster Assistance for Public Infrastructure  

E-Print Network [OSTI]

?s Divi- sion of Emergency Management. FEMA will communicate with local governments about the process of ap- plying under its Public Assistance Program. The information also is found on the FEMA Web site http://www.fema.gov/rrr/pa/. Eligible applicants... Public Assistance pro- gram, the FEMA Hazard Mitigation Grant Program (HMGP), and other aid programs. USDA Rural Development assistance for water infrastructure may be available through Emer- gency Community Water Assistance Grants. http://www.usda.gov...

Taylor, Greg

2005-10-10T23:59:59.000Z

166

D I S A S T E R R I S K M A N A G E M E N T S E R I E S  

E-Print Network [OSTI]

, Vulnerability, and the Global Economy 3 Charlotte Benson and Edward Clay 2. Natural Hazard Risk xi Editors' Note xiv Part I Globalization and the Economic Impacts of Disasters 1. Disasters. Globalization and Natural Disasters: An Integrative Risk Management Approach 57 Torben Juul Andersen 5. Urban

167

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

168

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

169

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

170

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

171

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

172

4 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY  

E-Print Network [OSTI]

4 ARE YOU READY? FEDERAL EMERGENCY MANAGEMENT AGENCY Emergency Planning and Disaster Supplies if you have questions. #12;FEDERAL EMERGENCY MANAGEMENT AGENCY ARE YOU READY? 5 9. Take a first aid and when to shut off water, gas, and electricity at the main switches. Consult with your local utili- ties

Tullos, Desiree

173

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

174

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

175

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

176

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

177

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

178

A COMPUTABLE GENERAL EQUILIBRIUM ANALYSIS OF THE ECONOMIC EFFECTS OF THE CHERNOBYL NUCLEAR DISASTER.  

E-Print Network [OSTI]

??This research focused on some of the major consequences of the Chernobyl nuclear disaster and their effect on the Ukrainian economy. Specifically, it focused on… (more)

Konovalchuk, Vladimir

2006-01-01T23:59:59.000Z

179

V-192: Symantec Security Information Manager Input Validation...  

Broader source: Energy.gov (indexed) [DOE]

Input Validation Flaws U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks T-731:Symantec IM Manager Code Injection Vulnerability...

180

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Talking About Disaster: Guide for Standard Messages 1 Talking About Disaster  

E-Print Network [OSTI]

Fire Extinguishers March 2007 188 Arc-Fault Circuit Interrupters (AFCIs) March 2007 189 Home Fire Earthquakes March 2007 14 Fires, Residential March 2007 23 Fires, Wildland March 2007 33 Floods and Flash · International Association of Emergency Managers · National Fire Protection Association · National Interagency

182

The Deepwater Horizon Disaster: What Happened and Why  

SciTech Connect (OSTI)

The Deepwater Horizon disaster was the largest oil spill in US history, and the second largest spill in the world. 11 men lost their lives in the explosion and fire. Although the impacts of the spill were evident to large numbers of people, its causes were harder to see. This lecture will focus on the technical aspects of the events that led to the spill itself: what happened on the rig before, during and after the event, up to the time the rig sank. As with many engineering disasters, the accident was due to a sequence of failures, including both technical systems and procedural issues. Although the causes were complex and interacting, the lecture will focus on four main problems: (1) the failure of the cement and casing seal, (2) the failure to recognize and respond to hydrocarbon flow into the riser, (3) the ignition of hydrocarbons on the rig, and (4) the failure of the blow-out preventer (BOP) to seal the well. The lecture will conclude with some suggestions as to how events such as the Deepwater Horizon disaster can be avoided in the future. (Roland N. Horne is the Thomas Davies Barrow Professor of Earth Sciences at Stanford University, and was the Chairman of Petroleum Engineering from 1995 to 2006. He holds BE, PhD and DSc degrees from the University of Auckland, New Zealand, all in Engineering Science. Horne is a member of the U.S. National Academy of Engineering and is also an Honorary Member of the Society of Petroleum Engineers.)

Horne, Roland N. (Stanford University) [Stanford University

2011-01-05T23:59:59.000Z

183

Geospatial Data Collection/Use in Disaster Response: A United States Nationwide  

E-Print Network [OSTI]

Geospatial Data Collection/Use in Disaster Response: A United States Nationwide Survey of State to provide assistance (in the form of monies, staff, geospatial data, etc.) to states when the disaster overwhelms the resources of the state. Geospatial support is one of the forms of assistance and a frequent

Hodgson, Michael E.

184

How Accurate are Disaster Loss Data? The Case of U.S. Flood Damage  

E-Print Network [OSTI]

disaster assistance programs. Comparison of early damage estimates with actual expenditures in a California.S. National Weather Service (NWS) has compiled annual flood loss estimates for each state since 1955 the provision of disaster relief assistance, e.g., how much, when, and in what form. Loss estimates provide

Colorado at Boulder, University of

185

Rebuilding After Disaster: Going Green from the Ground Up (Revised) (Brochure)  

SciTech Connect (OSTI)

20-page "how-to" guide describing ways to turn a disaster into an opportunity to rebuild with greener energy technologies. It covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

Not Available

2009-10-01T23:59:59.000Z

186

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

187

European biofuel plans could spell disaster -environmentalresearchweb A community website from IOP Publishing Sign in Forgotten your password? Sign  

E-Print Network [OSTI]

European biofuel plans could spell disaster - environmentalresearchweb A community website from IOP. Corporate Partners Sustainable Futures Dec 17, 2007 European biofuel plans could spell disaster European Union plans to increase the use of biofuels could spell disaster for some of the world's poorest people

188

Photo Credit: Mike Kuhman Sign-up for the USDA Crop Disaster Program anticipated in March 2005  

E-Print Network [OSTI]

, a problem with sign- up dates for the Noninsured Crop Disaster Assistance Program was addressed. The USDA by damaging weather. The Crop Disaster Program, or CDP, is fully funded under this legislation the Noninsured Crop Disaster Assistance Program, or NAP. However, these assistance programs are different

Florida, University of

189

Stop Blaming Disasters on Forces Beyond Our Control  

SciTech Connect (OSTI)

As we enter the new millennium, let us recognize that the losses resulting from natural or malevolent events that cause major property damage, severe injuries, and unnecessary death are not always due to forces beyond our control. We can prevent these losses by changing the way we think and act about design and construction projects. New tools, technologies, and techniques can improve structural safety, security, and reliability and protect owners, occupants, and users against loss and casualties. Hurricane Mitch, the African embassy bombings, the ice storms in Canada and the northeastern US last winter, the Oklahoma City bombing, flooding and earthquakes in California, tornadoes and flooding in Florida, and wildfires in the Southwest are threats to the safety and security of the public and the reliability of our constructed environment. Today's engineering design community must recognize these threats and address them in our standards, building codes, and designs. We know that disasters will continue to strike and we must reduce their impact on the public. We must demand and create innovative solutions that assure a higher level of structural performance when disasters strike.

Matalucci, R.V.

1999-04-09T23:59:59.000Z

190

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability   

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

191

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

192

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

193

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

194

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

195

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

196

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

197

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

198

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

199

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

200

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Interactive graphical timelines as collaborative scenario management tools  

E-Print Network [OSTI]

and Disaster Management Simulation WMD Weapons of Mass Destruction CBRNE Chemical, Biological, Radiological, Nuclear, and Explosive CSCW Computer Supported Collaborative Work MSEL Master Scenario Event Lists TAF Training Assessment Facility EOTC... Visualizer ........................................................................41 Figure 14: Questionnaire Averages Summary .................................................................52 x LIST OF TABLES Page Table 1: Example MSEL Items...

Riddle, Austin Christopher

2008-10-10T23:59:59.000Z

202

Tourism Crisis Management Institute 2011-2012 Annual Report  

E-Print Network [OSTI]

Tourism Crisis Management Institute 2011-2012 Annual Report 2011 natural disasters cost global for us here at the TCMI. As the global tourism industry continues to be affected by crises ranging from financial uncertainty to extreme weather events, many tourism organizations are faced with negative

Guo, Jing

203

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

204

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

205

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

206

ISDA 2010, Montpellier, June 28-30, 2010 1 HOUSEHOLDS' RISK MANAGEMENT STRAGIES  

E-Print Network [OSTI]

ISDA 2010, Montpellier, June 28-30, 2010 1 HOUSEHOLDS' RISK MANAGEMENT STRAGIES AND VULNERABILITY of ManagementXi'an Jiaotong University & School of Economic and Management ,Shanxi Normal University Mail Address : Gongyuan Road 1, Economic and Management School, Shanxi Normal University, Linfen city, Shanxi

Boyer, Edmond

207

Building & Enhancing Interorganizational Relationships for Disaster Preparedness and Response Capacity: a Study of Community-based Organizations Serving Vulnerable Populations: a Focus on the Homeless  

E-Print Network [OSTI]

21: p. 369-402. Seattle & King County Public Health. PublicCenter Seattle & King County Public Health Departmentinformation put out by King County Public Health Department

Nilsen, Donata Christiane

2012-01-01T23:59:59.000Z

208

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

209

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

210

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

211

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

212

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

213

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

214

Option prices in a model with stochastic disaster risk Sang Byung Seo  

E-Print Network [OSTI]

Option prices in a model with stochastic disaster risk Sang Byung Seo University of Pennsylvania volatility curve. First draft: January 18, 2013. Seo: sangseo@wharton.upenn.edu; Wachter: jwachter

Kahana, Michael J.

215

Alternatives for reducing the environmental risks associated with natural disasters and their effects on pipelines  

E-Print Network [OSTI]

Past pipeline failure reports have typically focused on corrosion and third party related events. However, natural disasters pose a substantial risk to pipeline integrity as well. Therefore, it was the objective of this thesis to analyze the risks...

Wellborn, Michael Wayne

2012-06-07T23:59:59.000Z

216

Picking up the pieces : transitional shelters for disaster relief in the northern mountainous regions of Pakistan  

E-Print Network [OSTI]

This thesis seeks to tackle a complex problem - disaster housing relief - from the angle of architecture design discipline and attempts to find a logical approach to solve such a problem via an in depth examination of a ...

Lee, Weifeng Victoria

2006-01-01T23:59:59.000Z

217

The Dynamic Effects of Hurricanes in the US: The Role of Non-Disaster Transfer Payments  

E-Print Network [OSTI]

We know little about the dynamic economic impacts of natural disasters. I examine the effect of hurricanes on US counties’ economies 0-10 years after landfall. Overall, I find no substantial changes in county population, ...

Deryugina, Tatyana

218

National Disaster Resilience Competition Webinar Series: Long-Term Commitment Factor  

Broader source: Energy.gov [DOE]

In light of the recent announcement of the National Disaster Resilience Competition (NDRC), HUD is offering a series of webinars to discuss NDRC NOFA requirements, answer NDRC NOFA questions and...

219

Dark tourism: understanding visitor motivation at sites of death and disaster  

E-Print Network [OSTI]

, numerous sites of death and disaster attract millions of visitors from all around the world: Auschwitz-Birkenau, Anne Frank's House, Graceland, Oklahoma City, Gettysburg, Vimy Ridge, the Somme, Arlington National Cemetery. The list grows each year...

Yuill, Stephanie Marie

2004-09-30T23:59:59.000Z

220

Suggested strategies and best practices in private supply chain disaster response  

E-Print Network [OSTI]

In times of disaster, demand for goods and services in affected areas spikes. Private companies generally have contingencies in place for business continuity; however, most lack a strategic approach to join the general ...

Budhiraj, Karn

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Variations in disaster aid acquisitions among ethnic groups in a rural community  

E-Print Network [OSTI]

VARIATIONS IN DISASTER AID ACQUISITIONS AMONG ETHNIC GROUPS IN A RURAL COMMUNITY A Dissertation by Kim Blanca Galindo Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of DOCTOR OF PHILOSOPHY August 2007 Major Subject: Urban and Regional Sciences VARIATIONS IN DISASTER AID ACQUISITIONS AMONG ETHNIC GROUPS IN A RURAL COMMUNITY A Dissertation by Kim Blanca Galindo...

Galindo, Kim Blanca

2009-06-02T23:59:59.000Z

222

National Disaster Resilience Competition Webinar Series - Q&A...  

Office of Environmental Management (EM)

climate adaptation planning, regional consortia building, innovative resilience, water management, rural community engagement, equity, infrastructure resilience, and...

223

DOE Hanford Network Upgrades and Disaster Recovery Exercise Support the Cleanup Mission Now and into the Future  

SciTech Connect (OSTI)

In 2013, the U.S. Department of Energy's (DOE) Hanford Site, located in Washington State, funded an update to the critical network infrastructure supporting the Hanford Federal Cloud (HFC). The project, called ET-50, was the final step in a plan that was initiated five years ago called "Hanford's IT Vision, 2015 and Beyond." The ET-50 project upgraded Hanford's core data center switches and routers along with a majority of the distribution layer switches. The upgrades allowed HFC the network intelligence to provide Hanford with a more reliable and resilient network architecture. The culmination of the five year plan improved network intelligence and high performance computing as well as helped to provide 10 Gbps capable links between core backbone devices (10 times the previous bandwidth). These improvements allow Hanford the ability to further support bandwidth intense applications, such as video teleconferencing. The ET-50 switch upgrade, along with other upgrades implemented from the five year plan, have prepared Hanford's network for the next evolution of technology in voice, video, and data. Hand-in-hand with ET-50's major data center outage, Mission Support Alliance's (MSA) Information Management (IM) organization executed a disaster recovery (DR) exercise to perform a true integration test and capability study. The DR scope was planned within the constraints of ET-50's 14 hour datacenter outage window. This DR exercise tested Hanford's Continuity of Operations (COOP) capability and failover plans for safety and business critical Hanford Federal Cloud applications. The planned suite of services to be tested was identified prior to the outage and plans were prepared to test the services ability to failover from the primary Hanford data center to the backup data center. The services tested were: Core Network (backbone, firewall, load balancers); Voicemail; Voice over IP (VoIP); Emergency Notification; Virtual desktops; and, Select set of production applications and data. The primary objective of the exercise was to test COOP around the emergency operations at Hanford to provide information on capabilities and dependencies of the current system to insure improved focus of emergency, safety and security capacity in a disaster situation. The integration of the DR test into the ET-50 project allowed the testing of COOP at Hanford and allowed the lessons learned to be defined. These lessons learned have helped improve the understanding of Hanford's COOP capabilities and will be critical for future planning. With the completion of the Hanford Federal Cloud network upgrades and the disaster recovery exercise, the MSA has a clearer path forward for future technology implementations as well as network improvements to help shape the usability and reliability of the Hanford network in support of the cleanup mission.

Eckman, Todd J. [Mission Support Alliance, Richland, WA (United States); Hertzel, Ali K. [Lockheed Martin Services, Inc. (United States); Lane, James J. [Lockheed Martin - Information Systems and Global Solutions (United States)

2013-11-07T23:59:59.000Z

224

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...  

Broader source: Energy.gov (indexed) [DOE]

7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

225

A Roadmap to Risk-Aware Business Process Management  

E-Print Network [OSTI]

that resources are utilized as efficient as possible and services are managed in an effective way. From vulnerabilities [11][12]. The introduced model consists of four interconnected layers: (1) Business process layerA Roadmap to Risk-Aware Business Process Management Stefan Jakoubi, Thomas Neubauer Secure Business

226

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

227

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

228

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

229

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

230

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

231

Management Plan Management Plan  

E-Print Network [OSTI]

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

232

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

233

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

234

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

235

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

236

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

237

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

238

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

239

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

240

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol  

SciTech Connect (OSTI)

This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

NONE

1994-09-01T23:59:59.000Z

242

Disaster debris management and recovery of housing stock in San Francisco, CA  

E-Print Network [OSTI]

This thesis investigates the potential effects of a 7.2 magnitude earthquake in San Francisco City, particularly the implications on San Francisco's residential housing stock and impacts on the construction and demolition ...

Saiyed, Zahraa Nazim

2012-01-01T23:59:59.000Z

243

Disaster debris management and recovery for housing stock in San Francisco, CA  

E-Print Network [OSTI]

In the wake of the next large-scale earthquake in the city of San Francisco, an expected 85,000 households are expected to become uninhabitable and beyond repair, leaving thousands of residents with immediate needs for ...

Saiyed, Zahraa N.

244

Stress in Adults after a Disaster: Warning Signs and Management (Spanish)  

E-Print Network [OSTI]

la persona durante la situaci?n de crisis. Aumento en el abuso de sustancias: En situaciones de estr?s, algunos adultos abusan del alcohol y otras sustancias. Este comportamiento puede derivar en mayores problemas en el hogar y trabajo. S?ntomas f... s?ntomas pueden estar relacionados con el aumento de la ansiedad. Altos niveles de estr?s pueden debilitar el sistema inmunol?gico derivando en el aumento de enfermedades. Pensamientos recurrentes: Los adultos pueden pensar constantemente acerca...

Warren, Judith L.

2007-10-08T23:59:59.000Z

245

In the past, disaster management used to only include support for hurricanes, floods, tornados, and earthquakes  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartment ofThe full text of what is refered to as the

246

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

247

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

248

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

249

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

250

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

251

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Université de

252

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

253

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

254

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

255

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

256

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

257

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

258

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

259

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

260

UCSF PD Emergency Management Division UCSF PD Website: http://police.ucsf.edu/  

E-Print Network [OSTI]

UCSF PD Emergency Management Division UCSF PD Website: http://police.ucsf.edu/ Emergency Kit 2014.doc Version Date: 02 2014 Emergency Preparedness Kit Suggestions You can purchase premade emergency kits and supplies. UCSF PD has contracted with Your Safety Place to offer specially priced disaster

Derisi, Joseph

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Gulf oil spill's ripples still a worry Warranted or not, disaster fears loom  

E-Print Network [OSTI]

Gulf oil spill's ripples still a worry Warranted or not, disaster fears loom BY JIM WAYMER from the nation's worst-ever oil mess. Oceanographers want to know the paths of underwater oil plumes. Biologists wonder if nesting sea turtles that accidentally gulped oil will lay viable eggs or whether eggs

Belogay, Eugene A.

262

On August 29th 2005, the worst natural disaster in American history struck our home.  

E-Print Network [OSTI]

#12;On August 29th 2005, the worst natural disaster in American history struck our home and stabilize our economy. Then together, we can begin to work toward a shared vision of a great city For Outcomes Process 7 Restore Public Safety 8 Electricity and Gas 9 Debris Removal/Waste Removal 9 Basic

263

Smart Wireless Sensor System for Lifeline Health Monitoring under a Disaster Event  

E-Print Network [OSTI]

of the acquired data and the flexibility of wireless communication technologies. We employ a non of millions. Early detection and preventive repair would be ideal but are not always possible. Therefore, real-time detection and timely damage control are the key to minimizing the adverse impact of such disaster events

Shinozuka, Masanobu

264

Welfare effects of natural disasters in developing countries: an examination using multi-dimensional socioeconomic indicators  

E-Print Network [OSTI]

technologies that boosts growth. Though geophysical disasters might be expected to have a similar effect capital such as the destruction of schools and health care facilities that would not show in GDP, loss of key assets, disruption of health causing increases in child and maternal mortality and loss

Columbia University

265

Resources for Pet, Poultry and Livestock Owners Affected by Natural Disasters  

E-Print Network [OSTI]

Disasters Livestock and Poultry Carcass Disposal For information or guidance on building a car- cass composting pile, contact the Texas AgriLife Extension Service at 806-677-5600 or 979-845- 3931. You can also go to http://agrilifebookstore. org...

Faries Jr., Floron C.

2008-09-02T23:59:59.000Z

266

Post-Disaster Reconstruction Models in the Asia Pacific: the cases of China, Iran and  

E-Print Network [OSTI]

Post-Disaster Reconstruction Models in the Asia Pacific: the cases of China, Iran and Myanmar Helen ­ Sichuan Earthquake 2008 Iran ­ Bam Earthquake 2003; Tabriz Earthquake 2012 Myanmar ­ Cyclone Nargis 2008 element in psycho-social recovery and reconstruction phase. #12;Iran Model Iran: Bam Earthquake 2003

Botea, Adi

267

NATURAL HAZARDS ON ALLUVIAL FANS: THE VENEZUELA DEBRIS FLOW AND FLASH FLOOD DISASTER  

E-Print Network [OSTI]

NATURAL HAZARDS ON ALLUVIAL FANS: THE VENEZUELA DEBRIS FLOW AND FLASH FLOOD DISASTER In December Venezuela. Rainfall on December 2-3 totaled 200 millimeters (8 inches) and was followed by a major storm, Denver, Colorado, Naples, Italy, and Vargas, Venezuela. In time scales spanning thousands of years

Eaton, L. Scott

268

A Partition-tolerant Manycast Algorithm for Disaster Area Networks Mikael Asplund, Simin Nadjm-Tehrani  

E-Print Network [OSTI]

types of infrastructures [17], disruptions can also be caused by more commonly occurring incidents-efficient communication in inter- mittently connected networks. When the existing infrastructure is damaged or overloaded. INTRODUCTION When a natural disaster strikes, the critical infrastructure that supports our society can

269

Sustainable shelters for post disaster reconstruction : an integrated approach for reconstruction after the South Asia earthquake  

E-Print Network [OSTI]

A year after the South Asia earthquake, over 60% of the survivors are still vulnerable due to the lack of adequate shelter, the absence of basic facilities for water and sanitation and livelihood restoration. The harsh ...

Ali, Zehra (Zehra Hyder)

2007-01-01T23:59:59.000Z

270

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

271

Transportation Center Seminar........ Anticipating Disaster: Planning for Emergency Logistics Needs  

E-Print Network [OSTI]

for computing in the College of Engineering. He has held visiting professor appointments at General Motors Needs Mark Turnquist Professor of Civil and Environmental Engineering Cornell University in the Master of Engineering program in engineering management. Turnquist is a past chairman

Bustamante, Fabián E.

272

EXaMINE -Experimentation of a Monitoring and Control System for Managing Vulnerabilities of the European  

E-Print Network [OSTI]

-08004 Barcelona, Spain Sart-Tilman B28, B-4000 Li`ege, Belgium Abstract -- This paper presents (Spain) AIA - Consulting and Engineering (Spain) CESI - Consulting and Engineering (Italy) SEMA Group

Wehenkel, Louis

273

V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a commandDepartment|

274

Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents  

SciTech Connect (OSTI)

The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

Not Available

1993-11-01T23:59:59.000Z

275

Hospitality Management Hospitality Management  

E-Print Network [OSTI]

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

276

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

277

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

278

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

279

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

280

Insurance as a Risk Management Instrument for Energy Infrastructure Security and Resilience Report Now Available  

Broader source: Energy.gov [DOE]

The Office of Electricity Delivery and Energy Reliability has released a report that examines the key risks confronting critical energy infrastructure and ways in which the insurance industry can help manage these risks. In most developed countries, insurance is one of the principal risk management instruments for aiding in recovery after a disaster and for encouraging future investments that are more resilient to potential hazards.

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site  

Broader source: Energy.gov [DOE]

This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

282

Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report  

SciTech Connect (OSTI)

This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

NONE

1994-09-01T23:59:59.000Z

283

he chain of calamity now known as Japan's Triple Disaster began with a massive rupture in the ocean floor.  

E-Print Network [OSTI]

, the earthquake had already knocked out electricity, but emergency backup systems seemed to be functioning backup diesel Japan's TripleDisasterBy David Pacchioli Some 45 miles east of Japan and 18.6 miles below

McCartney, Michael S.

284

The 1,000 dollar home : a scalable business model to build disaster relief dwellings and upgrade slums  

E-Print Network [OSTI]

This thesis proposes a new model for the private markets to build disaster relief dwellings or to upgrade degraded neighborhoods of very low income communities. The study offers a way to empower the dwellers of very poor ...

Cańzio, Luis (Del Cańzio)

2006-01-01T23:59:59.000Z

285

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

286

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

287

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

288

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

289

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

290

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, Herbert E.

291

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

292

An Incident Management Preparedness and Coordination Toolkit  

SciTech Connect (OSTI)

Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

Koch, Daniel B [ORNL; Payne, Patricia W [ORNL

2012-01-01T23:59:59.000Z

293

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

294

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

295

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

296

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Broader source: Energy.gov (indexed) [DOE]

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

297

Kiran Chandra Sapkota Livelihood strategies and vulnerability of urban poor  

E-Print Network [OSTI]

management of drinking water. 97.7 percent HHs have got the electricity and entertainment facilities, electric charge, etc. This study has tried to show five capital assets of urban poor in Khadi Pakha in local social institution but not represented in local government. Above 95 percent HHs involved

Richner, Heinz

298

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

299

Obtaining Disaster Assistance for Small Businesses and the Self-Employed  

E-Print Network [OSTI]

is www.tdi.state.tx.us. Replacing Lost Income Benefits for Disaster Unemployment Assis- tance (DUA) are available through the Texas Workforce Commission to persons (including the self-employed) who have lost all or part of their livelihood because... location. The number is 1-800-233-3405. Rebuilding the Business: What are the choices? Assess damage: Decide who will be responsible for assessing damage. That person should decide whether the facility is salvageable, whether lost or damaged equipment...

Brown, Pamela J.; Cavanagh, Joyce

2005-10-11T23:59:59.000Z

300

Racial Geography, Economic Growth and Natural Disaster Resilience  

SciTech Connect (OSTI)

Recent development of National Response Plans and National Incident Management Plans has emphasized the need for interoperability of plans, systems, technology, and command structures. However, much less emphasis has been placed on equally important elements such as the at-risk populations’ response to those plans, systems, and directions. The community-wide consequences of Hurricane Katrina demonstrated that the protection of communities should no longer be considered only a function of public organizations. Private organizations, nonprofit organizations and individual households have significant roles to play in these plans (Comfort 2006, Salamon 2002). This study is a first attempt to characterize the effect on the resilience (recovery) of metropolitan areas by the presence (or absence) of separate small communities within a larger jurisdiction. These communities can be based on many different social cleavages (ethnic, racial, economic, social, geographic, linguistic, etc.).

Li, Huiping [University of North Carolina at Charlotte; Fernandez, Steven J. [Oak Ridge National Laboratory; Ganguly, Auroop [Oak Ridge National Laboratory

2014-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Los Alamos National Laboratory emergency management plan. Revision 1  

SciTech Connect (OSTI)

The Laboratory has developed this Emergency Management Plan (EMP) to assist in emergency planning, preparedness, and response to anticipated and actual emergencies. The Plan establishes guidance for ensuring safe Laboratory operation, protection of the environment, and safeguarding Department of Energy (DOE) property. Detailed information and specific instructions required by emergency response personnel to implement the EMP are contained in the Emergency Management Plan Implementing Procedure (EMPIP) document, which consists of individual EMPIPs. The EMP and EMPIPs may be used to assist in resolving emergencies including but not limited to fires, high-energy accidents, hazardous material releases (radioactive and nonradioactive), security incidents, transportation accidents, electrical accidents, and natural disasters.

Ramsey, G.F.

1998-07-15T23:59:59.000Z

302

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

303

Network Management Network Management  

E-Print Network [OSTI]

that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

304

Rebuilding After Disaster: Going Green from the Ground Up (Revised) (Brochure), U.S. Department of Energy (DOE), Energy Efficiency & Renewable Energy (EERE)  

Office of Energy Efficiency and Renewable Energy (EERE)

20-page “how-to” guide describing ways to turn a disaster into an opportunity to rebuild with greener energy technologies. It covers such topics as the importance of energy, options for communities, instructions for developing an energy plan, and other considerations. This guide is intended for the community leaders who have experienced a disaster.

305

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

306

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

307

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

308

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

309

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

310

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

311

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

312

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

313

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

314

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

315

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

316

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

317

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

318

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

319

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

320

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

322

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

323

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

324

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

325

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

326

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

327

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

328

Natural disasters and the gas pipeline system. Topical report, August 1994-June 1995  

SciTech Connect (OSTI)

Episodic descriptions are provided of the effect of the Loma Prieta earthquake (1989) on the gas pipeline systems of Pacific Gas & Electric Company and the City of Palo Alto and of the Northridge earthquake (1994) on Southern California Gas` pipeline system. The emergency response plans and activities of South Carolina Electric & Gas Company during hurricane Hugo (1989) and of City Gas Company of Florida and other small gas companies during hurricane Andrew (1992) are also reviewed. Descriptions of the great Flood of 1993 and its effects on the operations of Iowa-Illinois Gas & Electric Company and Laclede Gas Company and of the San Jacinto River Floods on the transmission lines of Valero Gas Co. are also provided. Local and federal regulatory requirements, and the current practices by the gas industry for dealing with natural disasters, such as through preventive measures (e.g., strapping of water heaters, excess flow valves), and the tracking of weather-related events are described. The important role that preplanning and coordination with the local emergency response bodies and other gas utilities plays during a natural disaster is examined.

Atallah, S.; Saxena, S.; Martin, S.B.; Willowby, A.B.; Alger, R.

1996-11-15T23:59:59.000Z

329

Development of Algorithms to Estimate Post-Disaster Population Dislocation--A Research-Based Approach  

E-Print Network [OSTI]

of infrastructure such as electric power, water/sewer, fuel, transportation and telecommunications (Lindell et al., 2006). Alesch et al. (1993), Dahlhamer & D?Souza (1997), Lindell et al. (2006), and Tierney (1997) reported that small businesses are more... for business recovery. In addition, owners and employees of small businesses are more likely to be socially vulnerable groups such as ethnic minorities or members of low socioeconomic status. Job loss could compound the difficulty of the household recovery...

Lin, Yi-Sz

2010-10-12T23:59:59.000Z

330

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

331

Correlating Radioactive Material to Sea Surface Temperature off the Coast of Japan: The Fukushima Daiichi Nuclear Disaster  

E-Print Network [OSTI]

, causing a loss-of-coolant accident which eventually led to nuclear meltdown. Over the course Daiichi Nuclear Disaster Maya R. Pincus Department of Geology, University of Puerto Rico-MayagĂĽez e on the island. One of the most devastating results of this was the damage to the Fukushima Daiichi nuclear plant

Gilbes, Fernando

332

JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 30, NO. 16, AUGUST 15, 2012 2563 Design of Disaster-Resilient  

E-Print Network [OSTI]

-Resilient Optical Datacenter Networks M. Farhan Habib, Massimo Tornatore, Marc De Leenheer, Ferhat Dikbiyik delivered by datacenter networks yield new opportunities to provide protection against disasters. Cloud is generally ensured by providing a backup path to the same destination (i.e., a datacenter), which is link

California at Davis, University of

333

Study: Exposure to crude oil from the Deepwater Horizon disaster causes swimming deficiencies in juvenile mahi mahi  

E-Print Network [OSTI]

of large fish Crude oil spreads across a wide swath of the Gulf of Mexico during the 2010 Deepwater Horizon. The four million barrels of crude oil that spewed into the Gulf of Mexico from BP's failed oil drillingStudy: Exposure to crude oil from the Deepwater Horizon disaster causes swimming deficiencies

Grosell, Martin

334

When preparing for a disaster, it is important to provide for an adequate supply of water for drinking and cook-  

E-Print Network [OSTI]

in a household needs about 2 quarts of liquid per day for drinking and cooking. This can come from water for drinking as well as other liquids, such as juices or soft drinks. Additional clean water is neededWhen preparing for a disaster, it is important to provide for an adequate supply of water

Liskiewicz, Maciej

335

EXTREME EVENTS: OBSERVATIONS, MODELING AND ECONOMICS, VOL. ???, XXXX, DOI:10.1029/, Impacts of natural disasters on a dynamic economy  

E-Print Network [OSTI]

of natural disasters on a dynamic economy Andreas Groth,1,2 Patrice Dumas,3,1 Michael Ghil,1,2,4 and St.S. economy, based on multivariate singular spectrum analysis. We analyze a total of nine aggregate indicators in a 52-year interval (1954­2005) and demonstrate that the be- havior of the U.S. economy changes

Ghil, Michael

336

SUBCONTRACT MANAGEMENT  

Energy Savers [EERE]

0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

337

Project management improves well control events  

SciTech Connect (OSTI)

During a well control operation, the efficient use of personnel and equipment, through good project management techniques, contributes to increased safety and ensures a quality project. The key to a successful blowout control project is to use all resources in the most efficient manner. Excessive use of resources leads to unnecessary expenditures and delays in bringing the project under control. The Kuwait well control project, which involved more than 700 blowouts, was accomplished in a much shorter time (8 months) than first estimated (5 years). This improvement partly resulted from the application of sound project management techniques. These projects were prime examples of the need for a formal project management approach to handling wild well projects. There are many examples of projects that were successful in controlling wells but were economic disasters. Only through the effective application of project management can complex well control projects be completed in reasonable time frames at reasonable cost. The paper describes team management, project scope, organizational structures, scheduling, tracking models, critical path method, and decision trees.

Oberlender, G.D. [Oklahoma State Univ., Stillwater, OK (United States); Abel, L.W. [Wild Well Control Inc., Spring, TX (United States)

1995-07-10T23:59:59.000Z

338

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

339

Drought affects virtually all regions of the world and results in significant economic, social, and environmental impacts. The Federal Emergency Management Agency estimates  

E-Print Network [OSTI]

geospatial decision-support tools to address agricultural drought hazards and identify regions of vulnerability in the management of drought risk. The goal of the National Agricultural Decision Support System assess- ment and exposure analysis. Drought risk management involves both expanding our ability

Goddard, Steve

340

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association  

E-Print Network [OSTI]

) exposure to air pollution, and (3) social and health vulnerability. These three scores are then added and playgrounds because these are land uses where air pollution sensitive populations (very young, elderly14 em august 2013 awma.org Copyright 2013 Air & Waste Management Association em · feature Whether

Rohs, Remo

342

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

343

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

344

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

345

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

346

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

347

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

348

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

349

Capacity-building: an inquiry into the local coastal program component of coastal zone management in Louisiana  

E-Print Network [OSTI]

studies and articles have focused on the local level of government in examining, for instance, hazard mitigation and disaster policy implementation (Godshalk, Brower and Beatley, 1989; Witt, 1988; Beatley, 1986; May and Williams, 1986; Rossi, Wright... increasingly important, but that a systematic investigation of state capacity to manage was needed. Beatley, Brower, and Schwab (1994) similarly noted the importance of state programs in the effectiveness of the CZMA, but that the flexibility afforded...

Norris-Raynbird, Carla

2007-09-17T23:59:59.000Z

350

Project Management Plan Resident Management System (RMS)  

E-Print Network [OSTI]

1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

US Army Corps of Engineers

351

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

1998-08-01T23:59:59.000Z

352

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

353

Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress  

E-Print Network [OSTI]

ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

2009-02-19T23:59:59.000Z

354

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

355

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

356

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

357

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

358

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

359

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

360

Of Disasters and Dragon Kings: A Statistical Analysis of Nuclear Power Incidents & Accidents  

E-Print Network [OSTI]

We provide, and perform a risk theoretic statistical analysis of, a dataset that is 75 percent larger than the previous best dataset on nuclear incidents and accidents, comparing three measures of severity: INES (International Nuclear Event Scale), radiation released, and damage dollar losses. The annual rate of nuclear accidents, with size above 20 Million US$, per plant, decreased from the 1950s until dropping significantly after Chernobyl (April, 1986). The rate is now roughly stable at 0.002 to 0.003, i.e., around 1 event per year across the current fleet. The distribution of damage values changed after Three Mile Island (TMI; March, 1979), where moderate damages were suppressed but the tail became very heavy, being described by a Pareto distribution with tail index 0.55. Further, there is a runaway disaster regime, associated with the "dragon-king" phenomenon, amplifying the risk of extreme damage. In fact, the damage of the largest event (Fukushima; March, 2011) is equal to 60 percent of the total damag...

Wheatley, Spencer; Sornette, Didier

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

362

LRRB Pavement Management Systems Pavement Management Systems  

E-Print Network [OSTI]

LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

Minnesota, University of

363

Position Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

1992-06-23T23:59:59.000Z

364

Water Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

365

Program Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

366

MANAGEMENT (MNG)  

Broader source: Energy.gov (indexed) [DOE]

and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

367

Quality Management  

Broader source: Energy.gov [DOE]

The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

368

BachelorofManagement InternationalManagement  

E-Print Network [OSTI]

on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

Seldin, Jonathan P.

369

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

370

Sublethal Oxygen–Glucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to  

E-Print Network [OSTI]

Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygen–glucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 24–48 hr after sublethal oxygen–glucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

371

Advancing Equipment Reliability via a Natural Disaster Opportunities for Thinking Outside the Box  

E-Print Network [OSTI]

In 1991, the World Business Council for Sustainable Development (WBCSD) introduced “Eco- Efficiency” as a management strategy to link financial and environmental performance to create more value with less ecological impact. Based on this strategy...

Stephens, R.

2006-01-01T23:59:59.000Z

372

Treatment Effect of Repairs to an Electrical Grid Leveraging a Machine Learned Model of Structure Vulnerability  

E-Print Network [OSTI]

, USA becky@cs.columbia.edu Cynthia Rudin MIT Sloan School of Management Massachusetts Institute substations, where transformers step the voltage d

Rudin, Cynthia

373

Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may  

E-Print Network [OSTI]

Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

Boone, Randall B.

374

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer  

E-Print Network [OSTI]

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

Boyer, Edmond

375

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

376

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,  

E-Print Network [OSTI]

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

Saldin, Dilano

377

Risk Management Procedures Category: Strategic Management  

E-Print Network [OSTI]

/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 21 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT. PROCEDURAL DETAILS 2.1. Responsibilities Entity / Officer Responsibilities Planning and Management Committee

378

Conference Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

2007-01-25T23:59:59.000Z

379

Project Manager  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

380

Stormwater Management  

E-Print Network [OSTI]

management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

Jaber, Fouad

2008-10-23T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

194 / JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT / JULY/AUGUST 1999 INDICATORS OF IMPACTS OF GLOBAL CLIMATE CHANGE ON U.S.  

E-Print Network [OSTI]

194 / JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT / JULY/AUGUST 1999 INDICATORS OF IMPACTS of the indicators, regional reservoir storage vulnerability, is a particularly useful index summarizing (U.S.) to investigate the integrated impacts of potential global warming on water resources. Impacts

Vogel, Richard M.

382

Florida Emergency Information Line (Only activated during disasters). . . . . . . . . . . . . . . . . . . . . . . . . . . 1-800-342-3557 Florida Division of Emergency Management (www.FloridaDisaster.org) . . . . . . . . . . . Non-Emergencies 850-413-9900  

E-Print Network [OSTI]

.fpl.com) . . . . . . . . . . . . . . . . . . . . . . . . . . . Outage 1-800-4-OUTAGE (1-800-468-8243) Florida Keys Electric Cooperative (www.doh.state.fl.us) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850-245-4321 Florida Office of Insurance Regulation (www

383

Recommended Practice for Patch Management of Control Systems  

SciTech Connect (OSTI)

A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

Steven Tom; Dale Christiansen; Dan Berrett

2008-12-01T23:59:59.000Z

384

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network [OSTI]

Managing the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network to dynamically exchange customer­ and technology­related data. In this context, management systems are crucial providers: On the one hand, different service providers have chosen different management systems

385

Business Management Analyst Business Manager Director of Communication Contracts Manager  

E-Print Network [OSTI]

· Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

Maxwell, Bruce D.

386

Situational Awareness Technologies for Disaster Naveen Ashish, Dmitri Kalashnikov, Sharad Mehrotra, Nalini  

E-Print Network [OSTI]

of government, public authorities (such as state-managed utility companies), commercial entities, volunteer requires a broader participation of government and industry. In large urban areas such as Los Angeles and New York, it is not uncommon for each city within a county to have its own EOC where rep- resentatives

Kalashnikov, Dmitri V.

387

Managing Solutions  

E-Print Network [OSTI]

tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

Baker, Emily

2007-01-01T23:59:59.000Z

388

V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability  

Broader source: Energy.gov [DOE]

Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security.

389

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

390

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

SciTech Connect (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

391

Object Management Systems  

E-Print Network [OSTI]

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

392

Environmental Management System Plan  

E-Print Network [OSTI]

R-3 • Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

Fox, Robert

2009-01-01T23:59:59.000Z

393

Environmental Management System Plan  

E-Print Network [OSTI]

Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

Fox, Robert

2009-01-01T23:59:59.000Z

394

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-01-01T23:59:59.000Z

395

MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT  

E-Print Network [OSTI]

of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

396

Waste Management Program management plan. Revision 1  

SciTech Connect (OSTI)

As the prime contractor to the Department of Energy Idaho Operations Office (DOE-ID), Lockheed Martin Idaho Technologies Company (LMITCO) provides comprehensive waste management services to all contractors at the Idaho National Engineering and Environmental Laboratory (INEEL) through the Waste Management (WM) Program. This Program Management Plan (PMP) provides an overview of the Waste Management Program objectives, organization and management practices, and scope of work. This document will be reviewed at least annually and updated as needed to address revisions to the Waste Management`s objectives, organization and management practices, and scope of work. Waste Management Program is managed by LMITCO Waste Operations Directorate. The Waste Management Program manages transuranic, low-level, mixed low-level, hazardous, special-case, and industrial wastes generated at or transported to the INEEL.

NONE

1997-02-01T23:59:59.000Z

397

MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL  

E-Print Network [OSTI]

MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

Oliver, Douglas L.

398

Managing Critical Management Improvement Initiatives  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

399

Best Management Practice #1: Water Management Planning  

Broader source: Energy.gov [DOE]

A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

400

Environmental Management Waste Management Facility (EMWMF) at...  

Office of Environmental Management (EM)

Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Environmental Management  

SciTech Connect (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2014-11-12T23:59:59.000Z

402

Environmental Management  

ScienceCinema (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2015-01-07T23:59:59.000Z

403

Contract Management Certificate Program  

E-Print Network [OSTI]

Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

Rose, Michael R.

404

Rajit Gadh and B.S. Prabhu, Radio Frequency Identification (RFID) for the assistance of Katrina related disaster mortuary operations, IEEE Signal Processing, expected to appear March 2006, based on invitation to write short article.  

E-Print Network [OSTI]

Rajit Gadh and B.S. Prabhu, Radio Frequency Identification (RFID) for the assistance of Katrina of Katrina Hurricane Victims Rajit Gadh and B.S. Prabhu Recently news.com reported that the U.S. Disaster

California at Los Angeles, University of

405

Energy, Data Management, Reporting  

Broader source: Energy.gov (indexed) [DOE]

About Schneider Electric Enterprise wide Data Management Outputs Foundation and results Part of a complete energy management solution Schneider Electric...

406

Developing linkages between species traits and multiscaled environmental variation to explore vulnerability of stream benthic  

E-Print Network [OSTI]

, Fort Collins, Colorado 80523 USA 3 Center for Ecohydraulics Research, University of Idaho, Boise, Idaho is an emerging scientific challenge. Characterizing benthic species by biological attributes (traits of growing scientific and management interest. A challenge in doing so is to distinguish biological responses

Poff, N. LeRoy

407

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z

408

Landscape Management Systems The Visual Management System  

E-Print Network [OSTI]

Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality

Standiford, Richard B.

409

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls over

410

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls overOverview -

411

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls overOverview

412

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls

413

Management Overview  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement ControlsVHTR Materials

414

DEACTIVATION MANAGEMENT  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergy Cooperation |South42.2Consolidated Edison5 by ISA -ofDATA REPORT ON7 DATE:AFPsMANAGEMENT The

415

Management Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and InterfacesAdministration -Lowellfor 2013Malcolm J.Management Alert:Used

416

Management Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and InterfacesAdministration -Lowellfor 2013Malcolm J.Management

417

NIF Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell Batteries & FuelTechnologies |T I OPSNIF Management

418

Bibliographic Management  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M. Babzien, I.Program InformationBibliographic Managment

419

Vulnerability of the Superficial Zone of Immature Articular Cartilage to Compressive Injury  

SciTech Connect (OSTI)

The zonal composition and functioning of adult articular cartilage causes depth-dependent responses to compressive injury. In immature cartilage, shear and compressive moduli as well as collagen and sulfated glycosaminoglycan (sGAG) content also vary with depth. However, there is little understanding of the depth-dependent damage caused by injury. Since injury to immature knee joints most often causes articular cartilage lesions, this study was undertaken to characterize the zonal dependence of biomechanical, biochemical, and matrix-associated changes caused by compressive injury. Disks from the superficial and deeper zones of bovine calves were biomechanically characterized. Injury to the disks was achieved by applying a final strain of 50% compression at 100%/second, followed by biomechanical recharacterization. Tissue compaction upon injury as well as sGAG density, sGAG loss, and biosynthesis were measured. Collagen fiber orientation and matrix damage were assessed using histology, diffraction-enhanced x-ray imaging, and texture analysis. Injured superficial zone disks showed surface disruption, tissue compaction by 20.3 {+-} 4.3% (mean {+-} SEM), and immediate biomechanical impairment that was revealed by a mean {+-} SEM decrease in dynamic stiffness to 7.1 {+-} 3.3% of the value before injury and equilibrium moduli that were below the level of detection. Tissue areas that appeared intact on histology showed clear textural alterations. Injured deeper zone disks showed collagen crimping but remained undamaged and biomechanically intact. Superficial zone disks did not lose sGAG immediately after injury, but lost 17.8 {+-} 1.4% of sGAG after 48 hours; deeper zone disks lost only 2.8 {+-} 0.3% of sGAG content. Biomechanical impairment was associated primarily with structural damage. The soft superficial zone of immature cartilage is vulnerable to compressive injury, causing superficial matrix disruption, extensive compaction, and textural alteration, which results in immediate loss of biomechanical function. In conjunction with delayed superficial sGAG loss, these changes may predispose the articular surface to further softening and tissue damage, thus increasing the risk of development of secondary osteoarthritis.

Rolauffs, R.; Muehleman, C; Li, J; Kurz, B; Kuettner, K; Frank, E; Grodzinsky, A

2010-01-01T23:59:59.000Z

420

A case study of social vulnerability mapping: issues of scale and aggregation  

E-Print Network [OSTI]

plan to coordinate various government entities to establish a comprehensive emergency management to ensure a set of emergency protocols pre and post hazard event. Figure 1 is a revised version of the original NGA model with an alternative... hazards include acts of terrorism, warfare, and other purposely harmful anthropogenic actives inflicted on a population (Peek and Sutton 2003; Perry and Lindell 2003). Depending on their severity these three hazard categories frequently trigger...

Burns, Gabriel Ryan

2009-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service  

Broader source: Energy.gov [DOE]

This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

422

DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...  

Energy Savers [EERE]

Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and...

423

Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.  

SciTech Connect (OSTI)

Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

Enos, David George; Goods, Steven Howard

2006-11-01T23:59:59.000Z

424

Managing Critical Infrastructures C.I.M. Suite  

ScienceCinema (OSTI)

protect infrastructure during natural disasters, terrorist attacks and electrical outages. For more information about INL research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

425

BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN  

E-Print Network [OSTI]

BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

Florida, University of

426

Functional Facilities Management Energy Management Structure  

E-Print Network [OSTI]

Functional Facilities Management Energy Management Structure Jerome Malmquist Director Erick Van Controls Systems Jeff Davis Assistant Director, Facilities Engineering & Energy Efficiency Gene Husted Principal Engineer / Commissioning Emily Robin-Abbott St. Paul Energy Engineer & Technicians Supervisor Dan

Gulliver, Robert

427

Load Management for Industry  

E-Print Network [OSTI]

In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

Konsevick, W. J., Jr.

1982-01-01T23:59:59.000Z

428

IT Project Manager  

Broader source: Energy.gov [DOE]

This position is located in the IT Project Management Office (JP). A successful candidate in this position will serve as an IT Program Manager and technical expert responsible for directly managing...

429

Managing Web Data Managing Web Data  

E-Print Network [OSTI]

Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

Davulcu, Hasan

430

MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL  

E-Print Network [OSTI]

MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL NOTICE OF DESIGNATED DEPARTMENTAL OF MATERIALS MANAGEMENT ______ FURTHER INSTRUCTIONS 1. Include a copy of any relevant documents. 2. Item MATERIALS COORDINATOR ­ IC-8 Mail, Fax or PDF the entire package to: MC 2010 Fax: 679-4240 REFERENCE # DMC

Oliver, Douglas L.

431

Target Cost Management Strategy  

E-Print Network [OSTI]

Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

Okano, Hiroshi

1996-01-01T23:59:59.000Z

432

Stormwater Management Program (Pennsylvania)  

Broader source: Energy.gov [DOE]

Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

433

Stormwater Management (Maryland)  

Broader source: Energy.gov [DOE]

Maryland's Stormwater Management Program, administered by the Department of the Environment, aims to reduce stormwater runoff. The program requires the submission of a stormwater management plan...

434

Contract/Project Management  

Broader source: Energy.gov (indexed) [DOE]

3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

435

Records Management Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

436

Physics Department Management Review  

E-Print Network [OSTI]

ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

Homes, Christopher C.

437

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

2009-08-17T23:59:59.000Z

438

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Comprehensive Nutrient Management with regulatory guidelines by addressing items such as manure management, field crop nutrients, and storm water What is a CNMP? A Comprehensive Nutrient Management Plan (CNMP) is a total planning tool that details

439

Environmental Best Management Practices  

E-Print Network [OSTI]

Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

Liskiewicz, Maciej

440

Sport Management Academic Offerings  

E-Print Network [OSTI]

production and programming of events; marketing and public relations; technological operations management including (but not limited to) digital advertising, media law, new media business, operations managementSport Management Academic Offerings M.S. In Sport Venue And Event Management GRADUATE Chad Mc

Mather, Patrick T.

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Chemical Management Contacts  

Broader source: Energy.gov [DOE]

Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

442

Information resource management concepts for records managers  

SciTech Connect (OSTI)

Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

Seesing, P.R.

1992-10-01T23:59:59.000Z

443

Hanford Site Environmental Safety and Health Fiscal Year 2001 Budget-Risk management summary  

SciTech Connect (OSTI)

The Hanford Site Environment, Safety and Health (ES&H) Budget-Risk Management Summary report is prepared to support the annual request to sites in the U.S. Department of Energy (DOE) Complex by DOE, Headquarters. The request requires sites to provide supplementary crosscutting information related to ES&H activities and the ES&H resources that support these activities. The report includes the following: (1) A summary status of fiscal year (FY) 1999 ES&H performance and ES&H execution commitments; (2)Status and plans of Hanford Site Office of Environmental Management (EM) cleanup activities; (3) Safety and health (S&H) risk management issues and compliance vulnerabilities of FY 2001 Target Case and Below Target Case funding of EM cleanup activities; (4) S&H resource planning and crosscutting information for FY 1999 to 2001; and (5) Description of indirect-funded S&H activities.

REEP, I.E.

1999-05-12T23:59:59.000Z

444

Environmental disaster or just a drop in the bucket: Texas scientists on the real effects of the Deewater Horizon oil spill  

E-Print Network [OSTI]

Winter 2011 tx H2O 3 or just a drop in thebucket?Texas scientists on the real e#31;ects of the Deepwater Horizon oil spill 4 tx H2O Winter 2011 Environmental Disaster Continued What if gasoline pumped into cars, seafood eaten at restaurants... but forgo#27;en as the wreckage of the Deepwater Horizon MC#31;#30;#31; drilling platform sank into its waters. A crude awakening Like any large oil spill, this one took its toll in many ways. Eleven BP employees on the rig died in the explosion...

Lee, Leslie

2011-01-01T23:59:59.000Z

445

Environmental disaster or just a drop in the bucket?: Texas scientists on the real effects of the Deepwater Horizon oil spill  

E-Print Network [OSTI]

Winter 2011 tx H2O 3 or just a drop in thebucket?Texas scientists on the real e#31;ects of the Deepwater Horizon oil spill 4 tx H2O Winter 2011 Environmental Disaster Continued What if gasoline pumped into cars, seafood eaten at restaurants... but forgo#27;en as the wreckage of the Deepwater Horizon MC#31;#30;#31; drilling platform sank into its waters. A crude awakening Like any large oil spill, this one took its toll in many ways. Eleven BP employees on the rig died in the explosion...

Lee, Leslie

2011-01-01T23:59:59.000Z

446

Simulation-based design of energy management system with storage battery for a refugee shelter in Japan  

SciTech Connect (OSTI)

Since the massive earthquake hit eastern Japan in March, 2011, our team has participated in the recovery planning for Kesen Association, which is a group of cities in northeastern Japan. As one of our proposals for the recovery planning for the community, we are designing energy management system with renewable energy (RE) and storage batteries. Some public facilities in the area have been used as refugee shelters, but refugees had to put up with life without electricity for a while after the disaster. If RE generator and storage batteries are introduced into the facilities, it is possible to provide refugees with electricity. In this study, the sizes of photovoltaic (PV) appliances and storage batteries to be introduced into one public facility are optimized. The optimization is based on simulation, in which electric energy is managed by charge and discharge of storage battery.

Kaji, K.; Zhang, J.; Horie, H.; Tanaka, K. [Department of Technology Management for Innovation, Graduate School of Engineering, The University of Tokyo (Japan); Akimoto, H. [Korea Advanced Institute of Science and Technology (Korea, Republic of)

2013-12-10T23:59:59.000Z

447

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server  

Broader source: Energy.gov [DOE]

BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

448

Information resource management concepts for records managers  

SciTech Connect (OSTI)

Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

Seesing, P.R.

1992-10-01T23:59:59.000Z

449

Management and Program Analyst (Operations Manager)  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Management and Program Analyst in the Office of Strategic Programs in the DOE-EERE.

450

The Waste Management Quality Assurance Implementing Management Plan (QAIMP)  

E-Print Network [OSTI]

DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

Albert editor, R.

2009-01-01T23:59:59.000Z

451

Fusing Integration Test Management with Change Management  

E-Print Network [OSTI]

- 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

Perry, Dewayne E.

452

Waste Management Quality Assurance Plan  

E-Print Network [OSTI]

Revision 6 Waste Management Quality Assurance Plan Waste6 WM QA Plan Waste Management Quality Assurance Plan LBNL/4 Management Quality Assurance

Waste Management Group

2006-01-01T23:59:59.000Z

453

Ground Water Management Act (Virginia)  

Broader source: Energy.gov [DOE]

Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

454

Computerized Maintenance Management Systems  

Broader source: Energy.gov [DOE]

Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

455

Environmental Management Systems (Iowa)  

Broader source: Energy.gov [DOE]

A solid waste planning area (e.g., the land encompassed by a municipality with a comprehensive solid waste management policy) may qualify to be an Environmental Management System if it provides...

456

Business, management and finance  

E-Print Network [OSTI]

Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics MSc in International Accounting and Corporate Governance MSc in International Finance MSc

Sussex, University of

457

Coastal Management Act (Georgia)  

Broader source: Energy.gov [DOE]

The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

458

ENVIRONMENTAL MANAGEMENT Environmental Policy  

E-Print Network [OSTI]

ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

Haase, Markus

459

Environmental Management System Plan  

E-Print Network [OSTI]

management Water conservation LBNL’s approach to sustainable environmentalWater Discharges) of Introduction Environmental Managementenvironmental compliance programs, such as air and water quality, as well as less traditional programs, such as wildland fire management,

Fox, Robert

2009-01-01T23:59:59.000Z

460

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

2012-12-03T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Management of Nuclear Materials  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

2009-08-17T23:59:59.000Z

462

DECENTRALIZED WASTEWATER MANAGEMENT  

E-Print Network [OSTI]

1 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES Katie Sheehan wastewater treatment technologies. www.njunsystems.com Version 1.0, April 2013 #12; 2 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES PART ONE: BACKGROUND, ISSUES, AND PROGRAM

Rosemond, Amy Daum

463

Information Technology Project Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

2012-12-03T23:59:59.000Z

464

Managing Director Buildings, Transportation  

E-Print Network [OSTI]

Site Development Will Terris Manager Gardening Maintenance Jim Gish Manager Landscape Specialty Tegwyn Maintenance and project Delivery Scott Sherwood Director Transportation Services Glenl Wear Director Grounds Supervisor Specialty Crews 17 Area supervisors Custodial Maintenance Charles Anderson Supervisor Activity

Seamons, Kent E.

465

Risk Management Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

2011-01-18T23:59:59.000Z

466

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Disposal of Farm Medical Wastes Dan Vitamins and minerals Topical Medications Sprays Dewormers Ointments #12;Best Environmental Management of environmental contamination with chemicals or infectious agents. These include, among others: Injectable

467

Benchmarking Corporate Energy Management  

E-Print Network [OSTI]

BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

Norland, D. L.

468

Wildlife Management Areas (Florida)  

Broader source: Energy.gov [DOE]

Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

469

Workforce Management Office (WFMO) Functional Statements WORKFORCE MANAGEMENT OFFICE  

E-Print Network [OSTI]

, and destruction. BMD oversees WFMO's personal property management, Freedom of Information Act responses, Entry, organizing, and administering comprehensive human resources management programs in collaboration wMay 2014 Workforce Management Office (WFMO) ­ Functional Statements WORKFORCE MANAGEMENT OFFICE

470

Medical Management Treatment Manual  

E-Print Network [OSTI]

Medical Management Treatment Manual: A Clinical Guide for Researchers and Clinicians) This manual is an adaptation of: Medical Management Treatment Manual: A Clinical Research Guide for Medically, Maryland #12;Message to the Users of this Medical Management (MM) Manual from the Editors Background

Bezrukov, Sergey M.

471

Operating System Resource Management  

E-Print Network [OSTI]

Operating System Resource Management Date: Monday, September 27, 2010 Time: 2:00 ­ 3:00 pm Location constrained. This talk will propose a scheme for addressing the operating system resource management problem Sciences Seminar Series presents Pacific Northwest National Laboratory Resource management is the dynamic

472

FRESH THINKING FOR MANAGEMENT  

E-Print Network [OSTI]

FOR TECHNOLOGY MANAGEMENT Technology Acceptance in Organizations: What Can We Do to Improve it? by Patricia in organizations is thus an important topic in both management research and management practice. Technology choice of a mobile phone. In organizations, there are two steps in technology adoption. First

Yang, Eui-Hyeok

473

Business, management and finance  

E-Print Network [OSTI]

Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

Sussex, University of

474

Financial Management Oversight  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

2006-08-31T23:59:59.000Z

475

Best Environmental Management Practices  

E-Print Network [OSTI]

Best Environmental Management Practices Farm Animal Production Land Application of Manure management practices to avoid polluting surface or groundwater. 1. Public and private water wells Public pollution of surface waters increases. Therefore, to avoid this risk, manure P loadings should be managed

476

Database Management Certificate Program  

E-Print Network [OSTI]

Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

Rose, Michael R.

477

Sport Management Academic Offerings  

E-Print Network [OSTI]

production and programming of events; marketing and public relations; technological operations management Exploration of a topic (to be determined) not covered by the standard curriculum but of interest to faculty and sponsoring events. Management process, including theory of management and practical applications within

Raina, Ramesh

478

Environmental Management at  

E-Print Network [OSTI]

: ANUgreen for the HotRot Organic Recycling Project Sustainable Transport Category Winner: LEAD Development Themes: 1. Community Engagement 2. Energy and Greenhouse Management 3. Water Management 4. Recycling and Waste Management 5. Transport 6. Pollution Prevention and Environmental Risk 7. Biodiversity The Future

479

capabilities Disaster Resiliency and  

E-Print Network [OSTI]

and infrastructure resiliency Energy information and education Policy, financing, and partnership development Broad and sustainable energy systems and facilities. Economic Recovery Through partnerships with local stakeholders The National Renewable Energy Laboratory (NREL) is the nation's leader in energy efficient and renewable energy

480

Obtaining Disaster Assistance (Spanish)  

E-Print Network [OSTI]

cubrir las necesidades relacionadas con el desastre ? Cuando se hayan agotado los Gastos Diarios Adicionales provistos por su p?liza ? Cuando usted no cuenta con recursos de alquiler en su ?rea Para obtener m?s informaci?n, visite www. fema...

Cavanagh, Joyce

2008-09-24T23:59:59.000Z

Note: This page contains sample records for the topic "disaster management vulnerability" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM  

E-Print Network [OSTI]

HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S with a description of the SHAMAN system and briefly introduces its applica- tions to the management of tactical for MANagement). This management system developed at the Network Management Laboratory of the Univer- sity

Sethi, Adarshpal

482

CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S  

E-Print Network [OSTI]

CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012'S ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012-2017 Report Outline Building a Big: Student Recruitment Initiatives Sharing Our Story of Quality Improving the Academic Profile and Student

Powers, Robert

483

CSREES Nutrient Management Working Meeting  

E-Print Network [OSTI]

planning process ­ Nutrient management training ­ P-Indexes and tools developed ­ Educational materials #12Welcome CSREES Nutrient Management Working Meeting May 4 and 5, 2004 Atlanta, GA #12;University Objectives · Information Sharing Among States ­ Nutrient management regulations ­ Nutrient management

484

Radioactive Waste Management Basis  

SciTech Connect (OSTI)

The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

Perkins, B K

2009-06-03T23:59:59.000Z

485

Strategies for Successful Energy Management  

Broader source: Energy.gov [DOE]

This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

486

Material stabilization characterization management plan  

SciTech Connect (OSTI)

This document presents overall direction for characterization needs during stabilization of SNM at the Plutonium Finishing Plant (PFP). Technical issues for needed data and equipment are identified. Information on material categories and links to vulnerabilities are given. Comparison data on the material categories is discussed to assist in assessing the relative risks and desired processing priority.

GIBSON, M.W.

1999-08-31T23:59:59.000Z

487

Energy Management Working Group: Accelerating Energy Management  

E-Print Network [OSTI]

Countries participating in the Global Superior Energy Performance (GSEP) Energy Management Working Group (EMWG) are leveraging their resources and taking collective action to strengthen national and international efforts to facilitate the adoption...

Scheihing, P.

2014-01-01T23:59:59.000Z

488

Rangeland Drought Management for Texans: Livestock Management  

E-Print Network [OSTI]

Livestock producers need to create flexible plans for dealing with drought. This publication explains the steps that should be included in such a plan, including taking a forage inventory, using stocker animals, establishing a livestock management...

Carpenter, Bruce B.; Hart, Charles R.

2001-04-24T23:59:59.000Z

489

A Manager's Approach to Energy Cost Management  

E-Print Network [OSTI]

A major responsibility of management is the control and containment of operating costs. Energy costs are a major portion of the industrial budget. GM has developed a 3 phase approach to energy conservation. Phase I -Administrative Controls...

Spencer, R. J.

490

MAPSAR Simulation in Brazil: Current StatusMAPSAR Simulation in Brazil: Current Status Dr. Waldir Renato Paradella  

E-Print Network [OSTI]

/Geomorphology ·· Disaster ManagementDisaster Management ·· ForestryForestry ·· Geology/Mineral ExplorationGeologyBUnB, CPRM, CPRM ·· Disaster Management (Oil):Disaster Management (Oil): PolidutoPoliduto UrucuIgarapéé AAççuu (AM)(AM) ­­ INPE, INPA, JPLINPE, INPA, JPL ·· Geology:Geology: CarajCarajááss (PA) e(PA) e Cura

Domingues, Margarete Oliveira

491

The Potential Role of Optical Coherence Tomography in the Evaluation of Vulnerable Carotid Atheromatous Plaques: A Pilot Study  

SciTech Connect (OSTI)

Purpose. The decision to intervene surgically in patients with carotid artery disease is based on the presence of symptoms, along with the severity of carotid artery stenosis as assessed by ultrasound or X-ray computed tomography (CT). Optical coherence tomography (OCT) is a relatively new imaging technique that offers potential in the identification of, as well as the distinction between, stable and unstable atherosclerotic plaques. The purpose of our study was to evaluate whether OCT can be used as a noninvasive diagnostic tool to reveal the morphology of carotid stenosis from the adventitial surface of the carotid artery. To achieve this aim, excised atheromatous plaques were scanned by OCT from the external surface. Methods. Plaques removed at carotid endarterectomy were scanned by OCT from the external surface within 72 hr of surgery and then examined histologically. The images of the histologic slides and the scans were then compared. Results. We examined 10 carotid endarterectomy specimens and were able to identify calcification, cholesterol crystal clefts, and lipid deposits in the OCT images with histologic correlation. The strong light scattering from the calcified tissue and cholesterol crystal clefts limited the depth of light penetration, making observation of the intimal surface and the detail of the fibrous cap difficult. However, we were able to confidently identify the absence of an atherosclerotic plaque by OCT scans even from the external surface. Conclusion. The results of this pilot study demonstrate that OCT can reveal the main features of carotid stenosis but that plaque vulnerability cannot be reliably and precisely assessed if scanned from the external surface with OCT in its present form.

Prabhudesai, Vikramaditya [St. Joseph's Hospital, Diagnostic Imaging (Canada); Phelan, Cordelia [University Hospital of North Staffordshire, NHS Trust, Department of Pathology (United Kingdom); Yang, Ying [Institute of Science and Technology in Medicine, Keele University (United Kingdom)], E-mail: bea00@keele.ac.uk; Wang, Ruikang K. [Oregon Health and Science University, Department of Biomedical Engineering (United States); Cowling, Mark G. [University Hospital of North Staffordshire, NHS Trust, Department of Radiology (United Kingdom)

2006-12-15T23:59:59.000Z

492

Corporate Energy Management Process  

E-Print Network [OSTI]

. May 21-24, 2013 Corporate Energy Management Process 2 ?Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Best Practices ? Recognition ?Summary ESL-IE-13-05-25 Proceedings...-value products ? Intelligent, sustainable system solutions ? 2012 Sales: ?72.1 Billion ? Employees: 110,000 Company overview BASF ? The Chemical Company ESL-IE-13-05-25 Proceedings of the Thrity-Fifth Industrial Energy Technology Conference New Orleans, LA...

Geiger, T.

2013-01-01T23:59:59.000Z

493

Sustainable Energy Management Programs  

E-Print Network [OSTI]

Sustainable Energy Management Programs Steve Hanner Allen ISD/TEMA . ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Starting an Energy Management Program • Recognize need, Elicit District Commitment... • Appoint Energy Manager • Analyze Existing Conditions • Develop Plan • Implement and Monitor Program ESL-KT-14-11-45 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Sustainable Programs Feature – District Commitment...

Hanner, S.

2014-01-01T23:59:59.000Z

494

Contemporary heart failure management.  

E-Print Network [OSTI]

??The research presented within this thesis aims to add to the current knowledge regarding contemporary heart failure (HF) management. Chapter 2 describes a study collating… (more)

Wasywich, Cara Anne

2009-01-01T23:59:59.000Z

495

Water Management Act (Massachusetts)  

Broader source: Energy.gov [DOE]

This Act regulates and registers water withdrawals in the Commonwealth of Massachusetts to enable effective planning and management of water use and conservation. The Act establishes a Water...

496

Hazardous Wastes Management (Alabama)  

Broader source: Energy.gov [DOE]

This legislation gives regulatory authority to the Department of Environmental Management to monitor commercial sites for hazardous wastes; fees on waste received at such sites; hearings and...

497

Hazardous Waste Management (Indiana)  

Broader source: Energy.gov [DOE]

The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Department of Environmental...

498

CONFIGURATION MANAGEMENT (CM)  

Broader source: Energy.gov (indexed) [DOE]

Safety systems and mission critical systems are defined and a comprehensive Configuration Management systemprocedure to maintain control over the design and modifications of these...

499

Total Light Management  

Broader source: Energy.gov [DOE]

Presentation covers total light management, and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Providence, Rhode Island.

500

Project Risk Management:.  

E-Print Network [OSTI]

?? The recent increase in international projects has resulted in higher risk along with difficulties in control and coordination. Effective project management can therefore be… (more)

Koelmeyer, Chris

2013-01-01T23:59:59.000Z