Powered by Deep Web Technologies
Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Low floor mass transit vehicle  

DOE Patents [OSTI]

A mass transit vehicle includes a frame structure that provides an efficient and economical approach to providing a low floor bus. The inventive frame includes a stiff roof panel and a stiff floor panel. A plurality of generally vertical pillars extend between the roof and floor panels. A unique bracket arrangement is disclosed for connecting the pillars to the panels. Side panels are secured to the pillars and carry the shear stresses on the frame. A unique seating assembly that can be advantageously incorporated into the vehicle taking advantage of the load distributing features of the inventive frame is also disclosed.

Emmons, J. Bruce (Beverly Hills, MI); Blessing, Leonard J. (Rochester, MI)

2004-02-03T23:59:59.000Z

2

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

3

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassiveSubmitted forHighlights Nuclear PhysicsDoDepartment

4

NYU Electronic Suite for eBilling + ePayment For additional information, visit the Electronic Suite section on the  

E-Print Network [OSTI]

NYU Electronic Suite for eBilling + ePayment For additional information, visit the Electronic Suite of options. This will link you to the secure eSuite website. If parents want to make an electronic check-check payment, parents must be invited by the student, to create an eSuite account. NYU's Electronic Suite

Mohri, Mehryar

5

First Floor1 Second Floor2  

E-Print Network [OSTI]

Resource Center Financial Counseling & Infusion Center Scheduling Lactation Room Meditation Garden Infusion Center Clinical Lab Waiting Playground Registration Infusion Center Waiting Second Floor Research Tower . . . . . . . . . . . . . . . . . .Second Conference Room 2250 . . . . . . . . . . . . . . . . . .Second Financial Counseling & Infusion

Gleeson, Joseph G.

6

STAYS PNNL SUITE  

Energy Science and Technology Software Center (OSTI)

002851IBMPC00 STAYSL PNNL Suite  http://radiochemscieng.pnnl.gov/research_areas/research_area_description.asp?id=283 

7

Design of a flooring removal system for asbestos backed flooring  

E-Print Network [OSTI]

DESIGN OF A FLOORING REMOVAL SYSTEM FOR ASBESTOS BACKED FLOORING A Thesis bi PATHANJALI SAI PUDURU Submitted to the Office of Graduate Studies of Texas AJsM University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1990 Major Subject: Mechanical Engineering DESIGN OF A FLOORING REIyIOVAL SYSTEUil F' OR ASBESTOS BACKED FLOORING A Thesis PATHAX. JALI SAI Pl DI. RF Approved as to style ansi r ontent bp David G. . ansson (C'barr of C'omrnittee) Alan...

Puduru, Pathanjali Sai

2012-06-07T23:59:59.000Z

8

Directed Test Suite Augmentation.  

E-Print Network [OSTI]

??Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those elements.… (more)

Xu, Zhihong

2013-01-01T23:59:59.000Z

9

General Information Symposium Venue's Floor Map  

E-Print Network [OSTI]

be held responsible for accidents to symposium participants or accompanying persons, for damage or loss1 General Information Symposium Venue's Floor Map The Symposium venue is located at 5th floor at 5th floor. Symposium Venue The ISADS 2011 Symposium and Forum, the 4th workshop of AHSP (AHSP 2011

Mori, Kinji

10

Impact of Thermally Insulated Floors  

E-Print Network [OSTI]

Measures for their Implementation in Kuwait (DOE-1), Volume 2: Development of Typical Meteorological Year for Kuwait (Element 2, Sub-element 6). Kuwait Institute for Scientific Research Report No. KISR5857, Kuwait. 2000. ... Department of Kuwait Institute for Scientific Research for revision of the code this paper analyzes the effect of using un-insulated floors on the peak cooling demand and energy consumption of a middle income residential private villa and a one- bedroom...

Alghimlas, F.; Omar, E. A.

2004-01-01T23:59:59.000Z

11

Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStories » Removing nuclear waste,Report ArticlesReport

12

APS Floor Coordinators | Advanced Photon Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07)Operations2AP-XPSAPS Floor Coordinators APS Floor

13

Office Of Safety & Security Avenue West, Suite 117  

E-Print Network [OSTI]

.00 Emerson Motorcycle Quarter $62.50 Commuter (M-F, 7am ­ 4pm) Quarter $100.00 Motorcycle Only ­ Commuter

Nelson, Tim

14

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

15

First Floor Smithsonian American Art Museum  

E-Print Network [OSTI]

First Floor Smithsonian American Art Museum American Experience Folk Art Special ExhibitionsMillan Education Center Folk Art One Life Archives of American Art Gallery Recent AcquisitionsMuseum Store Museum Museum Graphic Arts American Art through 1940 America's Presidents The Struggle for Justice

Mathis, Wayne N.

16

International Flooring Conference 26 March 2009, Changzhou, China  

E-Print Network [OSTI]

International Flooring Conference 26 March 2009, Changzhou, China Global Trade of Wood Products;International Flooring Conference 26 March 2009, Changzhou, China Subjects I. Overview of developments II 26 March 2009, Changzhou, China Acknowledgements · China National Forest Products Industry

17

Design of a biomechanically synergistic exotendon suit  

E-Print Network [OSTI]

The focus of this thesis is on the design, development, and evaluation of a lightweight, exotendon suit for load carriage. The suit is intended to be worn underneath the wearer's own clothes for use in a military setting, ...

Graves, Carmen Marten-Ellis

2013-01-01T23:59:59.000Z

18

Mechanical decontamination techniques for floor drain systems  

SciTech Connect (OSTI)

The unprecedented nature of cleanup activities at Three Mile Island Unit 2 (TMI-2) following the 1979 accident has necessitated the development of new techniques to deal with radiation and contamination in the plant. One of these problems was decontamination of floor drain systems, which had become highly contaminated with various forms of dirt and sludge containing high levels of fission products and fuel from the damaged reactor core. The bulk of this contamination is loosely adherent to the drain pipe walls; however, significant amounts of contamination have become incorporated into pipe wall oxide and corrosion layers and embedded in microscopic pits and fissures in the pipe wall material. The need to remove this contamination was recognized early in the TMI-2 cleanup effort. A program consisting of development and laboratory testing of floor drain decontamination techniques was undertaken early in the cleanup with support from the Electric Power Research Institute (EPRI). Based on this initial research, two techniques were judged to show promise for use at TMI-2: a rotating brush hone system and a high-pressure water mole nozzle system. Actual use of these devices to clean floor drains at TMI-2 has yielded mixed decontamination results. The decontamination effectiveness that has been obtained is highly dependent on the nature of the contamination in the drain pipe and the combination of decontamination techniques used.

Palau, G.L.; Saigusa, Moriyuki

1987-01-01T23:59:59.000Z

19

The Variable Vector Countermeasure Suit for space habitation and exploration  

E-Print Network [OSTI]

The Variable Vector Countermeasure Suit (V2Suit) is a countermeasure suit for sensorimotor adaptation and musculoskeletal deconditioning in microgravity. The V2suit will consist of modules containing arrays of control ...

Vasquez, Rebecca (Rebecca Ann)

2014-01-01T23:59:59.000Z

20

Method and apparatus for recovering a gas from a gas hydrate located on the ocean floor  

DOE Patents [OSTI]

A method and apparatus for recovering a gas from a gas hydrate on the ocean floor includes a flexible cover, a plurality of steerable base members secured to the cover, and a steerable mining module. A suitable source for inflating the cover over the gas hydrate deposit is provided. The mining module, positioned on the gas hydrate deposit, is preferably connected to the cover by a control cable. A gas retrieval conduit or hose extends upwardly from the cover to be connected to a support ship on the ocean surface.

Wyatt, Douglas E. (Aiken, SC)

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Steam System Tool Suite Introduction Guide  

E-Print Network [OSTI]

Steam System Tool Suite Introduction Guide Alternate Text Narratives and Graphic.............................................................................................................................6 Modules Steam System Scoping Tool (SSST)........................................................................................8 Steam System Assessment Tool (SSAT

Oak Ridge National Laboratory

22

Accelerated Wear Tests on Common Floor-covering Materials.  

E-Print Network [OSTI]

*'r** qd** ""~c- web*- !,* . flccelerated Wear Tests e" f loor-couering materials AGRICULTURAL EXPERIMENT STATION R. D. LEWIS, DIRECTOR, COLLEGE STATION. TEXAS SUMMARY I .. - " : 5: Accelerated wear tests made on six common floor covering... coverings make up a large portion of this interior finish. The costs of maintenance and replacement of floor coverings contribute heavily 1 to the cost of home maintenance. Accelerated wear tests on floor covering ma- als were conducted...

Stewart, B. R.; Kunze, O. R.; Hobgood, Price.

1958-01-01T23:59:59.000Z

23

Universal Benchmark Suites Jozo J. Dujmovic  

E-Print Network [OSTI]

the same universal benchmark suite. This approach substantially reduces the cost of benchmarking. Keywords global increase of the cost of benchmarking. The first step in the development of a method for benchmark1 Universal Benchmark Suites Jozo J. Dujmovic Department of Computer Science San Francisco State

Dujmovic, Jozo J.

24

Behavior of Bidirectional Spring Unit in Isolated Floor Systems  

E-Print Network [OSTI]

gravity based sys- tems suspension mechanisms or linear spring based systems coil springs or rubber unitsBehavior of Bidirectional Spring Unit in Isolated Floor Systems Shenlei Cui, M.ASCE1 ; Michel of bidirectional spring units used as isolators in a kind of isolated floor system, three types of characterization

Bruneau, Michel

25

Black Literary Suite: Kansas Authors Edition  

E-Print Network [OSTI]

authors were born or lived in the Sunflower State, and their work often reflects their time in Kansas. This Black Literary Suite exhibit highlights four important black writers—Langston Hughes, Gwendolyn Brooks, Frank Marshall Davis, and Kevin Young...

Wiggins, Meredith Joan

2015-03-04T23:59:59.000Z

26

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

27

Production system improvement : floor area reduction and cycle time analysis  

E-Print Network [OSTI]

A medical device company challenged a research team to reduce the manufacturing floor space required for an occlusion system product by one third. The team first cataloged equipment location and size, detailed the processes ...

Peterson, Jennifer J. (Jennifer Jeanne)

2012-01-01T23:59:59.000Z

28

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

29

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

30

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

31

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

32

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

33

Prioritisation of test suites containing precedence constraints  

E-Print Network [OSTI]

1 Prioritisation of test suites containing precedence constraints Tim Miller Department@unimelb.edu.au Abstract--Test case prioritisation is the process of ordering the exe- cution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Many existing test case prioritisation

Miller, Tim

34

BDP: BrainSuite Diffusion Pipeline  

E-Print Network [OSTI]

BDP: BrainSuite Diffusion Pipeline Chitresh Bhushan #12; Quantify microstructural tissue ROI Connectivity ROI Statistics MPRAGE Diffusion #12;Diffusion Pipeline Dicom to NIfTI Co ROIs Custom ROIs #12;Diffusion Pipeline Dicom to NIfTI Co-registration Diffusion Modeling Tractography

Leahy, Richard M.

35

SUESS ET AL.: SEA FLOOR METHANE HYDRATES AT HYDRATE RIDGE, CASCADIA MARGIN Sea Floor Methane Hydrates at Hydrate Ridge, Cascadia Margin  

E-Print Network [OSTI]

SUESS ET AL.: SEA FLOOR METHANE HYDRATES AT HYDRATE RIDGE, CASCADIA MARGIN 1 Sea Floor Methane are exposed at the sea floor. A methane-oxidizing bacterial consortium populates the exposures of hydrate; colonies of vent macro-fauna are abundant as well. Discharge of methane from destabilized hydrate

Goldfinger, Chris

36

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

37

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

38

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

39

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

40

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

In Outer Space without a Space Suit?  

E-Print Network [OSTI]

The author proposes and investigates his old idea - a living human in space without the encumbrance of a complex space suit. Only in this condition can biological humanity seriously attempt to colonize space because all planets of Solar system (except the Earth) do not have suitable atmospheres. Aside from the issue of temperature, a suitable partial pressure of oxygen is lacking. In this case the main problem is how to satiate human blood with oxygen and delete carbonic acid gas (carbon dioxide). The proposed system would enable a person to function in outer space without a space suit and, for a long time, without food. That is useful also in the Earth for sustaining working men in an otherwise deadly atmosphere laden with lethal particulates (in case of nuclear, chemical or biological war), in underground confined spaces without fresh air, under water or a top high mountains above a height that can sustain respiration.

Alexander Bolonkin

2008-06-24T23:59:59.000Z

42

Novel millimeter wave sensor concepts for energy, environment, and national security  

E-Print Network [OSTI]

Millimeter waves are ideally suited for sensing and diagnosing materials, devices, and processes that are broadly important to energy, environment, and national security. Thermal return reflection (TRR) techniques that ...

Sundaram, S. K.

43

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

44

Extender for securing a closure  

DOE Patents [OSTI]

An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

Thomas, II, Patrick A.

2012-10-02T23:59:59.000Z

45

716 Langdon St 2nd Floor Red Gym  

E-Print Network [OSTI]

716 Langdon St 2nd Floor Red Gym Madison WI 53706 (608) 262-4503 http://msc.wisc.edu 1 FOLLOW OUR of witnesses may always go before you and walk beside you. We bestow a red and white kente stole upon all of our graduates. Red, for passion and sacrifice. White, for initiation and new beginnings. Each stole

Sheridan, Jennifer

46

Visopt ShopFloor System: Integrating Planning into Production Scheduling  

E-Print Network [OSTI]

Visopt ShopFloor System: Integrating Planning into Production Scheduling Roman Barták Charles, the first machine pre-processes the item (3 time units) that is finished in the second machine (additional 3 in parallel and a worker is required (left) or via a serial production when the item is pre- processed

Bartak, Roman

47

Pattern of Thermal Fluctuations in a Recovery Boiler Floor  

SciTech Connect (OSTI)

The floor of a black liquor recovey boiler at a mill in central Canada has experienced cracking and delamination of the composite tubing near the spout wall and deformation of the floor panels that is most severe in the vicinity of the spout wall. One possible explanation for the observed damage is impacts of salt cake falling from the convective section onto the floor. In order to determine if such impacts do occur, strain gauges and thermocouples were installed on the boiler floor in areas where cracking and deformation were most frequent. The data obtained from these instruments indicate that brief, sudden temperature fluctuations do occur, and changes in the strain experienced by the affected tube occur simultaneously. These fluctuations appear to occur less often along the spout wall and more frequently with increasing distance from the wall. The frequency of these temperature fluctuations is insufficient for thermal fatigue to be the sole cause of the cracking observed on the tubes, but the data are consistent with what might be expected from pieces of falling salt cake.

Abdullah, Z.; Gorog, J.P.; Keiser, J.R.; Meyers, L.E.; Swindeman, R.W.

1999-04-25T23:59:59.000Z

48

Pattern of thermal fluctuations in a recovery boiler floor  

SciTech Connect (OSTI)

The floor of a black liquor recovery boiler at a mill in central Canada has experienced cracking and delamination of the composite tubing near the spout wall and deformation of the floor panels that is most severe in the vicinity of the spout wail. One possible explanation for the observed damage is impacts of salt cake falling from the convective section onto the floor. In order to determine if such impacts do occur, strain gauges and thermocouples were installed on the boiler floor in areas where cracking and deformation were most frequent. The data obtained from these instruments indicate that brief, sudden temperature fluctuations do occur, and changes in the strain experienced by-the affected tube occur simultaneously. These fluctuations appear to occur less often along the spout wall and more frequently with increasing distance from the wall. The frequency of these temperature fluctuations is insufficient for thermal fatigue to be the sole cause of the cracking observed on the tubes, but the data are consistent with what might be expected from pieces of falling salt cake.

Keiser, J.R.; Meyers, L.E.; Swindeman, R.W.; Gorog, J.P.; Abdullah, Z.

1999-07-01T23:59:59.000Z

49

Academic Programs and Policy 401 Golden Shore, 6th Floor  

E-Print Network [OSTI]

Academic Programs and Policy 401 Golden Shore, 6th Floor Long Beach, CA 90802-4210 www for graduation is specified (not just the total for the major): _______ the proposed bachelor's program requires no fewer and no more than 120 units _______ proposed bachelor's degree programs

Ponce, V. Miguel

50

Global Energy Partners, LLC 500 Ygnacio Valley Road, Suite 450  

E-Print Network [OSTI]

Global Energy Partners, LLC 500 Ygnacio Valley Road, Suite 450 Walnut Creek, CA 94596 P: 925. This report was prepared by Global Energy Partners, LLC 500 Ygnacio Valley Blvd., Suite 450 Walnut Creek, CA

51

UC DAVIS FORENSIC SCIENCE CENTER 1909 Galileo Court, Suite B  

E-Print Network [OSTI]

UC DAVIS FORENSIC SCIENCE CENTER 1909 Galileo Court, Suite B Davis, CA 95618 Directions to the UC Davis Forensic Science Center: Exit I80 south on Richards Blvd. Richards Blvd. changes its name at the end of the court. Our office is on the right, Suite B. FORENSIC SCIENCE CENTER SUITE B Key Contact

Peisert, Sean

52

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

53

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

54

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

55

Berkeley Lab's SPOT Suite Transforms Beamline Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M. Babzien, I. Ben-Zvi,Benefits PlanabPerformanceSPOT Suite

56

Design and Experiments of a Solar Low-temperature Hot Water Floor Radiant Heating System  

E-Print Network [OSTI]

The solar low-temperature hot water floor radiant heating system combines solar energy heating with floor radiant heating. This kind of environmental heating way not only saves fossil resources and reduces pollution, but also makes people feel more...

Wu, Z.; Li, D.

2006-01-01T23:59:59.000Z

57

Lunar floor-fractured craters: Classification, distribution, origin and implications for magmatism and shallow crustal structure  

E-Print Network [OSTI]

Floor-Fractured Craters (FFCs) are a class of lunar craters characterized by anomalously shallow floors cut by radial, concentric, and/or polygonal fractures; additional interior features are moats, ridges, and patches of ...

Jozwiak, Lauren M.

58

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

59

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

60

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

62

Thermal Behavior of Floor Tubes in a Kraft Recovery Boiler  

SciTech Connect (OSTI)

The temperatures of floor tubes in a slope-floored black liquor recovery boiler were measured using an array of thermocouples located on the tube crowns. It was found that sudden, short duration temperature increases occurred with a frequency that increased with distance from the spout wall. To determine if the temperature pulses were associated with material falling from the convective section of the boiler, the pattern of sootblower operation was recorded and compared with the pattern of temperature pulses. During the period from September, 1998, through February, 1999, it was found that more than 2/3 of the temperature pulses occurred during the time when one of the fast eight sootblowers, which are directed at the back of the screen tubes and the leading edge of the first superheater bank, was operating.

Barker, R.E.; Choudhury, K.A.; Gorog, J.P.; Hall, L.M.; Keiser, J.R.; Sarma, G.B.

1999-09-12T23:59:59.000Z

63

Property:Building/FloorAreaMiscellaneous | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to: navigation, searchFloorAreaHotels

64

Property:Building/FloorAreaResidential | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to: navigation,FloorAreaOtherRetail

65

Property:Building/FloorAreaWarehouses | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress JumpFloorAreaTotal Jump to:

66

PHASE CHANGE MATERIALS IN FLOOR TILES FOR THERMAL ENERGY STORAGE  

SciTech Connect (OSTI)

Passive solar systems integrated into residential structures significantly reduce heating energy consumption. Taking advantage of latent heat storage has further increased energy savings. This is accomplished by the incorporation of phase change materials into building materials used in passive applications. Trombe walls, ceilings and floors can all be enhanced with phase change materials. Increasing the thermal storage of floor tile by the addition of encapsulated paraffin wax is the proposed topic of research. Latent heat storage of a phase change material (PCM) is obtained during a change in phase. Typical materials use the latent heat released when the material changes from a liquid to a solid. Paraffin wax and salt hydrates are examples of such materials. Other PCMs that have been recently investigated undergo a phase transition from one solid form to another. During this process they will release heat. These are known as solid-state phase change materials. All have large latent heats, which makes them ideal for passive solar applications. Easy incorporation into various building materials is must for these materials. This proposal will address the advantages and disadvantages of using these materials in floor tile. Prototype tile will be made from a mixture of quartz, binder and phase change material. The thermal and structural properties of the prototype tiles will be tested fully. It is expected that with the addition of the phase change material the structural properties will be compromised to some extent. The ratio of phase change material in the tile will have to be varied to determine the best mixture to provide significant thermal storage, while maintaining structural properties that meet the industry standards for floor tile.

Douglas C. Hittle

2002-10-01T23:59:59.000Z

67

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

68

OSCAR: Object Security Architecture for the Internet of Things  

E-Print Network [OSTI]

with each client. The load translates into increased energy consumption and a shortened lifetime of devices the Cooja emulator. We show significant energy savings at constrained servers and reasonable delays. We also a concern. Well designed IP security protocol suites have been ported to constrained devices of Io

Paris-Sud XI, Université de

69

Notices Disabled, 1401 S. Clark Street, Suite  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNationalNewportBig Eddyof H-2 andNot519 Federal434

70

Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

- 2013 BTO Peer Review Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System - 2013 BTO Peer Review Commercial Buildings...

71

The Global Health Group 50 Beale Street, Suite 1200  

E-Print Network [OSTI]

The Global Health Group 50 Beale Street, Suite 1200 San Francisco, CA 94105, USA tel: 415 Global Health Group Offices, 50 Beale Street, San Francisco, CA. Contact

Klein, Ophir

72

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

73

Why Do Kraft Recovery Boiler Composite Floor Tubes Crack?  

SciTech Connect (OSTI)

Cracks were first reported in 1992 in co-extruded 304L stainless steel/SA210 Gd Al carbon steel floor tubes of North American black liquor recovery boilers. Since then, a considerable amount of information has been collected on the tube environment, crack characteristics, the stress state of the tubes, and the crack initiation and propagation mechanisms. These studies have identified both operating procedures that apparently can greatly lessen the likelihood of crack formation in the stainless steel layer and alternate materials that appear to be much more resistant to cracking than is 304L stainless.

Keiser, J.R.

2001-10-22T23:59:59.000Z

74

Property:Building/FloorAreaHotels | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to: navigation, searchFloorAreaHotels Jump

75

Property:Building/FloorAreaOtherRetail | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to: navigation,FloorAreaOtherRetail Jump

76

Property:Building/FloorAreaShops | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to:FloorAreaSchoolsChildDayCare Jump

77

Property:Building/FloorAreaSportCenters | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to:FloorAreaSchoolsChildDayCare

78

Property:Building/FloorAreaTotal | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress JumpFloorAreaTotal Jump to: navigation, search

79

Property:Building/TotalFloorArea | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress JumpFloorAreaTotal JumpOid Jump to:

80

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Test Suite Prioritization by Interaction Coverage Renee C. Bryce  

E-Print Network [OSTI]

Test Suite Prioritization by Interaction Coverage Ren´ee C. Bryce Computer Science University event sequences. Managing the size of tests suites for EDS is diffi- cult as the number of event combinations and sequences grow ex- ponentially with the number of events. We propose a new test- ing technique

Bryce, Renee

82

Test Suite Prioritization by Interaction Coverage Renee C. Bryce  

E-Print Network [OSTI]

Test Suite Prioritization by Interaction Coverage Ren´ee C. Bryce Computer Science University event sequences. Managing the size of tests suites for EDS is dif- ficult as the number of possible event combinations and sequences grow exponentially with the number of events. We propose a new testing

Memon, Atif M.

83

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

84

Low Floor Americans with Disabilities Compliant Alternate Fuel Vehicle Project  

SciTech Connect (OSTI)

This project developed a low emission, cost effective, fuel efficient, medium-duty community/transit shuttle bus that meets American's with Disabilities Act (ADA) requirements and meets National Energy Policy Act requirements (uses alternative fuel). The Low Profile chassis, which is the basis of this vehicle is configured to be fuel neutral to accommodate various alternative fuels. Demonstration of the vehicle in Yellowstone Park in summer (wheeled operation) and winter (track operation) demonstrated the feasibility and flexibility for this vehicle to provide year around operation throughout the Parks system as well as normal transit operation. The unique configuration of the chassis which provides ADA access with a simple ramp and a flat floor throughout the passenger compartment, provides maximum access for all passengers as well as maximum flexibility to configure the vehicle for each application. Because this product is derived from an existing medium duty truck chassis, the completed bus is 40-50% less expensive than existing low floor transit buses, with the reliability and durability of OEM a medium duty truck.

James Bartel

2004-11-26T23:59:59.000Z

85

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

86

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

87

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

88

An evaluation of standing-induced lower leg edema as a function of floor surace  

E-Print Network [OSTI]

of Tukey Mean Separation Analysis of Floor Surface Rankings 34 LIST OF FIGURES FIGURE Page 1 Volume Measurement of the Ankle/Foot Region. 16 2 Above-Knee Region (Leg Region A): Percent Volume Change by Floor Surface and Gender. . . 24 3 Below...-Knee Region (Leg Region B): Percent Volume Change by Floor Surface and Gender. . . 25 4 Ankle/Foot Region (Leg Region C): Percent Volume Change by Floor Surface and Gender. . . 26 5 Above-Knee Region (Leg Region A): Percent Volume Change by Week...

DiSalvi, Lawrence Roberts

1995-01-01T23:59:59.000Z

89

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

90

Statistical Analysis of Tank 5 Floor Sample Results  

SciTech Connect (OSTI)

Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide1, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed, and the results of this analysis are reported. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

Shine, E. P.

2013-01-31T23:59:59.000Z

91

Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example  

SciTech Connect (OSTI)

This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling and quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.

Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

2011-12-01T23:59:59.000Z

92

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

93

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

94

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

95

Center for Space Research, Conference Room 2.806, WPR Building, 2nd Floor, 3925 W. Braker Lane, Suite 200, Austin, Texas 78759  

E-Print Network [OSTI]

.csr.utexas.edu/seminars Four related talks concerning work for the Joint Space Operations Center (JSPOC) Thursday, October 9 at the Joint Space Operations Center (JSPOC) for the Air Force. Force modeling and estimation techniques, Senior Scientist with Space Environment Technologies Abstract: Discussion of density variations and how

Lightsey, Glenn

96

Engineering a robotic exoskeleton for space suit simulation  

E-Print Network [OSTI]

Novel methods for assessing space suit designs and human performance capabilities are needed as NASA prepares for manned missions beyond low Earth orbit. Current human performance tests and training are conducted in space ...

Meyen, Forrest Edward

2013-01-01T23:59:59.000Z

97

PREVENTIVE CONSERVATION: A CONCEPT SUITED TO THE CONSERVATION OF EARTHEN  

E-Print Network [OSTI]

PREVENTIVE CONSERVATION: A CONCEPT SUITED TO THE CONSERVATION OF EARTHEN ARCHITECTURAL HERITAGE and Construction Key words: Preventive conservation, traditional conservation practices, risk reduction, heritage management Abstract The concept of "preventive conservation" is relatively old as it has already been

Paris-Sud XI, Université de

98

Mechanical counter-pressure space suit design using active materials  

E-Print Network [OSTI]

Mechanical counter-pressure (MCP) space suits have the potential to greatly improve the mobility of astronauts as they conduct planetary exploration activities; however, the underlying technologies required to provide ...

Holschuh, Bradley Thomas

2014-01-01T23:59:59.000Z

99

The Global Health Group 50 Beale Street, Suite 1200  

E-Print Network [OSTI]

The Global Health Group 50 Beale Street, Suite 1200 San Francisco, CA 94105, USA tel: 415 ­ May 2014, with the possibility of extension. Location: UCSF Global Health Group Offices, 50 Beale

Derisi, Joseph

100

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

UCR Chemistry Program 1953-1966; 2nd floor, Geology Building  

E-Print Network [OSTI]

UCR Chemistry Program 1953-1970 1953-1966; 2nd floor, Geology Building 1966-2005; Pierce Hall of Physical Sciences ­ chemistry, geology, mathematics, physics ­ W. Conway Pierce, Chairman #12;Hart Schmidt of Geology bld; 1954-66 ­ Plus 2nd floor addition; 1959-66 ­ Pierce Hall; 1966-2005 · Instruments and support

Reed, Christopher A.

102

EXPERIMENTAL STUDY OF BI-DIRECTIONAL SPRING UNIT IN ISOLATED FLOOR SYSTEMS  

E-Print Network [OSTI]

) or linear spring based systems (coil springs or rubber units used for restoration force), with viscousEXPERIMENTAL STUDY OF BI-DIRECTIONAL SPRING UNIT IN ISOLATED FLOOR SYSTEMS Shenlei Cui1 , Michel the mechanical behavior of bi-directional spring units used as isolators in a kind of such isolated floor systems

Bruneau, Michel

103

Modified floor response spectra for the Brookhaven National Laboratory High Flux Beam Reactor (HFBR)  

SciTech Connect (OSTI)

This report documents the modified floor response spectra that will be used for future seismic evaluations of structures, systems, and components (SSC`s) within the HFBR and the technical basis for the modified floor response spectra. When used within this report, the term ``current spectra`` refers to the 1978 spectra developed in BNL Informal Report BNL-26019.

Morante, R.J.; Skonieczny, J.

1994-03-01T23:59:59.000Z

104

This bright top floor accommodation comprises: -hall with shelved storage cupboard  

E-Print Network [OSTI]

This bright top floor accommodation comprises: - hall with shelved storage cupboard - fully oak flooring in the living/dining room and varnished floorboards in the hall and double bedroom regarded restaurants and a Waitrose supermarket. Recreational facilities can be found at Warrender Swimming

Edinburgh, University of

105

Numerical Simulation of Thermal Performance of Floor Radiant Heating System with Enclosed Phase Change Material  

E-Print Network [OSTI]

of the energy storage floor is designed,which places heat pipes in the enclosed phase change material (PCM) layer, without concrete in it. The PCM thermal storage time is studied in relation to the floor surface temperature under different low-temperature hot...

Qiu, L.; Wu, X.

2006-01-01T23:59:59.000Z

106

Licence 1 -Parcours Bio Formulaire sur les suites  

E-Print Network [OSTI]

: " (+) - (+) ", " 1 0 ", " 0 � ", " ", " 0 0 ", " 0 ", " 0 ", " 00 ", " 0 ". 5 Limites et in´egalit´es Th´eor l . Th´eor`eme 5.2 Soient (un) et (vn) deux suites. Si lim un = + et si il existe N N tel que (n N vn un) alors lim vn = + Th´eor`eme 5.3 Soient (un), (vn) et (wn) trois suites et l un r´eel. Si lim

Frénod, Emmanuel

107

Ambulatory infusion suite: pre- and post-occupancy evaluation  

E-Print Network [OSTI]

, London W1T 3JH, UK Building Research & Information Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/rbri20 Ambulatory infusion suite: pre- and post-occupancy evaluation Mardelle Mc... published: 08 Aug 2012. To cite this article: Mardelle McCuskey Shepley , Zofia Rybkowski , Jennifer Aliber & Cathleen Lange (2012): Ambulatory infusion suite: pre- and post-occupancy evaluation, Building Research & Information, 40:6, 700-712 To link...

Shepley, Mardelle McCuskey; Rybkowski, Zofia; Aliber, Jennifer; Lange, Cathleen

2015-02-08T23:59:59.000Z

108

Materials and Textile Architecture Analyses for Mechanical Counter-Pressure Space Suits using Active Materials  

E-Print Network [OSTI]

Mechanical counter-pressure (MCP) space suits have the potential to improve the mobility of astronauts as they conduct planetary exploration activities. MCP suits differ from traditional gas-pressurized space suits by ...

Buechley, Leah

109

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

110

GROUND FLOOR SECOND FLOOR  

E-Print Network [OSTI]

-OFF/ PICK-UP ACCESS DRIVE 7. CLOSE PROXIMITY PARKING 8. DEWEY STREET BUILDING EXIT 9. PHOTOVOLTAIC SOLAR PANELS R. INSTITUTES AND CENTERS S. STUDENT BUSINESS INCUBATOR T. ENTREPRENEURIAL RESOURCE CENTER U. GRADUATE STUDIES V. BEHAVIORAL LAB W. EXTERIOR ROOF GARDEN X. FACULTY OFFICES 1 3 4 5 8 9 6 7 rOVeTTa b

Ronquist, Fredrik

111

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

112

Modular, security enclosure and method of assembly  

DOE Patents [OSTI]

A transportable, reusable rapidly assembled and disassembled, resizable modular, security enclosure utilizes a stepped panel construction. Each panel has an inner portion and an outer portion which form joints. A plurality of channels can be affixed to selected joints of the panels. Panels can be affixed to a base member and then affixed to one another by the use of elongated pins extending through the channel joints. Alternatively, the base member can be omitted and the panels themselves can be used as the floor of the enclosure. The pins will extend generally parallel to the joint in which they are located. These elongated pins are readily inserted into and removable from the channels in a predetermined sequence to allow assembly and disassembly of the enclosure. A door constructed from panels is used to close the opening to the enclosure.

Linker, Kevin L. (Albuquerque, NM); Moyer, John W. (Albuquerque, NM)

1995-01-01T23:59:59.000Z

113

E-Print Network 3.0 - arithmtiques des suites Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

arithmtiques des suites Search Powered by Explorit Topic List Advanced Search Sample search results for: arithmtiques des suites Page: << < 1 2 3 4 5 > >> 1 TORSEURS ARITHMTIQUES...

114

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

115

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

116

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

117

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

118

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

119

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

120

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

122

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

123

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

124

Combined Operation of Solar Energy Source Heat Pump, Low-vale Electricity and Floor Radiant System  

E-Print Network [OSTI]

solar energy, low-vale electricity as heat sources in a floor radiant system are analyzed. This paper presents a new heat pump system and discusses its operational modes in winter....

Liu, G.; Guo, Z.; Hu, S.

2006-01-01T23:59:59.000Z

125

Experimental Study of the Floor Radiant Cooling System Combined with Displacement Ventilation  

E-Print Network [OSTI]

ICEBO2006, Shenzhen, China HVAC Technologies for Energy Efficiency, Vol. IV-11-4 Experimental Study of the Floor Radiant Cooling System Combined with Displacement Ventilation Yanli Ren1, Deying Li2, Yufeng Zhang1 1...

Ren, Y.; Li, D.; Zhang, Y.

2006-01-01T23:59:59.000Z

126

The effectiveness of floor mats as an intervention for standing fatigue of light fabrication workers  

E-Print Network [OSTI]

A field study was conducted in a light fabrication plant to determine the effectiveness of floor mats on reducing the symptoms of standing fatigue. Specific physiological variables measured include skin temperature of the foot, blood pooling...

O'Brien, Michael Shannon

1996-01-01T23:59:59.000Z

127

Efficient Formulations for the Multi-Floor Facility Layout Problem with ...  

E-Print Network [OSTI]

Feb 22, 2007 ... 1 Introduction. Facilities design is a methodology for the design of the physical enclosure of a set of operations. ... multiple floors. In addition, a compact building shape may allow for more efficient ... 3 Integrated Formulations.

Marc Goetschalckx and Takashi Irohara

2007-02-22T23:59:59.000Z

128

Production system improvement at a medical devices company : floor layout reduction and manpower analysis  

E-Print Network [OSTI]

Due to the low demand and the need to introduce other production lines in the floor, the medical devices company wants to optimize the utilization of space and manpower for the occlusion system product. This thesis shows ...

AlEisa, Abdulaziz A. (Abdulaziz Asaad)

2012-01-01T23:59:59.000Z

129

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

130

Kelly Services 1600 Valley River Drive, Suite 170  

E-Print Network [OSTI]

Kelly Services® 1600 Valley River Drive, Suite 170 Eugene, OR 97401 Phone: 541.687.9558 Fax: 541 put them on our payroll Experience 1946 ­ Present Kelly Services, Troy, MI We are a global, single to achieve results. We transform workforce challenges into opportunities. 1957 ­ Present Kelly Services

Oregon, University of

131

A Tool Suite to Prototype Pervasive Computing Applications  

E-Print Network [OSTI]

covering the development life- cycle of a pervasive computing system. This tool suite comprises a domain to deployment and test. Our approach We propose an approach that covers the development life- cycleSpecapplication 3 546 7 1 ArchitectureTaxonomy 2 Figure 1. Development life-cycle A. A design language for pervasive

Paris-Sud XI, Université de

132

College of Communication & Information 1345 Circle Park Drive | Suite 302  

E-Print Network [OSTI]

College of Communication & Information 1345 Circle Park Drive | Suite 302 Knoxville, TN 37996 & Communication Studies (CICS) - Awarded grants total $7 million +, NSF, IMLS, Sloan Foundation and more - 2.5+ million in science information and communication contract work at Oak Ridge National Labs. · Hands

Grissino-Mayer, Henri D.

133

Using Dependency Structures for Prioritisation of Functional Test Suites  

E-Print Network [OSTI]

1 Using Dependency Structures for Prioritisation of Functional Test Suites Shifa-e-Zehra Haidry, Australia. 3 Abstract--Test case prioritisation is the process of ordering the exe- cution of test cases software delivery. Many existing test case prioritisation techniques consider that tests can be run in any

Miller, Tim

134

PARENTE SUITE USER'S GUIDE (c) 1994-97  

E-Print Network [OSTI]

and Marriage Networks 5/97 (c) 1991-97 Douglas R. White. Shareware Registration: $10US, 15DM or 50FF You-Calc, and various other utility programs for an evaluation period of up to 45 days. If you wish to continue using Parente Suite after 45 days, you must register by sending $10 to Douglas R. White, Social Science Plaza

White, Douglas R.

135

Predicting the Operational Effectiveness of Aircraft Survivability Equipment Suite  

E-Print Network [OSTI]

, and experiment with their autonomous decision-making against threats in various electronic warfare settings. We: Autonomous Decision-Making, Electronic Warfare Settings, Aircraft Survivability Equipment Suite, Operational Effectiveness 1. Introduction In order to counter threats in electronic warfare environments, a command

Noh, Sanguk

136

Office of International Education Savant Building, Suite 211  

E-Print Network [OSTI]

Office of International Education Savant Building, Suite 211 Atlanta, Georgia 30332-0284 PHONE: 404 Participant FROM: Stephanie Bullard Education Abroad Assistant, Office of International Education RE that GT programs do not currently sponsor. If you intend to transfer credit back to GT for courses your

Li, Mo

137

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

Goldberg, Sharon

138

Comparison of Routable Control System Security Approaches  

SciTech Connect (OSTI)

This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

2011-06-01T23:59:59.000Z

139

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

140

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

142

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

143

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

144

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

145

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

146

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

147

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

148

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

149

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

150

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

151

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

152

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

153

Enhanced verification test suite for physics simulation codes  

SciTech Connect (OSTI)

This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations.

Kamm, James R.; Brock, Jerry S.; Brandon, Scott T.; Cotrell, David L.; Johnson, Bryan; Knupp, Patrick; Rider, William J.; Trucano, Timothy G.; Weirs, V. Gregory

2008-09-01T23:59:59.000Z

154

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

155

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

156

Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor  

E-Print Network [OSTI]

Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder to distinguish from the neutrino background. However for most velocity distributions the neutrino floor can still be surpassed using timing information, though certain velocity streams may prove problematic.

Jonathan H. Davis

2014-12-03T23:59:59.000Z

157

Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor  

E-Print Network [OSTI]

Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder to distinguish from the neutrino background. However for most velocity distributions the neutrino floor can still be surpassed using timing information, though certain velocity streams may prove problematic.

Jonathan H. Davis

2015-03-09T23:59:59.000Z

158

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

159

Support of Gulf of Mexico Hydrate Research Consortium: Activities of Support Establishment of a Sea Floor Monitoring Station Project  

SciTech Connect (OSTI)

The Gulf of Mexico Hydrates Research Consortium (GOM-HRC) was established in 1999 to assemble leaders in gas hydrates research that shared the need for a way to conduct investigations of gas hydrates and their stability zone in the Gulf of Mexico in situ on a more-or-less continuous basis. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory (SFO) on the sea floor in the northern Gulf of Mexico, in an area where gas hydrates are known to be present at, or just below, the sea floor and to discover the configuration and composition of the subsurface pathways or 'plumbing' through which fluids migrate into and out of the hydrate stability zone (HSZ) to the sediment-water interface. Monitoring changes in this zone and linking them to coincident and perhaps consequent events at the seafloor and within the water column is the eventual goal of the Consortium. This mission includes investigations of the physical, chemical and biological components of the gas hydrate stability zone - the sea-floor/sediment-water interface, the near-sea-floor water column, and the shallow subsurface sediments. The eventual goal is to monitor changes in the hydrate stability zone over time. Establishment of the Consortium succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among those involved in gas hydrates research. Complementary expertise, both scientific and technical, has been assembled to promote innovative methods and construct necessary instrumentation. Following extensive investigation into candidate sites, Mississippi Canyon 118 (MC118) was chosen by consensus of the Consortium at their fall, 2004, meeting as the site most likely to satisfy all criteria established by the group. Much of the preliminary work preceding the establishment of the site - sensor development and testing, geophysical surveys, and laboratory studies - has been reported in agency documents including the Final Technical Report to DOE covering Cooperative Agreement DEFC26-00NT40920 and Semiannual Progress Reports for this award, DE-FC26-02NT41628. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in MC118 in May of 2005. Follow-up deployments, planned for fall 2005, had to be postponed due to the catastrophic effects of Hurricane Katrina (and later, Rita) on the Gulf Coast. SFO completion, now anticipated for 2009-10, has, therefore, been delayed. Although delays caused scheduling and deployment difficulties, many sensors and instruments were completed during this period. Software has been written that will accommodate the data that the station retrieves, when it begins to be delivered. In addition, new seismic data processing software has been written to treat the peculiar data to be received by the vertical line array (VLA) and additional software has been developed that will address the horizontal line array (HLA) data. These packages have been tested on data from the test deployments of the VLA and on data from other, similar, areas of the Gulf (in the case of the HLA software). During the life of this Cooperative Agreement (CA), the CMRET conducted many cruises. Early in the program these were executed primarily to survey potential sites and test sensors and equipment being developed for the SFO. When MC118 was established as the observatory site, subsequent cruises focused on this location. Beginning in 2005 and continuing to the present, 13 research cruises to MC118 have been conducted by the Consortium. During September, 2006, the Consortium was able to secure 8 days aboard the R/V Seward Johnson with submersible Johnson SeaLink, a critical chapter in the life of the Observatory project as important documentation, tests, recoveries and deployments were accomplished during this trip (log appended). Consortium members have participated materially in a number of additional cruises including several of the NIUST autonomous underwater vehicle (AUV), Ea

J. Robert Woolsey; Thomas McGee; Carol Lutken

2008-05-31T23:59:59.000Z

160

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

162

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

163

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

164

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

165

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

166

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

167

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

168

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect (OSTI)

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

169

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

170

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

171

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

172

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

173

Heat pumps and under floor heating as a heating system for Finnish low-rise residential buildings.  

E-Print Network [OSTI]

??In bachelor’s thesis the study of under floor heating system with ground source heat pump for the heat transfers fluid heating is considered. The case… (more)

Chuduk, Svetlana

2010-01-01T23:59:59.000Z

174

Report on Analysis of Forest Floor Bulk Density and Depth at the Savannah River Site.  

SciTech Connect (OSTI)

The forest floor data from the Savannah River Site consists of two layers, the litter layer and the duff layer. The purpose for the study was to determine bulk density conversion factors to convert litter and duff depth values in inches to forest floor fuel values in tons per acre. The primary objective was to collect litter and duff samples to adequately characterize forest floor depth and bulk density for combinations of 4 common forest types (loblolly/slash pine, longleaf pine, pine and hardwood mix, upland hardwood), 3 age classes (5-20, 20-40, 40+ years old) and 3 categories of burning history (0-3, 3-10, 10+ years since last burn).

Bernard R. Parresol

2005-10-01T23:59:59.000Z

175

Space suit simulator for partial gravity extravehicular activity experimentation and training  

E-Print Network [OSTI]

During human space exploration, mobility is extremely limited when working inside a pressurized space suit. Astronauts perform extensive training on Earth to become accustomed to space suit-imposed high joint torques and ...

Gilkey, Andrea L. (Andrea Lynn)

2012-01-01T23:59:59.000Z

176

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

177

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

178

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

179

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

180

Testing the Floor Scale Designated for Pacific Northwest National Laboratory's UF6 Cylinder Portal Monitor  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory (PNNL) obtained a Mettler Toledo floor scale for the purpose of testing it to determine whether it can replace the International Atomic Energy Agency’s (IAEA) cumbersome, hanging load cell. The floor scale is intended for use as a subsystem within PNNL’s nascent UF6 Cylinder Portal Monitor. The particular model was selected for its accuracy, size, and capacity. The intent will be to use it only for 30B cylinders; consequently, testing did not proceed beyond 8,000 lb.

Curtis, Michael M.; Weier, Dennis R.

2009-03-12T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007  

E-Print Network [OSTI]

Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007 Fernando L. Podio Dylan Yaga Christofer J. McGinnis NISTIR 7791 #12;NISTIR 7791 Conformance Test Architecture and Test Suite for ANSI of these standards and the associated conformance test architectures and test suites. The ANSI/NIST-ITL standard

182

Using Hybrid Algorithm For Pareto Efficient Multi-Objective Test Suite Minimisation  

E-Print Network [OSTI]

Using Hybrid Algorithm For Pareto Efficient Multi-Objective Test Suite Minimisation Shin Yoo & Mark Harman King's College London, Strand, London, WC2R 2LS, UK Abstract Test suite minimisation techniques seek to reduce the effort required for regression testing by selecting a subset of test suites

Singer, Jeremy

183

Measuring and Improving Latency to Avoid Test Suite Wear Out Shin Yoo & Mark Harman  

E-Print Network [OSTI]

Measuring and Improving Latency to Avoid Test Suite Wear Out Shin Yoo & Mark Harman King's College London Centre for Research on Evolution, Search & Testing (CREST) London, UK {shin.yoo, mark introduces the concept of test suite latency. The more latent a test suite, the more it is possible

Singer, Jeremy

184

1 SWIM suits up in pursuit of national  

E-Print Network [OSTI]

: Cyber-Engineering Functional Nanoparticles for Targeted Drug Delivery 8 Student News: Doctoral Scholars.Water research is focused upon improving water infrastructure and distribution, water remediation, water success in securing significant research funding support. Additionally, ICTAS has invested close to $900

Crawford, T. Daniel

185

The SECO suite of codes for site Performance Assessment  

SciTech Connect (OSTI)

Modeling for Performance Assessment of the Waste Isolation Pilot Plant (WIPP ) has led to development of the SECO suite of codes for groundwater flow, particle tracking, and transport. Algorithm and code developments include the following areas: facilitation of grid convergence tests in multiple domains; correct treatment of transmissivity factors for unconfined aquifers; efficient multigrid algorithms; a formulation of brine Darcy flow equations that uses freshwater head as the dependent able; boundary-fitted coordinates; temporal high order particle tracking; an efficient and accurate implicit Finite Volume TVD algorithm for radionuclide transport in (possibly) fractured porous media; accurate calculation of advection via a flux-based modified method of characteristics; and Quality Assurance procedures.

Roache, P.J. [Ecodynamics Research Associates, Inc., Albuquerque, NM (United States)

1993-03-01T23:59:59.000Z

186

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

187

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

188

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

189

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

190

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

191

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

192

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

193

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

194

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

195

Integration of APECS and VE-Suite for Data Overlay  

SciTech Connect (OSTI)

In the design of advanced power generation facilities, process simulation tools are being utilized to model plant behavior and quickly analyze results. While such tools enable investigation of crucial aspects of plant design, typical commercial process simulators still do not explore some plant design information, including high-fidelity data from computational fluid dynamics (CFD) models of complex thermal and fluid flow phenomena, economics data used for policy decisions, operational data after the plant is constructed, and as-built information for use in as-designed models. Software tools must be created that allow disparate sources of information to be integrated for facilitating accurate and effective plant design. At the Department of Energy’s (DOE) National Energy Technology Laboratory (NETL), the Advanced Process Engineering Co-Simulator (APECS) has been developed as an integrated software suite that combines process simulation (e.g., Aspen Plus®) and high-fidelity equipment simulation (e.g., FLUENT®). In this paper, the integration of the high-fidelity CFD data with overall process data in a virtual power simulation environment will be described. More specifically, we will highlight VE-Suite, an open-source virtual engineering (VE) software toolkit, and its support of Aspen Plus® Hierarchy blocks via the VE-AspenUnit.

McCorkel, Doug (Iowa State University, Ames, IA); Bivins, Gerrick (Iowa State University, Ames, IA); Jordan, Terry; Bryden, Mark (Iowa State University, Ames, IA); Zitney, S.E.; Widmann, John (ANSYS, Lebanon, NH); Osawe, Maxwell

2008-06-01T23:59:59.000Z

196

Integration of APECS and VE-Suite for data overlay  

SciTech Connect (OSTI)

In the design of advanced power generation facilities, process simulation tools are being utilized to model plant behavior and quickly analyze results. While such tools enable investigation of crucial aspects of plant design, typical commercial process simulators still do not explore some plant design information, including high-fidelity data from computational fluid dynamics (CFD) models of complex thermal and fluid flow phenomena, economics data used for policy decisions, operational data after the plant is constructed, and as-built information for use in as-designed models. Software tools must be created that allow disparate sources of information to be integrated for facilitating accurate and effective plant design. At the Department of Energy’s (DOE) National Energy Technology Laboratory (NETL), the Advanced Process Engineering Co-Simulator (APECS) has been developed as an integrated software suite that combines process simulation (e.g., Aspen Plus®) and high-fidelity equipment simulation (e.g., FLUENT®). In this paper, the integration of the high-fidelity CFD data with overall process data in a virtual power simulation environment will be described. More specifically, we will highlight VE-Suite, an open-source virtual engineering (VE) software toolkit, and its support of Aspen Plus® Hierarchy blocks via the VE-AspenUnit.

McCorkel, D.; Bivins, G.; Jordan, T.; Bryden, M.; Zitney, S.; Widmann, J.; Osawe, M.

2008-01-01T23:59:59.000Z

197

Houses for early weaned piglets : influence of rearing on the floor or in batteries,  

E-Print Network [OSTI]

Houses for early weaned piglets : influence of rearing on the floor or in batteries, temperature groups in order to determine the influence of rearing conditions (housing, room temperature) and feeding on the animals performances between weaning at 36 ± 3 days and 70 days of age. Housing characteristics were

Paris-Sud XI, Université de

198

Support Vector Networks for Prediction of Floor Pressures in Shallow Cavity Flows  

E-Print Network [OSTI]

to collect a set of data, which is in the form of pressure readings from particular points in the test measurement at the cavity floor. The SVM based model is built for a very limited amount of training data indicate that the SVM based model is capable of matching the experimental data satisfactorily over

Efe, Mehmet Ă?nder

199

Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor  

E-Print Network [OSTI]

Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder ...

Davis, Jonathan H

2014-01-01T23:59:59.000Z

200

PRINCETON UNIVERSITY Office of the General Counsel New South, Fourth Floor  

E-Print Network [OSTI]

PRINCETON UNIVERSITY Office of the General Counsel New South, Fourth Floor (609) 258-2500 To as interpreted by the U.S. Department of Education's Office for Civil Rights (OCR). In the event you believe with the authority to interpret and enforce Title IX. In this capacity, OCR is given substantial deference by courts

Singh, Jaswinder Pal

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Wing Wave: Feasible, Alternative, Renewable, Electrical Energy Producing Ocean Floor System  

E-Print Network [OSTI]

Wing Wave: Feasible, Alternative, Renewable, Electrical Energy Producing Ocean Floor System Mark, alternative energy system to convert the circular motion of ocean waves as they propagate through the sea and feasible alternative, renewable, electrical energy producing subsea system. Index Terms--ocean energy, wave

Wood, Stephen L.

202

Take a quick trip around the experimental floor of the Lab's new light source  

SciTech Connect (OSTI)

Take a quick trip around the experimental floor of Brookhaven Lab's new light source -- the $912-million National Synchrotron Light Source II. Construction of the facility is now over 70 percent completed. With much of the conventional construction done, accelerator and experimental components are being installed.

None

2012-04-30T23:59:59.000Z

203

SPATIAL AND TEMPORAL VARIATION IN CALCIUM AND ALUMINUM IN NORTHERN HARDWOOD FOREST FLOORS  

E-Print Network [OSTI]

-6955) (Received 23 December 2003; accepted 22 July 2004) Abstract. Acid rain results in losses of exchangeable: acid rain, Ca:Al, cation depletion, forest floor, soil 1. Introduction Acid rain is thought to have and Simonsson, 2003). Alternatively, mobilization of Al by acid rain from the mineral soil below may provide

Phillips, Richard P.

204

System design description for the consolidated sludge sampling system for K Basins floor and fuel canisters  

SciTech Connect (OSTI)

This System Design Description describes the Consolidated Sludge Sampling System used in the gathering of sludge samples from K Basin floor and fuel canisters. This document provides additional information on the need for the system, the functions and requirements of the systems, the operations of the system, and the general work plan used in its' design and development.

HECHT, S.L.

1999-02-18T23:59:59.000Z

205

Systemwide Risk Management and Public Safety 401 Golden Shore, 5th Floor  

E-Print Network [OSTI]

Systemwide Risk Management and Public Safety 401 Golden Shore, 5th Floor Long Beach, CA 90802 in this self-insured program. The Office of Risk Management in the Chancellor's Office administers the general liability, workers' compensation, property, and professional liability programs. The State Office of Risk

de Lijser, Peter

206

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

207

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

208

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

209

Facilities | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Research and Development manages and oversees the operation of an exceptional suite of science, technology and engineering facilities that support and further the national...

210

Security Assessment Simulation Toolkit (SAST) Final Report  

SciTech Connect (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

211

Dose-Effect Relationships for Individual Pelvic Floor Muscles and Anorectal Complaints After Prostate Radiotherapy  

SciTech Connect (OSTI)

Purpose: To delineate the individual pelvic floor muscles considered to be involved in anorectal toxicity and to investigate dose-effect relationships for fecal incontinence-related complaints after prostate radiotherapy (RT). Methods and Materials: In 48 patients treated for localized prostate cancer, the internal anal sphincter (IAS) muscle, the external anal sphincter (EAS) muscle, the puborectalis muscle (PRM), and the levator ani muscles (LAM) in addition to the anal wall (Awall) and rectal wall (Rwall) were retrospectively delineated on planning computed tomography scans. Dose parameters were obtained and compared between patients with and without fecal urgency, incontinence, and frequency. Dose-effect curves were constructed. Finally, the effect of an endorectal balloon, which was applied in 28 patients, was investigated. Results: The total volume of the pelvic floor muscles together was about three times that of the Awall. The PRM was exposed to the highest RT dose, whereas the EAS received the lowest dose. Several anal and rectal dose parameters, as well as doses to all separate pelvic floor muscles, were associated with urgency, while incontinence was associated mainly with doses to the EAS and PRM. Based on the dose-effect curves, the following constraints regarding mean doses could be deduced to reduce the risk of urgency: {<=}30 Gy to the IAS; {<=}10 Gy to the EAS; {<=}50 Gy to the PRM; and {<=}40 Gy to the LAM. No dose-effect relationships for frequency were observed. Patients treated with an endorectal balloon reported significantly less urgency and incontinence, while their treatment plans showed significantly lower doses to the Awall, Rwall, and all pelvic floor muscles. Conclusions: Incontinence-related complaints show specific dose-effect relationships to individual pelvic floor muscles. Dose constraints for each muscle can be identified for RT planning. When only the Awall is delineated, substantial components of the continence apparatus are excluded.

Smeenk, Robert Jan, E-mail: r.smeenk@rther.umcn.nl [Department of Radiation Oncology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands); Hoffmann, Aswin L. [Department of Radiation Oncology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands); Hopman, Wim P.M. [Department of Gastroenterology and Hepatology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands); Lin, Emile N.J. Th. van; Kaanders, Johannes H.A.M. [Department of Radiation Oncology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands)

2012-06-01T23:59:59.000Z

212

Suite of Photo-electrochemical Technologies for Hydrogen Production -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystalline Gallium Oxide ThinIonSubstrate-InducedSuccess

213

User Guide for the STAYSL PNNL Suite of Software Tools  

SciTech Connect (OSTI)

The STAYSL PNNL software suite provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist of the reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations.

Greenwood, Lawrence R.; Johnson, Christian D.

2013-02-27T23:59:59.000Z

214

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

215

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

216

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

217

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

218

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

219

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

220

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

222

Energy and Nutrient Dynamics of Forest Floors in Three Minnesota Forests Author(s): W. A. Reiners and N. M. Reiners  

E-Print Network [OSTI]

Energy and Nutrient Dynamics of Forest Floors in Three Minnesota Forests Author(s): W. A. Reiners. http://www.jstor.org #12;497 ENERGY AND NUTRIENT DYNAMICS OF FOREST FLOORS IN THREE MINNESOTA FORESTS and subsequent utilization by heterotrophs is a major pathway of energy flow. Forest floors can also

Minnesota, University of

223

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

224

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

225

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

226

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

227

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

228

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

229

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

230

New Atmospheric Profiling Instrument Added to SGP CART Suite  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of1, 2007TransmissiontoSystemNewApproaches3 New

231

NREL: Energy Storage - Battery Lifetime Analysis and Simulation Tool Suite  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and Achievements ofLiz Torres PhotoMaterials Science Learn

232

Suite of Cellulase Enzyme Technologies for Biomass Conversion - Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystalline Gallium Oxide ThinIonSubstrate-InducedSuccess StoriesInnovation

233

Innovative residential floor construction: Structural evaluation of steel joists with pre-formed web openings  

SciTech Connect (OSTI)

Since 1992, the US Department of Housing and Urban Development has sponsored numerous studies to identify, evaluate, and implement innovative structural materials, such as cold-formed steel (CFS), in the residential market. The use of CFS is still very limited, partly because steel is not being effectively integrated into conventional home construction. One of the major barriers to the use of CFS floor joists is the impact it has on placement of large waste drains and ductwork installed in floor systems. This report provides an overview of tests conducted by the NAHB to integrate these systems with CFS. A brief literature review of relevant work followed by a detailed overview of the experimental and analytical approach are also provided. The report recommends adoption of the research findings in residential and commercial applications.

Elhajj, N.R.

1999-03-01T23:59:59.000Z

234

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

235

Floor response spectra for seismic qualification of Kozloduy VVER 440-230 NPP  

SciTech Connect (OSTI)

In this paper the floor response spectra generation methodology for Kozloduy NPP, Unit 1-2 of VVER 440-230 is presented. The 2D coupled soil-structure interaction models are used combined with a simplified correction of the final results for accounting of torsional effects. Both time history and direct approach for in-structure spectra generation are used and discussion of results is made.

Kostov, M.K. [Bulgarian Academy of Sciences, Sofia (BG). Central Lab. for Seismic Mechanics and Earthquake Engineering; Ma, D.C. [Argonne National Lab., IL (United States); Prato, C.A. [Univ. of Cordoba (AR); Stevenson, J.D. [Stevenson and Associates, Cleveland, OH (US)

1993-08-01T23:59:59.000Z

236

An evaluation of floor surfaces on the basis of skin temperature during constrained standing  

E-Print Network [OSTI]

popliteal fossa (popliteal region), and the medial side of abductor hallucis on the non-load bearing region of the foot (near the intersection of the top of the arch and the instep) or the foot region. All thermistors were located on the left leg... between an average ending temperature and an average start-up temperature. The foot skin temperature region was the only temperature region to indicate statistically significant results between the floor surfaces. The other two lower leg temperature...

Monford, Leo Gabriel

1995-01-01T23:59:59.000Z

237

Property:Building/FloorAreaUnheatedRentedPremises | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress JumpFloorAreaTotal Jump to: navigation,

238

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

239

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

240

Status Report on Studies of Recovery Boiler Composite Floor Tube Cracking  

SciTech Connect (OSTI)

Cracking of the stainless steel layer of co-extruded 304L stainless steel/SA210 Gd A 1 carbon steel black liquor recovery boiler floor tubes has been identified as one of the most serious material problems in the pulp and paper industry. A DOE-funded study was initiated in 1995 with the goal of determining the cause of and possible solutions to this cracking problem. These studies have characterized tube cracking as well as the chemical and thermal environment and stress state of floor tubes. Investigations of possible cracking mechanisms indicate that stress corrosion cracking rather than thermal fatigue is a more likely cause of crack initiation. The cracking mechanism appears to require the presence of hydrated sodium sulfide and is most likely active during shut-downs and/or start-ups. Based on these results and operating experience, certain alloys appear to be more resistant than others to cracking in the floor environment, and certain operating practices appear to significantly lessen the likelihood of cracking. This report is the latest in a series of progress reports presented on this project.

Eng, P.; Frederick, L.A.; Hoffmann, C.M.; Keiser, J.R.; Mahmood, J.; Maziasz, P.J.; Prescott, R.; Sarma, G.B.; Singbeil, D.L.; Singh, P.M.; Swindeman, R.W.; Wang, X.-L.

1999-09-12T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Designing a Suit to Protect Migrant Farm Workers in California from Pesticide Exposure  

E-Print Network [OSTI]

.........................................................................................................19 4.1 PESTICIDE RESISTANCE PROPERTIES OF MATERIALS...................................................................................................................................30 4.2 THERMAL COMFORT OF SUIT...........................................................................................................................................31 4.2.2 Thermal Comfort Testing Methods

Agogino, Alice M.

242

From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits...  

Energy Savers [EERE]

From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits- Mound Science and Energy Museum Programs Cover a Wide Range of Topics From Hydrogen Fuel Cells to...

243

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

244

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

245

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

246

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

247

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

248

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

249

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

250

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

251

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

252

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

253

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

254

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

255

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

256

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

257

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

258

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

259

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

260

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

262

Cyclic transgressive and regressive sequences, Paleocene Suite, Sirte basin, Libya  

SciTech Connect (OSTI)

The Farrud lithofacies represent the main reservoir rock of the Ghani oil field and Western Concession Eleven of the Sirte basin, Libya. Eight microfacies are recognized in the Farrud lithofacies in the Ghani field area: (1) bryozoan-bioclastic (shallow, warm, normal marine shelf deposits); (2) micrite (suggesting quiet, low-energy conditions such as may have existed in a well-protected lagoon); (3) dasycladacean (very shallow, normal marine environment); (4) bioclastic (very shallow, normal marine environment with moderate to vigorous energy); (5) mgal (very shallow, normal marine environment in a shelf lagoon); (6) pelletal-skeletal (deposition within slightly agitated waters of a sheltered lagoon with restricted circulation); (7) dolomicrite (fenestrate structures indicating a high intertidal environment of deposition); and (8) anhydrite (supratidal environment). The Paleocene suite of the Farrud lithofacies generally shows a prograding, regressive sequence of three facies: (1) supratidal facies, characterized by nonfossiliferous anhydrite, dolomite, and dolomitic pelletal carbonate mudstone; (2) intertidal to very shallow subtidal facies, characterized by fossiliferous, pelletal, carbonate mudstone and skeletal calcarenite; and (3) subtidal facies, characterized by a skeletal, pelletal, carbonate mudstone. Source rocks were primarily organic-rich shales overlying the Farrud reservoir rock. Porosity and permeability were developed in part by such processes as dolomitization, leaching, and fracturing in the two progradational, regressive carbonate facies. Hydrocarbons were trapped by a supratidal, anhydrite cap rock.

Abushagur, S.A.

1986-05-01T23:59:59.000Z

263

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

264

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

265

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

266

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

267

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

268

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

269

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

270

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

271

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

272

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

273

Specification and Analysis of the AER/NCA Active Network Protocol Suite in  

E-Print Network [OSTI]

Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real­Time Maude Peter and the Maude formal methodology to the specification and analy­ sis of the AER/NCA suite of active network and the composability of its components, AER/NCA poses challenging new problems for its formal specification

Ă?lveczky, Peter Csaba

274

Specification and Analysis of the AER/NCA Active Network Protocol Suite in  

E-Print Network [OSTI]

Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

Ă?lveczky, Peter Csaba

275

Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite  

E-Print Network [OSTI]

Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite Andreas Lanz1. In this software demonstration we show how the AristaFlow BPM Suite ­ an adaptive process management system) as offered by AristaFlow. 1 Introduction In many domains IT support can benefit from BPM technologies

Pfeifer, Holger

276

Designing for the Future: The New Open Suite of Programs and Peer Review Process  

E-Print Network [OSTI]

Designing for the Future: The New Open Suite of Programs and Peer Review Process Questions and Answers 1 Rationale 1. If the changes to the Open Suite of Programs and peer review process are successful processes is to develop a high quality, flexible and sustainable system capable of identifying

Charette, André

277

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

278

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

279

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

280

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

282

Forest floor bulk density and depth at Savannah River - Draft Final Report.  

SciTech Connect (OSTI)

Knowing the amount of biomass across a landscape is becoming increasingly important to fire managers as new fuel and fire management decision support systems come on line. Fire managers rarely have the time or funding available to sample fuels operationally and often depend upon mean values for critical variables whose variation is often associated with simple stand characteristics such as age, forest type, time since last burn, stocking, or site, and other easily measured variables. This report outlines a study to collect and analyze litter and duff bulk density samples for developing a simple predictive tool to estimate forest floor fuel loading based on simple stand characteristics.

Maier, Brian; Ottmar, Roger; Wright, Clint

2004-12-28T23:59:59.000Z

283

Property:Building/FloorAreaSchoolsChildDayCare | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug PowerAddress Jump to:FloorAreaSchoolsChildDayCare Jump to:

284

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

285

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

286

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

287

Characterization of the Radiation Shielding Properties of US andRussian EVA Suits  

SciTech Connect (OSTI)

Reported herein are results from the Eril Research, Inc.(ERI) participationin the NASA Johnson Space Center sponsored studycharacterizing the radiation shielding properties of the two types ofspace suit that astronauts are wearing during the EVA on-orbit assemblyof the International Space Station (ISS). Measurements using passivedetectors were carried out to assess the shielding properties of the USEMU Suit and the Russian Orlan-M suit during irradiations of the suitsand a tissue equivalent phantom to monoenergetic proton and electronbeams at the Loma Linda University Medical Center (LLUMC). Duringirradiations of 6 MeV electrons and 60 MeV protons, absorbed dose as afunction of depth was measured using TLDs exposed behind swatches of thetwo suit materials and inside the two EVA helmets. Considerable reductionin electron dosewas measured behind all suit materials in exposures to 6MeV electrons. Slowing of the proton beam in the suit materials led to anincrease in dose measured in exposures to 60 MeV protons. During 232 MeVproton irradiations, measurements were made with TLDs and CR-39 PNTDs atfive organ locations inside a tissue equivalent phantom, exposed bothwith and without the two EVA suits. The EVA helmets produce a 13 to 27percent reduction in total dose and a 0 to 25 percent reduction in doseequivalent when compared to measurements made in the phantom head alone.Differences in dose and dose equivalent between the suit and non-suitirradiations forthe lower portions of the two EVA suits tended to besmaller. Proton-induced target fragmentation was found to be asignificant source of increased dose equivalent, especially within thetwo EVA helmets, and average quality factor inside the EMU and Orlan-Mhelmets was 2 to 14 percent greater than that measured in the barephantom head.

Benton, E.R.; Benton, E.V.; Frank, A.L.

2001-10-26T23:59:59.000Z

288

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

289

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

290

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

291

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

292

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

293

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

294

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

295

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

296

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

297

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

298

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

299

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

300

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

302

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

303

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

304

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

305

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

306

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

307

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

308

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

309

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

310

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

311

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

312

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

313

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

314

An investigation of space suit mobility with applications to EVA operations  

E-Print Network [OSTI]

The primary aim of this thesis is to advance the current understanding of astronauts' capabilities and limitations in space-suited extravehicular activity (EVA) by compiling a detailed database of the torques needed to ...

Schmidt, Patricia Barrett, 1974-

2001-01-01T23:59:59.000Z

315

Understanding human-space suit interaction to prevent injury during extravehicular activity  

E-Print Network [OSTI]

Extravehicular Activity (EVA) is a critical component of human spaceflight. Working in gas-pressurized space suits, however, causes fatigue, unnecessary energy expenditure, and injury. The problem of injury is particularly ...

Anderson, Allison P. (Allison Paige)

2014-01-01T23:59:59.000Z

316

Development of a mechanical counter pressure Bio-Suit System for planetary exploration  

E-Print Network [OSTI]

Extra-vehicular activity (EVA) is critical for human spaceflight and particularly for human planetary exploration. The MIT Man Vehicle Laboratory is developing a Bio-Suit EVA System, based on mechanical counterpressure ...

Sim, Zhe Liang

2006-01-01T23:59:59.000Z

317

Assessment and preliminary model development of shape memory polymers mechanical counter pressure space suits  

E-Print Network [OSTI]

This thesis seeks to assess the viability of a space qualified shape memory polymer (SMP) mechanical counter pressure (MCP) suit. A key development objective identified by the International Space Exploration Coordination ...

Wee, Brian (Brian J.)

2013-01-01T23:59:59.000Z

318

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

319

The Department of Energy Respiratory Acceptance Program for Supplied-Air Suits  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The supplied-air suits that protect DOE contractor and federal employees from exposure to harmful atmospheres and radioactive contaminants are not included in the National Institute for Occupational Safety and Health (NIOSH) certification process for respiratory protective devices. Therefore, with the awareness and acknowledgement of NIOSH and the Occupational Safety and Health Administration (OSHA), the Department established a system for acceptance testing of supplied-air suits.

2004-02-04T23:59:59.000Z

320

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

322

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

323

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

324

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

325

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

326

Causes and solutions for cracking of coextruded and weld overlay floor tubes in black liquor recovery boilers  

SciTech Connect (OSTI)

Cracking of coextruded, black liquor recovery boiler floor tubes is both a safety and an economic issue to mill operators. In an effort to determine the cause of the cracking and to identify a solution, extensive studies, described in this and three accompanying papers, are being conducted. In this paper, results of studies to characterize both the cracking and the chemical and thermal environment are reported. Based on the results described in this series of papers, a possible mechanism is presented and means to lessen the likelihood of cracking or to totally avoid cracking of floor tubes are offered.

Keiser, J.R.; Taljat, B.; Wang, X.L. [and others

1998-09-01T23:59:59.000Z

327

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

328

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

329

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

330

Basin-floor fans in the North Sea: Sequence stratigraphic models vs. sedimentary facies  

SciTech Connect (OSTI)

Examination of nearly 12,000 feet (3658m) of conventional core from Paleogene and Cretaceous deep-water sandstone reservoirs cored in 50 wells in 10 different areas or fields in the North Sea and adjacent regions reveals that these reservoirs are predominantly composed of mass-transport deposits, mainly sandy slumps and sandy debris flows. Sedimentary features indicating slump and debris-flow origin include sand units with sharp upper contacts; slump folds; discordant, steeply dipping layers (up to 60{degrees}); glide planes; shear zones; brecciated clasts; clastic injections; floating mudstone clasts; planar clast fabric; inverse grading of clasts; and moderate-to-high matrix content (5-30%). This model predicts that basin-floor fans are predominantly composed of sand-rich turbidites with laterally extensive, sheetlike geometries. However, calibration of sedimentary facies in our long (400-700 feet) cores with seismic and wire-line-log signatures through several of these basin-floor fans (including the Gryphon-Forth, Frigg, and Faeroe areas) shows that these features are actually composed almost exclusively of mass-transport deposits consisting mainly of slumps and debris flows. Distinguishing deposits of mass-transport processes, such as debris flows, from those of turbidity currents has important implications for predicting reservoir geometry. Debris flows, which have plastic flow rheology, can form discontinuous, disconnected sand bodies that are harder to delineate and less economical to develop than deposits of fluidal turbidity currents, which potentially produce more laterally continuous, interconnected sand bodies. Process sedimentological interpretation of conventional core is commonly critical for determining the true origin and distribution of reservoir sands.

Shanmugam, G.; Bloch, R.B. [Mobil Research and Development Corp., Dallas, TX (United States); Mitchell, S.M. [Mobil Exploration and Producing US, Inc., Dallas, TX (United States); Beamish, G.W.J.; Shields, K.E. [Mobil North Sea Ltd., London (United Kingdom); Hodgkinson, R.J.; Straume, T.; Syvertsen, S.E. [Mobil Exploration Norway, Inc., Stavanger (Norway); Damuth, J.E. [Univ. of Texas, Arlington, TX (United States)

1995-04-01T23:59:59.000Z

331

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

332

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

333

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

334

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

335

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

336

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

337

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

338

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

339

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

340

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

342

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

343

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

344

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

345

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

346

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

347

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

348

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

349

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

350

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

351

METHOD OF EVALUATING THE EFFICIENCY OF ANTICOCCIDIAL DRUGS IN FLOOR-PEN TRIALS WITH MULTIPLE IN-FEED INFECTION VERSUS  

E-Print Network [OSTI]

contrôler la contamination des animaux que par la méthode des « seeder birds » et l'anticoccidien a une of environmental contamina- tion. Cover (1970) considers that floor-pen expe- riments are essential because) ; these authors use either a direct contamina- tion by suspended « seeder birds », or an indi- rect contamination

Boyer, Edmond

352

A model for an under floor air distribution system Y.J.P. Lina,*, P.F. Lindenb  

E-Print Network [OSTI]

cool air from above. This geometrical design induces entrainment of warm air at the top of the roomA model for an under floor air distribution system Y.J.P. Lina,*, P.F. Lindenb a Energy Abstract We present a simplified model of an underfloor air distribution (UFAD) system consisting

Linden, Paul F.

353

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

354

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

355

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

356

office of the university counsel Old Administration Building2nd Floor  

E-Print Network [OSTI]

be stored on secure servers rather than PCs or portable devices. If it is essential to store personal is free of charge). UBC cannot, however, charge individuals a fee for access to their own personal records, and · Protection of Privacy: to protect personal privacy by prohibiting the unauthorized

Handy, Todd C.

357

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

358

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

359

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

360

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

362

ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR  

SciTech Connect (OSTI)

Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data transmission in place of NSA Type 1 devices.

Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

2011-08-03T23:59:59.000Z

363

Heat strain and heat stress for workers wearing protective suits at a hazardous waste site  

SciTech Connect (OSTI)

In order to evaluate the effects of heat stress when full body protective suits are worn, heart rates, oral temperatures and environmental parameters were measured for five unacclimatized male workers (25-33 years of age) who performed sampling activities during hazardous waste clean-up operations. The protective ensembles included laminated PVC-Tyvec chemical resistant hood suits with rubber boots, gloves, full facepiece dual cartridge respirators and hard hats. For comparison, measurements also were performed when the men worked at a similar level of activity while they wore ordinary work clothes. A comparison of the heart rates for the men working with and without suits indicated that wearing the suits imposed a heat stress equivalent to adding 6/sup 0/ to 11/sup 0/C (11/sup 0/ to 20/sup 0/F) to the ambient WBGT index. A similar result was obtained by calculating the WBGT in the microclimate inside the suits and comparing it to the ambient WBGT. These results indicate the following: 1) there exists a significant risk of heat injury during hazardous waste work when full body protective clothing is worn, and 2) threshold limit values for heat stress established by the ACGIH must be lowered substantially before extending them to cover workers under these conditions.

Paull, J.M.; Rosenthal, F.S.

1987-05-01T23:59:59.000Z

364

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

365

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

366

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

367

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

368

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

Dahan, Ely

369

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

370

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

371

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

372

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

373

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

374

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

375

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

376

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

377

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

378

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

379

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

380

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

382

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

383

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

384

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

385

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

Langseth, Helge

386

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

387

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

388

SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT  

SciTech Connect (OSTI)

A Consortium, designed to assemble leaders in gas hydrates research, has been established at the University of Mississippi's Center for Marine Resources and Environmental Technology, CMRET. The primary objective of the group is to design and emplace a remote monitoring station on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station allows for the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. Noteworthy achievements six months into the extended life of this cooperative agreement include: (1) Progress on the vertical line array (VLA) of sensors: Analysis and repair attempts of the VLA used in the deep water deployment during October 2003 have been completed; Definition of an interface protocol for the VLA DATS to the SFO has been established; Design modifications to allow integration of the VLA to the SFO have been made; Experience gained in the deployments of the first VLA is being applied to the design of the next VLAs; One of the two planned new VLAs being modified to serve as an Oceanographic Line Array (OLA). (2) Progress on the Sea Floor Probe: The decision to replace the Sea Floor Probe technology with the borehole emplacement of a geophysical array was reversed due to the 1300m water depth at the JIP selected borehole site. The SFP concept has been revisited as a deployment technique for the subsea floor array; The SFP has been redesigned to include gravity driven emplacement of an array up to 10m into the shallow subsurface of the sea floor. (3) Progress on the Acoustic Systems for Monitoring Gas Hydrates: Video recordings of bubbles emitted from a seep in Mississippi Canyon have been analyzed for effects of currents and temperature changes; Several acoustic monitoring system concepts have been evaluated for their appropriateness to MC118, i.e., on the deep sea floor; A mock-up system was built but was rejected as too impractical for deployment on the sea floor. (4) Progress on the Electromagnetic Bubble Detector and Counter: The initial Inductive Conductivity Cell has been constructed from components acquired during the previous reporting period; Laboratory tests involving measuring bubble volume as a component of conductivity have been performed; The laboratory tests were performed in a closed system, under controlled conditions; the relationship between voltage and bubble volume appears to be linear. (5) Progress on the Mid-Infrared Sensor for Continuous Methane Monitoring: Designs and construction schematics for all electronic mounting pieces and an electronics system baseplate were finalized after extensive modeling to facilitate the successful fabrication and implementation of electronic components into the deep-sea, glass instrument housing; Construction schematics and fabrication of an electronics system baseplate have been completed with successful integration of all currently fabricated electronic mounting pieces; Modeling and design of an optics platform complementary to the constructed electronics platform for successful incorporation into ''sphereIR'' has commenced; A second generation chemometric data evaluation software package for evaluating complex spectra including corrections for baseline drifts and spectral anomalies resulting from matrix substances has been developed and will be incorporated into an optimized ''deepSniff'' program upon c

Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis

2005-09-01T23:59:59.000Z

389

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

390

SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT  

SciTech Connect (OSTI)

The Gulf of Mexico Hydrates Research Consortium was established in 1999 to assemble leaders in gas hydrates research. The group is administered by the Center for Marine Resources and Environmental Technology, CMRET, at the University of Mississippi. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station has always included the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. This possibility has recently received increased attention and the group of researchers working on the station has expanded to include several microbial biologists. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in Mississippi Canyon 118 in May of 2005. Follow-up deployments are planned for fall 2005 and center about the use of the vessel M/V Ocean Quest and its two manned submersibles. The subs will be used to effect bottom surveys, emplace sensors and sea floor experiments and make connections between sensor data loggers and the integrated data power unit (IDP). Station/observatory completion is anticipated for 2007 following the construction, testing and deployment of the horizontal line arrays, not yet funded. The seafloor monitoring station/observatory is funded approximately equally by three federal Agencies: Minerals Management Services (MMS) of the Department of the Interior (DOI), National Energy Technology Laboratory (NETL) of the Department of Energy (DOE), and the National Institute for Undersea Science and Technology (NIUST), an agency of the National Oceanographic and Atmospheric Administration (NOAA).

Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis; Bob A. Hardage; Jeffrey Chanton; Rudy Rogers

2006-03-01T23:59:59.000Z

391

Soil-structure interaction effects on containment fragilities and floor response spectra statistics  

SciTech Connect (OSTI)

The probability-based method for the reliability evaluation of nuclear structures developed at Brookhaven National Laboratory (BNL) is extended to include soil-structure interaction effects. A reinforced concrete containment is analyzed in order to investigate the soil-structure interaction effects on: structural fragilities; floor response spectra statistics and acceleration response correlations. To include the effect of soil flexibility on the reliability assessment the following two step approach is used. In the first step, the lumped parameter method for soil-structure interaction analysis is used together with a stick model representation of the structure in order to obtain the motions of the foundation plate. These motions, which include both translations and rotations of the foundation plate, are expressed in terms of the power-spectral density of the free-field ground excitation and the transfer function of the total acceleration response of the foundation. The second step involves a detailed finite element model of the structure subjected to the interaction motions computed from step one. Making use of the structural model and interaction motion the reliability analysis method yields the limit stat probabilities and fragility data for the structure.

Pires, J.; Reich, M.; Chokshi, N.C.

1987-01-01T23:59:59.000Z

392

Seismic soil-structure interaction effects on probabilistic floor response spectra  

SciTech Connect (OSTI)

For the purpose of performing a Seismic Probabilistic Risk Assessment (SPRA) for the Individual Plant Examination of External of Events (IPEEE) program, probabilistic soil-structure interaction (SSI) analyses for the major nuclear power plant (NPP) structures on the site were performed. The paper describes the probabilistic seismic SSI methodology and the probabilistic models used for the idealization of seismic excitation and surrounding soil deposit. To illustrate the effects of randomness in the input parameters, simulated and/or probabilistic Floor Response Spectra (FRS) at selected locations inside the Reactor Building (RB) and Auxiliary Building (AB) are plotted. The computed probabilistic FRS show that the randomness coming from the soil stiffness affects significantly the FRS of the RB and less significantly the FRS of AB. The coefficients of variation (or the standard deviations in the log normal format) of the FRS of RB due to soil stiffness randomness are considerably larger at upper elevations than at the basemat level showing that the random SSI effects are primarily manifested through the rocking motions and less through the horizontal translation of the base. The use of the current accepted rule for SPRA median response for median input may lead to unrealistic peaks in the median FRS especially when the SSI effects are significant as shown herein. This is due to the strong nonlinear relationship between the spectral amplitudes and soil stiffness at the SSI resonant frequencies.

Ghiocel, D.M.; Wilson, P.R.; Stevenson, J.D. [Stevenson and Associates, Cleveland, OH (United States)

1995-12-31T23:59:59.000Z

393

Inspection of the objects on the sea floor by using 14 MeV tagged neutrons  

SciTech Connect (OSTI)

Variety of objects found on the sea floor needs to be inspected for the presence of materials which represent the threat to the environment and to the safety of humans. We have demonstrated that the sealed tube 14 MeV neutron generator with the detection of associated alpha particles can be used underwater when mounted inside ROV equipped with the hydraulic legs and variety of sensors for the inspection of such objects for the presence of threat materials. Such a system is performing the measurement by using the NaI gamma detector and an API-120 neutron generator which could be rotated in order to maximize the inspected target volume. The neutron beam intensity during the 10-30 min. measurements is usually 1 x 10{sup 7} n/s in 4{pi}. In this report the experimental results for some of commonly found objects containing TNT explosive or its simulant are presented. The measured gamma spectra are dominant by C, O and Fe peaks enabling the determination of the presence of explosives inside the ammunition shell. Parameters influencing the C/O ratio are discussed in some details. (authors)

Valkovic, V. [A.C.T.d.o.o., Prilesje 4, Zagreb (Croatia); Sudac, D.; Obhodas, J. [Dept. of Experimental Physics, Inst. Ruder Boskovic, Zagreb (Croatia); Matika, D. [Inst. for Researches and Development of Defense Systems, Zagreb (Croatia); Kollar, R. [A.C.T.d.o.o., Prilesje 4, Zagreb (Croatia); Nad, K.; Orlic, Z. [Dept. of Experimental Physics, Inst. Ruder Boskovic, Zagreb (Croatia)

2011-07-01T23:59:59.000Z

394

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

395

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

396

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

397

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

398

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

399

A benchmark suite with virtualized reality models for supporting tracking evaluation and data set generation  

E-Print Network [OSTI]

) Benchmark resources Sharing of benchmarking results A : Datasets GenerateA benchmark suite with virtualized reality models for supporting tracking evaluation and data set laurence.nigay@imag.fr Takeshi Kurata AIST, Japan t.kurata@aist.go.jp Abstract We describe a benchmark

Boyer, Edmond

400

How kelp produce blade shapes suited to different flow regimes: A new wrinkle  

E-Print Network [OSTI]

How kelp produce blade shapes suited to different flow regimes: A new wrinkle M. A. R. Koehl,1,Ă? W bull kelp, Nereocystis luetkeana, to investigate how these ecomorphological differences are produced, strap-like blades of kelp from habitats with rapid flow collapse into streamlined bundles and flutter

Mahadevan, L.

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Aviation Safety Reporting System 625 Ellis St. Suite 305 Mountain View California 94043  

E-Print Network [OSTI]

of the event. Those who work to improve aviation safety have long recognized that incident reporting fromAviation Safety Reporting System 625 Ellis St. Suite 305 Mountain View California 94043 Cabin Crew Safety Information Article Presented at the 17th International Aircraft Cabin Safety Symposium by Linda

402

COLUMBIA RIVER INTER-TRIBAL FISH COMMISSION 700 NE Multnomah Street, Suite 1200  

E-Print Network [OSTI]

COLUMBIA RIVER INTER-TRIBAL FISH COMMISSION 700 NE Multnomah Street, Suite 1200 Portland, Oregon 97232 F (503) 235-4228 (503) 238-0667 F (503) 235-4228 www.critfc.org Putting fish back in the rivers and protecting the watersheds where fish live September 17, 2013 Bill Bradbury, Chairman Northwest Power

403

Constructed Wetlands Research Group meeting Forth Suite, SEPA Riccarton Office, Edinburgh EH14 4AP  

E-Print Network [OSTI]

, to address diffuse pollution (particularly hydrocarbons) associated with the nearby Brucefield Industry Park1 Minutes of Constructed Wetlands Research Group meeting Forth Suite, SEPA Riccarton Office. It was set up several years ago, particularly to support the implementation of constructed farm wetlands

Heal, Kate

404

The Impact of Test Suite Granularity on the CostEffectiveness of Regression Testing  

E-Print Network [OSTI]

The Impact of Test Suite Granularity on the Cost­Effectiveness of Regression Testing Gregg,pkallakug@cse.unl.edu ABSTRACT Regression testing is an expensive testing process used to validate software following modi#12;cations. The cost-e#11;ective- ness of regression testing techniques varies with characteris- tics of test

Rothermel, Gregg

405

On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel  

E-Print Network [OSTI]

On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 31, 2004 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

Rothermel, Gregg

406

The Impact of Test Suite Granularity on the Cost-Effectiveness of Regression Testing  

E-Print Network [OSTI]

The Impact of Test Suite Granularity on the Cost-Effectiveness of Regression Testing Gregg,pkallakug@cse.unl.edu ABSTRACT Regression testing is an expensive testing process used to validate software following modi cations. The cost-e ective- ness of regression testing techniques varies with characteris- tics of test

Rothermel, Gregg

407

The Impact of Test Suite Granularity on the CostEffectiveness of Regression Testing  

E-Print Network [OSTI]

The Impact of Test Suite Granularity on the Cost­Effectiveness of Regression Testing Gregg,pkallakug@cse.unl.edu ABSTRACT Regression testing is an expensive testing process used to validate software following modifications. The cost­effective­ ness of regression testing techniques varies with characteris­ tics of test

Rothermel, Gregg

408

On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel  

E-Print Network [OSTI]

On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 30, 2003 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

Rothermel, Gregg

409

Test Factoring: Focusing Test Suites for the Task at Hand Michael D. Ernst, research advisor  

E-Print Network [OSTI]

Test Factoring: Focusing Test Suites for the Task at Hand David Saff Michael D. Ernst, research and Subject Descriptors: D.2.5 (Testing and Debug- ging): Testing tools General Terms: Algorithms, Design, Performance, Verification Keywords: test factoring, mock objects, unit testing 1. Problem: slow, unfocused

Liskov, Barbara

410

Test Factoring: Focusing Test Suites for the Task at Hand Michael D. Ernst, research advisor  

E-Print Network [OSTI]

Test Factoring: Focusing Test Suites for the Task at Hand David Saff Michael D. Ernst, research and Subject Descriptors: D.2.5 (Testing and Debug­ ging): Testing tools General Terms: Algorithms, Design, Performance, Verification Keywords: test factoring, mock objects, unit testing 1. Problem: slow, unfocused

Liskov, Barbara

411

Two Distinctive Granite Suites in the SW Bohemian Massif and their Record of  

E-Print Network [OSTI]

Two Distinctive Granite Suites in the SW Bohemian Massif and their Record of Emplacement types of gneisses, migmatites and granites dominate the out- crops of the Bavarian Forest characteristics ofa crustal root zone. Fourteen granite intrusions from this area have been dated by the single

Siebel, Wolfgang

412

Two Distinctive Granite Suites in the Southwestern Bohemian Massif: Reply to  

E-Print Network [OSTI]

Two Distinctive Granite Suites in the Southwestern Bohemian Massif: Reply to F. Finger and M. Rene geochemical and geochronological analyses of mainly crustal-derived late Variscan granites (328^321 Ma) from the Bavarian Forest, Moldanubian unit, Bohemian Massif. As an important observation, a high Ca^Sr^Y granite

Siebel, Wolfgang

413

7900 SE 28th Street, Suite 200 Mercer, Island, WA 98040-2970  

E-Print Network [OSTI]

7900 SE 28th Street, Suite 200 Mercer, Island, WA 98040-2970 v 206.236.7200 f 206.236.3019 www-standing rivalries over the distribution of the Northwest's premiere asset. It will allow the customers to apply to acquire new generation assets. This conclusion, also reached by the Comprehensive Review of the Northwest

414

SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT  

SciTech Connect (OSTI)

A Consortium, designed to assemble leaders in gas hydrates research, has been established at the University of Mississippi's Center for Marine Resources and Environmental Technology, CMRET. The primary objective of the group is to design and emplace a remote monitoring station on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station allows for the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. Establishment of the Consortium has already succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to innovate research methods and construct necessary instrumentation. As funding for this project, scheduled to commence December 1, 2002, had only been in place for less than half of the reporting period, project progress has been less than for other reporting periods. Nevertheless, significant progress has been made and several cruises are planned for the summer/fall of 2003 to test equipment, techniques and compatibility of systems. En route to reaching the primary goal of the Consortium, the establishment of a monitoring station on the sea floor, the following achievements have been made: (1) Progress on the vertical line array (VLA) of sensors: Software and hardware upgrades to the data logger for the prototype vertical line array, including enhanced programmable gains, increased sampling rates, improved surface communications, Cabling upgrade to allow installation of positioning sensors, Incorporation of capability to map the bottom location of the VLA, Improvements in timing issues for data recording. (2) Sea Floor Probe: The Sea Floor Probe and its delivery system, the Multipurpose sled have been completed; The probe has been modified to penetrate the <1m blanket of hemipelagic ooze at the water/sea floor interface to provide the necessary coupling of the accelerometer with the denser underlying sediments. (3) Electromagnetic bubble detector and counter: Initial tests performed with standard conductivity sensors detected nonconductive objects as small as .6mm, a very encouraging result, Components for the prototype are being assembled, including a dedicated microcomputer to control power, readout and logging of the data, all at an acceptable speed. (4) Acoustic Systems for Monitoring Gas Hydrates: Video recordings of bubbles emitted from a seep in Mississippi Canyon have been made from a submersible dive and the bubbles analyzed with respect to their size, number, and rise rate; these measurements will be used to determine the parameters to build the system capable of measuring gas escaping at the site of the monitoring station; A scattering system and bubble-producing device, being assembled at USM, will be tested in the next two months, and the results compared to a physical scattering model. (5) Mid-Infrared Sensor for Continuous Methane Monitoring: Progress has been made toward minimizing system maintenance through increased capacity and operational longevity, Miniaturization of many components of the sensor systems has been completed, A software package has been designed especially for the MIR sensor data evaluation, Custom electronics have been developed that reduce power consumption and, therefore, increase the length of time the system can remain operational. (6) Seismo-acoustic characterization of sea floor properties and processes at the hydrate monitoring station. (7) Adaptation of the acoustic-logging device, developed as part of the European Union-funded research project, Sub-Gate, for monitoring temporal variations in seabe

Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis

2004-03-01T23:59:59.000Z

415

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

416

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

417

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

418

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

419

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

420

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

422

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

423

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

424

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

425

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

426

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

427

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

428

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

429

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

430

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

431

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

432

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

433

A Sea Floor Survey of the Sleipner Field to Monitor CO2 Migration  

SciTech Connect (OSTI)

In the North Sea natural gas production field at Sleipner, CO{sub 2} is being separated from natural gas and injected into an underground saline aquifer, known as the Utsira formation, for environmental purposes. In this study, gravity measurements were made over the Sleipner CO{sub 2} injection site in 2002 and again in 2005 on top of 30 concrete benchmarks on the seafloor to study the behavior and physical properties of the injected CO{sub 2}. As the gas is injected, pore space water is replaced by gas, altering the bulk density of the formation. This results in a change in gravitational acceleration observed on the overlying sea floor. Our gravity measurements show a repeatability of 4.3 {micro}Gal for 2003 and 3.5 {micro}Gal for 2005. Forward models of the gravity change are calculated based on both 3-D seismic data and reservoir simulation models from other studies. These forward models indicate that the magnitude of maximum gravity change is primarily related to CO{sub 2} density rather than flow geometry. The time-lapse gravity observations best fit a high temperature forward model based on the seismically determined CO{sub 2} geometry, suggesting that the 3-D reflection seismics are imaging the geometry of the injected CO{sub 2}, and that the in situ CO{sub 2} density is around 530 kg/m{sup 3}. Uncertainty in determining the average density using this technique is estimated to be {+-}65 kg/m{sup 3} (95% confidence), however, additional seismic surveys are needed before final conclusions can be drawn. Future gravity measurements will put better constraints on the CO{sub 2} density and continue to map out the CO{sub 2} flow.

Mark A. Zumberge

2005-12-31T23:59:59.000Z

434

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

435

SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT  

SciTech Connect (OSTI)

The Gulf of Mexico Hydrates Research Consortium (GOM-HRC) was established in 1999 to assemble leaders in gas hydrates research. The Consortium is administered by the Center for Marine Resources and Environmental Technology, CMRET, at the University of Mississippi. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory (MS/SFO) on the sea floor in the northern Gulf of Mexico by the year 2007, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission, although unavoidably delayed by hurricanes and other disturbances, necessitates assembling a station that will monitor physical and chemical parameters of the marine environment, including sea water and sea-floor sediments, on a more-or-less continuous basis over an extended period of time. In 2005, biological monitoring, as a means of assessing environmental health was added to the mission of the MS/SFO. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in the arena of gas hydrates research. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. The observatory has now achieved a microbial dimension in addition to the geophysical and geochemical components it had already included. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in Mississippi Canyon 118 in May of 2005. Follow-up deployments, planned for fall 2005, had to be postponed due to the catastrophic effects of Hurricane Katrina (and later, Rita) on the Gulf Coast. Every effort was made to locate and retain the services of a suitable vessel and submersibles or Remotely Operated Vehicles (ROVs) following the storms and the loss of the contracted vessel, the M/V Ocean Quest and its two submersibles, but these efforts have been fruitless due to the demand for these resources in the tremendous recovery effort being made in the Gulf area. Station/observatory completion, anticipated for 2007, will likely be delayed by at least one year. The seafloor monitoring station/observatory is funded approximately equally by three federal Agencies: Minerals Management Services (MMS) of the Department of the Interior (DOI), National Energy Technology Laboratory (NETL) of the Department of Energy (DOE), and the National Institute for Undersea Science and Technology (NIUST), an agency of the National Oceanographic and Atmospheric Administration (NOAA).

J. Robert Woolsey; Tom McGee; Carol Lutken; Elizabeth Stidham

2006-06-01T23:59:59.000Z

436

Walking on daylight : the application of translucent floor systems as a means of achieving natural daylighting in mid and low rise architecture  

E-Print Network [OSTI]

This thesis is concerned with the introduction of quality daylight to buildings by means of translucency in the horizontal planes or floors within the building. Since people began to build, the concept of translucency in ...

Widder, James

1985-01-01T23:59:59.000Z

437

Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude  

E-Print Network [OSTI]

Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude Peter-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite-sensitive behavior, the presence of probabilistic algorithms, and the composability of its components, AER/NCA poses

Ă?lveczky, Peter Csaba

438

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

439

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

440

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

442

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

443

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

444

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

445

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

446

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

447

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

448

Safeguards and Security Program, acronyms and abbereviations...  

Office of Environmental Management (EM)

Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

449

Site Tour Security Plan.pdf  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

450

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

451

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

452

Improving tamper detection for hazardous waste security  

SciTech Connect (OSTI)

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

453

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

454

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

455

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

456

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

457

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

458

New Solicitations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

459

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

460

Spring 2013 Computer Security Midterm 1  

E-Print Network [OSTI]

the site's security officers have set a policy that all access between machines must use two separate forms

Paxson, Vern

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

462

Track 6: Integrating Safety Into Security Operations  

Broader source: Energy.gov [DOE]

ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

463

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

464

Energy Security: Microgrid Planning and Design (Presentation)  

SciTech Connect (OSTI)

Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

Giraldez, J.

2012-05-01T23:59:59.000Z

465

Security and United States Immigration Policy  

E-Print Network [OSTI]

National Security Council memorandum as created to “encourage defection of all USSR nationals and ‘key’ personnel from the satellite

Totten, Robbie James

2012-01-01T23:59:59.000Z

466

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

467

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

468

National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th  

E-Print Network [OSTI]

Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, heSeminar: National Security Issues at Department of Homeland Security and Department of Energy

Farritor, Shane

469

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

470

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

471

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network [OSTI]

systems 2 #12;GEORG-AUGUST-UNIVERSIT�T G�TTINGEN Why Security? » Computer systems are ubiquitous in our daily life » Computers store and process our data » Computers access and control our resources » More: intelligent security systems » Machine learning and arti cial intelligence for security 4 T-800 HAL 9000WOPR

Grabowski, Jens

472

Systems Security at Chemical and Biochemical Engineering  

E-Print Network [OSTI]

and Biochemical Engineering. The Systems Administrator for Chemical and Biochemical Engineering regularly reviews network security.However, maintaining systems security is a group effort and a never-ending task. Here Administrator regarding security bugs that may affect your personal computer. If a patch is available, download

473

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

474

Optimal Security Liquidation Algorithms Sergiy Butenko  

E-Print Network [OSTI]

using a set of historical sample-paths of prices. 1. Introduction Consider the following decision making positions for several securities. Historical sequences of prices of these securities (after opening. The algorithms provide path-dependent strategies which sell some fractions of security depending upon price

Uryasev, Stanislav

475

Oak Ridge National Laboratory National Security Programs  

E-Print Network [OSTI]

Oak Ridge National Laboratory National Security Programs Dr. Michael A. Kuliasha, Chief Scientist National Security Technologies Oak Ridge National Laboratory #12;2 OAK RIDGE NATIONAL LABORATORY U. S Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies

476

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

477

Cloud Security: Issues and Concerns Pierangela Samarati*  

E-Print Network [OSTI]

1 Cloud Security: Issues and Concerns Authors Pierangela Samarati* UniversitĂ  degli Studi di Milano, Italy sabrina.decapitani@unimi.it Keywords cloud security confidentiality integrity availability secure data storage and processing Summary The cloud has emerged as a successful computing paradigm

Samarati, Pierangela

478

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

479

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

480

Cyber Security in Smart Grid Substations  

E-Print Network [OSTI]

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

Note: This page contains sample records for the topic "floor suite secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Business-driven security White paper  

E-Print Network [OSTI]

March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

482

Energy Security in Nova Scotia Larry Hughes  

E-Print Network [OSTI]

to maintain energy security #12;Mr. Harper and his energy superpower · "...an ocean of oil soaked sand liesERG/200706 Energy Security in Nova Scotia Larry Hughes Energy Research Group Electrical to Café Canada, Mahone Bay 30 November 2007 #12;Energy security in Nova Scotia Larry Hughes, PhD Energy

Hughes, Larry

483

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

484

The Carmen-Suite: Maya Plisetskaya Challenging Soviet Culture and Policy  

E-Print Network [OSTI]

for the degree of MASTER OF ARTS Chair of Committee, Judith Hamera Committee Members, Jayson Beaster-Jones Olga Cooke Head of Department, Donnalee Dox May 2014 Major Subject: Performance Studies Copyright 2014 Anna Kalashnikova ii ABSTRACT... Cold War, research into the artistic, cultural and political significance of the 1967 Carmen-Suite may be of particular significance. iii ACKNOWLEDGEMENTS I would like to thank my committee chair, Dr. Judith Hamera for her passion, interest...

Kalashnikova, Anna

2014-04-24T23:59:59.000Z

485

Facility Security Checklist U.S. Department of Transportation  

E-Print Network [OSTI]

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

486

NISTIR 6462 CSPP -Guidance for COTS Security Protection Profiles  

E-Print Network [OSTI]

..................................................................................................................................................4 2.2 OPERATIONAL ENVIRONMENT ............................................................................................................................... 25 4.3 JOINT TOE/ENVIRONMENT SECURITY OBJECTIVES...................................................................................................................5 3. SECURITY ENVIRONMENT

487

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

488

Towards the Integration of APECS and VE-Suite for Virtual Power Plant Co-Simulation  

SciTech Connect (OSTI)

Process modeling and simulation tools are widely used for the design and operation of advanced power generation systems. These tools enable engineers to solve the critical process systems engineering problems that arise throughout the lifecycle of a power plant, such as designing a new process, troubleshooting a process unit or optimizing operations of the full process. To analyze the impact of complex thermal and fluid flow phenomena on overall power plant performance, the Department of Energy’s (DOE) National Energy Technology Laboratory (NETL) has developed the Advanced Process Engineering Co-Simulator (APECS). The APECS system is an integrated software suite that combines process simulation (e.g., Aspen Plus) and high-fidelity equipment simulations such as those based on computational fluid dynamics (CFD), together with advanced analysis capabilities including case studies, sensitivity analysis, stochastic simulation for risk/uncertainty analysis, and multi-objective optimization. In this paper we discuss the initial phases of the integration of the APECS system with the immersive and interactive virtual engineering software, VE-Suite, developed at Iowa State University and Ames Laboratory. VE-Suite uses the ActiveX (OLE Automation) controls in the Aspen Plus process simulator wrapped by the CASI library developed by Reaction Engineering International to run process/CFD co-simulations and query for results. This integration represents a necessary step in the development of virtual power plant co-simulations that will ultimately reduce the time, cost, and technical risk of developing advanced power generation systems.

Zitney, S.E.; McCorkle, D. (Iowa State University, Ames, IA); Yang, C. (Reaction Engineering International, Salt Lake City, UT); Jordan, T.; Swensen, D. (Reaction Engineering International, Salt Lake City, UT); Bryden, M. (Iowa State University, Ames, IA)

2007-05-01T23:59:59.000Z

489

Reliable Process for Security Policy Deployment  

E-Print Network [OSTI]

We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

2009-01-01T23:59:59.000Z

490

SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT  

SciTech Connect (OSTI)

A Consortium, designed to assemble leaders in gas hydrates research, has been established at the University of Mississippi's Center for Marine Resources and Environmental Technology, CMRET. The primary objective of the group is to design and emplace a remote monitoring station on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station allows for the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to innovate research methods and construct necessary instrumentation. A year into the life of this cooperative agreement, we note the following achievements: (1) Progress on the vertical line array (VLA) of sensors: (A) Software and hardware upgrades to the data logger for the prototype vertical line array, including enhanced programmable gains, increased sampling rates, improved surface communications, (B) Cabling upgrade to allow installation of positioning sensors, (C) Adaptation of SDI's Angulate program to use acoustic slant ranges and DGPS data to compute and map the bottom location of the vertical array, (D) Progress in T''0'' delay and timing issues for improved control in data recording, (E) Successful deployment and recovery of the VLA twice during an October, 2003 cruise, once in 830m water, once in 1305m water, (F) Data collection and recovery from the DATS data logger, (G) Sufficient energy supply and normal functioning of the pressure compensated battery even following recharge after the first deployment, (H) Survival of the acoustic modem following both deployments though it was found to have developed a slow leak through the transducer following the second deployment due, presumably, to deployment in excess of 300m beyond its rating. (2) Progress on the Sea Floor Probe: (A) The Sea Floor Probe and its delivery system, the Multipurpose sled have been completed, (B) The probe has been modified to penetrate the <1m blanket of hemipelagic ooze at the water/sea floor interface to provide the necessary coupling of the accelerometer with the denser underlying sediments, (C) The MPS has been adapted to serve as an energy source for both p- and s-wave studies at the station as well as to deploy the horizontal line arrays and the SFP. (3) Progress on the Electromagnetic Bubble Detector and Counter: (A) Components for the prototype have been assembled, including a dedicated microcomputer to control power, readout and logging of the data, all at an acceptable speed, (B) The prototype has been constructed and preliminary data collected, (C) The construction of the field system is underway. (4) Progress on the Acoustic Systems for Monitoring Gas Hydrates: (A) Video recordings of bubbles emitted from a seep in Mississippi Canyon have been made from a submersible dive and the bubbles analyzed with respect to their size, number, and rise rate. These measurements have been used to determine the parameters to build the system capable of measuring gas escaping at the site of the monitoring station, (B) Laboratory tests performed using the project prototype have produced a conductivity data set that is being used to refine parameters of the field model. (5) Progress on the Mid-Infrared Sensor for Continuous Methane Monitoring: (A) Preliminary designs of mounting pieces for electrical components of ''sphereIR'' have been completed using AutoCAD software, (B) The preliminary design of an electronics baseplate has been completed and aided in the optimization of

Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis

2005-08-01T23:59:59.000Z

491

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

492

Simulated Interdiction: Proliferation Security Initiative  

E-Print Network [OSTI]

Parthia to curtail its nuclear weapons development programs. However, Bearia has often disagreed sharply with the U.S. and other international partners on specific steps to persuade Parthia to halt uranium enrichment. 17 For Simulation Use Only...For Simulation Use Only i For Simulation Use Only i George Bush School of Government and Public Service Nuclear Engineering Department Nuclear Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated...

2009-01-01T23:59:59.000Z

493

research | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective

494

Nonproliferation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNationalNewportBig Eddy

495

Security Council Approval of Kofi  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC.509

496

Safety and Security Policy Jobs  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial CarbonArticlesHuman Resources

497

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudgetEnterpriseFermilabNational Security

498

Particle Size (Sieving) and Enthalpy (Acid Calorimetry) Analysis of Single-Pull K East Basin Floor and Pit Sludges  

SciTech Connect (OSTI)

This report discusses particle size and calorimetry analyses performed on single-pull sludge samples collected from the Hanford K East Basin floor and pits. This study was conducted by the Pacific Northwest National Laboratory (PNNL) in support of the baseline sludge management plan, which calls for the sludge to be packaged, shipped and stored at T Plant in the Hanford 200 West Area until final processing as a future date. These analyses were needed to better understand the K Basin sludge inventory and chemical reactivity.

Bredt, Paul R. (BATTELLE (PACIFIC NW LAB)); Delegard, Calvin H. (BATTELLE (PACIFIC NW LAB)); Schmidt, Andrew J. (BATTELLE (PACIFIC NW LAB)); Silvers, Kurt L. (BATTELLE (PACIFIC NW LAB)); Thornton, Brenda M. (BATTELLE (PACIFIC NW LAB)); Gano, Sue (BATTELLE (PACIFIC NW LAB))

2000-10-31T23:59:59.000Z

499

SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT  

SciTech Connect (OSTI)

A Consortium, designed to assemble leaders in gas hydrates research, has been established at the University of Mississippi's Center for Marine Resources and Environmental Technology, CMRET. The primary objective of the group is to design and emplace a remote monitoring station on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station allows for the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. Noteworthy achievements one year into the extended life of this cooperative agreement include: (1) Progress on the vertical line array (VLA) of sensors: (1a) Repair attempts of the VLA cable damaged in the October >1000m water depth deployment failed; a new design has been tested successfully. (1b) The acoustic modem damaged in the October deployment was repaired successfully. (1c) Additional acoustic modems with greater depth rating and the appropriate surface communications units have been purchased. (1d) The VLA computer system is being modified for real time communications to the surface vessel using radio telemetry and fiber optic cable. (1e) Positioning sensors--including compass and tilt sensors--were completed and tested. (1f) One of the VLAs has been redesigned to collect near sea floor geochemical data. (2) Progress on the Sea Floor Probe: (2a) With the Consortium's decision to divorce its activities from those of the Joint Industries Program (JIP), due to the JIP's selection of a site in 1300m of water, the Sea Floor Probe (SFP) system was revived as a means to emplace arrays in the shallow subsurface until arrangements can be made for boreholes at >1000m water depth. (2b) The SFP penetrometer has been designed and construction begun. (2c) The SFP geophysical and pore-fluid probes have been designed. (3) Progress on the Acoustic Systems for Monitoring Gas Hydrates: (3a) Video recordings of bubbles emitted from a seep in Mississippi Canyon have been analyzed for effects of currents and temperature changes. (3b) Several acoustic monitoring system concepts have been evaluated for their appropriateness to MC118, i.e., on the deep sea floor. (3c) A mock-up system was built but was rejected as too impractical for deployment on the sea floor. (4) Progress on the Electromagnetic Bubble Detector and Counter: (4a) Laboratory tests were performed using bubbles of different sizes in waters of different salinities to test the sensitivity of the. Differences were detected satisfactorily. (4b) The system was field tested, first at the dock and then at the shallow water test site at Cape Lookout Bight where methane bubbles from the sea floor, naturally, in 10m water depth. The system successfully detected peaks in bubbling as spike decreases in conductivity. (5) Progress on the Mid-Infrared Sensor for Continuous Methane Monitoring: (5a) Modeling and design of an optics platform complementary to the constructed electronics platform for successful incorporation into ''sphereIR'' continues. AutoCAD design and manual construction of mounting pieces for major optical components have been completed. (5b) Initial design concepts for IR-ATR sensor probe geometries have been established and evaluated. Initial evaluations of a horizontal ATR (HATR) sensing probe with fiber optic guiding light have been performed and validate the design concept as a potentially viable deep sea sensing pr

Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis

2005-11-01T23:59:59.000Z

500

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z