National Library of Energy BETA

Sample records for floor suite secure

  1. Cummings Engineering's Secure Mobility Suite B Crypto Module

    E-Print Network [OSTI]

    Cummings Engineering's Secure Mobility Suite B Crypto Module FIPS 140-2 Level 1 Security Policy Version: 1.1 Last Updated: April 15, 2013 Cummings Engineering Consultants, Inc. 145 S. 79th St., Suite 26 Chandler, Arizona 85226 Office: 480-809-6024 Fax: 866-884-9570 #12;Cummings Engineering's Secure Mobility

  2. Center for Space Research, Conference Room 2.806, WPR Building, 2nd Floor, 3925 W. Braker Lane, Suite 200, Austin, Texas 78759

    E-Print Network [OSTI]

    Lightsey, Glenn

    Center for Space Research, Conference Room 2.806, WPR Building, 2nd Floor, 3925 W. Braker Lane 10 -- 8:30 AM Thermospheric Density Variations, Solar EUV and Geomag. Storm Modeling Bruce R. Bowman, Senior Scientist with Space Environment Technologies Abstract: Discussion of density variations and how

  3. Low floor mass transit vehicle

    DOE Patents [OSTI]

    Emmons, J. Bruce (Beverly Hills, MI); Blessing, Leonard J. (Rochester, MI)

    2004-02-03

    A mass transit vehicle includes a frame structure that provides an efficient and economical approach to providing a low floor bus. The inventive frame includes a stiff roof panel and a stiff floor panel. A plurality of generally vertical pillars extend between the roof and floor panels. A unique bracket arrangement is disclosed for connecting the pillars to the panels. Side panels are secured to the pillars and carry the shear stresses on the frame. A unique seating assembly that can be advantageously incorporated into the vehicle taking advantage of the load distributing features of the inventive frame is also disclosed.

  4. National Information Assurance Education and Training Program (NIETP) National Security Agency ~ 9800 Savage Road ~ Ft. Meade, MD 20755-6744 ~ ATTN: I083, Suite 6744

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    National Information Assurance Education and Training Program (NIETP) National Security Agency University courseware meets all of the elements of the Committee on National Security Systems (CNSS) National Training Standards for: Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011 System

  5. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  6. CBR Fermenter Suite Frequently asked questions: Updated Jun 2011

    E-Print Network [OSTI]

    Strynadka, Natalie

    , and air), motor, pH sensor, dO2 sensor, temperature sensor, heating jacket, and 3 pumps (acid, base Floor Plan from the Equipment page to see floor plan of our suite. I'm the first time user. How do I

  7. First Floor1 Second Floor2

    E-Print Network [OSTI]

    Gleeson, Joseph G.

    Resource Center Financial Counseling & Infusion Center Scheduling Lactation Room Meditation Garden Infusion Center Clinical Lab Waiting Playground Registration Infusion Center Waiting Second Floor Research Tower . . . . . . . . . . . . . . . . . .Second Conference Room 2250 . . . . . . . . . . . . . . . . . .Second Financial Counseling & Infusion

  8. CNP_TEST_SUITE

    Energy Science and Technology Software Center (OSTI)

    002854MLTPL00 Automated Nuclear Data Test Suite  file:///usr/gapps/CNP_src/us/RR/test_suite_cz/cnp_test_suite 

  9. LEVEL 01 FLOOR LEVEL 1 / GROUND FLOOR / SUPPORT SERVICES BUILDING

    E-Print Network [OSTI]

    Lennard, William N.

    LEVEL 01 FLOOR LEVEL 1 / GROUND FLOOR / SUPPORT SERVICES BUILDING 05/02/2012ACCESSIBILITY WESTERN FLOOR PLAN SUPPORT SERVICES BUILDING Level 2 Lower building Rm.2350 1393 WESTERN ROAD N6G -1G9 UPDATE DRAWN #12;LEVEL 02 FLOOR LEVEL 2 / SECOND FLOOR / SUPPORT SERVICES BUILDING 05/02/2012ACCESSIBILITY

  10. Modelling heated composite floor slabs with reference to the Cardington experiments 

    E-Print Network [OSTI]

    Gillie, Martin; Usmani, Asif; Rotter, J Michael

    2001-01-01

    This paper describes a method of modelling composite floor slabs in fire conditions using a stress-resultant approach. The FEAST suite, which consists of two main computer programs is described. The first, SRAS, is designed ...

  11. STAYS PNNL SUITE

    Energy Science and Technology Software Center (OSTI)

    002851IBMPC00 STAYSL PNNL Suite  http://radiochemscieng.pnnl.gov/research_areas/research_area_description.asp?id=283 

  12. LANL Go Suite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand Cubic Feet)MultimaterialforLAESFGettingLANLLANL Go Suite

  13. Impact of Thermally Insulated Floors 

    E-Print Network [OSTI]

    Alghimlas, F.; Omar, E. A.

    2004-01-01

    INSULATED FLOORS E. Al-Sayed Omar Associate Research Scientist Kuwait Institute for Scientific Research P.O. Box 24885, 13109 Safat, Kuwait F. Alghimlas * Research Associate Kuwait Institute for Scientific Research P.O. Box 24885, 13109 Safat..., Kuwait * fghimlas@kisr.edu.kw ABSTRACT Presently in Kuwait the code of practice for energy conservation in the air conditioned buildings implemented by the Ministry of Electricity and Water (MEW) which has been in effect since 1983 has...

  14. The UNIVERSITY of WESTERN ONTARIO Subcommittee on Information Technology (SUIT)

    E-Print Network [OSTI]

    Lennard, William N.

    The UNIVERSITY of WESTERN ONTARIO SENATE Subcommittee on Information Technology (SUIT) Terms of Reference: To report to SCUP on security issues relating to Information Technology, including: mechanisms, review, update and/or develop policies in the area of Information Technology. To report annually to SCUP

  15. (No) Security in Automation!?

    E-Print Network [OSTI]

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  16. Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet) Wyoming Dry Natural GasNaturalOctober 2015 Alcohol. TheData -1 IdleReportReport

  17. DC Pro Software Tool Suite

    SciTech Connect (OSTI)

    2009-04-01

    This fact sheet describes how DOE's Data Center Energy Profiler (DC Pro) Software Tool Suite and other resources can help U.S. companies identify ways to improve the efficiency of their data centers.

  18. Modeling thermal comfort with radiant floors and ceilings

    E-Print Network [OSTI]

    2009-01-01

    literatures related to floor heating environment in Japan.of performance of radiant floor-heating systems and a wallB.W. 2002. Radiant floor heating in theory and practice.

  19. Optimization Online - Efficient Formulations for the Multi-Floor ...

    E-Print Network [OSTI]

    Marc Goetschalckx

    2007-02-28

    Feb 28, 2007 ... ... of the facility layout problem with practical applications when the price ... provided the floor projections on the ground floor are nested starting ...

  20. Secure Cloud Manufacturing: Research Challenges and a Case Study

    E-Print Network [OSTI]

    Wang, Weichao

    Secure Cloud Manufacturing: Research Challenges and a Case Study Weichao Wang1 , Yu Wang2 , Wesley-floor will be injected into the system to assess its security. 1 Introduction With the fast development of cloud for the sustainability of US economy [14, 15]. To bridge this gap, we plan to investigate security of cloud manufacturing

  1. Tsunami recorded on the open ocean floor

    SciTech Connect (OSTI)

    Filloux, J.H.

    1982-01-01

    On March 14, 1979 a sizeable earth-quake (Ms-7.6 Richter scale) occurred on the continential shelf adjacent to S.W. Mexico, near Petatlan in the state of Guerrero. This earthquake generated a small tsunami that was recorded in deep water, 1000 km away, thus providing for the first time a glance at a tsunami traveling in the open ocean. The same sea floor pressure record displays conspicuous signals associated with vertical sea floor motions generated at the passage of the first Rayleight seismic wave, R1. Seismic and tsunami travel velocities are in agreement with our present understanding of the phenomena, and tsunami detectability in deep water is demonstrated to be well within present day state of the art in the design of sea floor pressure transducers. As calculations anticipate, the E.M. signals associated with the passage of the tsunami were too faint to be detected.

  2. SPOT Suite Transforms Beamline Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II) byMultidayAlumni > The2/01/12 Page 1 ofSuper1 THISSPOT Suite

  3. HRC floors are found in residence centers located

    E-Print Network [OSTI]

    Robeson, Scott M.

    to sign up for housing. No matter the weather, living in an HRC means always having a warm, welcoming home friends on the HRC floors, and end up living with friends from their HRC floor when they move off campus are members of the Hutton Honors Col- lege and many live on HRC floors, but HRC res- idents know how to man

  4. Ocean floor mounting of wave energy converters

    DOE Patents [OSTI]

    Siegel, Stefan G

    2015-01-20

    A system for mounting a set of wave energy converters in the ocean includes a pole attached to a floor of an ocean and a slider mounted on the pole in a manner that permits the slider to move vertically along the pole and rotate about the pole. The wave energy converters can then be mounted on the slider to allow adjustment of the depth and orientation of the wave energy converters.

  5. The Variable Vector Countermeasure Suit for space habitation and exploration

    E-Print Network [OSTI]

    Vasquez, Rebecca (Rebecca Ann)

    2014-01-01

    The Variable Vector Countermeasure Suit (V2Suit) is a countermeasure suit for sensorimotor adaptation and musculoskeletal deconditioning in microgravity. The V2suit will consist of modules containing arrays of control ...

  6. ITL BULLETIN FOR JANUARY 2012 ADVANCING SECURITY AUTOMATION AND STANDARDIZATION

    E-Print Network [OSTI]

    ITL BULLETIN FOR JANUARY 2012 ADVANCING SECURITY AUTOMATION AND STANDARDIZATION: REVISED TECHNICAL SPECIFICATIONS ISSUED FOR THE SECURITY CONTENT AUTOMATION PROTOCOL (SCAP) Shirley Radack, Editor Computer.S. Department of Commerce The Security Content Automation Protocol (SCAP) is a suite of specifications

  7. Directed Test Suite Augmentation: Techniques and Tradeoffs

    E-Print Network [OSTI]

    Directed Test Suite Augmentation: Techniques and Tradeoffs Zhihong Xu, Yunho Kim, Moonzoo Kim and Technology kimyunho@kaist.ac.kr, moonzoo@cs.kaist.ac.kr ABSTRACT Test suite augmentation techniques are used in regression testing to identify code elements affected by changes and to generate test cases to cover those

  8. Method and apparatus for recovering a gas from a gas hydrate located on the ocean floor

    DOE Patents [OSTI]

    Wyatt, Douglas E. (Aiken, SC)

    2001-01-01

    A method and apparatus for recovering a gas from a gas hydrate on the ocean floor includes a flexible cover, a plurality of steerable base members secured to the cover, and a steerable mining module. A suitable source for inflating the cover over the gas hydrate deposit is provided. The mining module, positioned on the gas hydrate deposit, is preferably connected to the cover by a control cable. A gas retrieval conduit or hose extends upwardly from the cover to be connected to a support ship on the ocean surface.

  9. Building Area Location Grant 3rd Floor Hallway Outside of S304

    E-Print Network [OSTI]

    Ford, James

    Building Area Location Grant 3rd Floor Hallway Outside of S304 Grant 2nd Floor Room S274 Grant 2nd Floor Mailroom A246 (Next to S299) Alway 3rd Floor End of Hallway (By Recycling Bins) Lane Library 1st Beckman Center 3rd Floor Mail / Recycling Area Beckman Center 4th Floor Room B432 Hagey PSRL 1st Floor

  10. Savings Project: Insulate and Air Seal Floors Over Unconditioned...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project: Insulate and Air Seal Floors Over Unconditioned Garages Tips: Passive Solar Heating and Cooling Where to insulate. Adding insulation in the areas shown here may be...

  11. UCSF EMERGENCY PREPAREDNESS EAP Floor Warden Duties Pamela Roskowski

    E-Print Network [OSTI]

    Derisi, Joseph

    followed Retrieve emergency bag and put on Floor Warden ID vest and hard hat Observe any hazardous or Emergency Responders with status report of condition of assigned floor. Include the last known locations of any injuries, deaths, trapped or missing persons, fires, hazardous materials spills, utility failures

  12. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  13. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  14. Impact of Solar Heat Gain on Radiant Floor Cooling System Design

    E-Print Network [OSTI]

    Feng, Jingjuan Dove; Schiavon, Stefano; Bauman, Fred

    2013-01-01

    Bauman F. 2013. Impact of Solar Heat Gain on Radiant FloorBauman F. 2013. Impact of Solar Heat Gain on Radiant FloorBauman F. 2013. Impact of Solar Heat Gain on Radiant Floor

  15. Impact of Solar Heat Gain on Radiant Floor Cooling System Design

    E-Print Network [OSTI]

    Feng, Jingjuan Dove; Schiavon, Stefano; Bauman, Fred

    2013-01-01

    7] B. Borresen, Floor heating and cooling of an atrium, in:thermal performance of floor heating systems, Solar Energy,discussed this issue for floor heating, but not cooling.

  16. Impact of Solar Heat Gain on Radiant Floor Cooling System Design

    E-Print Network [OSTI]

    Feng, Jingjuan Dove; Schiavon, Stefano; Bauman, Fred

    2013-01-01

    Radiant Heating and Cooling Systems, in, 2012. [15] F.Gain on Radiant Floor Cooling System Design. Proceedings ofof radiant floor cooling systems and their associated air

  17. Introduction Machine Learning Suite XML Interface MLSuite Results Closing Remarks Machine Learning Suite Overview and Tutorial

    E-Print Network [OSTI]

    Wang, Xiaorui "Ray"

    Interface MLSuite Results Future Electrical Consumption EnergyPlus Approximation Inverse EnergyPlus Closing Learning Suite XML Interface MLSuite Results Future Electrical Consumption EnergyPlus Approximation Inverse EnergyPlus Closing Remarks Richard E. Edwards University of Tennessee Machine Learning Suite Overview

  18. The flow in an under-floor plenum

    E-Print Network [OSTI]

    Choi, Jun Myoung

    2009-01-01

    forced convection dominant flow. REFERENCES Bauman F. , HuiOF CALIFORNIA, SAN DIEGO The Flow in an Under-Floor Plenum A10 3 THE EFFECT OF FLOW RATE AND PLENUM DEPTH…………………15

  19. Full-scale shear tests of embedded floor modules

    SciTech Connect (OSTI)

    Fricke, K.E.; Jones, W.D.; Burdette, E.G.

    1984-01-01

    A floor module used to support a centrifuge machine is a steel framework embedded in a 2-ft (610-mm) thick concrete slab. This steel framework is made up of four cylindrical hollow sockets tied together with four S-beams to form a square pattern. In the event of a centrifuge machine wreck, large forces are transmitted from the machine to the corner sockets (through connecting steel lugs) and to the concrete slab. The floor modules are loaded with a combination of torsion and shear forces in the plane of the floor slab. Precisely how these wreck loads are transmitted to, and reacted by, the floor modules and the surrounding concrete was the scope of a series of full-scale tests performed at the DOE Gas Centrifuge Enrichment Plant (GCEP) located near Piketon, Ohio. This report describes the tests and the results of the data reduction to date.

  20. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  1. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  2. BDP: BrainSuite Diffusion Pipeline

    E-Print Network [OSTI]

    Leahy, Richard M.

    BDP: BrainSuite Diffusion Pipeline Chitresh Bhushan #12; Quantify microstructural tissue ROI Connectivity ROI Statistics MPRAGE Diffusion #12;Diffusion Pipeline Dicom to NIfTI Co ROIs Custom ROIs #12;Diffusion Pipeline Dicom to NIfTI Co-registration Diffusion Modeling Tractography

  3. Collaboration Suite Advanced Web Client User Guide

    E-Print Network [OSTI]

    Shepp, Larry

    ZimbraTM Collaboration Suite Advanced Web Client User Guide Version 5.0 #12;Zimbra Web Client User Guide Copyright Notice Copyright © 2008 Zimbra, Inc. All rights reserved materials, onscreen publication, or Web documentation--is expressly forbidden. Zimbra and the Zimbra logo

  4. Secure Computation on the Web: Computing without Simultaneous Interaction

    E-Print Network [OSTI]

    Lindell, Yehuda

    ] for an overview). In fact, with client-side processing in Web 2.0 we now have a huge mass of parties with seriousSecure Computation on the Web: Computing without Simultaneous Interaction Shai Halevi1 , Yehuda of computation on the web is not suited to the type of communication patterns needed for secure computation

  5. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  6. The Architecture and Implementation of NetworkLayer Security Under Unix

    E-Print Network [OSTI]

    Blaze, Matthew

    to transparently enforce intermediate­hop security in an internetwork. swIPe's power lies in its minimalistThe Architecture and Implementation of Network­Layer Security Under Unix ABSTRACT swIPe is a network­layer security protocol for the IP protocol suite. This paper presents the architecture, design

  7. Work Project Report: Static Analysis Suite

    E-Print Network [OSTI]

    Bartek, Filip

    2013-01-01

    This summer, I was working in PH-SFT group as a summer student. My assignment consisted of developing a software tool for static analysis of C++ code. The tool is called Static Analysis Suite. This document describes the project - the initial goal, the domain of interest, i.e. static program analysis, the work I performed and the tools I used, and the results.

  8. SUESS ET AL.: SEA FLOOR METHANE HYDRATES AT HYDRATE RIDGE, CASCADIA MARGIN Sea Floor Methane Hydrates at Hydrate Ridge, Cascadia Margin

    E-Print Network [OSTI]

    Goldfinger, Chris

    SUESS ET AL.: SEA FLOOR METHANE HYDRATES AT HYDRATE RIDGE, CASCADIA MARGIN 1 Sea Floor Methane are exposed at the sea floor. A methane-oxidizing bacterial consortium populates the exposures of hydrate; colonies of vent macro-fauna are abundant as well. Discharge of methane from destabilized hydrate

  9. The bioenergetics of walking and running in space suits

    E-Print Network [OSTI]

    Carr, Christopher E. (Christopher Edward), 1976-

    2005-01-01

    Space-suited activity is critical for human spaceflight, and is synonymous with human planetary exploration. Space suits impose kinematic and kinetic boundary conditions that affect movement and locomotion, and in doing ...

  10. Property:Building/FloorAreaShops | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation,FloorAreaShops Jump

  11. Property:Building/FloorAreaSportCenters | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation,FloorAreaShops

  12. Property:Building/FloorAreaTotal | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to:FloorAreaTotal Jump to:

  13. Property:Building/FloorAreaWarehouses | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to:FloorAreaTotal

  14. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  15. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  16. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  17. INSTANTANEOUS FREQUENCY VERSUS TIME FOR 7 BUILDINGS B.0466 Los Angeles, 15250 Ventura Blvd., Roof (13th floor) (pp. 7)

    E-Print Network [OSTI]

    Southern California, University of

    Blvd., Roof (13th floor) (pp. 7) B.5108 Santa Susana, ETEC Bldg 462 (6th Floor, and 1st Floor (pp. 19) B.5450 Burbank, 3601 West Olive Ave., Roof (9th floor) (pp. 11) B.5451 Los Angeles, 6301 Owensmouth Ave., Roof (12th level) (pp. 7) B.5453 Los Angeles, 5805 Sepulveda Blvd., Roof (9th floor) (pp. 13) B

  18. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  19. Novel millimeter wave sensor concepts for energy, environment, and national security

    E-Print Network [OSTI]

    Sundaram, S. K.

    Millimeter waves are ideally suited for sensing and diagnosing materials, devices, and processes that are broadly important to energy, environment, and national security. Thermal return reflection (TRR) techniques that ...

  20. Autonomous Industrial Vehicles: From the Laboratory to the Factory Floor

    E-Print Network [OSTI]

    WORKSHOP Autonomous Industrial Vehicles: From the Laboratory to the Factory Floor 1 IEEE@astm.org 610-832-9720 www.astm.org May 30, 2015 #12;· To solicit researchers and industry input for the development of consensus standards within ASTM International Committee F45 on Driverless Automatic Industrial

  1. Strategy Guideline: Quality Management in Existing Homes - Cantilever Floor Example

    SciTech Connect (OSTI)

    Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented.

  2. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  3. Financial Services and Operations 2nd Floor Lakeshore Center

    E-Print Network [OSTI]

    or type The number below is: Individual Taxpayer ID No. (ITIN) Social Security No. Federal Employer ID No

  4. Design and Experiments of a Solar Low-temperature Hot Water Floor Radiant Heating System 

    E-Print Network [OSTI]

    Wu, Z.; Li, D.

    2006-01-01

    The solar low-temperature hot water floor radiant heating system combines solar energy heating with floor radiant heating. This kind of environmental heating way not only saves fossil resources and reduces pollution, but ...

  5. Experimental Study of the Floor Radiant Cooling System Combined with Displacement Ventilation 

    E-Print Network [OSTI]

    Ren, Y.; Li, D.; Zhang, Y.

    2006-01-01

    As a comfortable and energy-efficient air conditioning system, the application of floor radiant heating system is used increasingly greatly in the north of China. As a result, the feasibility of floor radiant cooling has gained more attention...

  6. Influence of raised floor on zone design cooling load in commercial buildings.

    E-Print Network [OSTI]

    Schiavon, Stefano; Lee, Kwang Ho; Bauman, Fred; Webster, Tom

    2010-01-01

    Floor and Ceiling Plenum Energy Model Parameters, American Society of Heating,heating and cooling systems were not modelled because the simulation aim was to investigate the influence of the raised floor

  7. Modeling, Simulation, and Practice of Floor Control for Synchronous and Ubiquitous

    E-Print Network [OSTI]

    : Floor control, Ubiquitous collaboration, Synchronous collaboration, Mobile devices, Human-computer dispersed virtual place. Mobile computing paradigm [34] made ubiquitous access possible with the integration1 Modeling, Simulation, and Practice of Floor Control for Synchronous and Ubiquitous Collaboration

  8. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  9. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  10. Security Risks and Modern Cyber Security Technologies for Corporate Networks

    E-Print Network [OSTI]

    Gharibi, Wajeb

    2011-01-01

    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.

  11. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  12. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. BUILDING CONNECTION ACCESS VIA MAIN ENTRANCE ON PEEL (5TH AND 6TH FLOOR) AND

    E-Print Network [OSTI]

    Shoubridge, Eric

    1ST FLOOR ENTRANCE ELEVATOR WASHROOMS BUILDING CONNECTION ACCESS VIA MAIN ENTRANCE ON PEEL (5TH MCINTYRE MEDICAL SCIENCES BUILDING 3655 SIR WILLIAM OSLER PINE AVENUE PROMENADESIRWILLIAMOSLER ACCESSIBLE BUILDING CONNECTION ACCESS VIA MAIN ENTRANCE ON PEEL (5TH AND 6TH FLOOR) AND SOUTH ENTRANCE (1ST FLOOR) ALL

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  15. Extender for securing a closure

    DOE Patents [OSTI]

    Thomas, II, Patrick A.

    2012-10-02

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  18. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  19. Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Controls and RTU Smart Monitoring and Diagnostic System - 2013 BTO Peer Review Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic...

  20. The coyote universe III: simulation suite and precision emulator...

    Office of Scientific and Technical Information (OSTI)

    suite and precision emulator for the nonlinear matter power spectrum Ongoing and future large scale structure surveys targeted at the investigation of dark energy will enter...

  1. Suite of Cellulase Enzyme Technologies for Biomass Conversion...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Biomass and Biofuels Biomass and Biofuels Find More Like This Return to Search Suite of Cellulase Enzyme Technologies for Biomass Conversion National Renewable Energy Laboratory...

  2. PHASE CHANGE MATERIALS IN FLOOR TILES FOR THERMAL ENERGY STORAGE

    SciTech Connect (OSTI)

    Douglas C. Hittle

    2002-10-01

    Passive solar systems integrated into residential structures significantly reduce heating energy consumption. Taking advantage of latent heat storage has further increased energy savings. This is accomplished by the incorporation of phase change materials into building materials used in passive applications. Trombe walls, ceilings and floors can all be enhanced with phase change materials. Increasing the thermal storage of floor tile by the addition of encapsulated paraffin wax is the proposed topic of research. Latent heat storage of a phase change material (PCM) is obtained during a change in phase. Typical materials use the latent heat released when the material changes from a liquid to a solid. Paraffin wax and salt hydrates are examples of such materials. Other PCMs that have been recently investigated undergo a phase transition from one solid form to another. During this process they will release heat. These are known as solid-state phase change materials. All have large latent heats, which makes them ideal for passive solar applications. Easy incorporation into various building materials is must for these materials. This proposal will address the advantages and disadvantages of using these materials in floor tile. Prototype tile will be made from a mixture of quartz, binder and phase change material. The thermal and structural properties of the prototype tiles will be tested fully. It is expected that with the addition of the phase change material the structural properties will be compromised to some extent. The ratio of phase change material in the tile will have to be varied to determine the best mixture to provide significant thermal storage, while maintaining structural properties that meet the industry standards for floor tile.

  3. Property:Building/FloorAreaHeatedGarages | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)Energy TechnologyFloorAreaHealthServicesDaytime Jump

  4. Property:Building/FloorAreaHotels | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)Energy TechnologyFloorAreaHealthServicesDaytime

  5. Property:Building/FloorAreaRestaurants | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation, search

  6. Property:Building/TotalFloorArea | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices

  7. Automated structure solution with the PHENIX suite

    SciTech Connect (OSTI)

    Terwilliger, Thomas C [Los Alamos National Laboratory; Zwart, Peter H [LBNL; Afonine, Pavel V [LBNL; Grosse - Kunstleve, Ralf W [LBNL

    2008-01-01

    Significant time and effort are often required to solve and complete a macromolecular crystal structure. The development of automated computational methods for the analysis, solution, and completion of crystallographic structures has the potential to produce minimally biased models in a short time without the need for manual intervention. The PHENIX software suite is a highly automated system for macromolecular structure determination that can rapidly arrive at an initial partial model of a structure without significant human intervention, given moderate resolution, and good quality data. This achievement has been made possible by the development of new algorithms for structure determination, maximum-likelihood molecular replacement (PHASER), heavy-atom search (HySS), template- and pattern-based automated model-building (RESOLVE, TEXTAL), automated macromolecular refinement (phenix. refine), and iterative model-building, density modification and refinement that can operate at moderate resolution (RESOLVE, AutoBuild). These algorithms are based on a highly integrated and comprehensive set of crystallographic libraries that have been built and made available to the community. The algorithms are tightly linked and made easily accessible to users through the PHENIX Wizards and the PHENIX GUI.

  8. Automated Structure Solution with the PHENIX Suite

    SciTech Connect (OSTI)

    Zwart, Peter H.; Zwart, Peter H.; Afonine, Pavel; Grosse-Kunstleve, Ralf W.; Hung, Li-Wei; Ioerger, Tom R.; McCoy, A.J.; McKee, Eric; Moriarty, Nigel; Read, Randy J.; Sacchettini, James C.; Sauter, Nicholas K.; Storoni, L.C.; Terwilliger, Tomas C.; Adams, Paul D.

    2008-06-09

    Significant time and effort are often required to solve and complete a macromolecular crystal structure. The development of automated computational methods for the analysis, solution and completion of crystallographic structures has the potential to produce minimally biased models in a short time without the need for manual intervention. The PHENIX software suite is a highly automated system for macromolecular structure determination that can rapidly arrive at an initial partial model of a structure without significant human intervention, given moderate resolution and good quality data. This achievement has been made possible by the development of new algorithms for structure determination, maximum-likelihood molecular replacement (PHASER), heavy-atom search (HySS), template and pattern-based automated model-building (RESOLVE, TEXTAL), automated macromolecular refinement (phenix.refine), and iterative model-building, density modification and refinement that can operate at moderate resolution (RESOLVE, AutoBuild). These algorithms are based on a highly integrated and comprehensive set of crystallographic libraries that have been built and made available to the community. The algorithms are tightly linked and made easily accessible to users through the PHENIX Wizards and the PHENIX GUI.

  9. Measuring Test Case Similarity to Support Test Suite Understanding

    E-Print Network [OSTI]

    Zaidman, Andy

    Measuring Test Case Similarity to Support Test Suite Understanding Michaela Greiler, Arie van.e.zaidman}@tudelft.nl Abstract. In order to support test suite understanding, we investigate whether we can automatically derive relations between test cases. In par- ticular, we search for trace-based similarities between (high

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  11. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  12. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  13. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  14. sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    sSCADA: Securing SCADA Infrastructure Communications Yongge Wang and Bei-Tseng Chu Dept. of SIS control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed. This paper presents a suite of security protocols optimized for SCADA/DCS systems which include: point

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  1. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  2. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  3. An intelligent floor field cellular automata model for pedestrian dynamics

    E-Print Network [OSTI]

    Ekaterina Kirik; Tat'yana Yurgel'yan; Dmitriy Krouglov

    2009-06-15

    A stochastic cellular automata (CA) model for pedestrian dynamics is presented. Our goal is to simulate different types of pedestrian movement, from regular to panic. But here we emphasize regular situations which imply that pedestrians analyze environment and choose their route more carefully. And transition probabilities have to depict such effect. The potentials of floor fields and environment analysis are combined in the model obtained. People patience is included in the model. This makes simulation of pedestrians movement more realistic. Some simulation results are presented and comparison with basic FF-model is made.

  4. Property:Building/FloorAreaGroceryShops | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)Energy Technology JumpWilliamDRAFTAreaFloorAreaGroceryShops

  5. Property:Building/FloorAreaOffices | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation, search This is a

  6. Property:Building/FloorAreaOtherRetail | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation, search This is

  7. Property:Building/FloorAreaResidential | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation, search This

  8. Cactus, Pixies, 04 Sept 09 Sittin' here wishin' on a cement floor

    E-Print Network [OSTI]

    Reiners, Peter W.

    Cactus, Pixies, 04 Sept 09 Em Sittin' here wishin' on a cement floor G Em just wishin' that I had that dress when you di-yi-yi-yi-yine Em Sittin' here wishin' on a cement floor G Em just wishin' that I had it to me Em Sittin' here wishin' on a cement floor G Em just wishin' that I had something you wore #12;

  9. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  10. 120 years of U.S. residential housing stock and floor space

    SciTech Connect (OSTI)

    Moura, Maria Cecilia P.; Smith, Steven J.; Belzer, David B.; Zhou, Wei -Xing

    2015-08-11

    Residential buildings are a key driver of energy consumption and also impact transportation and land-use. Energy consumption in the residential sector accounts for one-fifth of total U.S. energy consumption and energy-related CO? emissions, with floor space a major driver of building energy demands. In this work a consistent, vintage-disaggregated, annual long-term series of U.S. housing stock and residential floor space for 1891–2010 is presented. An attempt was made to minimize the effects of the incompleteness and inconsistencies present in the national housing survey data. Over the 1891–2010 period, floor space increased almost tenfold, from approximately 24,700 to 235,150 million square feet, corresponding to a doubling of floor space per capita from approximately 400 to 800 square feet. While population increased five times over the period, a 50% decrease in household size contributed towards a tenfold increase in the number of housing units and floor space, while average floor space per unit remains surprisingly constant, as a result of housing retirement dynamics. In the last 30 years, however, these trends appear to be changing, as household size shows signs of leveling off, or even increasing again, while average floor space per unit has been increasing. GDP and total floor space show a remarkably constant growth trend over the period and total residential sector primary energy consumption and floor space show a similar growth trend over the last 60 years, decoupling only within the last decade.

  11. Efficient Formulations for the Multi-Floor Facility Layout Problem with ...

    E-Print Network [OSTI]

    Marc Goetschalckx and Takashi Irohara

    2007-02-22

    Feb 22, 2007 ... problem with practical applications when the price of land is high or when a ... may have different dimensions provided the floor projections on.

  12. Mechanical counter-pressure space suit design using active materials

    E-Print Network [OSTI]

    Holschuh, Bradley Thomas

    2014-01-01

    Mechanical counter-pressure (MCP) space suits have the potential to greatly improve the mobility of astronauts as they conduct planetary exploration activities; however, the underlying technologies required to provide ...

  13. Engineering a robotic exoskeleton for space suit simulation

    E-Print Network [OSTI]

    Meyen, Forrest Edward

    2013-01-01

    Novel methods for assessing space suit designs and human performance capabilities are needed as NASA prepares for manned missions beyond low Earth orbit. Current human performance tests and training are conducted in space ...

  14. PARENTE SUITE USER'S GUIDE (c) 1994-97

    E-Print Network [OSTI]

    White, Douglas R.

    are granted a limited license to use this working version of Parente Suite which includes PGraph, Ego2Cpl, Par, funding from the A. von Humboldt Foundation and Leibnitz Award to Thomas Schweizer

  15. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  17. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  18. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  19. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  20. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  1. Materials and Textile Architecture Analyses for Mechanical Counter-Pressure Space Suits using Active Materials

    E-Print Network [OSTI]

    Buechley, Leah

    Mechanical counter-pressure (MCP) space suits have the potential to improve the mobility of astronauts as they conduct planetary exploration activities. MCP suits differ from traditional gas-pressurized space suits by ...

  2. Statistical Analysis of Tank 5 Floor Sample Results

    SciTech Connect (OSTI)

    Shine, E. P.

    2013-01-31

    Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide1, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed, and the results of this analysis are reported. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

  3. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  4. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  5. Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example

    SciTech Connect (OSTI)

    Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling and quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  8. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  9. Houses for early weaned piglets : influence of rearing on the floor or in batteries,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Houses for early weaned piglets : influence of rearing on the floor or in batteries, temperature-deck batteries on wire floor divided into 2 compartments : one at I8.!0 y- i°C, relative humidity 61+ io p. roo and in batteries were the following : 148 and z36 (period I), !2S and 495 (period 11), i. e. differences in favour

  10. UCR Chemistry Program 1953-1966; 2nd floor, Geology Building

    E-Print Network [OSTI]

    Reed, Christopher A.

    UCR Chemistry Program 1953-1970 1953-1966; 2nd floor, Geology Building 1966-2005; Pierce Hall of Physical Sciences ­ chemistry, geology, mathematics, physics ­ W. Conway Pierce, Chairman #12;Hart Schmidt of Geology bld; 1954-66 ­ Plus 2nd floor addition; 1959-66 ­ Pierce Hall; 1966-2005 · Instruments and support

  11. Numerical Simulation of Thermal Performance of Floor Radiant Heating System with Enclosed Phase Change Material 

    E-Print Network [OSTI]

    Qiu, L.; Wu, X.

    2006-01-01

    of the energy storage floor is designed,which places heat pipes in the enclosed phase change material (PCM) layer, without concrete in it. The PCM thermal storage time is studied in relation to the floor surface temperature under different low-temperature hot...

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  13. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  14. Crowne Plaza Suites MSP Airport - Mall of America

    Office of Environmental Management (EM)

    * Kevin Leuer, Minnesota Homeland Security and Emergency Management * Andrew Doyle, Baltimore Fire Department * Viktoria Mitlyng, U.S. Nuclear Regulatory Commission THURSDAY, MAY...

  15. Crowne Plaza Suites MSP Airport - Mall of America

    Office of Environmental Management (EM)

    * Kevin Leuer, Minnesota Homeland Security and Emergency Management * Andrew Doyle, Baltimore Fire Department * Viktoria Mitlyng, U.S. Nuclear Regulatory Commission Thursday, May...

  16. Vitality and chemistry of roots of red spruce in forest floors of stands with a gradient of soil

    E-Print Network [OSTI]

    David, Mark B.

    Vitality and chemistry of roots of red spruce in forest floors of stands with a gradient of soil Al) dominated by red spruce and with a gradient of forest floor exchangeable Al/Ca ratios. Root vitality

  17. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  18. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  19. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  20. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  1. Ambulatory infusion suite: pre- and post-occupancy evaluation 

    E-Print Network [OSTI]

    Shepley, Mardelle McCuskey; Rybkowski, Zofia; Aliber, Jennifer; Lange, Cathleen

    2015-02-08

    dans ce contexte. Mots cle´s: e´tablissement de lutte contre le cancer, e´valuation d’e´tablissement, soins de sante´, centre de perfusion, occupation, vie prive´e, interaction sociale Introduction This study focuses on an evaluation of infusion suites... facility, facility evaluation, healthcare, infusion suite, post-occupancy, privacy, social interaction Il est pre´sente´ une e´valuation de l’expe´rience ve´cue par les patients, les familles et les employe´s dans deux centres de perfusion. L’un des centres...

  2. 120 years of U.S. residential housing stock and floor space

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Moura, Maria Cecilia P.; Smith, Steven J.; Belzer, David B.; Zhou, Wei -Xing

    2015-08-11

    Residential buildings are a key driver of energy consumption and also impact transportation and land-use. Energy consumption in the residential sector accounts for one-fifth of total U.S. energy consumption and energy-related CO? emissions, with floor space a major driver of building energy demands. In this work a consistent, vintage-disaggregated, annual long-term series of U.S. housing stock and residential floor space for 1891–2010 is presented. An attempt was made to minimize the effects of the incompleteness and inconsistencies present in the national housing survey data. Over the 1891–2010 period, floor space increased almost tenfold, from approximately 24,700 to 235,150 million squaremore »feet, corresponding to a doubling of floor space per capita from approximately 400 to 800 square feet. While population increased five times over the period, a 50% decrease in household size contributed towards a tenfold increase in the number of housing units and floor space, while average floor space per unit remains surprisingly constant, as a result of housing retirement dynamics. In the last 30 years, however, these trends appear to be changing, as household size shows signs of leveling off, or even increasing again, while average floor space per unit has been increasing. GDP and total floor space show a remarkably constant growth trend over the period and total residential sector primary energy consumption and floor space show a similar growth trend over the last 60 years, decoupling only within the last decade.« less

  3. DYNA3D/ParaDyn Regression Test Suite Inventory

    SciTech Connect (OSTI)

    Lin, J I

    2011-01-25

    The following table constitutes an initial assessment of feature coverage across the regression test suite used for DYNA3D and ParaDyn. It documents the regression test suite at the time of production release 10.1 in September 2010. The columns of the table represent groupings of functionalities, e.g., material models. Each problem in the test suite is represented by a row in the table. All features exercised by the problem are denoted by a check mark in the corresponding column. The definition of ''feature'' has not been subdivided to its smallest unit of user input, e.g., algorithmic parameters specific to a particular type of contact surface. This represents a judgment to provide code developers and users a reasonable impression of feature coverage without expanding the width of the table by several multiples. All regression testing is run in parallel, typically with eight processors. Many are strictly regression tests acting as a check that the codes continue to produce adequately repeatable results as development unfolds, compilers change and platforms are replaced. A subset of the tests represents true verification problems that have been checked against analytical or other benchmark solutions. Users are welcomed to submit documented problems for inclusion in the test suite, especially if they are heavily exercising, and dependent upon, features that are currently underrepresented.

  4. A Test Suite for GCMs: An Intercomparison of 11

    E-Print Network [OSTI]

    Jablonowski, Christiane

    A Test Suite for GCMs: An Intercomparison of 11 Dynamical Cores Christiane Jablonowski1, PeterSandia National Laboratories PDEs on the Sphere Workshop, Santa Fe Apr/28/2009 #12;Motivation · Test standardized & easy-to-use analysis techniques · Idea: Establish a collection of test cases that finds broad

  5. Soft Wearable Motion Sensing Suit for Lower Limb Biomechanics Measurements*

    E-Print Network [OSTI]

    Wood, Robert

    Soft Wearable Motion Sensing Suit for Lower Limb Biomechanics Measurements* Yigit Meng¨uc¸1,2, Yong of human biomechanics as well as the entertainment industry. Although existing technologies motion data in order to understand the underlying biomechanics. Simulation tools such as Open- Sim [2

  6. Anti-cancer Technology Summary 121 Research Drive, Suite 501

    E-Print Network [OSTI]

    Peak, Derek

    Anti-cancer Technology Summary 121 Research Drive, Suite 501 Saskatoon, SK, S7N 1K2 Tel: (306) 966 cancers are ranked 2ed , 3ed and 11th of the most diagnosed cancers (National Cancer Institute, USA cancer cells but also healthy ones. A great opportunity exists for targeted therapies for the use solely

  7. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  8. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  10. Modular, security enclosure and method of assembly

    DOE Patents [OSTI]

    Linker, Kevin L. (Albuquerque, NM); Moyer, John W. (Albuquerque, NM)

    1995-01-01

    A transportable, reusable rapidly assembled and disassembled, resizable modular, security enclosure utilizes a stepped panel construction. Each panel has an inner portion and an outer portion which form joints. A plurality of channels can be affixed to selected joints of the panels. Panels can be affixed to a base member and then affixed to one another by the use of elongated pins extending through the channel joints. Alternatively, the base member can be omitted and the panels themselves can be used as the floor of the enclosure. The pins will extend generally parallel to the joint in which they are located. These elongated pins are readily inserted into and removable from the channels in a predetermined sequence to allow assembly and disassembly of the enclosure. A door constructed from panels is used to close the opening to the enclosure.

  11. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  12. Jane Gray Research Greenhouse and IB Sixth Floor Greenhouse Department of Integrative Biology

    E-Print Network [OSTI]

    Jane Gray Research Greenhouse and IB Sixth Floor Greenhouse Department of Integrative Biology UC Berkeley - 200 Centennial Dr. Greenhouse Space Request Form Date of Request____________ Expected time frame_____________________E-mail______________________________________ --------------------------------------------------------------------------------------------------------------------- Greenhouse Environmental Specifications Watering instructions

  13. The effectiveness of floor mats as an intervention for standing fatigue of light fabrication workers 

    E-Print Network [OSTI]

    O'Brien, Michael Shannon

    1996-01-01

    A field study was conducted in a light fabrication plant to determine the effectiveness of floor mats on reducing the symptoms of standing fatigue. Specific physiological variables measured include skin temperature of the ...

  14. Development of an NC equipment level controller in a hierarchical shop floor control system 

    E-Print Network [OSTI]

    Chang, William

    1993-01-01

    The methodology of developing an NC equipment controller in a Computer Integrated Manufacturing (CIM) System, which is based on a philosophy of hierarchical shop floor control, is presented in this research. The underlying architecture consists...

  15. Ground Floor (Basement) B10 -B10A --IT Service Center

    E-Print Network [OSTI]

    Oklahoma, University of

    -- Living Room 130 -- Buskuhl Gallery B50 ­ Arch 1st Year Studio B60 ­ ID 1st Year Studio B60 East ­ ID 2nd;Second Floor 205 -- Arch 2nd Year Studio (Access by First or Third Floor) 230 -- CNS Classroom 240 -- CNS Year Studio B80 ­ ID 3rd Year Studio B90 ­ ID 4th Year 150, 155, 160 -- Shared Classrooms 165

  16. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. Scurit Informatique / Numro 11 ////// Mars 2011 >>>> suite page 1

    E-Print Network [OSTI]

    Provence Aix-Marseille I, Université de

    sphères privée et professionnelle se retrouve aussi dans une simple clef UsB. Isabelle Benoist de la... _8 par Isabelle Benoist >>>> suite page 2 �ditorial Clefs USB : pratiques mais risquées Luc Vallée ANSSI Par leurs formats et la généralisation rapide de l'interface USB, les clefs sont rapidement

  18. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  20. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  1. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  2. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  3. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  4. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  5. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  6. Space suit simulator for partial gravity extravehicular activity experimentation and training

    E-Print Network [OSTI]

    Gilkey, Andrea L. (Andrea Lynn)

    2012-01-01

    During human space exploration, mobility is extremely limited when working inside a pressurized space suit. Astronauts perform extensive training on Earth to become accustomed to space suit-imposed high joint torques and ...

  7. On the deformation of human skin for mechanical counter pressure space suit development

    E-Print Network [OSTI]

    Obropta, Edward William, Jr

    2015-01-01

    Exploration of planetary bodies requires space suits that do not inhibit astronaut mobility. Gas pressurized suits are typically bulky and stiff to operate or require unnatural human motion. Development of mechanical counter ...

  8. Robotic Joint Torque Testing: A Critical Tool in the Development of Pressure Suit Mobility Elements

    E-Print Network [OSTI]

    Meyen, Forrest Edward

    Pressure suits allow pilots and astronauts to survive in extreme environments at the edge of Earth’s atmosphere and in the vacuum of space. One obstacle that pilots and astronauts face is that gas-pressurized suits stiffen ...

  9. 851 S.W. Sixth Avenue, Suite 1100 Portland, Oregon 97204-1348 Executive Director

    E-Print Network [OSTI]

    851 S.W. Sixth Avenue, Suite 1100 Portland, Oregon 97204-1348 Executive Director www progress report on various activities that are underway. 851 S.W. Sixth Avenue, Suite 1100 Steve Crow 503

  10. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  11. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  12. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  13. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  14. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  15. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  16. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  17. STING Millennium: a web-based suite of programs for comprehensive and simultaneous analysis

    E-Print Network [OSTI]

    Neshich, Goran

    STING Millennium: a web-based suite of programs for comprehensive and simultaneous analysis ABSTRACT STING Millennium Suite (SMS) is a new web-based suite of programs and databases providing visuali it provides a variety of algorithms and validated data, wrapped-up in a user friendly web interface. Using SMS

  18. Augmenting Test Suites Effectiveness by Increasing Output Diversity Nadia Alshahwan and Mark Harman

    E-Print Network [OSTI]

    Harman, Mark

    that output uniqueness shall be used to augment a traditional test generation adequacy criterion not replace for relatively high coverage test suites. In this paper we use output uniqueness to augment a test suiteAugmenting Test Suites Effectiveness by Increasing Output Diversity Nadia Alshahwan and Mark Harman

  19. Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor

    E-Print Network [OSTI]

    Jonathan H. Davis

    2015-03-09

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder to distinguish from the neutrino background. However for most velocity distributions the neutrino floor can still be surpassed using timing information, though certain velocity streams may prove problematic.

  20. TD M41 Series Serie 3 Suites de fonctions

    E-Print Network [OSTI]

    Berglund, Nils

    1 + (x + n)2 ; 2. fn(x) = 1 - xn 1 + xn , x 0; 7. fn(x) = 1 nx2 + 1 ; 3. fn(x) = x n(1 + xn) ; 8. fn(x) = sin(nx) nx , x > 0; 4. fn(x) = nx 1 + n2x ; 9. fn(x) = (log x)2n - 2 (log x)2n + 2 , x > 0; 5. fn(x) = nx3 1 + nx2 ; 10. fn(x) = x2 e-x/n ; Exercice 2 D´eterminer pour lesquelles des suites de fonctions

  1. Support of Gulf of Mexico Hydrate Research Consortium: Activities of Support Establishment of a Sea Floor Monitoring Station Project

    SciTech Connect (OSTI)

    J. Robert Woolsey; Thomas McGee; Carol Lutken

    2008-05-31

    The Gulf of Mexico Hydrates Research Consortium (GOM-HRC) was established in 1999 to assemble leaders in gas hydrates research that shared the need for a way to conduct investigations of gas hydrates and their stability zone in the Gulf of Mexico in situ on a more-or-less continuous basis. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory (SFO) on the sea floor in the northern Gulf of Mexico, in an area where gas hydrates are known to be present at, or just below, the sea floor and to discover the configuration and composition of the subsurface pathways or 'plumbing' through which fluids migrate into and out of the hydrate stability zone (HSZ) to the sediment-water interface. Monitoring changes in this zone and linking them to coincident and perhaps consequent events at the seafloor and within the water column is the eventual goal of the Consortium. This mission includes investigations of the physical, chemical and biological components of the gas hydrate stability zone - the sea-floor/sediment-water interface, the near-sea-floor water column, and the shallow subsurface sediments. The eventual goal is to monitor changes in the hydrate stability zone over time. Establishment of the Consortium succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among those involved in gas hydrates research. Complementary expertise, both scientific and technical, has been assembled to promote innovative methods and construct necessary instrumentation. Following extensive investigation into candidate sites, Mississippi Canyon 118 (MC118) was chosen by consensus of the Consortium at their fall, 2004, meeting as the site most likely to satisfy all criteria established by the group. Much of the preliminary work preceding the establishment of the site - sensor development and testing, geophysical surveys, and laboratory studies - has been reported in agency documents including the Final Technical Report to DOE covering Cooperative Agreement DEFC26-00NT40920 and Semiannual Progress Reports for this award, DE-FC26-02NT41628. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in MC118 in May of 2005. Follow-up deployments, planned for fall 2005, had to be postponed due to the catastrophic effects of Hurricane Katrina (and later, Rita) on the Gulf Coast. SFO completion, now anticipated for 2009-10, has, therefore, been delayed. Although delays caused scheduling and deployment difficulties, many sensors and instruments were completed during this period. Software has been written that will accommodate the data that the station retrieves, when it begins to be delivered. In addition, new seismic data processing software has been written to treat the peculiar data to be received by the vertical line array (VLA) and additional software has been developed that will address the horizontal line array (HLA) data. These packages have been tested on data from the test deployments of the VLA and on data from other, similar, areas of the Gulf (in the case of the HLA software). During the life of this Cooperative Agreement (CA), the CMRET conducted many cruises. Early in the program these were executed primarily to survey potential sites and test sensors and equipment being developed for the SFO. When MC118 was established as the observatory site, subsequent cruises focused on this location. Beginning in 2005 and continuing to the present, 13 research cruises to MC118 have been conducted by the Consortium. During September, 2006, the Consortium was able to secure 8 days aboard the R/V Seward Johnson with submersible Johnson SeaLink, a critical chapter in the life of the Observatory project as important documentation, tests, recoveries and deployments were accomplished during this trip (log appended). Consortium members have participated materially in a number of additional cruises including several of the NIUST autonomous underwater vehicle (AUV), Ea

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  5. Testing the Floor Scale Designated for Pacific Northwest National Laboratory's UF6 Cylinder Portal Monitor

    SciTech Connect (OSTI)

    Curtis, Michael M.; Weier, Dennis R.

    2009-03-12

    Pacific Northwest National Laboratory (PNNL) obtained a Mettler Toledo floor scale for the purpose of testing it to determine whether it can replace the International Atomic Energy Agency’s (IAEA) cumbersome, hanging load cell. The floor scale is intended for use as a subsystem within PNNL’s nascent UF6 Cylinder Portal Monitor. The particular model was selected for its accuracy, size, and capacity. The intent will be to use it only for 30B cylinders; consequently, testing did not proceed beyond 8,000 lb.

  6. Property:Building/FloorAreaUnheatedRentedPremises | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to:FloorAreaTotal Jump

  7. Enhanced Verification Test Suite for Physics Simulation Codes

    SciTech Connect (OSTI)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of greater sophistication or other physics regimes (e.g., energetic material response, magneto-hydrodynamics), would represent a scientifically desirable complement to the fundamental test cases discussed in this report. The authors believe that this document can be used to enhance the verification analyses undertaken at the DOE WP Laboratories and, thus, to improve the quality, credibility, and usefulness of the simulation codes that are analyzed with these problems.

  8. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  9. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  10. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  11. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  12. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  13. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  14. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  15. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  16. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  17. CATALOG OF PROCESSED DATA FOR 7 BUILDINGS A.0466 Los Angeles, 15250 Ventura Blvd., Roof (13th floor) (pp. 7)

    E-Print Network [OSTI]

    Southern California, University of

    APPENDIX A CATALOG OF PROCESSED DATA FOR 7 BUILDINGS A.0466 Los Angeles, 15250 Ventura Blvd., Roof Burbank, 3601 West Olive Ave., Roof (9th floor) (pp. 11) A.5451 Los Angeles, 6301 Owensmouth Ave., Roof (12th level) (pp. 8) A.5453 Los Angeles, 5805 Sepulveda Blvd., Roof (9th floor) (pp. 19) A.5455 Los

  18. User Guide for the STAYSL PNNL Suite of Software Tools

    SciTech Connect (OSTI)

    Greenwood, Lawrence R.; Johnson, Christian D.

    2013-02-27

    The STAYSL PNNL software suite provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist of the reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations.

  19. eXtended CASA Line Analysis Software Suite (XCLASS)

    E-Print Network [OSTI]

    Möller, T; Schilke, P

    2015-01-01

    The eXtended CASA Line Analysis Software Suite (XCLASS) is a toolbox for the Common Astronomy Software Applications package (CASA) containing new functions for modeling interferometric and single dish data. Among the tools is the myXCLASS program which calculates synthetic spectra by solving the radiative transfer equation for an isothermal object in one dimension, whereas the finite source size and dust attenuation are considered as well. Molecular data required by the myXCLASS program are taken from an embedded SQLite3 database containing entries from the Cologne Database for Molecular Spectroscopy CDMS) and JPL using the Virtual Atomic and Molecular Data Center (VAMDC) portal. Additionally, the toolbox provides an interface for the model optimizer package Modeling and Analysis Generic Interface for eXternal numerical codes (MAGIX), which helps to find the best description of observational data using myXCLASS (or another external model program), i.e., finding the parameter set that most closely reproduces t...

  20. An Integrated Suite of Tools to support Human Factors Engineering

    SciTech Connect (OSTI)

    Jacques V Hugo

    2001-08-01

    Human Factors Engineering (HFE) work for the nuclear industry imposes special demands on the practitioner in terms of the scope, complexity and safety requirements for humans in nuclear installations. Unfortunately HFE lags behind other engineering disciplines in the development and use of modern, powerful tools for the full range of analysis and design processes. HFE does not appear to be an attractive market for software and hardware developers and as a result, HFE practitioners usually have to rely on inefficient general-purpose tools like standard office software, or they have to use expensive special-purpose tools that offer only part of the solution they require and which also do not easily integrate with other tools. There have been attempts to develop generic software tools to support the HFE analyst and also to achieve some order and consistency in format and presentation. However, in spite of many years of development, very few tools have emerged that have achieved these goals. This would suggest the need for special tools, but existing commercial products have been found inadequate and to date not a single tool has been developed that adequately supports the special requirements of HFE work for the nuclear industry. This paper describes an integrated suite of generic as well as purpose-built tools that facilitate information solicitation, issues tracking, work domain analysis, functional requirements analysis, function allocation, operational sequence analysis, task analysis and development of HSI design requirements. In combination, this suite of tools supports the analytical as well as the representational aspects of key HFE activities primarily for new NPPs, including capturing information from subject matter experts and various source documents directly into the appropriate tool and then linking, analyzing and extending that information further to represent detailed functional and task information, and ultimately HSI design requirements. The paper also describes a tool developed especially for functional requirements analysis, function allocation, and task analysis.

  1. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  2. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  3. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  4. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  5. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  7. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  8. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  9. Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor

    E-Print Network [OSTI]

    Davis, Jonathan H

    2015-01-01

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder ...

  10. COOLING OF THE OCEANIC LITHOSPHERE AND OCEAN FLOOR (Copyright, 2001, David T. Sandwell)

    E-Print Network [OSTI]

    Sandwell, David T.

    1 COOLING OF THE OCEANIC LITHOSPHERE AND OCEAN FLOOR TOPOGRAPHY (Copyright, 2001, David T. Sandwell) Introduction This lecture is the development of the lithospheric cooling problem. For researchers in the areas important thermal boundary layer which is at the core-mantle boundary. As the lithosphere cools it becomes

  11. Particle resuspension from indoor flooring materials James H. Lohaus, Atila Novoselac and Jeffrey A. Siegel*

    E-Print Network [OSTI]

    Siegel, Jeffrey

    Particle resuspension from indoor flooring materials James H. Lohaus, Atila Novoselac and Jeffrey A@mail.utexas.edu Keywords: Fluid dynamics, Indoor surfaces, Particle experiments Introduction Particle resuspension from for supermicron particles. Resuspension is usually reported either as a critical velocity, the velocity at which

  12. UNIVERSITY OF NORTH CAROLINA WILMINGTON 1 Office of the Registrar, James Hall--First Floor

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    UNIVERSITY OF NORTH CAROLINA WILMINGTON 1 Office of the Registrar, James Hall--First Floor Office/or for the past 12 months. 4. Evidence you are a registered voter in North Carolina. 5. Evidence of motor vehicle ownership - registration card in North Carolina. 6. Copy of North Carolina Driver's License. 7. Evidence

  13. UNIVERSITY OF NORTH CAROLINA WILMINGTON1 Office of the Registrar, James Hall--First Floor

    E-Print Network [OSTI]

    Olszewski Jr., Edward A.

    UNIVERSITY OF NORTH CAROLINA WILMINGTON1 Office of the Registrar, James Hall--First Floor Office (Domiciliary) of North Carolina for Tuition Purposes. 1. Documents of residence for the past 12 months (i are a registered voter in North Carolina. 5. Evidence of motor vehicle ownership - registration card in North

  14. Carbon Dioxide Evolution from the Floor of Three Minnesota Forests Author(s): W. A. Reiners

    E-Print Network [OSTI]

    Thomas, David D.

    Carbon Dioxide Evolution from the Floor of Three Minnesota Forests Author(s): W. A. Reiners and extend access to Ecology. http://www.jstor.org #12;Late Spring 1968 CARBON DIOXIDE EVOLUTION RATES 471. Germination behavior of some halc- phytes. Bull. Res. Council Israel (D) 6: 187-188. CARBON DIOXIDE EVOLUTION

  15. Systemwide Risk Management and Public Safety 401 Golden Shore, 5th Floor

    E-Print Network [OSTI]

    de Lijser, Peter

    Systemwide Risk Management and Public Safety 401 Golden Shore, 5th Floor Long Beach, CA 90802 in this self-insured program. The Office of Risk Management in the Chancellor's Office administers the general liability, workers' compensation, property, and professional liability programs. The State Office of Risk

  16. Influence of floor plenum on energy performance of buildings with1 UFAD systems2

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    . Thermal29 buoyancy causes temperature stratification in the occupied zone, and the air temperature in the31 to use less energy for cooling [1,2]. In addition, the thermal stratification in a room the occupied zone and the floor plenum also be considered, so do the43 thermal stratification in the occupied

  17. Beyond Kanban: Creating and analyzing lean shop floor control policies 1

    E-Print Network [OSTI]

    Gershwin, Stanley B.

    Beyond Kanban: Creating and analyzing lean shop floor control policies 1 Asbjoern M. Bonvik ffl Stanley B. Gershwin Operations Research Center, MIT, Cambridge, MA 02139 Laboratory for Manufacturing policies for repetitive manufacturing, including kanban, basestock, and CONWIP control. This view focuses

  18. The Floor Strategy: Wayfinding Cognition in a Multi-Level Building

    E-Print Network [OSTI]

    1 The Floor Strategy: Wayfinding Cognition in a Multi-Level Building Christoph Hölscher1 , Georg and cognitive processes of wayfinding in public buildings. We conducted an empirical study in a complex multi-level building, comparing performance measures of experienced and inexperienced participants in different

  19. Wing Wave: Feasible, Alternative, Renewable, Electrical Energy Producing Ocean Floor System

    E-Print Network [OSTI]

    Wood, Stephen L.

    Wing Wave: Feasible, Alternative, Renewable, Electrical Energy Producing Ocean Floor System Mark, alternative energy system to convert the circular motion of ocean waves as they propagate through the sea and feasible alternative, renewable, electrical energy producing subsea system. Index Terms--ocean energy, wave

  20. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  1. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  2. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  3. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  4. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  5. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  6. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  7. Tender Notice for Renovation of Toilets (Gents & Ladies) on Ground and Second Floor in the Academic Block of ISI Bangalore Centre

    E-Print Network [OSTI]

    Bandyopadhyay, Antar

    Block of ISI Bangalore Centre Sealed tender applications are hereby invited from the contractors (Gents & Ladies) on ground floor and second floor in the Academic block building of ISI, Bangalore Centre

  8. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  9. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  10. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  11. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  12. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  14. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  16. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  18. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  19. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  2. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits...

    Energy Savers [EERE]

    From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits- Mound Science and Energy Museum Programs Cover a Wide Range of Topics From Hydrogen Fuel Cells to...

  4. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  5. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  6. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  7. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  8. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  9. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  10. Floor System Vibration Control E.M. Hines, Ph.D., P.E., Res. Asst. Professor, Tufts University, Dept. Civ. & Env. Eng.;

    E-Print Network [OSTI]

    Hines, Eric

    Floor System Vibration Control E.M. Hines, Ph.D., P.E., Res. Asst. Professor, Tufts University in the design of steel and concrete floor systems to control vibrations suggests that a floor system's vibration-term collaborative research program between Tufts University and LeMessurier Consultants to investigate the vibration

  11. Energy and Nutrient Dynamics of Forest Floors in Three Minnesota Forests Author(s): W. A. Reiners and N. M. Reiners

    E-Print Network [OSTI]

    Thomas, David D.

    Energy and Nutrient Dynamics of Forest Floors in Three Minnesota Forests Author(s): W. A. Reiners. http://www.jstor.org #12;497 ENERGY AND NUTRIENT DYNAMICS OF FOREST FLOORS IN THREE MINNESOTA FORESTS and subsequent utilization by heterotrophs is a major pathway of energy flow. Forest floors can also

  12. Facilities | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and oversees the operation of an exceptional suite of science, technology and engineering facilities that support and further the national stockpile stewardship agenda. Of...

  13. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  14. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  18. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  19. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  20. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  1. Innovative residential floor construction: Structural evaluation of steel joists with pre-formed web openings

    SciTech Connect (OSTI)

    Elhajj, N.R.

    1999-03-01

    Since 1992, the US Department of Housing and Urban Development has sponsored numerous studies to identify, evaluate, and implement innovative structural materials, such as cold-formed steel (CFS), in the residential market. The use of CFS is still very limited, partly because steel is not being effectively integrated into conventional home construction. One of the major barriers to the use of CFS floor joists is the impact it has on placement of large waste drains and ductwork installed in floor systems. This report provides an overview of tests conducted by the NAHB to integrate these systems with CFS. A brief literature review of relevant work followed by a detailed overview of the experimental and analytical approach are also provided. The report recommends adoption of the research findings in residential and commercial applications.

  2. Three-dimensional modeling of heat transfer from slab floors. Final report

    SciTech Connect (OSTI)

    Bahnfleth, W.P.

    1989-07-01

    Earth-coupled heat-transfer processes have been recognized in recent years as a potential source of significant energy savings in both conventional and earth-sheltered designs, Because of the complexity of the building/soil/atmosphere interaction, however, important aspects of earth-coupled heat transfer are not well understood. There is a particular lack of three-dimensional foundation heat-loss data. In this study, a detailed three-dimensional finite-difference model of a slab floor was used to generate 93 annual simulations in parametric groups focusing on effects of size and shape, soil properties, boundary conditions, climate, insulation, and building shadow. These results indicate that soil thermal conductivity, ground surface conditions, foundation design, and floor shape/size are essential elements of a general change in heat-transfer rate.

  3. Second Floor N314 N313 N312 N311 N310 N309N308

    E-Print Network [OSTI]

    NORTHWEST CORRIDOR N304 N307 N306 Centre for Doctoral Research N305 LIFT First Floor NORTHWEST CORRIDOR N203207 S207A S206S206A S205 S204 S203 S202 MAIN NORTH CORRIDOR M F LINKCORRIDOR LIFT 301 F M D Lift LIFT Lecture Theatre 1 (N111) Seminar Room 1 Tea & Cofee Station Seminar Room 2 Programme Office Office

  4. Property:Building/FloorAreaSchoolsChildDayCare | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to: navigation,

  5. Property:Building/FloorAreaTheatresConcertHallsCinemas | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)EnergyFloorAreaOffices Jump to:

  6. Test Suite Reduction for Fault Detection and Localization: A Combined Approach

    E-Print Network [OSTI]

    Beszedes, Árpád

    detection capability of a test suite in general is hard, and the mostly accepted method is to use different from fault localization viewpoint. Based on this observation, we defined a test reduction methodTest Suite Reduction for Fault Detection and Localization: A Combined Approach László Vidács

  7. Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007

    E-Print Network [OSTI]

    Conformance Test Architecture and Test Suite for ANSI/NIST-ITL 1-2007 Fernando L. Podio Dylan Yaga Christofer J. McGinnis NISTIR 7791 #12;NISTIR 7791 Conformance Test Architecture and Test Suite for ANSI develops tests, test methods, reference data, proof of concept implementations, and technical analysis

  8. Specification and Analysis of the AER/NCA Active Network Protocol Suite in

    E-Print Network [OSTI]

    Ă?lveczky, Peter Csaba

    Specification and Analysis of the AER/NCA Active Network Protocol Suite to the specification and analy- sis of the AER/NCA suite of active network multicast protocol compo- nents, AER/NCA poses challenging new problems for its formal specification and analysis. Real-Time Maude

  9. Specification and Analysis of the AER/NCA Active Network Protocol Suite in

    E-Print Network [OSTI]

    Ă?lveczky, Peter Csaba

    Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real­Time Maude Peter and the Maude formal methodology to the specification and analy­ sis of the AER/NCA suite of active network and the composability of its components, AER/NCA poses challenging new problems for its formal specification

  10. Space Suited Crew Engineering Evaluation of the Proposed Array A-Z PSE Decoupled

    E-Print Network [OSTI]

    Rathbun, Julie A.

    : : I Pt ·::., p.~ Space Suited Crew Engineering Evaluation of the Proposed Array A-Z PSE Decoupled Shroud (Crew Engineering Mockup) NO. REV. NO. ATM-973 PAGE 1 OF 8 rtems Division DATE Z/9/71 A. INTRCDUC TICN On January ZZ, 1971, the BxA Crew Engineering group performed a lG, space- suited handling

  11. A Diagnostic Suite of Models for the Evaluation of Oceanic Mesoscale Eddy Parameterizations

    E-Print Network [OSTI]

    Fox-Kemper, Baylor

    A Diagnostic Suite of Models for the Evaluation of Oceanic Mesoscale Eddy Parameterizations by S. D of Oceanic Mesoscale Eddy Parameterizations written by S. D. Bachman has been approved for the Department and Oceanic Sciences) A Diagnostic Suite of Models for the Evaluation of Oceanic Mesoscale Eddy

  12. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  13. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  14. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  15. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  18. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  19. Inherent secure communications using lattice based waveform design.

    SciTech Connect (OSTI)

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  20. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  1. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  2. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  3. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  4. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  5. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  6. Wheelchair access to this building is not currently recommended without assistance and is limited to the ground floor.

    E-Print Network [OSTI]

    Edinburgh, University of

    . Lift. Page 10. Stairs. Page 10. Toilets. Page 11. Room Directory. Page 12. Floor Plans, Page 13 at Pollock Halls. The nearest railway line is at Waverley Station in the city centre. The nearest bus stops

  7. Commissioning Tools for Heating/Cooling System in Residence - Verification of Floor Heating System and Room Air Conditioning System Performance 

    E-Print Network [OSTI]

    Miura, H.; Hokoi, S.; Iwamae, A.; Umeno, T.; Kondo, S.

    2004-01-01

    Tools of evaluating the performance of floor heating and room air conditioner are examined as a commissioning tool. Simple method is needed to check these performance while in use by residents, because evaluation currently requires significant time...

  8. Fatigue analysis of stringer to floor beam connections in through plate girder and through truss railroad bridges 

    E-Print Network [OSTI]

    Evans, Leslie Virginia

    1999-01-01

    The objective of this thesis is to determine fatigue stresses in the stringer to floor beam connections of through plate girder (TPG) and through truss (TT) bridges in order to predict failure. Field observations by the Association of American...

  9. Floor Polisher 

    E-Print Network [OSTI]

    Unknown

    2011-08-17

    When steam transfers its heat in a manufacturing process or heat exchanger, it may revert to a liquid phase called condensate. This paper presents a method to help certain manufacturing and petro-chemical companies to save energy costs by returning their...

  10. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  11. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  12. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  13. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  14. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  15. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  16. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  17. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  18. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  19. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  20. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  1. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  2. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  3. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  4. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  5. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  6. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  7. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  8. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  9. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  10. University of California Davis Medical Center, Employee Health Services 2221 Stockton Boulevard, Cypress Building Suite A, Sacramento, CA 95817

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    , Cypress Building Suite A, Sacramento, CA 95817 916-734-3572 Fax 916-734-7510 FLU CONSENT - INACTIVATED

  11. University of California Davis Medical Center, Employee Health Services 2221 Stockton Boulevard, Cypress Building Suite A, Sacramento, CA 95817

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    , Cypress Building Suite A, Sacramento, CA 95817 916-734-3572 Fax 916-734-7510 Influenza Vaccine Declination

  12. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  13. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  14. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  15. Forest floor community metatranscriptomes identify fungal and bacterial responses to N deposition in two maple forests

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hesse, Cedar N.; Mueller, Rebecca C.; Vuyisich, Momchilo; Gallegos-Graves, La Verne; Gleasner, Cheryl D.; Zak, Donald R.; Kuske, Cheryl R.

    2015-04-23

    Anthropogenic N deposition alters patterns of C and N cycling in temperate forests, where forest floor litter decomposition is a key process mediated by a diverse community of bacteria and fungi. To track forest floor decomposer activity we generated metatranscriptomes that simultaneously surveyed the actively expressed bacterial and eukaryote genes in the forest floor, to compare the impact of N deposition on the decomposers in two natural maple forests in Michigan, USA, where replicate field plots had been amended with N for 16 years. Site and N amendment responses were compared using about 74,000 carbohydrate active enzyme transcript sequences (CAZymes)more »in each metatranscriptome. Parallel ribosomal RNA (rRNA) surveys of bacterial and fungal biomass and taxonomic composition showed no significant differences in either biomass or OTU richness between the two sites or in response to N. Site and N amendment were not significant variables defining bacterial taxonomic composition, but they were significant for fungal community composition, explaining 17 and 14% of the variability, respectively. The relative abundance of expressed bacterial and fungal CAZymes changed significantly with N amendment in one of the forests, and N-response trends were also identified in the second forest. Although the two ambient forests were similar in community biomass, taxonomic structure and active CAZyme profile, the shifts in active CAZyme profiles in response to N-amendment differed between the sites. One site responded with an over-expression of bacterial CAZymes, and the other site responded with an over-expression of both fungal and different bacterial CAZymes. Both sites showed reduced representation of fungal lignocellulose degrading enzymes in N-amendment plots. The metatranscriptome approach provided a holistic assessment of eukaryote and bacterial gene expression and is applicable to other systems where eukaryotes and bacteria interact.« less

  16. Verification of criticality accident alarm system detector locations for the X-326 process cell floor

    SciTech Connect (OSTI)

    Dobelbower, M.C.; Woollard, J.; Lee, B.L. Jr.; Tayloe, R.W. Jr. [Battelle, Columbus, OH (United States)

    1995-08-01

    Criticality Accident Alarm System (CAAS) detectors on the cell floor of the X-326 process building at the Portsmouth Gaseous Diffusion Plant (PORTS) are located at a height of 5 m above the cell floor. It has been suggested that this height be lowered to I m to alleviate accelerated system failures caused by the elevated temperatures at 5 m and to reduce the frequency of injury to maintenance personnel lifting the approximately 90-lb units into position. Work has been performed which analyzed the effect of relocating the CAAS detectors on the process floors of the X-333 and X-330 buildings from their current height to a height of 1 m{sup 1}. This earlier work was based on criticality accidents occurring in low enriched material (5% {sup 235}U) and was limited to the X-333 and X-330 buildings and the low enriched areas of X-326. It did not consider the residual higher enriched material in the X-326 building. This report analyzes the effect on criticality alarm coverage of lowering the CAAS detectors. This analysis is based on criticality accidents resulting from higher enriched material which may be present as ``hold-up`` in the process equipment within the X-326 building. The criticality accident alarm detectors at the PORTS facility are set to alarm at a neutron absorbed dose rate of 5 mrad/hr. The calculated absorbed dose rates presented in this report show that the detectors examined that produce an alarm for the given criticality event at their current height will also produce an alarm if located at a height of 1 meter. Therefore, lowering the detectors will not result in a loss of coverage within the building.

  17. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  18. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  19. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  20. Combined Operation of Solar Energy Source Heat Pump, Low-vale Electricity and Floor Radiant System 

    E-Print Network [OSTI]

    Liu, G.; Guo, Z.; Hu, S.

    2006-01-01

    accordin g to heat quantity compared charge according to area. 2.3 Government Encouraging Use of New and Re producible Energy In order to save energy in architecture field, government and MINISRY OF CONSTRUCTIO N P.R. CHINA issue a series of laws... has longer life and its life is up to fifty years. 6) Divided calculation heat is easily carried out i n floor radiant heating system. It is helpful to so lve charge question. According to statistic, it can save energy about 20~30% that charge...

  1. Property:Building/FloorAreaHealthServicesDaytime | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975)Energy TechnologyFloorAreaHealthServicesDaytime Jump to:

  2. An investigation of space suit mobility with applications to EVA operations

    E-Print Network [OSTI]

    Schmidt, Patricia Barrett, 1974-

    2001-01-01

    The primary aim of this thesis is to advance the current understanding of astronauts' capabilities and limitations in space-suited extravehicular activity (EVA) by compiling a detailed database of the torques needed to ...

  3. DC Pro Software Tool Suite, Data Center Fact Sheet, Industrial Technologies Program

    SciTech Connect (OSTI)

    Not Available

    2009-04-01

    This fact sheet describes how DOE's Data Center Energy Profiler (DC Pro) Software Tool Suite and other resources can help U.S. companies identify ways to improve the efficiency of their data centers.

  4. Space exploration challenges : characterization and enhancement of space suit mobility and planetary protection policy analysis

    E-Print Network [OSTI]

    Holschuh, Bradley Thomas

    2010-01-01

    This thesis addresses two challenges associated with advanced space and planetary exploration: characterizing and improving the mobility of current and future gas pressurized space suits; and developing effective domestic ...

  5. Unsupervised Learning of Contextual Role Knowledge for Coreference Attensity Corporation, Suite 600

    E-Print Network [OSTI]

    Corporation, Suite 600 Gateway One 90 South 400 West Salt Lake City, UT 84101 dbean@attensity.com Ellen Riloff. Section 4 presents experimen- #12;tal results on two corpora: the MUC-4 terrorism cor- pus, and Reuters

  6. Bureau for Private Postsecondary Education 2535 Capitol Oaks Drive, Suite 400, Sacramento, CA 95833~t.. r

    E-Print Network [OSTI]

    Gollin, George

    Bureau for Private Postsecondary Education 2535 Capitol Oaks Drive, Suite 400, Sacramento, CA 95833~t.. r::n:::aP.O. Box 980818, West Sacramento, CA 95798-0818 BPPE P (916) 431-6959 F (916) 263

  7. ADVANCED DIGITAL CINEMA CAMERA CAGE 14 E. Jackson St. Suite LL103

    E-Print Network [OSTI]

    Schaefer, Marcus

    ADVANCED DIGITAL CINEMA CAMERA CAGE 14 E. Jackson St. Suite LL103 dcstage, 75mm, 100mm Zeiss CP.2 Cinema Prime Package (EF / Canon Mount) 21mm, 25mm, 35mm

  8. Development of a mechanical counter pressure Bio-Suit System for planetary exploration

    E-Print Network [OSTI]

    Sim, Zhe Liang

    2006-01-01

    Extra-vehicular activity (EVA) is critical for human spaceflight and particularly for human planetary exploration. The MIT Man Vehicle Laboratory is developing a Bio-Suit EVA System, based on mechanical counterpressure ...

  9. Assessment and preliminary model development of shape memory polymers mechanical counter pressure space suits

    E-Print Network [OSTI]

    Wee, Brian (Brian J.)

    2013-01-01

    This thesis seeks to assess the viability of a space qualified shape memory polymer (SMP) mechanical counter pressure (MCP) suit. A key development objective identified by the International Space Exploration Coordination ...

  10. Understanding human-space suit interaction to prevent injury during extravehicular activity

    E-Print Network [OSTI]

    Anderson, Allison P. (Allison Paige)

    2014-01-01

    Extravehicular Activity (EVA) is a critical component of human spaceflight. Working in gas-pressurized space suits, however, causes fatigue, unnecessary energy expenditure, and injury. The problem of injury is particularly ...

  11. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  12. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  13. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  14. The Department of Energy Respiratory Acceptance Program for Supplied-Air Suits

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-04

    The supplied-air suits that protect DOE contractor and federal employees from exposure to harmful atmospheres and radioactive contaminants are not included in the National Institute for Occupational Safety and Health (NIOSH) certification process for respiratory protective devices. Therefore, with the awareness and acknowledgement of NIOSH and the Occupational Safety and Health Administration (OSHA), the Department established a system for acceptance testing of supplied-air suits.

  15. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna

    E-Print Network [OSTI]

    Hwang, Kai

    An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid

  16. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  17. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  18. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  19. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  1. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  2. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  3. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  4. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  5. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  6. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  8. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  9. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  10. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  11. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  12. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  13. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  14. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  15. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  16. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  17. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  18. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  19. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  20. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  1. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  2. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  3. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  4. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  5. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  6. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  7. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  8. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  9. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  10. Adjudication of a Contract for the Supply of False Floors for the Auxiliary Buildings of the 300 GeV Accelerator

    E-Print Network [OSTI]

    1973-01-01

    Adjudication of a Contract for the Supply of False Floors for the Auxiliary Buildings of the 300 GeV Accelerator

  11. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  12. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  13. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  14. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  16. Irena : tool suite for modeling and analysis of small-angle scattering.

    SciTech Connect (OSTI)

    Ilavsky, J.; Jemian, P.

    2009-04-01

    Irena, a tool suite for analysis of both X-ray and neutron small-angle scattering (SAS) data within the commercial Igor Pro application, brings together a comprehensive suite of tools useful for investigations in materials science, physics, chemistry, polymer science and other fields. In addition to Guinier and Porod fits, the suite combines a variety of advanced SAS data evaluation tools for the modeling of size distribution in the dilute limit using maximum entropy and other methods, dilute limit small-angle scattering from multiple non-interacting populations of scatterers, the pair-distance distribution function, a unified fit, the Debye-Bueche model, the reflectivity (X-ray and neutron) using Parratt's formalism, and small-angle diffraction. There are also a number of support tools, such as a data import/export tool supporting a broad sampling of common data formats, a data modification tool, a presentation-quality graphics tool optimized for small-angle scattering data, and a neutron and X-ray scattering contrast calculator. These tools are brought together into one suite with consistent interfaces and functionality. The suite allows robust automated note recording and saving of parameters during export.

  17. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  18. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  19. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  20. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  1. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  2. Optical Spectrum Analyzer with Quantum-Limited Noise Floor M. Bishof, X. Zhang, M. J. Martin, and Jun Ye

    E-Print Network [OSTI]

    Optical Spectrum Analyzer with Quantum-Limited Noise Floor M. Bishof, X. Zhang, M. J. Martin with state-of-the-art stability. We demonstrate a technique that precisely measures the noise spectrum determine the laser noise spectrum from near dc to 100 Hz via the measured fluctuations in atomic excitation

  3. PII S0016-7037(00)00511-1 Reaction of forest floor organic matter at goethite, birnessite and smectite surfaces

    E-Print Network [OSTI]

    Chorover, Jon

    PII S0016-7037(00)00511-1 Reaction of forest floor organic matter at goethite, birnessite carbon (DOC) concentrations (0­140 g C m 3 ) for reaction with goethite ( -FeOOH), birnessite ( -MnO2 different NOM adsorption, fractionation and transformation patterns. Goethite exhibited a steep initial

  4. A model for an under floor air distribution system Y.J.P. Lina,*, P.F. Lindenb

    E-Print Network [OSTI]

    Linden, Paul F.

    ; improved thermal comfort; improved ventilation efficiency and indoor air quality; reduced energy useA model for an under floor air distribution system Y.J.P. Lina,*, P.F. Lindenb a Energy gains that occur above the occupied zone are isolated from the calculation of the required space supply

  5. Job Opportunity at NEUROMATTERS, LLC 40 Wall Street, 28th Floor, New York, NY 10005 www.neuromatters.com

    E-Print Network [OSTI]

    Adams, Mark

    , Neuromatters is at the forefront of neurotechnologies, EEG signal processing and decoding. The successfulJob Opportunity at NEUROMATTERS, LLC 40 Wall Street, 28th Floor, New York, NY 10005 www.neuromatters.com Founded by recognized neuroengineering experts from Columbia University and the City College of New York

  6. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  7. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  8. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  9. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  10. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  11. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  12. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  14. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  2. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  3. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  4. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  5. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  6. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  7. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  10. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  11. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  12. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  17. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  18. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  19. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  20. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  1. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  2. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  3. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  4. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  5. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  6. 211 Quarry Road, Suite 201, Palo Alto, CA 94304 (650) 725-8400 http://healthlibrary.stanford.edu

    E-Print Network [OSTI]

    Kay, Mark A.

    211 Quarry Road, Suite 201, Palo Alto, CA 94304 (650) 725-8400 · http is my tax-deductible contribution of $______________ Payment Method: Check enclosed Visa Master

  7. Modeling Tidal Freshwater Marsh Sustainability in the Sacramento–San Joaquin Delta Under a Broad Suite of Potential Future Scenarios

    E-Print Network [OSTI]

    Swanson, Kathleen M.; Drexler, Judith Z.; Fuller, Christopher C.; Schoellhamer, David H.

    2015-01-01

    a Broad Suite of Potential Future Scenarios Kathleen M.Holocene, recent, and future accretion in channel marshas well as possible future trends in sediment sup- ply and

  8. 970 East 58th Street 3rd floor Chicago, IL 60637 773-702-8000

    E-Print Network [OSTI]

    He, Chuan

    with the University; and to ensure the University's compliance with the Payment Card Industry Data Security Standards merchant standards and/or industry standards for the processing of credit cards or automated clearing house of a proposed application with PCIDSS and industry best practices for conducting electronic payment transactions

  9. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  10. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  11. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  12. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  13. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  15. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  16. Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage

    E-Print Network [OSTI]

    Harrold, Mary Jean

    Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage James A. Jones (MC/DC) adequate. Despite its cost, there is evidence that MC/DC is an effective verification technique, and can help to uncover safety faults. As the software is modified and new test cases are added

  17. Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage

    E-Print Network [OSTI]

    Harrold, Mary Jean

    Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage James A. Jones condition/decision coverage (MC/DC) adequate. Despite its cost, there is evidence that MC/DC is an effective verification technique and can help to uncover safety faults. As the software is modified and new test cases

  18. STUDIES ON THE GOES-R HYPERSPECTRAL ENVIRONMENTAL SUITE (HES) ON , Timothy, J. Schmit

    E-Print Network [OSTI]

    Li, Jun

    resolution infrared radiances from the Hyperspectral Environmental Suite (HES) on Geostationary Operational with capabilities from current sensors. Corresponding author address: Jun Li, Cooperative Institute and 2 km relative humidity (RH) rms were created to evaluate the retrieval difference between LW + LMW

  19. On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel

    E-Print Network [OSTI]

    Rothermel, Gregg

    On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 31, 2004 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

  20. On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel

    E-Print Network [OSTI]

    Rothermel, Gregg

    On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 30, 2003 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

  1. TSpaces Services Suite: Automating the Development and Management of Web Services

    E-Print Network [OSTI]

    Fontoura, Marcus F.

    TSpaces Services Suite: Automating the Development and Management of Web Services Marcus Fontoura Page Mill Road Palo Alto, CA 94304 yuhong.xiong@hp.com ABSTRACT Web services allow authorized entities and implemented an infrastructure and a set of tools to simplify the development and management of Web services

  2. Test Factoring: Focusing Test Suites for the Task at Hand Michael D. Ernst, research advisor

    E-Print Network [OSTI]

    Liskov, Barbara

    Test Factoring: Focusing Test Suites for the Task at Hand David Saff Michael D. Ernst, research and Subject Descriptors: D.2.5 (Testing and Debug­ ging): Testing tools General Terms: Algorithms, Design, Performance, Verification Keywords: test factoring, mock objects, unit testing 1. Problem: slow, unfocused

  3. Test Factoring: Focusing Test Suites for the Task at Hand Michael D. Ernst, research advisor

    E-Print Network [OSTI]

    Liskov, Barbara

    Test Factoring: Focusing Test Suites for the Task at Hand David Saff Michael D. Ernst, research and Subject Descriptors: D.2.5 (Testing and Debug- ging): Testing tools General Terms: Algorithms, Design, Performance, Verification Keywords: test factoring, mock objects, unit testing 1. Problem: slow, unfocused

  4. Towards High-Performance Optimizations of the Unstructured Open-Source SU2 Suite

    E-Print Network [OSTI]

    Alonso, Juan J.

    , materials, heat transfer, vortical flows, and combustion. CFD simulations run the gamut of computational. This article presents a snapshot of ongoing efforts to optimize an open-source CFD anal- ysis and design suite-based, finite volume CFD solvers, making efficient use of memory within a heavily object-oriented solver

  5. Status and Outlook of Integrated Transport Analysis Suite, TASK3D-a

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    Suite TASK3D-a01 (2012.9) Automated Experimental Energy Balance Analysis Significant progress (NBI) Experimental energy/momentum balance wout (VMEC) newboz.dat Te(reff) ne(reff) Ti(reff) output eg-UD) close collaboration with LHD Experiment Group and Kyoto University 1 #12;/14 LHD, the world largest

  6. Citizens' Utility Board of Oregon 610 S.W. Broadway, Suite 308

    E-Print Network [OSTI]

    1 Citizens' Utility Board of Oregon 610 S.W. Broadway, Suite 308 Portland, Oregon 97205 Phone 503 for the Future Role of the Bonneville Power Administration in Power Supply Dear Mr. Walker, The Citizens' Utility towards an allocation of the existing system through long term contracts and to serve utilities beyond

  7. A suite of web-based programs to search for transcriptional regulatory motifs

    E-Print Network [OSTI]

    Brutlag, Doug

    A suite of web-based programs to search for transcriptional regulatory motifs Yueyi Liu, Liping Wei, the individual sites used to con- struct the motifs and the location of each site on the input sequences. The web for these three programs have been tested and published. We have since developed them into interactive web

  8. PULSE: A Suite of R Functions for Detecting Pulsatile Hormone Secretions

    E-Print Network [OSTI]

    Wang, Yuedong

    PULSE: A Suite of R Functions for Detecting Pulsatile Hormone Secretions Yu­Chieh Yang Department 93106. email: yuedong@pstat.ucsb.edu September 7, 2004 1 Introduction PULSE is a R package for hormone pulse detection and estimation based on the nonlinear mixed e#ects partial spline models proposed

  9. PULSE: A Suite of R Functions for Detecting Pulsatile Hormone Secretions

    E-Print Network [OSTI]

    Wang, Yuedong

    PULSE: A Suite of R Functions for Detecting Pulsatile Hormone Secretions Yu-Chieh Yang Department 93106. email: yuedong@pstat.ucsb.edu September 7, 2004 1 Introduction PULSE is a R package for hormone pulse detection and estimation based on the nonlinear mixed effects partial spline models proposed

  10. Wi-HTest: Compliance Test Suite for Diagnosing Devices in Real-Time WirelessHARTTM

    E-Print Network [OSTI]

    Chandy, John A.

    {deji.chen, mark.nixon}@emerson.com HART Communication Foundation, 9390 Research Blvd., Suite I-350 and interoperability. To ensure the compliance with the HARTTM Communication Protocol and the adherence to its strict timing requirements, all WirelessHART devices must be thoroughly tested and registered with the HART

  11. Name: Quebec Anglophone Heritage Network located at 257 Queen, Suite 400 Position Description

    E-Print Network [OSTI]

    Name: Quebec Anglophone Heritage Network ­ located at 257 Queen, Suite 400 Position Description: The Quebec Anglophone Heritage Network (QAHN) is a non-profit, non-partisan umbrella organization that promotes the preservation of the built, cultural and natural heritage of Quebec. QAHN aims to advance

  12. A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull

    E-Print Network [OSTI]

    Bull, Mark

    A Parallel Java Grande Benchmark Suite L. A. Smith and J. M. Bull EPCC, The King's Buildings Republic. email: xobdrzal@fi.muni.cz Abstract Increasing interest is being shown in the use of Java for large scale or Grande applications. This new use of Java places specific demands on the Java execution

  13. Constructed Wetlands Research Group meeting Forth Suite, SEPA Riccarton Office, Edinburgh EH14 4AP

    E-Print Network [OSTI]

    Heal, Kate

    .uk/our-work/wetland-habitats/wetlands-in-my-backyard). 3. Presentations and discussion Seven presentations were made to the group on various aspects1 Minutes of Constructed Wetlands Research Group meeting Forth Suite, SEPA Riccarton Office of the group Kate Heal welcomed the participants and summarised the history and original aims of the CWRG

  14. UCSF tomography: An integrated software suite for real-time electron microscopic tomographic

    E-Print Network [OSTI]

    Agard, David

    suite provides full automation from data collec- tion to real-time reconstruction by which the three pixel images which are subsequently computationally binned four- fold for the on-line reconstruction improving both productivity and efficiency of system resources. The total time from start of data collection

  15. Proc. FASE 2015, (c) Springer Facilitating Reuse in Multi-Goal Test-Suite

    E-Print Network [OSTI]

    Beyer, Dirk

    approach for automated product-line test-suite generation incorporating extensive reuse of reachability. Keywords: Software Product Lines, Automated Test Generation, Sym- bolic Model Checking, CPAchecker, CPA Product Lines Johannes Bürdek1 , Malte Lochau1 , Stefan Bauregger1 , Andreas Holzer2 , Alexander von Rhein

  16. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  17. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  18. SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT

    SciTech Connect (OSTI)

    Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis

    2005-09-01

    A Consortium, designed to assemble leaders in gas hydrates research, has been established at the University of Mississippi's Center for Marine Resources and Environmental Technology, CMRET. The primary objective of the group is to design and emplace a remote monitoring station on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station allows for the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. Noteworthy achievements six months into the extended life of this cooperative agreement include: (1) Progress on the vertical line array (VLA) of sensors: Analysis and repair attempts of the VLA used in the deep water deployment during October 2003 have been completed; Definition of an interface protocol for the VLA DATS to the SFO has been established; Design modifications to allow integration of the VLA to the SFO have been made; Experience gained in the deployments of the first VLA is being applied to the design of the next VLAs; One of the two planned new VLAs being modified to serve as an Oceanographic Line Array (OLA). (2) Progress on the Sea Floor Probe: The decision to replace the Sea Floor Probe technology with the borehole emplacement of a geophysical array was reversed due to the 1300m water depth at the JIP selected borehole site. The SFP concept has been revisited as a deployment technique for the subsea floor array; The SFP has been redesigned to include gravity driven emplacement of an array up to 10m into the shallow subsurface of the sea floor. (3) Progress on the Acoustic Systems for Monitoring Gas Hydrates: Video recordings of bubbles emitted from a seep in Mississippi Canyon have been analyzed for effects of currents and temperature changes; Several acoustic monitoring system concepts have been evaluated for their appropriateness to MC118, i.e., on the deep sea floor; A mock-up system was built but was rejected as too impractical for deployment on the sea floor. (4) Progress on the Electromagnetic Bubble Detector and Counter: The initial Inductive Conductivity Cell has been constructed from components acquired during the previous reporting period; Laboratory tests involving measuring bubble volume as a component of conductivity have been performed; The laboratory tests were performed in a closed system, under controlled conditions; the relationship between voltage and bubble volume appears to be linear. (5) Progress on the Mid-Infrared Sensor for Continuous Methane Monitoring: Designs and construction schematics for all electronic mounting pieces and an electronics system baseplate were finalized after extensive modeling to facilitate the successful fabrication and implementation of electronic components into the deep-sea, glass instrument housing; Construction schematics and fabrication of an electronics system baseplate have been completed with successful integration of all currently fabricated electronic mounting pieces; Modeling and design of an optics platform complementary to the constructed electronics platform for successful incorporation into ''sphereIR'' has commenced; A second generation chemometric data evaluation software package for evaluating complex spectra including corrections for baseline drifts and spectral anomalies resulting from matrix substances has been developed and will be incorporated into an optimized ''deepSniff'' program upon c

  19. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  20. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  1. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  2. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  3. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01

    plants as a form of energy security in the absence of suffi-can be drawn. The energy security situation and outlook areregional cooperation on energy and security issues in Asia.

  4. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  5. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  6. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat’,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    myths and facts behind cyber security risks for industrialJ. and Hieb, J. [2007], ‘Cyber security risk assessment forOn Cyber Security for Networked Control Systems by Saurabh

  8. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  9. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  10. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  11. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  12. Water Scarcity, Security and democracy

    E-Print Network [OSTI]

    Water Scarcity, Security and democracy: a Mediterranean Mosaic edited by Francesca de châtel, Gail holst-WarhaFt and taMMo steenhuis #12;#12;Water Scarcity, Security and democracy: a mediterranean moSaic #12;© 2014 by Global Water Partnership Mediterranean, Cornell University and the Atkinson Center

  13. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  14. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  15. Distributed Internet Security and Measurement

    E-Print Network [OSTI]

    New Mexico, University of

    , New Mexico May, 2009 #12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico May

  16. Building:__________ Suite:_________

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Clothes Yes No Yes, but ask Yes No Yes, but ask Yes No Yes, but ask Yes No Yes, but ask Food Yes No Yes responsibilities: Sweeping/vacuuming, emptying the trash, dusting, picking up/tidying room, defrosting

  17. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  18. Spatial variability of throughfall water and chemistry and forest floor water content in a Douglas fir forest stand Hydrology and Earth System Sciences, 6(3), 363374 (2002) EGS

    E-Print Network [OSTI]

    Boyer, Edmond

    2002-01-01

    Spatial variability of throughfall water and chemistry and forest floor water content in a Douglas variability of throughfall water and chemistry and forest floor water content in a Douglas fir forest stand K variability of throughfall water and chemistry and forest floor water content within a Douglas fir

  19. SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT

    SciTech Connect (OSTI)

    Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis; Bob A. Hardage; Jeffrey Chanton; Rudy Rogers

    2006-03-01

    The Gulf of Mexico Hydrates Research Consortium was established in 1999 to assemble leaders in gas hydrates research. The group is administered by the Center for Marine Resources and Environmental Technology, CMRET, at the University of Mississippi. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station has always included the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. This possibility has recently received increased attention and the group of researchers working on the station has expanded to include several microbial biologists. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in Mississippi Canyon 118 in May of 2005. Follow-up deployments are planned for fall 2005 and center about the use of the vessel M/V Ocean Quest and its two manned submersibles. The subs will be used to effect bottom surveys, emplace sensors and sea floor experiments and make connections between sensor data loggers and the integrated data power unit (IDP). Station/observatory completion is anticipated for 2007 following the construction, testing and deployment of the horizontal line arrays, not yet funded. The seafloor monitoring station/observatory is funded approximately equally by three federal Agencies: Minerals Management Services (MMS) of the Department of the Interior (DOI), National Energy Technology Laboratory (NETL) of the Department of Energy (DOE), and the National Institute for Undersea Science and Technology (NIUST), an agency of the National Oceanographic and Atmospheric Administration (NOAA).

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  1. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01

    impacts and responses to environmental change making it anhuman security or environmental change if the lecturer isReview: Global Environmental Change and Human Security By

  2. Developing Secure Power Systems Professional Competence: Alignment...

    Energy Savers [EERE]

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  3. Transportation Safeguards & Security Test Bed (TSSTB) | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Safeguards and Security Test Bed May 30, 2013 The Transportation Safeguards and Security Test Bed consists of a test-bed vehicle and a monitoringlaboratorytraining...

  4. Control Systems Security Standards: Accomplishments And Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    that need to be made toward meeting the priority strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards:...

  5. Energy Security Planning for Sustainable Buildings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    capabilities are sufficient to serve their most critical needs during a prolonged outage. Energy Security Assessments For analysis and planning, see Performing Energy Security...

  6. Lemnos Interoperable Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements,...

  7. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  8. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Environmental Management (EM)

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  9. Nuclear Security Conference 2010 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his...

  10. 2014 Headquarters Facilities Master Security Plan- Acronyms

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Acronyms A list of the acronyms contained in the 2014 Headquarters Facilities Master Security Plan (HQFMSP).

  11. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  12. Nevada National Security Site Waste Acceptance Criteria

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office Environmental...

  13. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  14. Enforcement Letter, National Security Technologies, LLC - November...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 13, 2007 Enforcement Letter, National Security Technologies, LLC - November 13, 2007 November 13, 2007 Issued to National Security Technologies, LLC related to an...

  15. Consent Order, Lawrence Livermore National National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lawrence Livermore National National Security, LLC - WCO-2010-01 Consent Order, Lawrence Livermore National National Security, LLC - WCO-2010-01 October 29, 2010 Issued to Lawrence...

  16. Voluntary Protection Program Onsite Review, National Security...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - February 2015 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - February 2015 February 2015 Recertification of...

  17. Independent Activity Report, Nevada National Security Site -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR...

  18. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security Enforcement Preliminary Notice of Violation...

  19. Voluntary Protection Program Onsite Review, National Security...

    Energy Savers [EERE]

    January 2009 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - January 2009 January 2009 Evaluation to determine whether the National Security...

  20. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat...