Sample records for floor suite secure

  1. Security Suites | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder

  2. AES-CCM ECC Cipher Suites for TLS CS290G Network Security

    E-Print Network [OSTI]

    AES-CCM ECC Cipher Suites for TLS CS290G Network Security Qin ZHOU #12;· Transfer Layer Security (TLS) · Handshake Protocol: ECDHE_ECDSA · Record Protocol: AEAD_AES_CCM Content #12;Transfer Layer_ECDHE_ECDSA_WITH_AES_128_CCM ECDHE_ECDSA AES_128_CCM TLS_ECDHE_ECDSA_WITH_AES_256_CCM ECDHE_ECDSA AES_256_CCM TLS

  3. Low floor mass transit vehicle

    DOE Patents [OSTI]

    Emmons, J. Bruce (Beverly Hills, MI); Blessing, Leonard J. (Rochester, MI)

    2004-02-03T23:59:59.000Z

    A mass transit vehicle includes a frame structure that provides an efficient and economical approach to providing a low floor bus. The inventive frame includes a stiff roof panel and a stiff floor panel. A plurality of generally vertical pillars extend between the roof and floor panels. A unique bracket arrangement is disclosed for connecting the pillars to the panels. Side panels are secured to the pillars and carry the shear stresses on the frame. A unique seating assembly that can be advantageously incorporated into the vehicle taking advantage of the load distributing features of the inventive frame is also disclosed.

  4. First Floor1 Second Floor2

    E-Print Network [OSTI]

    Gleeson, Joseph G.

    Resource Center Financial Counseling & Infusion Center Scheduling Lactation Room Meditation Garden Infusion Center Clinical Lab Waiting Playground Registration Infusion Center Waiting Second Floor Research Tower . . . . . . . . . . . . . . . . . .Second Conference Room 2250 . . . . . . . . . . . . . . . . . .Second Financial Counseling & Infusion

  5. STAYS PNNL SUITE

    Energy Science and Technology Software Center (OSTI)

    002851IBMPC00 STAYSL PNNL Suite  http://radiochemscieng.pnnl.gov/research_areas/research_area_description.asp?id=283 

  6. Design of a flooring removal system for asbestos backed flooring

    E-Print Network [OSTI]

    Puduru, Pathanjali Sai

    1990-01-01T23:59:59.000Z

    Page 1 Properties of flooring, adhesive and subflooring 2 Results for wood subflooring vvhen t, is 100 deg C 3 Results for vood subflooring when t, is 110 deg C 4 Results for v;ood subfloorin ' when t, is 120 deg C 34 LIST OF FIGURES Figure Pa. ge... 1 Cross section of a, typical non-foam flooring 2 Cross section of a typical foam flooring 3 'Top surface heating of the flooring material . 4 Hot knife at adhessve layer . 10 5 Radiation method of heating 6 Conduction method of heating 12 7...

  7. Impact of Thermally Insulated Floors 

    E-Print Network [OSTI]

    Alghimlas, F.; Omar, E. A.

    2004-01-01T23:59:59.000Z

    of insulated floors. It was found that using an R- 10 floors in multi-story apartment buildings greatly reduce both the peak cooling demand as well as the energy consumption by about 15%, whereas only minimal savings (about 4%) were detected in the case...

  8. Suite for Wind Ensemble

    E-Print Network [OSTI]

    Oliver, Theodore

    2014-05-31T23:59:59.000Z

    "Suite for Wind Ensemble" consists of three movements, each of which contains a main theme and several smaller themes. Each main theme is introduced within the first minute of the movement, and the main themes from the ...

  9. LANL Go Suite

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5 - -/e),,s - 6157 / ThePreliminaryLANL Go Suite

  10. Optimization Online - Efficient Formulations for the Multi-Floor ...

    E-Print Network [OSTI]

    Marc Goetschalckx

    2007-02-28T23:59:59.000Z

    Feb 28, 2007 ... ... of the facility layout problem with practical applications when the price ... provided the floor projections on the ground floor are nested starting ...

  11. Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for On-Highway4,1,50022,3,,,,6,1,9,1,50022,3,,,,6,1,Decade Year-0E (2001) - HouseholdshortEIA-782A andS FRecord U.S.Report

  12. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  13. First Floor Smithsonian American Art Museum

    E-Print Network [OSTI]

    Mathis, Wayne N.

    First Floor Smithsonian American Art Museum American Experience Folk Art Special ExhibitionsMillan Education Center Folk Art One Life Archives of American Art Gallery Recent AcquisitionsMuseum Store Museum Museum Graphic Arts American Art through 1940 America's Presidents The Struggle for Justice

  14. International Flooring Conference 26 March 2009, Changzhou, China

    E-Print Network [OSTI]

    International Flooring Conference 26 March 2009, Changzhou, China Global Trade of Wood Products;International Flooring Conference 26 March 2009, Changzhou, China Subjects I. Overview of developments II 26 March 2009, Changzhou, China Acknowledgements · China National Forest Products Industry

  15. Design of a biomechanically synergistic exotendon suit

    E-Print Network [OSTI]

    Graves, Carmen Marten-Ellis

    2013-01-01T23:59:59.000Z

    The focus of this thesis is on the design, development, and evaluation of a lightweight, exotendon suit for load carriage. The suit is intended to be worn underneath the wearer's own clothes for use in a military setting, ...

  16. Method and apparatus for recovering a gas from a gas hydrate located on the ocean floor

    DOE Patents [OSTI]

    Wyatt, Douglas E. (Aiken, SC)

    2001-01-01T23:59:59.000Z

    A method and apparatus for recovering a gas from a gas hydrate on the ocean floor includes a flexible cover, a plurality of steerable base members secured to the cover, and a steerable mining module. A suitable source for inflating the cover over the gas hydrate deposit is provided. The mining module, positioned on the gas hydrate deposit, is preferably connected to the cover by a control cable. A gas retrieval conduit or hose extends upwardly from the cover to be connected to a support ship on the ocean surface.

  17. The Variable Vector Countermeasure Suit for space habitation and exploration

    E-Print Network [OSTI]

    Vasquez, Rebecca (Rebecca Ann)

    2014-01-01T23:59:59.000Z

    The Variable Vector Countermeasure Suit (V2Suit) is a countermeasure suit for sensorimotor adaptation and musculoskeletal deconditioning in microgravity. The V2suit will consist of modules containing arrays of control ...

  18. Floor Support | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA)Budget(DANCE) Target 1 Flight Path°Floor Support

  19. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  20. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  1. Steam System Tool Suite Introduction Guide

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    Steam System Tool Suite Introduction Guide Alternate Text Narratives and Graphic.............................................................................................................................6 Modules Steam System Scoping Tool (SSST)........................................................................................8 Steam System Assessment Tool (SSAT

  2. The Variable Vector Countermeasure Suit (V2Suit) for space habitation and exploration

    E-Print Network [OSTI]

    Duda, Kevin R.

    The “Variable Vector Countermeasure Suit (V2Suit) for Space Habitation and Exploration” is a novel system concept that provides a platform for integrating sensors and actuators with daily astronaut intravehicular activities ...

  3. Universal Benchmark Suites Jozo J. Dujmovic

    E-Print Network [OSTI]

    Dujmovic, Jozo J.

    the same universal benchmark suite. This approach substantially reduces the cost of benchmarking. Keywords global increase of the cost of benchmarking. The first step in the development of a method for benchmark1 Universal Benchmark Suites Jozo J. Dujmovic Department of Computer Science San Francisco State

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. UCSF EMERGENCY PREPAREDNESS EAP Floor Warden Duties Pamela Roskowski

    E-Print Network [OSTI]

    Derisi, Joseph

    followed Retrieve emergency bag and put on Floor Warden ID vest and hard hat Observe any hazardous or Emergency Responders with status report of condition of assigned floor. Include the last known locations of any injuries, deaths, trapped or missing persons, fires, hazardous materials spills, utility failures

  6. Impact of Solar Heat Gain on Radiant Floor Cooling System Design

    E-Print Network [OSTI]

    Feng, Jingjuan Dove; Schiavon, Stefano; Bauman, Fred

    2013-01-01T23:59:59.000Z

    Bauman F. 2013. Impact of Solar Heat Gain on Radiant FloorBauman F. 2013. Impact of Solar Heat Gain on Radiant FloorBauman F. 2013. Impact of Solar Heat Gain on Radiant Floor

  7. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  8. Daily Scheduling of Nurses in Operating Suites

    E-Print Network [OSTI]

    2011-10-07T23:59:59.000Z

    (2008) proposed a stochastic model ...... operating suites, each spanning either 8 or 10 regular hours plus overtime and lunch. ... above the 700 minimum. Moreover ..... Empirically, this was seen to reduce the size of the branch-and-

  9. Black Literary Suite: Kansas Authors Edition

    E-Print Network [OSTI]

    Wiggins, Meredith Joan

    2015-03-04T23:59:59.000Z

    authors were born or lived in the Sunflower State, and their work often reflects their time in Kansas. This Black Literary Suite exhibit highlights four important black writers—Langston Hughes, Gwendolyn Brooks, Frank Marshall Davis, and Kevin Young...

  10. Impact of Solar Heat Gain on Radiant Floor Cooling System Design

    E-Print Network [OSTI]

    Feng, Jingjuan Dove; Schiavon, Stefano; Bauman, Fred

    2013-01-01T23:59:59.000Z

    Gain on Radiant Floor Cooling System Design. Proceedings ofWater-based radiant cooling systems are gaining popularityGain on Radiant Floor Cooling System Design. Proceedings of

  11. Property:Building/FloorAreaTotal | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices JumpFloorAreaShopsFloorAreaTotal

  12. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  13. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  14. Prioritisation of test suites containing precedence constraints

    E-Print Network [OSTI]

    Miller, Tim

    1 Prioritisation of test suites containing precedence constraints Tim Miller Department@unimelb.edu.au Abstract--Test case prioritisation is the process of ordering the exe- cution of test cases to achieve a certain goal, such as increasing the rate of fault detection. Many existing test case prioritisation

  15. Collaboration Suite Advanced Web Client User Guide

    E-Print Network [OSTI]

    Shepp, Larry

    ZimbraTM Collaboration Suite Advanced Web Client User Guide Version 5.0 #12;Zimbra Web Client User Guide Copyright Notice Copyright © 2008 Zimbra, Inc. All rights reserved materials, onscreen publication, or Web documentation--is expressly forbidden. Zimbra and the Zimbra logo

  16. www.earthrisktech.com Avenue, Suite 320

    E-Print Network [OSTI]

    Droegemeier, Kelvin K.

    Weather Analytic Software About EarthRisk Technologies EarthRisk Technologies creates a market advantage at the University of California San Diego. Energy producers and commodity investment firms currently employ TempRisk.earthrisktech.com 1 2970 5th Avenue, Suite 320 San Diego, California 92103 858.413.RISK

  17. Novel millimeter wave sensor concepts for energy, environment, and national security

    E-Print Network [OSTI]

    Sundaram, S. K.

    Millimeter waves are ideally suited for sensing and diagnosing materials, devices, and processes that are broadly important to energy, environment, and national security. Thermal return reflection (TRR) techniques that ...

  18. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  20. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Property:Building/FloorAreaShops | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices JumpFloorAreaShops Jump to:

  3. Property:Building/FloorAreaSportCenters | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices JumpFloorAreaShops Jump

  4. Property:Building/FloorAreaWarehouses | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOfficesFloorAreaWarehouses Jump to:

  5. In Outer Space without a Space Suit?

    E-Print Network [OSTI]

    Alexander Bolonkin

    2008-06-24T23:59:59.000Z

    The author proposes and investigates his old idea - a living human in space without the encumbrance of a complex space suit. Only in this condition can biological humanity seriously attempt to colonize space because all planets of Solar system (except the Earth) do not have suitable atmospheres. Aside from the issue of temperature, a suitable partial pressure of oxygen is lacking. In this case the main problem is how to satiate human blood with oxygen and delete carbonic acid gas (carbon dioxide). The proposed system would enable a person to function in outer space without a space suit and, for a long time, without food. That is useful also in the Earth for sustaining working men in an otherwise deadly atmosphere laden with lethal particulates (in case of nuclear, chemical or biological war), in underground confined spaces without fresh air, under water or a top high mountains above a height that can sustain respiration.

  6. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  8. Extender for securing a closure

    DOE Patents [OSTI]

    Thomas, II, Patrick A.

    2012-10-02T23:59:59.000Z

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  11. The bioenergetics of walking and running in space suits

    E-Print Network [OSTI]

    Carr, Christopher E. (Christopher Edward), 1976-

    2005-01-01T23:59:59.000Z

    Space-suited activity is critical for human spaceflight, and is synonymous with human planetary exploration. Space suits impose kinematic and kinetic boundary conditions that affect movement and locomotion, and in doing ...

  12. Global Energy Partners, LLC 500 Ygnacio Valley Road, Suite 450

    E-Print Network [OSTI]

    Global Energy Partners, LLC 500 Ygnacio Valley Road, Suite 450 Walnut Creek, CA 94596 P: 925. This report was prepared by Global Energy Partners, LLC 500 Ygnacio Valley Blvd., Suite 450 Walnut Creek, CA

  13. Academic Programs and Policy 401 Golden Shore, 6th Floor

    E-Print Network [OSTI]

    Ponce, V. Miguel

    Academic Programs and Policy 401 Golden Shore, 6th Floor Long Beach, CA 90802-4210 www for graduation is specified (not just the total for the major): _______ the proposed bachelor's program requires no fewer and no more than 120 units _______ proposed bachelor's degree programs

  14. Controlling Social Dynamics with a Parametrized Model of Floor Regulation

    E-Print Network [OSTI]

    Das, Suman

    Controlling Social Dynamics with a Parametrized Model of Floor Regulation Crystal Chao, Andrea L is to build autonomous robot controllers for successfully engaging in human-like turn-taking interactions. Towards this end, we present CADENCE, a novel computational model and architecture that explicitly reasons

  15. Pattern of Thermal Fluctuations in a Recovery Boiler Floor

    SciTech Connect (OSTI)

    Abdullah, Z.; Gorog, J.P.; Keiser, J.R.; Meyers, L.E.; Swindeman, R.W.

    1999-04-25T23:59:59.000Z

    The floor of a black liquor recovey boiler at a mill in central Canada has experienced cracking and delamination of the composite tubing near the spout wall and deformation of the floor panels that is most severe in the vicinity of the spout wall. One possible explanation for the observed damage is impacts of salt cake falling from the convective section onto the floor. In order to determine if such impacts do occur, strain gauges and thermocouples were installed on the boiler floor in areas where cracking and deformation were most frequent. The data obtained from these instruments indicate that brief, sudden temperature fluctuations do occur, and changes in the strain experienced by the affected tube occur simultaneously. These fluctuations appear to occur less often along the spout wall and more frequently with increasing distance from the wall. The frequency of these temperature fluctuations is insufficient for thermal fatigue to be the sole cause of the cracking observed on the tubes, but the data are consistent with what might be expected from pieces of falling salt cake.

  16. Pattern of thermal fluctuations in a recovery boiler floor

    SciTech Connect (OSTI)

    Keiser, J.R.; Meyers, L.E.; Swindeman, R.W.; Gorog, J.P.; Abdullah, Z.

    1999-07-01T23:59:59.000Z

    The floor of a black liquor recovery boiler at a mill in central Canada has experienced cracking and delamination of the composite tubing near the spout wall and deformation of the floor panels that is most severe in the vicinity of the spout wail. One possible explanation for the observed damage is impacts of salt cake falling from the convective section onto the floor. In order to determine if such impacts do occur, strain gauges and thermocouples were installed on the boiler floor in areas where cracking and deformation were most frequent. The data obtained from these instruments indicate that brief, sudden temperature fluctuations do occur, and changes in the strain experienced by-the affected tube occur simultaneously. These fluctuations appear to occur less often along the spout wall and more frequently with increasing distance from the wall. The frequency of these temperature fluctuations is insufficient for thermal fatigue to be the sole cause of the cracking observed on the tubes, but the data are consistent with what might be expected from pieces of falling salt cake.

  17. UWMC Floor Maps for Pa ents and Visitors

    E-Print Network [OSTI]

    Yetisgen-Yildiz, Meliha

    Center SHUTTLES To Harborview, UWMC-Roosevelt, FHCHC, and SCCA Pharmacy - Inpa ent PACIFIC TOWER Radia ng Area Angio-VIR CT/MRI Nuclear Medicine Ultrasound Quiet Room PACIFIC TOWER Anatomic Pathology Pavilion Pharmacy Spiral Stairs Vending Machines Sky Bridge Shu le Cash machine (1st Floor) Coffee (1st & 3

  18. Managing power system security and optimization

    SciTech Connect (OSTI)

    O'Grady, M.J. (Potomac Electric Power Co., Washington, DC (United States)); Briggs, W.T.; Stadlin, W.O.

    1994-10-01T23:59:59.000Z

    Power system control objectives of energy management systems (EMSs) are well defined and understood: reliability, security, and optimization. However, the approaches to achieving these objectives have often resulted in disjointed solutions and poor acceptance by system operators. This article describes how the new PEPCO EMS provides unique system-wide (generation, transmission, distribution) security and optimization strategies via a coordinated suite of real-time closed-loop control functions. System operators played a key role in defining the application features and user interfaces, ensuring correct operating practices.

  19. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  20. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  1. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  2. Numerical Simulation of Thermal Performance of Floor Radiant Heating System with Enclosed Phase Change Material

    E-Print Network [OSTI]

    Qiu, L.; Wu, X.

    2006-01-01T23:59:59.000Z

    water temperatures. With the method of enthalpy , the PCM thermal storage time is studied under different supply water temperatures, supply water flows, distances between water wipe in the floor construction, floor covers and insulation conditions....

  3. Design and Experiments of a Solar Low-temperature Hot Water Floor Radiant Heating System 

    E-Print Network [OSTI]

    Wu, Z.; Li, D.

    2006-01-01T23:59:59.000Z

    The solar low-temperature hot water floor radiant heating system combines solar energy heating with floor radiant heating. This kind of environmental heating way not only saves fossil resources and reduces pollution, but also makes people feel more...

  4. Design and Experiments of a Solar Low-temperature Hot Water Floor Radiant Heating System

    E-Print Network [OSTI]

    Wu, Z.; Li, D.

    2006-01-01T23:59:59.000Z

    The solar low-temperature hot water floor radiant heating system combines solar energy heating with floor radiant heating. This kind of environmental heating way not only saves fossil resources and reduces pollution, but also makes people feel more...

  5. Berkeley Lab's SPOT Suite Transforms Beamline Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWPAlumniComplex historianBenefits offorSPOT Suite Transforms

  6. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  9. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  10. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  11. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  13. Thermal Behavior of Floor Tubes in a Kraft Recovery Boiler

    SciTech Connect (OSTI)

    Barker, R.E.; Choudhury, K.A.; Gorog, J.P.; Hall, L.M.; Keiser, J.R.; Sarma, G.B.

    1999-09-12T23:59:59.000Z

    The temperatures of floor tubes in a slope-floored black liquor recovery boiler were measured using an array of thermocouples located on the tube crowns. It was found that sudden, short duration temperature increases occurred with a frequency that increased with distance from the spout wall. To determine if the temperature pulses were associated with material falling from the convective section of the boiler, the pattern of sootblower operation was recorded and compared with the pattern of temperature pulses. During the period from September, 1998, through February, 1999, it was found that more than 2/3 of the temperature pulses occurred during the time when one of the fast eight sootblowers, which are directed at the back of the screen tubes and the leading edge of the first superheater bank, was operating.

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  16. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  17. Accelerated Wear Tests on Common Floor-covering Materials.

    E-Print Network [OSTI]

    Stewart, B. R.; Kunze, O. R.; Hobgood, Price.

    1958-01-01T23:59:59.000Z

    *'r** qd** ""~c- web*- !,* . flccelerated Wear Tests e" f loor-couering materials AGRICULTURAL EXPERIMENT STATION R. D. LEWIS, DIRECTOR, COLLEGE STATION. TEXAS SUMMARY I .. - " : 5: Accelerated wear tests made on six common floor covering... materials indicated there are variations in the changes of appearance and wear in these materials. Solid sheet vinyls and rubber tiles showed significantly less wear than asphalt tiles, vinyl- asbestos tiles, linoleums and cork. Asphalt tiles showed...

  18. PHASE CHANGE MATERIALS IN FLOOR TILES FOR THERMAL ENERGY STORAGE

    SciTech Connect (OSTI)

    Douglas C. Hittle

    2002-10-01T23:59:59.000Z

    Passive solar systems integrated into residential structures significantly reduce heating energy consumption. Taking advantage of latent heat storage has further increased energy savings. This is accomplished by the incorporation of phase change materials into building materials used in passive applications. Trombe walls, ceilings and floors can all be enhanced with phase change materials. Increasing the thermal storage of floor tile by the addition of encapsulated paraffin wax is the proposed topic of research. Latent heat storage of a phase change material (PCM) is obtained during a change in phase. Typical materials use the latent heat released when the material changes from a liquid to a solid. Paraffin wax and salt hydrates are examples of such materials. Other PCMs that have been recently investigated undergo a phase transition from one solid form to another. During this process they will release heat. These are known as solid-state phase change materials. All have large latent heats, which makes them ideal for passive solar applications. Easy incorporation into various building materials is must for these materials. This proposal will address the advantages and disadvantages of using these materials in floor tile. Prototype tile will be made from a mixture of quartz, binder and phase change material. The thermal and structural properties of the prototype tiles will be tested fully. It is expected that with the addition of the phase change material the structural properties will be compromised to some extent. The ratio of phase change material in the tile will have to be varied to determine the best mixture to provide significant thermal storage, while maintaining structural properties that meet the industry standards for floor tile.

  19. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  20. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  2. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  3. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  4. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  5. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  6. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  7. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - 2013 BTO Peer Review Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System - 2013 BTO Peer Review Commercial Buildings...

  9. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  10. Automated structure solution with the PHENIX suite

    SciTech Connect (OSTI)

    Terwilliger, Thomas C [Los Alamos National Laboratory; Zwart, Peter H [LBNL; Afonine, Pavel V [LBNL; Grosse - Kunstleve, Ralf W [LBNL

    2008-01-01T23:59:59.000Z

    Significant time and effort are often required to solve and complete a macromolecular crystal structure. The development of automated computational methods for the analysis, solution, and completion of crystallographic structures has the potential to produce minimally biased models in a short time without the need for manual intervention. The PHENIX software suite is a highly automated system for macromolecular structure determination that can rapidly arrive at an initial partial model of a structure without significant human intervention, given moderate resolution, and good quality data. This achievement has been made possible by the development of new algorithms for structure determination, maximum-likelihood molecular replacement (PHASER), heavy-atom search (HySS), template- and pattern-based automated model-building (RESOLVE, TEXTAL), automated macromolecular refinement (phenix. refine), and iterative model-building, density modification and refinement that can operate at moderate resolution (RESOLVE, AutoBuild). These algorithms are based on a highly integrated and comprehensive set of crystallographic libraries that have been built and made available to the community. The algorithms are tightly linked and made easily accessible to users through the PHENIX Wizards and the PHENIX GUI.

  11. Automated Structure Solution with the PHENIX Suite

    SciTech Connect (OSTI)

    Zwart, Peter H.; Zwart, Peter H.; Afonine, Pavel; Grosse-Kunstleve, Ralf W.; Hung, Li-Wei; Ioerger, Tom R.; McCoy, A.J.; McKee, Eric; Moriarty, Nigel; Read, Randy J.; Sacchettini, James C.; Sauter, Nicholas K.; Storoni, L.C.; Terwilliger, Tomas C.; Adams, Paul D.

    2008-06-09T23:59:59.000Z

    Significant time and effort are often required to solve and complete a macromolecular crystal structure. The development of automated computational methods for the analysis, solution and completion of crystallographic structures has the potential to produce minimally biased models in a short time without the need for manual intervention. The PHENIX software suite is a highly automated system for macromolecular structure determination that can rapidly arrive at an initial partial model of a structure without significant human intervention, given moderate resolution and good quality data. This achievement has been made possible by the development of new algorithms for structure determination, maximum-likelihood molecular replacement (PHASER), heavy-atom search (HySS), template and pattern-based automated model-building (RESOLVE, TEXTAL), automated macromolecular refinement (phenix.refine), and iterative model-building, density modification and refinement that can operate at moderate resolution (RESOLVE, AutoBuild). These algorithms are based on a highly integrated and comprehensive set of crystallographic libraries that have been built and made available to the community. The algorithms are tightly linked and made easily accessible to users through the PHENIX Wizards and the PHENIX GUI.

  12. Why Do Kraft Recovery Boiler Composite Floor Tubes Crack?

    SciTech Connect (OSTI)

    Keiser, J.R.

    2001-10-22T23:59:59.000Z

    Cracks were first reported in 1992 in co-extruded 304L stainless steel/SA210 Gd Al carbon steel floor tubes of North American black liquor recovery boilers. Since then, a considerable amount of information has been collected on the tube environment, crack characteristics, the stress state of the tubes, and the crack initiation and propagation mechanisms. These studies have identified both operating procedures that apparently can greatly lessen the likelihood of crack formation in the stainless steel layer and alternate materials that appear to be much more resistant to cracking than is 304L stainless.

  13. Property:Building/FloorAreaHeatedGarages | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt Institute forToolkitFloorAreaHealthServicesDaytime Jump

  14. Property:Building/FloorAreaHotels | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt Institute forToolkitFloorAreaHealthServicesDaytime

  15. Property:Building/FloorAreaOffices | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices Jump to: navigation, search This

  16. Property:Building/FloorAreaOtherRetail | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices Jump to: navigation, search

  17. Property:Building/FloorAreaResidential | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices Jump to: navigation,

  18. Property:Building/FloorAreaRestaurants | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices Jump to:

  19. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  20. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  1. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  2. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  3. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  4. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  5. Cactus, Pixies, 04 Sept 09 Sittin' here wishin' on a cement floor

    E-Print Network [OSTI]

    Reiners, Peter W.

    Cactus, Pixies, 04 Sept 09 Em Sittin' here wishin' on a cement floor G Em just wishin' that I had that dress when you di-yi-yi-yi-yine Em Sittin' here wishin' on a cement floor G Em just wishin' that I had it to me Em Sittin' here wishin' on a cement floor G Em just wishin' that I had something you wore #12;

  6. Low Floor Americans with Disabilities Compliant Alternate Fuel Vehicle Project

    SciTech Connect (OSTI)

    James Bartel

    2004-11-26T23:59:59.000Z

    This project developed a low emission, cost effective, fuel efficient, medium-duty community/transit shuttle bus that meets American's with Disabilities Act (ADA) requirements and meets National Energy Policy Act requirements (uses alternative fuel). The Low Profile chassis, which is the basis of this vehicle is configured to be fuel neutral to accommodate various alternative fuels. Demonstration of the vehicle in Yellowstone Park in summer (wheeled operation) and winter (track operation) demonstrated the feasibility and flexibility for this vehicle to provide year around operation throughout the Parks system as well as normal transit operation. The unique configuration of the chassis which provides ADA access with a simple ramp and a flat floor throughout the passenger compartment, provides maximum access for all passengers as well as maximum flexibility to configure the vehicle for each application. Because this product is derived from an existing medium duty truck chassis, the completed bus is 40-50% less expensive than existing low floor transit buses, with the reliability and durability of OEM a medium duty truck.

  7. THERMAL EVALUATION OF CONTAMINATED LIQUID ONTO CELL FLOORS

    SciTech Connect (OSTI)

    (NOEMAIL), J

    2009-05-04T23:59:59.000Z

    For the Salt Disposition Integration Project (SDIP), postulated events in the new Salt Waste Processing Facility (SWPF) can result in spilling liquids that contain Cs-137 and organics onto cell floors. The parameters of concern are the maximum temperature of the fluid following a spill and the time required for the maximum fluid temperature to be reached. Control volume models of the various process cells have been developed using standard conduction and natural convection relationships. The calculations are performed using the Mathcad modeling software. The results are being used in Consolidated Hazards Analysis Planning (CHAP) to determine the controls that may be needed to mitigate the potential impact of liquids containing Cs-137 and flammable organics that spill onto cell floors. Model development techniques and the ease of making model changes within the Mathcad environment are discussed. The results indicate that certain fluid spills result in overheating of the fluid, but the times to reach steady-state are several hundred hours. The long times allow time for spill clean up without the use of expensive mitigation controls.

  8. An evaluation of standing-induced lower leg edema as a function of floor surace

    E-Print Network [OSTI]

    DiSalvi, Lawrence Roberts

    1995-01-01T23:59:59.000Z

    of Tukey Mean Separation Analysis of Floor Surface Rankings 34 LIST OF FIGURES FIGURE Page 1 Volume Measurement of the Ankle/Foot Region. 16 2 Above-Knee Region (Leg Region A): Percent Volume Change by Floor Surface and Gender. . . 24 3 Below...-Knee Region (Leg Region B): Percent Volume Change by Floor Surface and Gender. . . 25 4 Ankle/Foot Region (Leg Region C): Percent Volume Change by Floor Surface and Gender. . . 26 5 Above-Knee Region (Leg Region A): Percent Volume Change by Week...

  9. E-Print Network 3.0 - aircraft floor paneling Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Collection: Materials Science 13 NIST NCSTAR 1-5A, WTC Investigation 297 FIRE BEHAVIOR IN WORLD TRADE CENTER 2 Summary: of the aircraft's starboard wing. Other floors...

  10. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  11. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  12. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  13. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  14. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  15. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  16. Statistical Analysis Of Tank 5 Floor Sample Results

    SciTech Connect (OSTI)

    Shine, E. P.

    2012-08-01T23:59:59.000Z

    Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed in Appendix A, and the results of this analysis are reported in Appendix B. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

  17. STATISTICAL ANALYSIS OF TANK 5 FLOOR SAMPLE RESULTS

    SciTech Connect (OSTI)

    Shine, E.

    2012-03-14T23:59:59.000Z

    Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, radionuclide, inorganic, and anion concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed in Appendix A, and the results of this analysis are reported in Appendix B. The data were generally found to follow a normal distribution, and to be homogeneous across composite samples.

  18. Statistical Analysis of Tank 5 Floor Sample Results

    SciTech Connect (OSTI)

    Shine, E. P.

    2013-01-31T23:59:59.000Z

    Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide1, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements above their MDCs. The identification of distributions and the selection of UCL95 procedures generally followed the protocol in Singh, Armbya, and Singh [2010]. When all of an analyte's measurements lie below their MDCs, only a summary of the MDCs can be provided. The measurement results reported by SRNL are listed, and the results of this analysis are reported. The data were generally found to follow a normal distribution, and to be homogenous across composite samples.

  19. A Tactile Luminous Floor Used as a Playful Space's Skin* Tobi Delbrck, Adrian M. Whatley, Rodney Douglas, Kynan Eng, Klaus Hepp and Paul F.M.J. Verschure

    E-Print Network [OSTI]

    Delbruck, Tobi

    A Tactile Luminous Floor Used as a Playful Space's Skin* Tobi Delbrück, Adrian M. Whatley, Rodney of the novel tactile luminous floor and how the floor is used as the skin of the playful interactive space Ada--interactive space, tactile surface, luminous floor, people tracking, gamse I. INTRODUCTION Many luminous floors have

  20. Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example

    SciTech Connect (OSTI)

    Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

    2011-12-01T23:59:59.000Z

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling and quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.

  1. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  2. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  3. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  4. Floor-Supply Displacement Ventilation in a Small Office Nobukazu Kobayashi

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    1 Floor-Supply Displacement Ventilation in a Small Office Nobukazu Kobayashi Building Technology Displacement ventilation . Computational fluid dynamics . Experimental measurements . Floor supply . Indoor air ventilation system using computational-fluid-dynamics (CFD). The experiment was carried out in a full

  5. ENERGY ANALYSISF FOR WORKSHOPS WITH FLOOR-SUPPLY DISPLACEMENT VENTILATION UNDER THE U.S. CLIMATES

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    1 ENERGY ANALYSISF FOR WORKSHOPS WITH FLOOR-SUPPLY DISPLACEMENT VENTILATION UNDER THE U.S. CLIMATES ventilation systems are better than mixing ventilation systems. The benefits include indoor air quality. This research compared the energy use of a floor-supply displacement ventilation system in a large industrial

  6. Experimental Study of the Floor Radiant Cooling System Combined with Displacement Ventilation

    E-Print Network [OSTI]

    Ren, Y.; Li, D.; Zhang, Y.

    2006-01-01T23:59:59.000Z

    and developed measures for preventing it. The dry air layer near the floor formed by a displacement ventilation system can effectively prevent dews on the surface of the floor in the wet and hot days in summer. In addition, for the sake of the displacement...

  7. Modified floor response spectra for the Brookhaven National Laboratory High Flux Beam Reactor (HFBR)

    SciTech Connect (OSTI)

    Morante, R.J.; Skonieczny, J.

    1994-03-01T23:59:59.000Z

    This report documents the modified floor response spectra that will be used for future seismic evaluations of structures, systems, and components (SSC`s) within the HFBR and the technical basis for the modified floor response spectra. When used within this report, the term ``current spectra`` refers to the 1978 spectra developed in BNL Informal Report BNL-26019.

  8. UCR Chemistry Program 1953-1966; 2nd floor, Geology Building

    E-Print Network [OSTI]

    Reed, Christopher A.

    UCR Chemistry Program 1953-1970 1953-1966; 2nd floor, Geology Building 1966-2005; Pierce Hall of Physical Sciences ­ chemistry, geology, mathematics, physics ­ W. Conway Pierce, Chairman #12;Hart Schmidt of Geology bld; 1954-66 ­ Plus 2nd floor addition; 1959-66 ­ Pierce Hall; 1966-2005 · Instruments and support

  9. Selecting The Optimal Logging Suite For Geothermal Reservoir...

    Open Energy Info (EERE)

    Selecting The Optimal Logging Suite For Geothermal Reservoir Evaluation- Results From The Alum 25-29 Well, Nevada Jump to: navigation, search OpenEI Reference LibraryAdd to library...

  10. Mechanical counter-pressure space suit design using active materials

    E-Print Network [OSTI]

    Holschuh, Bradley Thomas

    2014-01-01T23:59:59.000Z

    Mechanical counter-pressure (MCP) space suits have the potential to greatly improve the mobility of astronauts as they conduct planetary exploration activities; however, the underlying technologies required to provide ...

  11. Engineering a robotic exoskeleton for space suit simulation

    E-Print Network [OSTI]

    Meyen, Forrest Edward

    2013-01-01T23:59:59.000Z

    Novel methods for assessing space suit designs and human performance capabilities are needed as NASA prepares for manned missions beyond low Earth orbit. Current human performance tests and training are conducted in space ...

  12. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  13. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  14. Ambulatory infusion suite: pre- and post-occupancy evaluation

    E-Print Network [OSTI]

    Shepley, Mardelle McCuskey; Rybkowski, Zofia; Aliber, Jennifer; Lange, Cathleen

    2015-02-08T23:59:59.000Z

    , London W1T 3JH, UK Building Research & Information Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/rbri20 Ambulatory infusion suite: pre- and post-occupancy evaluation Mardelle Mc... published: 08 Aug 2012. To cite this article: Mardelle McCuskey Shepley , Zofia Rybkowski , Jennifer Aliber & Cathleen Lange (2012): Ambulatory infusion suite: pre- and post-occupancy evaluation, Building Research & Information, 40:6, 700-712 To link...

  15. Materials and Textile Architecture Analyses for Mechanical Counter-Pressure Space Suits using Active Materials

    E-Print Network [OSTI]

    Buechley, Leah

    Mechanical counter-pressure (MCP) space suits have the potential to improve the mobility of astronauts as they conduct planetary exploration activities. MCP suits differ from traditional gas-pressurized space suits by ...

  16. Center for Space Research, Conference Room 2.806, WPR Building, 2nd Floor, 3925 W. Braker Lane, Suite 200, Austin, Texas 78759

    E-Print Network [OSTI]

    Lightsey, Glenn

    .csr.utexas.edu/seminars Four related talks concerning work for the Joint Space Operations Center (JSPOC) Thursday, October 9 at the Joint Space Operations Center (JSPOC) for the Air Force. Force modeling and estimation techniques, Senior Scientist with Space Environment Technologies Abstract: Discussion of density variations and how

  17. Modular, security enclosure and method of assembly

    DOE Patents [OSTI]

    Linker, Kevin L. (Albuquerque, NM); Moyer, John W. (Albuquerque, NM)

    1995-01-01T23:59:59.000Z

    A transportable, reusable rapidly assembled and disassembled, resizable modular, security enclosure utilizes a stepped panel construction. Each panel has an inner portion and an outer portion which form joints. A plurality of channels can be affixed to selected joints of the panels. Panels can be affixed to a base member and then affixed to one another by the use of elongated pins extending through the channel joints. Alternatively, the base member can be omitted and the panels themselves can be used as the floor of the enclosure. The pins will extend generally parallel to the joint in which they are located. These elongated pins are readily inserted into and removable from the channels in a predetermined sequence to allow assembly and disassembly of the enclosure. A door constructed from panels is used to close the opening to the enclosure.

  18. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  19. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  20. GROUND FLOOR SECOND FLOOR

    E-Print Network [OSTI]

    Ronquist, Fredrik

    -OFF/ PICK-UP ACCESS DRIVE 7. CLOSE PROXIMITY PARKING 8. DEWEY STREET BUILDING EXIT 9. PHOTOVOLTAIC SOLAR PANELS R. INSTITUTES AND CENTERS S. STUDENT BUSINESS INCUBATOR T. ENTREPRENEURIAL RESOURCE CENTER U. GRADUATE STUDIES V. BEHAVIORAL LAB W. EXTERIOR ROOF GARDEN X. FACULTY OFFICES 1 3 4 5 8 9 6 7 rOVeTTa b

  1. CATALOG OF PROCESSED DATA FOR 7 BUILDINGS A.0466 Los Angeles, 15250 Ventura Blvd., Roof (13th floor) (pp. 7)

    E-Print Network [OSTI]

    Southern California, University of

    APPENDIX A CATALOG OF PROCESSED DATA FOR 7 BUILDINGS A.0466 Los Angeles, 15250 Ventura Blvd., Roof Angeles, 16000 Ventura Blvd., Roof (13th floor) (pp. 13) A.5457 Los Angeles, 8436 West 3rd St., Roof (10th floor) (pp. 19) #12;#12;A.0466--1 Appendix A.0466 LOS ANGELES, 15250 VENTURA BLVD., ROOF (13th Floor

  2. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  3. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  4. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  5. Classification and storage of wastewater from floor finish removal operations

    SciTech Connect (OSTI)

    Hunt, C.E.

    1996-05-01T23:59:59.000Z

    This study evaluates the wastewater generated from hard surface floor finish removal operations at Lawrence Livermore Laboratory in order to determine if this wastewater is a hazardous waste, either by statistical evaluation, or other measurable regulatory guidelines established in California Regulations. This research also comparatively evaluates the 55 gallon drum and other portable tanks, all less than 1,000 gallons in size in order to determine which is most effective for the management of this waste stream at Lawrence Livermore Laboratory. The statistical methods in SW-846 were found to be scientifically questionable in their application to hazardous waste determination. In this statistical evaluation, the different data transformations discussed in the regulatory guidance document were applied along with the log transformation to the population of 18 samples from 55 gallon drums. Although this statistical evaluation proved awkward in its application, once the data is collected and organized on a spreadsheet this statistical analysis can be an effective tool which can aid the environmental manager in the hazardous waste classification process.

  6. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  7. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  8. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  9. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  10. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  11. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  14. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  16. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  17. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  18. SMASHUP: Secure Mashup for Defense Transformation and Net-Centric Systems

    E-Print Network [OSTI]

    Heileman, Gregory L.

    SMASHUP: Secure Mashup for Defense Transformation and Net- Centric Systems Mark D. Heileman., 709 S. Harbor City Blvd., Suite 400, Melbourne, FL 32901; b University of New Mexico, Dept. of Electrical & Computer Engineering, Albuquerque, NM 87131; c Air Force Research Laboratory, AFRL/RIEBB, Rome

  19. Combined Operation of Solar Energy Source Heat Pump, Low-vale Electricity and Floor Radiant System 

    E-Print Network [OSTI]

    Liu, G.; Guo, Z.; Hu, S.

    2006-01-01T23:59:59.000Z

    solar energy, low-vale electricity as heat sources in a floor radiant system are analyzed. This paper presents a new heat pump system and discusses its operational modes in winter....

  20. The effectiveness of floor mats as an intervention for standing fatigue of light fabrication workers

    E-Print Network [OSTI]

    O'Brien, Michael Shannon

    1996-01-01T23:59:59.000Z

    A field study was conducted in a light fabrication plant to determine the effectiveness of floor mats on reducing the symptoms of standing fatigue. Specific physiological variables measured include skin temperature of the foot, blood pooling...

  1. Combined Operation of Solar Energy Source Heat Pump, Low-vale Electricity and Floor Radiant System

    E-Print Network [OSTI]

    Liu, G.; Guo, Z.; Hu, S.

    2006-01-01T23:59:59.000Z

    solar energy, low-vale electricity as heat sources in a floor radiant system are analyzed. This paper presents a new heat pump system and discusses its operational modes in winter....

  2. Development of an NC equipment level controller in a hierarchical shop floor control system

    E-Print Network [OSTI]

    Chang, William

    1993-01-01T23:59:59.000Z

    of meeting cost, quality, variety and time constraints imposed by markets[2]. Obviously, allocating resources, directing part flow, and coordinating shop floor activities in a manufacturing environment are complex and interact with each other and requiring...

  3. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  5. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  6. Using Dependency Structures for Prioritisation of Functional Test Suites

    E-Print Network [OSTI]

    Miller, Tim

    1 Using Dependency Structures for Prioritisation of Functional Test Suites Shifa-e-Zehra Haidry, Australia. 3 Abstract--Test case prioritisation is the process of ordering the exe- cution of test cases software delivery. Many existing test case prioritisation techniques consider that tests can be run in any

  7. A Tool Suite to Prototype Pervasive Computing Applications

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    covering the development life- cycle of a pervasive computing system. This tool suite comprises a domain to deployment and test. Our approach We propose an approach that covers the development life- cycleSpecapplication 3 546 7 1 ArchitectureTaxonomy 2 Figure 1. Development life-cycle A. A design language for pervasive

  8. College of Communication & Information 1345 Circle Park Drive | Suite 302

    E-Print Network [OSTI]

    Grissino-Mayer, Henri D.

    College of Communication & Information 1345 Circle Park Drive | Suite 302 Knoxville, TN 37996 & Communication Studies (CICS) - Awarded grants total $7 million +, NSF, IMLS, Sloan Foundation and more - 2.5+ million in science information and communication contract work at Oak Ridge National Labs. · Hands

  9. Predicting the Operational Effectiveness of Aircraft Survivability Equipment Suite

    E-Print Network [OSTI]

    Noh, Sanguk

    , and experiment with their autonomous decision-making against threats in various electronic warfare settings. We: Autonomous Decision-Making, Electronic Warfare Settings, Aircraft Survivability Equipment Suite, Operational Effectiveness 1. Introduction In order to counter threats in electronic warfare environments, a command

  10. 2820 Napoleon Avenue, Suite 700 New Orleans, LA 70115

    E-Print Network [OSTI]

    2820 Napoleon Avenue, Suite 700 New Orleans, LA 70115 Tel: 504-412-1517 Park in the Jena Garage onto Napoleon Ave. Turn Right onto Clara Turn Right onto Jena (garage on left) Directions from Westbank Tchoupitoulas Stay on Tch to Napoleon Ave. Turn Right onto Napoleon Ave. Cross St. Charles, go about 12 blocks

  11. Water Optimizer Suite: Tools for Decision Support and Policy Analysis

    E-Print Network [OSTI]

    Nebraska-Lincoln, University of

    , irrigation system options, well and pump characteristics and water supply. Irrigation options include center pivot or gravity irrigation systems, well or canal delivery, and systems powered by electricity, diesel irrigation water when water supplies are limited. The Water Optimizer Suite consists of four separate

  12. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01T23:59:59.000Z

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  13. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  14. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  15. Comparison of two methods to quantify cyber and physical security effectiveness.

    SciTech Connect (OSTI)

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01T23:59:59.000Z

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  16. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  17. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  18. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  19. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  20. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  1. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  2. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  3. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  4. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  5. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  6. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  7. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  8. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  9. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  10. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  11. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  12. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  13. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  14. Support of Gulf of Mexico Hydrate Research Consortium: Activities of Support Establishment of a Sea Floor Monitoring Station Project

    SciTech Connect (OSTI)

    J. Robert Woolsey; Thomas McGee; Carol Lutken

    2008-05-31T23:59:59.000Z

    The Gulf of Mexico Hydrates Research Consortium (GOM-HRC) was established in 1999 to assemble leaders in gas hydrates research that shared the need for a way to conduct investigations of gas hydrates and their stability zone in the Gulf of Mexico in situ on a more-or-less continuous basis. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory (SFO) on the sea floor in the northern Gulf of Mexico, in an area where gas hydrates are known to be present at, or just below, the sea floor and to discover the configuration and composition of the subsurface pathways or 'plumbing' through which fluids migrate into and out of the hydrate stability zone (HSZ) to the sediment-water interface. Monitoring changes in this zone and linking them to coincident and perhaps consequent events at the seafloor and within the water column is the eventual goal of the Consortium. This mission includes investigations of the physical, chemical and biological components of the gas hydrate stability zone - the sea-floor/sediment-water interface, the near-sea-floor water column, and the shallow subsurface sediments. The eventual goal is to monitor changes in the hydrate stability zone over time. Establishment of the Consortium succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among those involved in gas hydrates research. Complementary expertise, both scientific and technical, has been assembled to promote innovative methods and construct necessary instrumentation. Following extensive investigation into candidate sites, Mississippi Canyon 118 (MC118) was chosen by consensus of the Consortium at their fall, 2004, meeting as the site most likely to satisfy all criteria established by the group. Much of the preliminary work preceding the establishment of the site - sensor development and testing, geophysical surveys, and laboratory studies - has been reported in agency documents including the Final Technical Report to DOE covering Cooperative Agreement DEFC26-00NT40920 and Semiannual Progress Reports for this award, DE-FC26-02NT41628. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in MC118 in May of 2005. Follow-up deployments, planned for fall 2005, had to be postponed due to the catastrophic effects of Hurricane Katrina (and later, Rita) on the Gulf Coast. SFO completion, now anticipated for 2009-10, has, therefore, been delayed. Although delays caused scheduling and deployment difficulties, many sensors and instruments were completed during this period. Software has been written that will accommodate the data that the station retrieves, when it begins to be delivered. In addition, new seismic data processing software has been written to treat the peculiar data to be received by the vertical line array (VLA) and additional software has been developed that will address the horizontal line array (HLA) data. These packages have been tested on data from the test deployments of the VLA and on data from other, similar, areas of the Gulf (in the case of the HLA software). During the life of this Cooperative Agreement (CA), the CMRET conducted many cruises. Early in the program these were executed primarily to survey potential sites and test sensors and equipment being developed for the SFO. When MC118 was established as the observatory site, subsequent cruises focused on this location. Beginning in 2005 and continuing to the present, 13 research cruises to MC118 have been conducted by the Consortium. During September, 2006, the Consortium was able to secure 8 days aboard the R/V Seward Johnson with submersible Johnson SeaLink, a critical chapter in the life of the Observatory project as important documentation, tests, recoveries and deployments were accomplished during this trip (log appended). Consortium members have participated materially in a number of additional cruises including several of the NIUST autonomous underwater vehicle (AUV), Ea

  15. Enhanced verification test suite for physics simulation codes

    SciTech Connect (OSTI)

    Kamm, James R.; Brock, Jerry S.; Brandon, Scott T.; Cotrell, David L.; Johnson, Bryan; Knupp, Patrick; Rider, William J.; Trucano, Timothy G.; Weirs, V. Gregory

    2008-09-01T23:59:59.000Z

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations.

  16. Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor

    E-Print Network [OSTI]

    Jonathan H. Davis

    2015-03-09T23:59:59.000Z

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder to distinguish from the neutrino background. However for most velocity distributions the neutrino floor can still be surpassed using timing information, though certain velocity streams may prove problematic.

  17. Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor

    E-Print Network [OSTI]

    Jonathan H. Davis

    2014-12-03T23:59:59.000Z

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder to distinguish from the neutrino background. However for most velocity distributions the neutrino floor can still be surpassed using timing information, though certain velocity streams may prove problematic.

  18. Indoor Airflow And Pollutant Removal In A Room With Floor-Based Task Ventilation: Results of Additional Experiments

    E-Print Network [OSTI]

    Faulkner, D.

    2011-01-01T23:59:59.000Z

    C , "Displacement Ventilation Systems in Office Rooms,"Controlled Office Ventilation System," ASHRAE Transactions,of a floor-based task ventilation system designed for use in

  19. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  20. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  1. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  2. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  3. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  4. Space suit simulator for partial gravity extravehicular activity experimentation and training

    E-Print Network [OSTI]

    Gilkey, Andrea L. (Andrea Lynn)

    2012-01-01T23:59:59.000Z

    During human space exploration, mobility is extremely limited when working inside a pressurized space suit. Astronauts perform extensive training on Earth to become accustomed to space suit-imposed high joint torques and ...

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  6. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  7. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  10. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  11. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  12. The Apollo Number: Space Suits, Self-Support, and the Walk-Run Transition

    E-Print Network [OSTI]

    Carr, Christopher E.

    Background: How space suits affect the preferred walk-run transition is an open question with relevance to human

  13. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  14. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  15. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  16. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  17. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  18. Testing the Floor Scale Designated for Pacific Northwest National Laboratory's UF6 Cylinder Portal Monitor

    SciTech Connect (OSTI)

    Curtis, Michael M.; Weier, Dennis R.

    2009-03-12T23:59:59.000Z

    Pacific Northwest National Laboratory (PNNL) obtained a Mettler Toledo floor scale for the purpose of testing it to determine whether it can replace the International Atomic Energy Agency’s (IAEA) cumbersome, hanging load cell. The floor scale is intended for use as a subsystem within PNNL’s nascent UF6 Cylinder Portal Monitor. The particular model was selected for its accuracy, size, and capacity. The intent will be to use it only for 30B cylinders; consequently, testing did not proceed beyond 8,000 lb.

  19. Property:Building/FloorAreaTheatresConcertHallsCinemas | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices JumpFloorAreaShops

  20. Using Hybrid Algorithm For Pareto Efficient Multi-Objective Test Suite Minimisation

    E-Print Network [OSTI]

    Singer, Jeremy

    Using Hybrid Algorithm For Pareto Efficient Multi-Objective Test Suite Minimisation Shin Yoo & Mark Harman King's College London, Strand, London, WC2R 2LS, UK Abstract Test suite minimisation techniques seek to reduce the effort required for regression testing by selecting a subset of test suites

  1. 1 SWIM suits up in pursuit of national

    E-Print Network [OSTI]

    Crawford, T. Daniel

    : Cyber-Engineering Functional Nanoparticles for Targeted Drug Delivery 8 Student News: Doctoral Scholars.Water research is focused upon improving water infrastructure and distribution, water remediation, water success in securing significant research funding support. Additionally, ICTAS has invested close to $900

  2. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  3. The SECO suite of codes for site Performance Assessment

    SciTech Connect (OSTI)

    Roache, P.J. [Ecodynamics Research Associates, Inc., Albuquerque, NM (United States)

    1993-03-01T23:59:59.000Z

    Modeling for Performance Assessment of the Waste Isolation Pilot Plant (WIPP ) has led to development of the SECO suite of codes for groundwater flow, particle tracking, and transport. Algorithm and code developments include the following areas: facilitation of grid convergence tests in multiple domains; correct treatment of transmissivity factors for unconfined aquifers; efficient multigrid algorithms; a formulation of brine Darcy flow equations that uses freshwater head as the dependent able; boundary-fitted coordinates; temporal high order particle tracking; an efficient and accurate implicit Finite Volume TVD algorithm for radionuclide transport in (possibly) fractured porous media; accurate calculation of advection via a flux-based modified method of characteristics; and Quality Assurance procedures.

  4. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  5. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  6. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  7. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  8. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  9. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  10. INSTANTANEOUS FREQUENCY VERSUS TIME FOR 7 BUILDINGS B.0466 Los Angeles, 15250 Ventura Blvd., Roof (13th floor) (pp. 7)

    E-Print Network [OSTI]

    Southern California, University of

    APPENDIX B INSTANTANEOUS FREQUENCY VERSUS TIME FOR 7 BUILDINGS B.0466 Los Angeles, 15250 Ventura.5455 Los Angeles, 16000 Ventura Blvd., Roof (13th floor) (pp. 11) B.5457 Los Angeles, 8436 West 3rd ST., Roof (10th floor) (pp. 16) #12;#12;B.0466­1 Appendix B.0466 LOS ANGELES, 15250 VENTURA BLVD. Table B

  11. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  12. Take a quick trip around the experimental floor of the Lab's new light source

    SciTech Connect (OSTI)

    None

    2012-04-30T23:59:59.000Z

    Take a quick trip around the experimental floor of Brookhaven Lab's new light source -- the $912-million National Synchrotron Light Source II. Construction of the facility is now over 70 percent completed. With much of the conventional construction done, accelerator and experimental components are being installed.

  13. Message-Generated Kripke Semantics Jan van Eijck and Floor Sietsma

    E-Print Network [OSTI]

    van Eijck, Jan

    Message-Generated Kripke Semantics Jan van Eijck and Floor Sietsma ABSTRACT We show how to generate multi-agent Kripke models from message exchanges. With these models we can analyze the epistemic con- sequences of a message exchange. One novelty in this approach is that we include the messages in our logical

  14. Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor

    E-Print Network [OSTI]

    Davis, Jonathan H

    2014-01-01T23:59:59.000Z

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder ...

  15. Influence of floor plenum on energy performance of buildings with1 UFAD systems2

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    1 Influence of floor plenum on energy performance of buildings with1 UFAD systems2 Yan Xue1 a negative impact on the energy performance of these buildings, although very12 few studies have been compared the energy use in a Philadelphia office building with a14 UFAD system to that with a well

  16. Systemwide Risk Management and Public Safety 401 Golden Shore, 5th Floor

    E-Print Network [OSTI]

    de Lijser, Peter

    Systemwide Risk Management and Public Safety 401 Golden Shore, 5th Floor Long Beach, CA 90802 in this self-insured program. The Office of Risk Management in the Chancellor's Office administers the general liability, workers' compensation, property, and professional liability programs. The State Office of Risk

  17. SPATIAL AND TEMPORAL VARIATION IN CALCIUM AND ALUMINUM IN NORTHERN HARDWOOD FOREST FLOORS

    E-Print Network [OSTI]

    Phillips, Richard P.

    -6955) (Received 23 December 2003; accepted 22 July 2004) Abstract. Acid rain results in losses of exchangeable: acid rain, Ca:Al, cation depletion, forest floor, soil 1. Introduction Acid rain is thought to have and Simonsson, 2003). Alternatively, mobilization of Al by acid rain from the mineral soil below may provide

  18. Wing Wave: Feasible, Alternative, Renewable, Electrical Energy Producing Ocean Floor System

    E-Print Network [OSTI]

    Wood, Stephen L.

    Wing Wave: Feasible, Alternative, Renewable, Electrical Energy Producing Ocean Floor System Mark, alternative energy system to convert the circular motion of ocean waves as they propagate through the sea and feasible alternative, renewable, electrical energy producing subsea system. Index Terms--ocean energy, wave

  19. Numerical Simulation of Thermal Performance of Floor Radiant Heating System with Enclosed Phase Change Material 

    E-Print Network [OSTI]

    Qiu, L.; Wu, X.

    2006-01-01T23:59:59.000Z

    In the present paper, a kind of enclosed phase change material (PCM) used in solar and low-temperature hot water radiant floor heating is investigated. On the basis of obtaining the best performance of PCM properties, a new radiant heating structure...

  20. Dark Matter vs. Neutrinos: The effect of astrophysical uncertainties and timing information on the neutrino floor

    E-Print Network [OSTI]

    Davis, Jonathan H

    2015-01-01T23:59:59.000Z

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments will run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder ...

  1. TWO FLOOR BUILDING NEEDING EIGHT COLORS STPHANE BESSY, DANIEL GONALVES, AND JEAN-SBASTIEN SERENI

    E-Print Network [OSTI]

    Boyer, Edmond

    TWO FLOOR BUILDING NEEDING EIGHT COLORS STĂ?PHANE BESSY, DANIEL GONĂ?ALVES, AND JEAN-SĂ?BASTIEN SERENI-002-01 and anr 10 jcjc 0204 01, respectively. 1 hal-00996709,version1-26May2014 #12;2 STĂ?PHANE BESSY, DANIEL

  2. Houses for early weaned piglets : influence of rearing on the floor or in batteries,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Houses for early weaned piglets : influence of rearing on the floor or in batteries, temperature groups in order to determine the influence of rearing conditions (housing, room temperature) and feeding on the animals performances between weaning at 36 ± 3 days and 70 days of age. Housing characteristics were

  3. Particle resuspension from indoor flooring materials James H. Lohaus, Atila Novoselac and Jeffrey A. Siegel*

    E-Print Network [OSTI]

    Siegel, Jeffrey

    Particle resuspension from indoor flooring materials James H. Lohaus, Atila Novoselac and Jeffrey A@mail.utexas.edu Keywords: Fluid dynamics, Indoor surfaces, Particle experiments Introduction Particle resuspension from for supermicron particles. Resuspension is usually reported either as a critical velocity, the velocity at which

  4. System design description for the consolidated sludge sampling system for K Basins floor and fuel canisters

    SciTech Connect (OSTI)

    HECHT, S.L.

    1999-02-18T23:59:59.000Z

    This System Design Description describes the Consolidated Sludge Sampling System used in the gathering of sludge samples from K Basin floor and fuel canisters. This document provides additional information on the need for the system, the functions and requirements of the systems, the operations of the system, and the general work plan used in its' design and development.

  5. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  6. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  7. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  8. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect (OSTI)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15T23:59:59.000Z

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  9. Dose-Effect Relationships for Individual Pelvic Floor Muscles and Anorectal Complaints After Prostate Radiotherapy

    SciTech Connect (OSTI)

    Smeenk, Robert Jan, E-mail: r.smeenk@rther.umcn.nl [Department of Radiation Oncology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands); Hoffmann, Aswin L. [Department of Radiation Oncology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands); Hopman, Wim P.M. [Department of Gastroenterology and Hepatology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands); Lin, Emile N.J. Th. van; Kaanders, Johannes H.A.M. [Department of Radiation Oncology, Radboud University Nijmegen Medical Centre, Nijmegen (Netherlands)

    2012-06-01T23:59:59.000Z

    Purpose: To delineate the individual pelvic floor muscles considered to be involved in anorectal toxicity and to investigate dose-effect relationships for fecal incontinence-related complaints after prostate radiotherapy (RT). Methods and Materials: In 48 patients treated for localized prostate cancer, the internal anal sphincter (IAS) muscle, the external anal sphincter (EAS) muscle, the puborectalis muscle (PRM), and the levator ani muscles (LAM) in addition to the anal wall (Awall) and rectal wall (Rwall) were retrospectively delineated on planning computed tomography scans. Dose parameters were obtained and compared between patients with and without fecal urgency, incontinence, and frequency. Dose-effect curves were constructed. Finally, the effect of an endorectal balloon, which was applied in 28 patients, was investigated. Results: The total volume of the pelvic floor muscles together was about three times that of the Awall. The PRM was exposed to the highest RT dose, whereas the EAS received the lowest dose. Several anal and rectal dose parameters, as well as doses to all separate pelvic floor muscles, were associated with urgency, while incontinence was associated mainly with doses to the EAS and PRM. Based on the dose-effect curves, the following constraints regarding mean doses could be deduced to reduce the risk of urgency: {<=}30 Gy to the IAS; {<=}10 Gy to the EAS; {<=}50 Gy to the PRM; and {<=}40 Gy to the LAM. No dose-effect relationships for frequency were observed. Patients treated with an endorectal balloon reported significantly less urgency and incontinence, while their treatment plans showed significantly lower doses to the Awall, Rwall, and all pelvic floor muscles. Conclusions: Incontinence-related complaints show specific dose-effect relationships to individual pelvic floor muscles. Dose constraints for each muscle can be identified for RT planning. When only the Awall is delineated, substantial components of the continence apparatus are excluded.

  10. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  12. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  14. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  15. Facilities | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Research and Development manages and oversees the operation of an exceptional suite of science, technology and engineering facilities that support and further the national...

  16. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  17. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  18. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  19. Tender Notice for Renovation of Toilets (Gents & Ladies) on Ground and Second Floor in the Academic Block of ISI Bangalore Centre

    E-Print Network [OSTI]

    Bandyopadhyay, Antar

    Block of ISI Bangalore Centre Sealed tender applications are hereby invited from the contractors (Gents & Ladies) on ground floor and second floor in the Academic block building of ISI, Bangalore Centre

  20. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  1. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  2. User Guide for the STAYSL PNNL Suite of Software Tools

    SciTech Connect (OSTI)

    Greenwood, Lawrence R.; Johnson, Christian D.

    2013-02-27T23:59:59.000Z

    The STAYSL PNNL software suite provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist of the reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations.

  3. An Integrated Suite of Tools to support Human Factors Engineering

    SciTech Connect (OSTI)

    Jacques V Hugo

    2001-08-01T23:59:59.000Z

    Human Factors Engineering (HFE) work for the nuclear industry imposes special demands on the practitioner in terms of the scope, complexity and safety requirements for humans in nuclear installations. Unfortunately HFE lags behind other engineering disciplines in the development and use of modern, powerful tools for the full range of analysis and design processes. HFE does not appear to be an attractive market for software and hardware developers and as a result, HFE practitioners usually have to rely on inefficient general-purpose tools like standard office software, or they have to use expensive special-purpose tools that offer only part of the solution they require and which also do not easily integrate with other tools. There have been attempts to develop generic software tools to support the HFE analyst and also to achieve some order and consistency in format and presentation. However, in spite of many years of development, very few tools have emerged that have achieved these goals. This would suggest the need for special tools, but existing commercial products have been found inadequate and to date not a single tool has been developed that adequately supports the special requirements of HFE work for the nuclear industry. This paper describes an integrated suite of generic as well as purpose-built tools that facilitate information solicitation, issues tracking, work domain analysis, functional requirements analysis, function allocation, operational sequence analysis, task analysis and development of HSI design requirements. In combination, this suite of tools supports the analytical as well as the representational aspects of key HFE activities primarily for new NPPs, including capturing information from subject matter experts and various source documents directly into the appropriate tool and then linking, analyzing and extending that information further to represent detailed functional and task information, and ultimately HSI design requirements. The paper also describes a tool developed especially for functional requirements analysis, function allocation, and task analysis.

  4. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  5. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  6. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  7. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  8. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  9. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  10. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  11. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  12. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  14. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  15. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  16. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  17. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  18. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  19. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  20. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  1. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  2. From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits...

    Energy Savers [EERE]

    From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits- Mound Science and Energy Museum Programs Cover a Wide Range of Topics From Hydrogen Fuel Cells to...

  3. An evaluation of floor surfaces on the basis of skin temperature during constrained standing

    E-Print Network [OSTI]

    Monford, Leo Gabriel

    1995-01-01T23:59:59.000Z

    popliteal fossa (popliteal region), and the medial side of abductor hallucis on the non-load bearing region of the foot (near the intersection of the top of the arch and the instep) or the foot region. All thermistors were located on the left leg... between an average ending temperature and an average start-up temperature. The foot skin temperature region was the only temperature region to indicate statistically significant results between the floor surfaces. The other two lower leg temperature...

  4. Floor response spectra for seismic qualification of Kozloduy VVER 440-230 NPP

    SciTech Connect (OSTI)

    Kostov, M.K. [Bulgarian Academy of Sciences, Sofia (BG). Central Lab. for Seismic Mechanics and Earthquake Engineering; Ma, D.C. [Argonne National Lab., IL (United States); Prato, C.A. [Univ. of Cordoba (AR); Stevenson, J.D. [Stevenson and Associates, Cleveland, OH (US)

    1993-08-01T23:59:59.000Z

    In this paper the floor response spectra generation methodology for Kozloduy NPP, Unit 1-2 of VVER 440-230 is presented. The 2D coupled soil-structure interaction models are used combined with a simplified correction of the final results for accounting of torsional effects. Both time history and direct approach for in-structure spectra generation are used and discussion of results is made.

  5. Status Report on Studies of Recovery Boiler Composite Floor Tube Cracking

    SciTech Connect (OSTI)

    Eng, P.; Frederick, L.A.; Hoffmann, C.M.; Keiser, J.R.; Mahmood, J.; Maziasz, P.J.; Prescott, R.; Sarma, G.B.; Singbeil, D.L.; Singh, P.M.; Swindeman, R.W.; Wang, X.-L.

    1999-09-12T23:59:59.000Z

    Cracking of the stainless steel layer of co-extruded 304L stainless steel/SA210 Gd A 1 carbon steel black liquor recovery boiler floor tubes has been identified as one of the most serious material problems in the pulp and paper industry. A DOE-funded study was initiated in 1995 with the goal of determining the cause of and possible solutions to this cracking problem. These studies have characterized tube cracking as well as the chemical and thermal environment and stress state of floor tubes. Investigations of possible cracking mechanisms indicate that stress corrosion cracking rather than thermal fatigue is a more likely cause of crack initiation. The cracking mechanism appears to require the presence of hydrated sodium sulfide and is most likely active during shut-downs and/or start-ups. Based on these results and operating experience, certain alloys appear to be more resistant than others to cracking in the floor environment, and certain operating practices appear to significantly lessen the likelihood of cracking. This report is the latest in a series of progress reports presented on this project.

  6. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  7. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  8. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  9. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  10. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  11. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  12. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  13. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  14. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  15. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  16. Commissioning Tools for Heating/Cooling System in Residence - Verification of Floor Heating System and Room Air Conditioning System Performance 

    E-Print Network [OSTI]

    Miura, H.; Hokoi, S.; Iwamae, A.; Umeno, T.; Kondo, S.

    2004-01-01T23:59:59.000Z

    Tools of evaluating the performance of floor heating and room air conditioner are examined as a commissioning tool. Simple method is needed to check these performance while in use by residents, because evaluation currently requires significant time...

  17. Commissioning Tools for Heating/Cooling System in Residence - Verification of Floor Heating System and Room Air Conditioning System Performance

    E-Print Network [OSTI]

    Miura, H.; Hokoi, S.; Iwamae, A.; Umeno, T.; Kondo, S.

    2004-01-01T23:59:59.000Z

    Tools of evaluating the performance of floor heating and room air conditioner are examined as a commissioning tool. Simple method is needed to check these performance while in use by residents, because evaluation currently requires significant time...

  18. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  19. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  20. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  1. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  2. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  3. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  4. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  5. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  6. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  7. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  8. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  9. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  10. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  11. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  12. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  13. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  14. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  15. Cyclic transgressive and regressive sequences, Paleocene Suite, Sirte basin, Libya

    SciTech Connect (OSTI)

    Abushagur, S.A.

    1986-05-01T23:59:59.000Z

    The Farrud lithofacies represent the main reservoir rock of the Ghani oil field and Western Concession Eleven of the Sirte basin, Libya. Eight microfacies are recognized in the Farrud lithofacies in the Ghani field area: (1) bryozoan-bioclastic (shallow, warm, normal marine shelf deposits); (2) micrite (suggesting quiet, low-energy conditions such as may have existed in a well-protected lagoon); (3) dasycladacean (very shallow, normal marine environment); (4) bioclastic (very shallow, normal marine environment with moderate to vigorous energy); (5) mgal (very shallow, normal marine environment in a shelf lagoon); (6) pelletal-skeletal (deposition within slightly agitated waters of a sheltered lagoon with restricted circulation); (7) dolomicrite (fenestrate structures indicating a high intertidal environment of deposition); and (8) anhydrite (supratidal environment). The Paleocene suite of the Farrud lithofacies generally shows a prograding, regressive sequence of three facies: (1) supratidal facies, characterized by nonfossiliferous anhydrite, dolomite, and dolomitic pelletal carbonate mudstone; (2) intertidal to very shallow subtidal facies, characterized by fossiliferous, pelletal, carbonate mudstone and skeletal calcarenite; and (3) subtidal facies, characterized by a skeletal, pelletal, carbonate mudstone. Source rocks were primarily organic-rich shales overlying the Farrud reservoir rock. Porosity and permeability were developed in part by such processes as dolomitization, leaching, and fracturing in the two progradational, regressive carbonate facies. Hydrocarbons were trapped by a supratidal, anhydrite cap rock.

  16. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  17. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  18. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  19. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  1. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  2. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  3. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  6. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  7. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  8. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  9. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  10. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  11. Lee-TM: A Non-Trivial Benchmark Suite for Transactional Memory

    E-Print Network [OSTI]

    Singer, Jeremy

    , Ian Watson, Chris Kirkham, Mikel Luj´an, and Kim Jarvis School of Computer Science, University of Manchester {ansari, kotselidis, watson, kirkham, lujan, jarvis}@cs.manchester.ac.uk Abstract. Transactional-trivial and realistic TM bench- mark suite based on Lee's routing algorithm. The benchmark suite pro- vides sequential

  12. A Diagnostic Suite of Models for the Evaluation of Oceanic Mesoscale Eddy Parameterizations

    E-Print Network [OSTI]

    Fox-Kemper, Baylor

    A Diagnostic Suite of Models for the Evaluation of Oceanic Mesoscale Eddy Parameterizations by S. D of Oceanic Mesoscale Eddy Parameterizations written by S. D. Bachman has been approved for the Department and Oceanic Sciences) A Diagnostic Suite of Models for the Evaluation of Oceanic Mesoscale Eddy

  13. Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite

    E-Print Network [OSTI]

    Pfeifer, Holger

    Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite Andreas Lanz1. In this software demonstration we show how the AristaFlow BPM Suite ­ an adaptive process management system) as offered by AristaFlow. 1 Introduction In many domains IT support can benefit from BPM technologies

  14. Designing for the Future: The New Open Suite of Programs and Peer Review Process

    E-Print Network [OSTI]

    Charette, André

    Designing for the Future: The New Open Suite of Programs and Peer Review Process Questions and Answers 1 Rationale 1. If the changes to the Open Suite of Programs and peer review process are successful processes is to develop a high quality, flexible and sustainable system capable of identifying

  15. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  16. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  17. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  18. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  19. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  20. Property:Building/FloorAreaHealthServicesDaytime | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt Institute forToolkitFloorAreaHealthServicesDaytime Jump to:

  1. Property:Building/FloorAreaSchoolsChildDayCare | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices Jump

  2. Property:Building/FloorAreaUnheatedRentedPremises | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt InstituteFloorAreaOffices

  3. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  4. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  5. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  6. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  7. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  8. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  9. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  10. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  11. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  12. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  13. 3-Phase Recognition Approach to Pseudo 3D Building Generation from 2D Floor Plan

    E-Print Network [OSTI]

    Moloo, Raj Kishen; Auleear, Abu Salmaan

    2011-01-01T23:59:59.000Z

    Nowadays three dimension (3D) architectural visualisation has become a powerful tool in the conceptualisation, design and presentation of architectural products in the construction industry, providing realistic interaction and walkthrough on engineering products. Traditional ways of implementing 3D models involves the use of specialised 3D authoring tools along with skilled 3D designers with blueprints of the model and this is a slow and laborious process. The aim of this paper is to automate this process by simply analyzing the blueprint document and generating the 3D scene automatically. For this purpose we have devised a 3-Phase recognition approach to pseudo 3D building generation from 2D floor plan and developed a software accordingly. Our 3-phased 3D building system has been implemented using C, C++ and OpenCV library [24] for the Image Processing module; The Save Module generated an XML file for storing the processed floor plan objects attributes; while the Irrlitch [14] game engine was used to impleme...

  14. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  15. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  16. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  17. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  19. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  20. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  1. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  2. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  3. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  5. Space exploration challenges : characterization and enhancement of space suit mobility and planetary protection policy analysis

    E-Print Network [OSTI]

    Holschuh, Bradley Thomas

    2010-01-01T23:59:59.000Z

    This thesis addresses two challenges associated with advanced space and planetary exploration: characterizing and improving the mobility of current and future gas pressurized space suits; and developing effective domestic ...

  6. The Effect of State Policy Suites on the Development of Solar...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Effect of State Policy Suites on the Development of Solar Markets D. Steward and E. Doris National Renewable Energy Laboratory Technical Report NRELTP- 7A40-62506 November...

  7. Assessment and preliminary model development of shape memory polymers mechanical counter pressure space suits

    E-Print Network [OSTI]

    Wee, Brian (Brian J.)

    2013-01-01T23:59:59.000Z

    This thesis seeks to assess the viability of a space qualified shape memory polymer (SMP) mechanical counter pressure (MCP) suit. A key development objective identified by the International Space Exploration Coordination ...

  8. Understanding human-space suit interaction to prevent injury during extravehicular activity

    E-Print Network [OSTI]

    Anderson, Allison P. (Allison Paige)

    2014-01-01T23:59:59.000Z

    Extravehicular Activity (EVA) is a critical component of human spaceflight. Working in gas-pressurized space suits, however, causes fatigue, unnecessary energy expenditure, and injury. The problem of injury is particularly ...

  9. An investigation of space suit mobility with applications to EVA operations

    E-Print Network [OSTI]

    Schmidt, Patricia Barrett, 1974-

    2001-01-01T23:59:59.000Z

    The primary aim of this thesis is to advance the current understanding of astronauts' capabilities and limitations in space-suited extravehicular activity (EVA) by compiling a detailed database of the torques needed to ...

  10. The Apollo Number: space suits, self-support, and the walk-run

    E-Print Network [OSTI]

    McGee, Jeremy

    Background: How space suits affect the preferred walk-run transition is an open question with relevance to human biomechanics and planetary extravehicular activity. Walking and running energetics differ; in reduced gravity ...

  11. Development of a mechanical counter pressure Bio-Suit System for planetary exploration

    E-Print Network [OSTI]

    Sim, Zhe Liang

    2006-01-01T23:59:59.000Z

    Extra-vehicular activity (EVA) is critical for human spaceflight and particularly for human planetary exploration. The MIT Man Vehicle Laboratory is developing a Bio-Suit EVA System, based on mechanical counterpressure ...

  12. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  13. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  14. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  15. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  16. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  17. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  18. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  19. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  20. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  1. The Department of Energy Respiratory Acceptance Program for Supplied-Air Suits

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-04T23:59:59.000Z

    The supplied-air suits that protect DOE contractor and federal employees from exposure to harmful atmospheres and radioactive contaminants are not included in the National Institute for Occupational Safety and Health (NIOSH) certification process for respiratory protective devices. Therefore, with the awareness and acknowledgement of NIOSH and the Occupational Safety and Health Administration (OSHA), the Department established a system for acceptance testing of supplied-air suits.

  2. Causes and solutions for cracking of coextruded and weld overlay floor tubes in black liquor recovery boilers

    SciTech Connect (OSTI)

    Keiser, J.R.; Taljat, B.; Wang, X.L. [and others

    1998-09-01T23:59:59.000Z

    Cracking of coextruded, black liquor recovery boiler floor tubes is both a safety and an economic issue to mill operators. In an effort to determine the cause of the cracking and to identify a solution, extensive studies, described in this and three accompanying papers, are being conducted. In this paper, results of studies to characterize both the cracking and the chemical and thermal environment are reported. Based on the results described in this series of papers, a possible mechanism is presented and means to lessen the likelihood of cracking or to totally avoid cracking of floor tubes are offered.

  3. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  4. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  5. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  6. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  7. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  8. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  9. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  10. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  11. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  12. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  13. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  14. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  16. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  17. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  18. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  19. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  1. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  2. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  3. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  4. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  5. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  6. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  7. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  8. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  9. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  10. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  11. Quantum Enabled Security (QES) for Optical Communications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled...

  12. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  13. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  14. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  15. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  16. Independent Activity Report, Nevada National Security Site -...

    Energy Savers [EERE]

    Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR NNSS-2012-12-03 This Independent Activity Report documents an...

  17. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  18. Lau, J. and Chen, Q. 2007. "Floor-supply displacement ventilation for workshops," Building and Environment, 42(4), 1718-1730.

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    of the heating, ventilating and air-conditioning (HVAC) systems used in U.S. buildings are mixing ventilation1 Lau, J. and Chen, Q. 2007. "Floor-supply displacement ventilation for workshops," Building and Environment, 42(4), 1718-1730. FLOOR-SUPPLY DISPLACEMENT VENTILATION FOR WORKSHOPS Josephine Lau and Qingyan

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  20. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria); Institut fuer Quantenoptik und Quanteninformation der Oesterreichischen, Akademie der Wissenschaften, Innsbruck (Austria); Calsamiglia, J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)

    2005-04-01T23:59:59.000Z

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  1. McMASTER SECURITY SERVICES ANNUAL REPORT 2007

    E-Print Network [OSTI]

    Thompson, Michael

    McMASTER SECURITY SERVICES ANNUAL REPORT 2007 #12;#12;Table of Contents MCMASTER SECURITY SERVICES .................................................................................................................................6 MCMASTER SECURITY SERVICES ­ WHO WE .......................................................................................................................29 #12;#12;5 MCMASTER SECURITY SERVICES MISSION STATEMENT Developing a safe and secure environment

  2. Thermal environment in indoor spaces with under-floor air distribution systems: 2. Determination of design parameters (1522-

    E-Print Network [OSTI]

    Chen, Qingyan "Yan"

    Thermal environment in indoor spaces with under-floor air distribution systems: 2. Determination of Mechanical Engineering, Purdue University, West Lafayette, Indiana 47907, USA 2 Building Energy and Environment Engineering LLP, Lafayette, Indiana 47905, USA 3 School of Environmental Science and Engineering

  3. Job Opportunity at NEUROMATTERS, LLC 40 Wall Street, 28th Floor, New York, NY 10005 www.neuromatters.com

    E-Print Network [OSTI]

    Adams, Mark

    , Neuromatters is at the forefront of neurotechnologies, EEG signal processing and decoding. The successfulJob Opportunity at NEUROMATTERS, LLC 40 Wall Street, 28th Floor, New York, NY 10005 www.neuromatters.com Founded by recognized neuroengineering experts from Columbia University and the City College of New York

  4. Problem Set 2, Fall 2014 Due date: Noon Monday, Sept. 22 (return assignment to the 4th floor assignment box).

    E-Print Network [OSTI]

    Flynn, Morris R.

    MEC E 390 Problem Set 2, Fall 2014 Due date: Noon Monday, Sept. 22 (return assignment to the 4th may be deducted if your code does not meet these criteria. Problem 1. [15 points] Suppose that you are to design a ventilation system for a restaurant, whose serving area floor plan is shown schematically below

  5. PII S0016-7037(00)00511-1 Reaction of forest floor organic matter at goethite, birnessite and smectite surfaces

    E-Print Network [OSTI]

    Chorover, Jon

    PII S0016-7037(00)00511-1 Reaction of forest floor organic matter at goethite, birnessite carbon (DOC) concentrations (0­140 g C m 3 ) for reaction with goethite ( -FeOOH), birnessite ( -MnO2 different NOM adsorption, fractionation and transformation patterns. Goethite exhibited a steep initial

  6. office of the university counsel Old Administration Building2nd Floor

    E-Print Network [OSTI]

    Handy, Todd C.

    be stored on secure servers rather than PCs or portable devices. If it is essential to store personal is free of charge). UBC cannot, however, charge individuals a fee for access to their own personal records, and · Protection of Privacy: to protect personal privacy by prohibiting the unauthorized

  7. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  8. WEP SecurityWEP Security David ArmstrongDavid Armstrong

    E-Print Network [OSTI]

    ""inin house.house."" 802.11802.11 nn 802.11a802.11a ­­ no securityno security nn 802.11b802.11b ­­ WEP

  9. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  10. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01T23:59:59.000Z

    OF FIGURES FIGURE Page 1 SET overview 32 2 SET messages 34 3 SET and SSL overview 36 4 Overview of SHPS 48 5 An example E C M L document 56 6 An example E C C document 57 7 An example CurrencyUpdate document 65 8 An example PurchaseRequest document... information. Netscape's Secure Socket Layer (SSL) provides the secure link between the consumer and merchant. While this approach has been successful due to the availability of SSL in most web browsers, the approach does not provide the level of security...

  11. Entropic security in Quantum Cryptography

    E-Print Network [OSTI]

    Simon Pierre Desrosiers

    2007-11-16T23:59:59.000Z

    We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under reasonable conditions and yet be secure in an information theoretic setting. This cipher also totally closes the gap between the key requirement of quantum ciphers and classical ciphers.

  12. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  13. Decision Support for Choice of Security

    E-Print Network [OSTI]

    Langseth, Helge

    Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

  14. Security Event and Log Management Service

    E-Print Network [OSTI]

    Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

  15. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  16. McMaster Security 2012 Annual Report

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services 2012 Annual Report #12;McMaster Security Services ­ Annual Report 2012 2 Mission Statement Developing a safe and secure environment in this academic institution within the McMaster community is assigned to the Security Services Department. Methods and approaches

  17. Server Security Policy 1.0 Purpose

    E-Print Network [OSTI]

    Demirel, Melik C.

    Server Security Policy COE­SSP­01 1.0 Purpose The purpose of this policy is to establish standards configurations must be in accordance with approved College guidelines to ensure a significant level of security Wrappers or other security mechanisms. · The most recent security patches must be installed on the system

  18. Feb 4, 2005 --Lecture 8 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

  19. April 8, 2005 --Lecture 30 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    April 8, 2005 -- Lecture 30 22C:169 Computer Security Douglas W. Jones Department of Computer Science Administrative Issues #12;Warning Security is a system property An emergent property of the whole of system Security rarely emerges by accident Adding a security module to a system rarely achieves much! #12

  20. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  1. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  2. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  3. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  4. Grid Security: Expecting the Mingchao Ma

    E-Print Network [OSTI]

    University College London

    of a communications line; Power failure; Internet connection failure; Mis-configuration; · Security incidents ­ SystemGrid Security: Expecting the Unexpected Mingchao Ma STFC ­ Rutherford Appleton Laboratory, UK #12;Slide 2 Overview · Security Service Challenges (SSC) Review · Grid Security Incident ­ What had happened

  5. EXTENDED DESCRIPTION TECHNIQUES FOR SECURITY ENGINEERING

    E-Print Network [OSTI]

    of security critical systems. Based on general security evaluation criteria, we show how to extend the system applications that communi- cate over open networks like the Internet--security is an extremely important issue this problem, on the one hand there are highly sophisticated col- lections of evaluation criteria that security

  6. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  7. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  8. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  9. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  10. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  11. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  12. Energy and Global Security - Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Helps Lead Charge to Revolutionize Energy Storage Gizmodo UK: Fast-Acting Nuclear Reactor Will Power through Piles of Plutonium Daily Herald: Fagel Book Named Security Book of...

  13. NSC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home content Social Media NSC NSC What does NNSA's new National Security Campus in Kansas City, MO look...

  14. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02T23:59:59.000Z

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  15. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05T23:59:59.000Z

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  16. Cognitive Security for Personal Devices

    E-Print Network [OSTI]

    Greenstadt, Rachel

    2008-03-17T23:59:59.000Z

    Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

  17. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  18. Secure Biometric Recognition Abhishek Nagar

    E-Print Network [OSTI]

    Template Security 20 3.1 Biometric Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.6 Evaluation of Template Protection Techniques . . . . . . . . . . . . . . . . . 41 4 of the major threats hovering the wired society. According to Javelin Strategy and Research Survey, there were

  19. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  20. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  1. Homeland Security Issues for Facilities

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01T23:59:59.000Z

    more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure...

  2. Securities trading of concepts (STOC)

    E-Print Network [OSTI]

    Dahan, Ely

    Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

  3. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M

  4. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  5. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  6. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  7. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  8. Critical Infrastructure and Cyber Security

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01T23:59:59.000Z

    that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

  9. SUPPORT OF GULF OF MEXICO HYDRATE RESEARCH CONSORTIUM: ACTIVITIES TO SUPPORT ESTABLISHMENT OF A SEA FLOOR MONITORING STATION PROJECT

    SciTech Connect (OSTI)

    Paul Higley; J. Robert Woolsey; Ralph Goodman; Vernon Asper; Boris Mizaikoff; Angela Davis; Bob A. Hardage; Jeffrey Chanton; Rudy Rogers

    2006-03-01T23:59:59.000Z

    The Gulf of Mexico Hydrates Research Consortium was established in 1999 to assemble leaders in gas hydrates research. The group is administered by the Center for Marine Resources and Environmental Technology, CMRET, at the University of Mississippi. The primary objective of the group is to design and emplace a remote monitoring station or sea floor observatory on the sea floor in the northern Gulf of Mexico by the year 2005, in an area where gas hydrates are known to be present at, or just below, the sea floor. This mission necessitates assembling a station that will monitor physical and chemical parameters of the sea water and sea floor sediments on a more-or-less continuous basis over an extended period of time. Development of the station has always included the possibility of expanding its capabilities to include biological monitoring, as a means of assessing environmental health. This possibility has recently received increased attention and the group of researchers working on the station has expanded to include several microbial biologists. Establishment of the Consortium has succeeded in fulfilling the critical need to coordinate activities, avoid redundancies and communicate effectively among researchers in this relatively new research arena. Complementary expertise, both scientific and technical, has been assembled to promote innovative research methods and construct necessary instrumentation. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in Mississippi Canyon 118 in May of 2005. Follow-up deployments are planned for fall 2005 and center about the use of the vessel M/V Ocean Quest and its two manned submersibles. The subs will be used to effect bottom surveys, emplace sensors and sea floor experiments and make connections between sensor data loggers and the integrated data power unit (IDP). Station/observatory completion is anticipated for 2007 following the construction, testing and deployment of the horizontal line arrays, not yet funded. The seafloor monitoring station/observatory is funded approximately equally by three federal Agencies: Minerals Management Services (MMS) of the Department of the Interior (DOI), National Energy Technology Laboratory (NETL) of the Department of Energy (DOE), and the National Institute for Undersea Science and Technology (NIUST), an agency of the National Oceanographic and Atmospheric Administration (NOAA).

  10. Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

  11. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01T23:59:59.000Z

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  12. all-weather security surveillance: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  13. asia-pacific security studies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  14. Inspection of the objects on the sea floor by using 14 MeV tagged neutrons

    SciTech Connect (OSTI)

    Valkovic, V. [A.C.T.d.o.o., Prilesje 4, Zagreb (Croatia); Sudac, D.; Obhodas, J. [Dept. of Experimental Physics, Inst. Ruder Boskovic, Zagreb (Croatia); Matika, D. [Inst. for Researches and Development of Defense Systems, Zagreb (Croatia); Kollar, R. [A.C.T.d.o.o., Prilesje 4, Zagreb (Croatia); Nad, K.; Orlic, Z. [Dept. of Experimental Physics, Inst. Ruder Boskovic, Zagreb (Croatia)

    2011-07-01T23:59:59.000Z

    Variety of objects found on the sea floor needs to be inspected for the presence of materials which represent the threat to the environment and to the safety of humans. We have demonstrated that the sealed tube 14 MeV neutron generator with the detection of associated alpha particles can be used underwater when mounted inside ROV equipped with the hydraulic legs and variety of sensors for the inspection of such objects for the presence of threat materials. Such a system is performing the measurement by using the NaI gamma detector and an API-120 neutron generator which could be rotated in order to maximize the inspected target volume. The neutron beam intensity during the 10-30 min. measurements is usually 1 x 10{sup 7} n/s in 4{pi}. In this report the experimental results for some of commonly found objects containing TNT explosive or its simulant are presented. The measured gamma spectra are dominant by C, O and Fe peaks enabling the determination of the presence of explosives inside the ammunition shell. Parameters influencing the C/O ratio are discussed in some details. (authors)

  15. Soil-structure interaction effects on containment fragilities and floor response spectra statistics

    SciTech Connect (OSTI)

    Pires, J.; Reich, M.; Chokshi, N.C.

    1987-01-01T23:59:59.000Z

    The probability-based method for the reliability evaluation of nuclear structures developed at Brookhaven National Laboratory (BNL) is extended to include soil-structure interaction effects. A reinforced concrete containment is analyzed in order to investigate the soil-structure interaction effects on: structural fragilities; floor response spectra statistics and acceleration response correlations. To include the effect of soil flexibility on the reliability assessment the following two step approach is used. In the first step, the lumped parameter method for soil-structure interaction analysis is used together with a stick model representation of the structure in order to obtain the motions of the foundation plate. These motions, which include both translations and rotations of the foundation plate, are expressed in terms of the power-spectral density of the free-field ground excitation and the transfer function of the total acceleration response of the foundation. The second step involves a detailed finite element model of the structure subjected to the interaction motions computed from step one. Making use of the structural model and interaction motion the reliability analysis method yields the limit stat probabilities and fragility data for the structure.

  16. Seismic soil-structure interaction effects on probabilistic floor response spectra

    SciTech Connect (OSTI)

    Ghiocel, D.M.; Wilson, P.R.; Stevenson, J.D. [Stevenson and Associates, Cleveland, OH (United States)

    1995-12-31T23:59:59.000Z

    For the purpose of performing a Seismic Probabilistic Risk Assessment (SPRA) for the Individual Plant Examination of External of Events (IPEEE) program, probabilistic soil-structure interaction (SSI) analyses for the major nuclear power plant (NPP) structures on the site were performed. The paper describes the probabilistic seismic SSI methodology and the probabilistic models used for the idealization of seismic excitation and surrounding soil deposit. To illustrate the effects of randomness in the input parameters, simulated and/or probabilistic Floor Response Spectra (FRS) at selected locations inside the Reactor Building (RB) and Auxiliary Building (AB) are plotted. The computed probabilistic FRS show that the randomness coming from the soil stiffness affects significantly the FRS of the RB and less significantly the FRS of AB. The coefficients of variation (or the standard deviations in the log normal format) of the FRS of RB due to soil stiffness randomness are considerably larger at upper elevations than at the basemat level showing that the random SSI effects are primarily manifested through the rocking motions and less through the horizontal translation of the base. The use of the current accepted rule for SPRA median response for median input may lead to unrealistic peaks in the median FRS especially when the SSI effects are significant as shown herein. This is due to the strong nonlinear relationship between the spectral amplitudes and soil stiffness at the SSI resonant frequencies.

  17. The Impact of Test Suite Granularity on the CostEffectiveness of Regression Testing

    E-Print Network [OSTI]

    Rothermel, Gregg

    The Impact of Test Suite Granularity on the Cost­Effectiveness of Regression Testing Gregg,pkallakug@cse.unl.edu ABSTRACT Regression testing is an expensive testing process used to validate software following modi#12;cations. The cost-e#11;ective- ness of regression testing techniques varies with characteris- tics of test

  18. The Impact of Test Suite Granularity on the CostEffectiveness of Regression Testing

    E-Print Network [OSTI]

    Rothermel, Gregg

    The Impact of Test Suite Granularity on the Cost­Effectiveness of Regression Testing Gregg,pkallakug@cse.unl.edu ABSTRACT Regression testing is an expensive testing process used to validate software following modifications. The cost­effective­ ness of regression testing techniques varies with characteris­ tics of test

  19. The Impact of Test Suite Granularity on the Cost-Effectiveness of Regression Testing

    E-Print Network [OSTI]

    Rothermel, Gregg

    The Impact of Test Suite Granularity on the Cost-Effectiveness of Regression Testing Gregg,pkallakug@cse.unl.edu ABSTRACT Regression testing is an expensive testing process used to validate software following modi cations. The cost-e ective- ness of regression testing techniques varies with characteris- tics of test

  20. COLUMBIA RIVER INTER-TRIBAL FISH COMMISSION 700 NE Multnomah Street, Suite 1200

    E-Print Network [OSTI]

    COLUMBIA RIVER INTER-TRIBAL FISH COMMISSION 700 NE Multnomah Street, Suite 1200 Portland, Oregon 97232 F (503) 235-4228 (503) 238-0667 F (503) 235-4228 www.critfc.org Putting fish back in the rivers and protecting the watersheds where fish live September 17, 2013 Bill Bradbury, Chairman Northwest Power

  1. The Carmen-Suite: Maya Plisetskaya Challenging Soviet Culture and Policy 

    E-Print Network [OSTI]

    Kalashnikova, Anna

    2014-04-24T23:59:59.000Z

    -Cold War politics in the USSR and post-Soviet Russia. The evolution of Carmen-Suite from a symbol of protest to an integral part of the established cultural system illustrates both political protest on the part of its creators and artistic repossession...

  2. Multimedia Analytics Canopy is a visual analytic software suite, developed by researchers at Battelle's

    E-Print Network [OSTI]

    Multimedia Analytics Canopy is a visual analytic software suite, developed by researchers to efficiently analyze massive amounts of multimedia data. Canopy incorporates cutting-edge extraction techniques is a multimedia analytics software platform that combines cutting-edge extraction techniques, state

  3. Constructed Wetlands Research Group meeting Forth Suite, SEPA Riccarton Office, Edinburgh EH14 4AP

    E-Print Network [OSTI]

    Heal, Kate

    , to address diffuse pollution (particularly hydrocarbons) associated with the nearby Brucefield Industry Park1 Minutes of Constructed Wetlands Research Group meeting Forth Suite, SEPA Riccarton Office. It was set up several years ago, particularly to support the implementation of constructed farm wetlands

  4. Two Distinctive Granite Suites in the SW Bohemian Massif and their Record of

    E-Print Network [OSTI]

    Siebel, Wolfgang

    Two Distinctive Granite Suites in the SW Bohemian Massif and their Record of Emplacement types of gneisses, migmatites and granites dominate the out- crops of the Bavarian Forest characteristics ofa crustal root zone. Fourteen granite intrusions from this area have been dated by the single

  5. Two Distinctive Granite Suites in the Southwestern Bohemian Massif: Reply to

    E-Print Network [OSTI]

    Siebel, Wolfgang

    Two Distinctive Granite Suites in the Southwestern Bohemian Massif: Reply to F. Finger and M. Rene geochemical and geochronological analyses of mainly crustal-derived late Variscan granites (328^321 Ma) from the Bavarian Forest, Moldanubian unit, Bohemian Massif. As an important observation, a high Ca^Sr^Y granite

  6. Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage

    E-Print Network [OSTI]

    Harrold, Mary Jean

    Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage James A. Jones (MC/DC) adequate. Despite its cost, there is evidence that MC/DC is an effective verification technique, and can help to uncover safety faults. As the software is modified and new test cases are added

  7. Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage

    E-Print Network [OSTI]

    Harrold, Mary Jean

    Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage James A. Jones condition/decision coverage (MC/DC) adequate. Despite its cost, there is evidence that MC/DC is an effective verification technique and can help to uncover safety faults. As the software is modified and new test cases

  8. A benchmark suite with virtualized reality models for supporting tracking evaluation and data set generation

    E-Print Network [OSTI]

    Boyer, Edmond

    ) Benchmark resources Sharing of benchmarking results A : Datasets GenerateA benchmark suite with virtualized reality models for supporting tracking evaluation and data set laurence.nigay@imag.fr Takeshi Kurata AIST, Japan t.kurata@aist.go.jp Abstract We describe a benchmark

  9. Test Factoring: Focusing Test Suites for the Task at Hand Michael D. Ernst, research advisor

    E-Print Network [OSTI]

    Liskov, Barbara

    Test Factoring: Focusing Test Suites for the Task at Hand David Saff Michael D. Ernst, research and Subject Descriptors: D.2.5 (Testing and Debug­ ging): Testing tools General Terms: Algorithms, Design, Performance, Verification Keywords: test factoring, mock objects, unit testing 1. Problem: slow, unfocused

  10. On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel

    E-Print Network [OSTI]

    Rothermel, Gregg

    On Test Suite Composition and Cost-Effective Regression Testing Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 31, 2004 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

  11. Test Factoring: Focusing Test Suites for the Task at Hand Michael D. Ernst, research advisor

    E-Print Network [OSTI]

    Liskov, Barbara

    Test Factoring: Focusing Test Suites for the Task at Hand David Saff Michael D. Ernst, research and Subject Descriptors: D.2.5 (Testing and Debug- ging): Testing tools General Terms: Algorithms, Design, Performance, Verification Keywords: test factoring, mock objects, unit testing 1. Problem: slow, unfocused

  12. On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel

    E-Print Network [OSTI]

    Rothermel, Gregg

    On Test Suite Composition and Cost-Effective Regression Testing. Gregg Rothermel , Sebastian Elbaum}@cse.unl.edu August 30, 2003 Abstract Regression testing is an expensive testing process used to re-validate software as it evolves. Various methodologies for improving regression testing processes have been explored, but the cost

  13. How kelp produce blade shapes suited to different flow regimes: A new wrinkle

    E-Print Network [OSTI]

    Mahadevan, L.

    How kelp produce blade shapes suited to different flow regimes: A new wrinkle M. A. R. Koehl,1,Ă? W bull kelp, Nereocystis luetkeana, to investigate how these ecomorphological differences are produced, strap-like blades of kelp from habitats with rapid flow collapse into streamlined bundles and flutter

  14. STUDIES ON THE GOES-R HYPERSPECTRAL ENVIRONMENTAL SUITE (HES) ON , Timothy, J. Schmit

    E-Print Network [OSTI]

    Li, Jun

    resolution infrared radiances from the Hyperspectral Environmental Suite (HES) on Geostationary Operational with capabilities from current sensors. Corresponding author address: Jun Li, Cooperative Institute and 2 km relative humidity (RH) rms were created to evaluate the retrieval difference between LW + LMW

  15. 7900 SE 28th Street, Suite 200 Mercer, Island, WA 98040-2970

    E-Print Network [OSTI]

    7900 SE 28th Street, Suite 200 Mercer, Island, WA 98040-2970 v 206.236.7200 f 206.236.3019 www Administration. The Joint Proposal is a comprehensive settlement that will bring to an end the long costs, when the responsibility for reaching agreements with IPPs, is dispersed directly to the load

  16. Space Suited Crew Engineering Evaluation of the Proposed Array A-Z PSE Decoupled

    E-Print Network [OSTI]

    Rathbun, Julie A.

    for thermal skirt deployment was utilized. C. TEST FACILITIES Crew Engineering Laboratory, Plt 2. D. TEST: : I Pt ·::., p.~ Space Suited Crew Engineering Evaluation of the Proposed Array A-Z PSE Decoupled Shroud (Crew Engineering Mockup) NO. REV. NO. ATM-973 PAGE 1 OF 8 rtems Division DATE Z/9/71 A. INTRCDUC

  17. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  18. NNSA Celebrates 10 Years of Cooperation with Russia in Securing...

    National Nuclear Security Administration (NNSA)

    Security Administration (NNSA) commemorated ten years of work securing nuclear and radiological material in Russia and the former Soviet Union by completing security...

  19. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

  20. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01T23:59:59.000Z

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all