National Library of Energy BETA

Sample records for halide lighting security

  1. Bright Light-Emitting Diodes based on Organometal Halide Perovskite

    E-Print Network [OSTI]

    Tan, Zhi-Kuang; Moghaddam, Reza Saberi; Lai, May Ling; Docampo, Pablo; Higler, Ruben; Deschler, Felix; Price, Michael; Sadhanala, Aditya; Pazos, Luis M.; Credgington, Dan; Hanusch, Fabian; Bein, Thomas; Snaith, Henry J.; Friend, Richard H.

    2014-08-03

    temperature and high vacuum processes, rendering them uneconomical for use in large area displays. Here, we report high brightness light-emitting diodes based on solution-processed organometal halide perovskites. We demonstrate electroluminescence in the near...

  2. Evaluation of Metal Halide, Plasma, and LED Lighting Technologies for a Hydrogen Fuel Cell Mobile Light (H 2 LT)

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Miller, L. B.; Donohoe, S. P.; Jones, M. H.; White, W. A.; Klebanoff, L. E.; Velinsky, S. A.

    2015-04-22

    This article reports on the testing and comparison of a prototype hydrogen fuel cell light tower (H2LT) and a conventional diesel-powered metal halide light trailer for use in road maintenance and construction activities. The prototype was originally outfitted with plasma lights and then with light-emitting diode (LED) luminaires. Light output and distribution, lighting energy efficiency (i.e., efficacy), power source thermal efficiency, and fuel costs are compared. The metal halide luminaires have 2.2 and 3.1 times more light output than the plasma and LED luminaires, respectively, but they require more power/lumen to provide that output. The LED luminaires have 1.6 timesmore »better light efficacy than either the metal halide or plasma luminaires. The light uniformity ratios produced by the plasma and LED towers are acceptable. The fuel cell thermal efficiency at the power required to operate the plasma lights is 48%, significantly higher than the diesel generator efficiency of 23% when operating the metal halide lights. Due to the increased efficiency of the fuel cell and the LED lighting, the fuel cost per lumen-hour of the H2LT is 62% of the metal halide diesel light tower assuming a kilogram of hydrogen is twice the cost of a gallon of diesel fuel.« less

  3. Evaluation of Metal Halide, Plasma, and LED Lighting Technologies for a Hydrogen Fuel Cell Mobile Light (H 2 LT)

    SciTech Connect (OSTI)

    Miller, L. B.; Donohoe, S. P.; Jones, M. H.; White, W. A.; Klebanoff, L. E.; Velinsky, S. A.

    2015-04-22

    This article reports on the testing and comparison of a prototype hydrogen fuel cell light tower (H2LT) and a conventional diesel-powered metal halide light trailer for use in road maintenance and construction activities. The prototype was originally outfitted with plasma lights and then with light-emitting diode (LED) luminaires. Light output and distribution, lighting energy efficiency (i.e., efficacy), power source thermal efficiency, and fuel costs are compared. The metal halide luminaires have 2.2 and 3.1 times more light output than the plasma and LED luminaires, respectively, but they require more power/lumen to provide that output. The LED luminaires have 1.6 times better light efficacy than either the metal halide or plasma luminaires. The light uniformity ratios produced by the plasma and LED towers are acceptable. The fuel cell thermal efficiency at the power required to operate the plasma lights is 48%, significantly higher than the diesel generator efficiency of 23% when operating the metal halide lights. Due to the increased efficiency of the fuel cell and the LED lighting, the fuel cost per lumen-hour of the H2LT is 62% of the metal halide diesel light tower assuming a kilogram of hydrogen is twice the cost of a gallon of diesel fuel.

  4. Lutetium gadolinium halide scintillators

    DOE Patents [OSTI]

    Shah, Kanai S. (Newton, MA); Higgins, William M (Westborough, MA); Van Loef, Edgar V (Allston, MA); Glodo, Jaroslaw (Allston, MA)

    2010-07-13

    Lutetium gadolinium halide scintillators, devices and methods, including a composition having the formula Lu.sub.xGd.sub.(1-x)Halide and a dopant.

  5. Light-weight primitive, feather-weight security a cryptanalytic knock-out

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Light-weight primitive, feather-weight security ­ a cryptanalytic knock-out (Preliminary results) V Kingdom page@cs.bris.ac.uk ABSTRACT In [12], the authors present a new light-weight cryptographic systems; D.4.6 [Security and Protection]: Authentication Keywords Light-weight block cipher, structural

  6. Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA

    SciTech Connect (OSTI)

    Rubinstein, Francis M.

    1999-10-25

    Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.

  7. Actinide halide complexes

    DOE Patents [OSTI]

    Avens, Larry R. (Los Alamos, NM); Zwick, Bill D. (Santa Fe, NM); Sattelberger, Alfred P. (Los Alamos, NM); Clark, David L. (Los Alamos, NM); Watkin, John G. (Los Alamos, NM)

    1992-01-01

    A compound of the formula MX.sub.n L.sub.m wherein M is a metal atom selected from the group consisting of thorium, plutonium, neptunium or americium, X is a halide atom, n is an integer selected from the group of three or four, L is a coordinating ligand selected from the group consisting of aprotic Lewis bases having an oxygen-, nitrogen-, sulfur-, or phosphorus-donor, and m is an integer selected from the group of three or four for monodentate ligands or is the integer two for bidentate ligands, where the sum of n+m equals seven or eight for monodentate ligands or five or six for bidentate ligands, a compound of the formula MX.sub.n wherein M, X, and n are as previously defined, and a process of preparing such actinide metal compounds including admixing the actinide metal in an aprotic Lewis base as a coordinating solvent in the presence of a halogen-containing oxidant, are provided.

  8. Actinide halide complexes

    DOE Patents [OSTI]

    Avens, L.R.; Zwick, B.D.; Sattelberger, A.P.; Clark, D.L.; Watkin, J.G.

    1992-11-24

    A compound is described of the formula MX[sub n]L[sub m] wherein M is a metal atom selected from the group consisting of thorium, plutonium, neptunium or americium, X is a halide atom, n is an integer selected from the group of three or four, L is a coordinating ligand selected from the group consisting of aprotic Lewis bases having an oxygen-, nitrogen-, sulfur-, or phosphorus-donor, and m is an integer selected from the group of three or four for monodentate ligands or is the integer two for bidentate ligands, where the sum of n+m equals seven or eight for monodentate ligands or five or six for bidentate ligands. A compound of the formula MX[sub n] wherein M, X, and n are as previously defined, and a process of preparing such actinide metal compounds are described including admixing the actinide metal in an aprotic Lewis base as a coordinating solvent in the presence of a halogen-containing oxidant.

  9. Preparation of cerium halide solvate complexes

    DOE Patents [OSTI]

    Vasudevan, Kalyan V; Smith, Nickolaus A; Gordon, John C; McKigney, Edward A; Muenchaussen, Ross E

    2013-08-06

    Crystals of a solvated cerium(III) halide solvate complex resulted from a process of forming a paste of a cerium(III) halide in an ionic liquid, adding a solvent to the paste, removing any undissolved solid, and then cooling the liquid phase. Diffusing a solvent vapor into the liquid phase also resulted in crystals of a solvated cerium(III) halide complex.

  10. Development of Halide and Oxy-Halides for Isotopic Separations

    SciTech Connect (OSTI)

    Leigh R. Martin; Aaron T. Johnson; Jana Pfeiffer; Martha R. Finck

    2014-10-01

    The goal of this project was to synthesize a volatile form of Np for introduction into mass spectrometers at INL. Volatile solids of the 5f elements are typically those of the halides (e.g. UF6), however fluorine is highly corrosive to the sensitive internal components of the mass separator, and the other volatile halides exist as several different stable isotopes in nature. However, iodide is both mono-isotopic and volatile, and as such presents an avenue for creation of a form of Np suitable for introduction into the mass separator. To accomplish this goal, the technical work in the project sought to establish a novel synthetic route for the conversion NpO2+ (dissolved in nitric acid) to NpI3 and NpI4.

  11. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  12. Technical Feasibility Assessment of LED Roadway Lighting on the...

    Office of Scientific and Technical Information (OSTI)

    Technical Feasibility Assessment of LED Roadway Lighting on the Golden Gate Bridge Tuenge, Jason R. LED; induction; ceramic metal halide; plasma; roadway lighting; Golden Gate...

  13. Diamond films treated with alkali-halides

    DOE Patents [OSTI]

    Anderson, D.F.; Kwan, S.W.

    1997-04-08

    A secondary electron emitter is provided and includes a substrate with a diamond film, the diamond film is treated or coated with an alkali-halide. 5 figs.

  14. Lanthanide doped strontium barium mixed halide scintillators

    DOE Patents [OSTI]

    Gundiah, Gautam; Bizarri, Gregory; Hanrahan, Stephen M; Bourret-Courchesne, Edith; Derenzo, Stephen E

    2013-07-16

    The present invention provides for a composition comprising an inorganic scintillator comprising a lanthanide-doped strontium barium mixed halide useful for detecting nuclear material.

  15. Hygroscopicity Evaluation of Halide Scintillators

    SciTech Connect (OSTI)

    Zhuravleva, M; Stand, L; Wei, H; Hobbs, C. L.; Boatner, Lynn A; Ramey, Joanne Oxendine; Burger, Arnold; Rowe, E; Bhattacharya, P.; Tupitsyn, E; Melcher, Charles L

    2014-01-01

    A collaborative study of relative hygroscopicity of anhydrous halide scintillators grown at various laboratories is presented. We have developed a technique to evaluate moisture sensitivity of both raw materials and grown crystals, in which the moisture absorption rate is measured using a gravimetric analysis. Degradation of the scintillation performance was investigated by recording gamma-ray spectra and monitoring the photopeak position, count rate and energy resolution. The accompanying physical degradation of the samples exposed to ambient atmosphere was photographically recorded as well. The results were compared with ben

  16. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema (OSTI)

    Philips, Julia [Sandia

    2010-01-08

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  17. Halide and Oxy-Halide Eutectic Systems for High-Performance,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    computational modeling along with rapid material screening methods to identify halide salt mixtures with a melting point below 250C that are stable at temperatures well above...

  18. New Energy Efficiency Standards for Metal Halide Lamp Fixtures...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Metal Halide Lamp Fixtures to Save on Energy Bills and Reduce Carbon Pollution New Energy Efficiency Standards for Metal Halide Lamp Fixtures to Save on Energy Bills and Reduce...

  19. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    SciTech Connect (OSTI)

    Thomas, L.L.; Strait, R.S. [Lawrence Livermore National Lab., CA (United States). Fission Energy and Systems Safety Program

    1994-10-01

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient.

  20. Shape Evolution and Single Particle Luminescence of Organometal Halide Perovskite Nanocrystals

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhu, Feng; Men, Long; Guo, Yijun; Zhu, Qiaochu; Bhattacharjee, Ujjal; Goodwin, Peter M.; Petrich, Jacob W.; Smith, Emily A.; Vela, Javier

    2015-02-09

    Organometallic halide perovskites CH3NH3PbX3 (X = I, Br, Cl) have quickly become one of the most promising semiconductors for solar cells, with photovoltaics made of these materials reaching power conversion efficiencies of near 20%. Improving our ability to harness the full potential of organometal halide perovskites will require more controllable syntheses that permit a detailed understanding of their fundamental chemistry and photophysics. In our manuscript, we systematically synthesize CH3NH3PbX3 (X = I, Br) nanocrystals with different morphologies (dots, rods, plates or sheets) by using different solvents and capping ligands. CH3NH3PbX3 nanowires and nanorods capped with octylammonium halides show relatively highermore »photoluminescence (PL) quantum yields and long PL lifetimes. CH3NH3PbI3 nanowires monitored at the single particle level show shape-correlated PL emission across whole particles, with little photobleaching observed and very few off periods. Our work highlights the potential of low-dimensional organometal halide perovskite semiconductors in constructing new porous and nanostructured solar cell architectures, as well as in applying these materials to other fields such as light-emitting devices and single particle imaging and tracking.« less

  1. J. Am. Chem. SOC.1991, 113,9575-9585 9575 Mixed Aggregation of Lithium Enolates and Lithium Halides

    E-Print Network [OSTI]

    Collum, David B.

    J. Am. Chem. SOC.1991, 113,9575-9585 9575 Mixed Aggregation of Lithium Enolates and Lithium Halides with Lithium 2,2,6,6-Tetramethylpiperidide(LiTMP) Patricia L. Hall, James H. Gilchrist, Aidan T. Harrison]-lithiumdi-tert-butylamide and conformationally locked [6Li]-lithium2,2,4,6,6-pentamethylpiperidide shed further light

  2. Lanthanide-halide based humidity indicators

    DOE Patents [OSTI]

    Beitz, James V. (Hinsdale, IL); Williams, Clayton W. (Chicago, IL)

    2008-01-01

    The present invention discloses a lanthanide-halide based humidity indicator and method of producing such indicator. The color of the present invention indicates the humidity of an atmosphere to which it is exposed. For example, impregnating an adsorbent support such as silica gel with an aqueous solution of the europium-containing reagent solution described herein, and dehydrating the support to dryness forms a substance with a yellow color. When this substance is exposed to a humid atmosphere the water vapor from the air is adsorbed into the coating on the pore surface of the silica gel. As the water content of the coating increases, the visual color of the coated silica gel changes from yellow to white. The color change is due to the water combining with the lanthanide-halide complex on the pores of the gel.

  3. Lanthanum halide scintillators for time-of-flight 3-D pet

    DOE Patents [OSTI]

    Karp, Joel S. (Glenside, PA); Surti, Suleman (Philadelphia, PA)

    2008-06-03

    A Lanthanum Halide scintillator (for example LaCl.sub.3 and LaBr.sub.3) with fast decay time and good timing resolution, as well as high light output and good energy resolution, is used in the design of a PET scanner. The PET scanner includes a cavity for accepting a patient and a plurality of PET detector modules arranged in an approximately cylindrical configuration about the cavity. Each PET detector includes a Lanthanum Halide scintillator having a plurality of Lanthanum Halide crystals, a light guide, and a plurality of photomultiplier tubes arranged respectively peripherally around the cavity. The good timing resolution enables a time-of-flight (TOF) PET scanner to be developed that exhibits a reduction in noise propagation during image reconstruction and a gain in the signal-to-noise ratio. Such a PET scanner includes a time stamp circuit that records the time of receipt of gamma rays by respective PET detectors and provides timing data outputs that are provided to a processor that, in turn, calculates time-of-flight (TOF) of gamma rays through a patient in the cavity and uses the TOF of gamma rays in the reconstruction of images of the patient.

  4. Energy - LEDs to light UT arena | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to 85 percent more efficient than conventional arena metal halide lights. The light-emitting diode fixtures developed by Oak Ridge-based LED North America incorporate an Oak...

  5. On the surface morphology of thin alkali halide photocathode "lms

    E-Print Network [OSTI]

    On the surface morphology of thin alkali halide photocathode "lms T. Boutboul *, A. Breskin , R-91128 Palaiseau Cedex, France Abstract Thin alkali halide "lms are currently used as transmissive UVI and CsBr "lms was investigated by means of a scanning electron microscope, to which the samples were

  6. Cross-coupling reactions of unactivated alkyl halides

    E-Print Network [OSTI]

    Zhou, Jianrong (Jianrong Steve)

    2005-01-01

    My graduate research at MIT has been focused on the development of palladium- or nickel-catalyzed cross-coupling reactions using unactivated alkyl electrophiles (e.g., halides and sulfonates). Although aryl and alkenyl ...

  7. Assessing Global Terrestrial Sources of Methyl Halides - Ozone Regulating Gases 

    E-Print Network [OSTI]

    Gancarczyk, Maciej

    2010-11-24

    Methyl bromide (CH3Br) and methyl chloride (CH3Cl) play significant roles in the depletion of the stratospheric ozone layer. The vast portion of methyl halide sources and sinks sources and sinks are natural in origin. The ...

  8. Metal-halide perovskites for photovoltaic and light-emitting...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are exotic hybrid crystalline materials developed out of curiosity. Unexpectedly, solar cells incorporating these perovskites are rapidly emerging as serious contenders to rival...

  9. Efficient Light-Emitting Diodes Based on Nanocrystalline Perovskite in a Dielectric Polymer Matrix

    E-Print Network [OSTI]

    Li, Guangru; Tan, Zhi-Kuang; Di, Dawei; Lai, May Ling; Jiang, Lang; Lim, Jonathan Hua-Wei; Friend, Richard H.; Greenham, Neil C.

    2015-02-24

    Electroluminescence in light-emitting devices relies on the encounter and radiative recombination of electrons and holes in the emissive layer. In organometal halide perovskite light-emitting diodes, poor film formation creates electrical shunting...

  10. Advances in the growth of alkaline-earth halide single crystals for scintillator detectors

    SciTech Connect (OSTI)

    Boatner, Lynn A; Ramey, Joanne Oxendine; Kolopus, James A; Neal, John S; Cherepy, Nerine; Payne, Stephen A.; Beck, P; Burger, Arnold; Rowe, E; Bhattacharya, P.

    2014-01-01

    Alkaline-earth scintillators such as strontium iodide and other alkaline-earth halides activated with divalent europium represent some of the most efficient and highest energy resolution scintillators for use as gamma-ray detectors in a wide range of applications. These applications include the areas of nuclear nonproliferation, homeland security, the detection of undeclared nuclear material, nuclear physics and materials science, medical diagnostics, space physics, high energy physics, and radiation monitoring systems for first responders, police, and fire/rescue personnel. Recent advances in the growth of large single crystals of these scintillator materials hold the promise of higher crystal yields and significantly lower detector production costs. In the present work, we describe new processing protocols that, when combined with our molten salt filtration methods, have led to advances in achieving a significant reduction of cracking effects during the growth of single crystals of SrI2:Eu2+. In particular, we have found that extended pumping on the molten crystal-growth charge under vacuum for time periods extending up to 48 hours is generally beneficial in compensating for variations in the alkaline-earth halide purity and stoichiometry of the materials as initially supplied by commercial sources. These melt-pumping and processing techniques are now being applied to the purification of CaI2:Eu2+ and some mixed-anion europium-doped alkaline-earth halides prior to single-crystal growth by means of the vertical Bridgman technique. The results of initial studies of the effects of aliovalent doping of SrI2:Eu2+ on the scintillation characteristics of this material are also described.

  11. Lighting the night one step at a time | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesse BergkampCenter (LMI-EFRC) ProximityCenter (LMI-EFRC)Lighting

  12. Vitrification of IFR and MSBR halide salt reprocessing wastes

    SciTech Connect (OSTI)

    Siemer, D.D.

    2013-07-01

    Both of the genuinely sustainable (breeder) nuclear fuel cycles (IFR - Integral Fast Reactor - and MSBR - Molten Salt Breeder Reactor -) studied by the USA's national laboratories would generate high level reprocessing waste (HLRW) streams consisting of a relatively small amount ( about 4 mole %) of fission product halide (chloride or fluoride) salts in a matrix comprised primarily (about 95 mole %) of non radioactive alkali metal halide salts. Because leach resistant glasses cannot accommodate much of any of the halides, most of the treatment scenarios previously envisioned for such HLRW have assumed a monolithic waste form comprised of a synthetic analog of an insoluble crystalline halide mineral. In practice, this translates to making a 'substituted' sodalite ('Ceramic Waste Form') of the IFR's chloride salt-based wastes and fluoroapatite of the MSBR's fluoride salt-based wastes. This paper discusses my experimental studies of an alternative waste management scenario for both fuel cycles that would separate/recycle the waste's halide and immobilize everything else in iron phosphate (Fe-P) glass. It will describe both how the work was done and what its results indicate about how a treatment process for both of those wastes should be implemented (fluoride and chloride behave differently). In either case, this scenario's primary advantages include much higher waste loadings, much lower overall cost, and the generation of a product (glass) that is more consistent with current waste management practices. (author)

  13. Regeneration of zinc halide catalyst used in the hydrocracking of polynuclear hydrocarbons

    DOE Patents [OSTI]

    Gorin, Everett (San Rafael, CA)

    1978-01-01

    Improved recovery of spent molten zinc halide hydro-cracking catalyst is achieved in the oxidative vapor phase regeneration thereof by selective treatment of the zinc oxide carried over by the effluent vapors from the regeneration zone with hydrogen halide gas under conditions favoring the reaction of the zinc oxide with the hydrogen halide, whereby regenerated zinc halide is recovered in a solids-free state with little loss of zinc values.

  14. Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResourcelogo and-E C H N13,CenterCenterLighting Sign In

  15. Electrolytic systems and methods for making metal halides and refining metals

    DOE Patents [OSTI]

    Holland, Justin M.; Cecala, David M.

    2015-05-26

    Disclosed are electrochemical cells and methods for producing a halide of a non-alkali metal and for electrorefining the halide. The systems typically involve an electrochemical cell having a cathode structure configured for dissolving a hydrogen halide that forms the halide into a molten salt of the halogen and an alkali metal. Typically a direct current voltage is applied across the cathode and an anode that is fabricated with the non-alkali metal such that the halide of the non-alkali metal is formed adjacent the anode. Electrorefining cells and methods involve applying a direct current voltage across the anode where the halide of the non-alkali metal is formed and the cathode where the non-alkali metal is electro-deposited. In a representative embodiment the halogen is chlorine, the alkali metal is lithium and the non-alkali metal is uranium.

  16. Replacement of Lighting Fixtures with LED Energy Efficient Lights at the Parking Facility, Milwaukee, Wisconsin

    SciTech Connect (OSTI)

    David Brien

    2012-06-21

    The Forest County Potawatomi Community (FCPC or Tribe) owns a six-story parking facility adjacent to its Potawatomi Bingo Casino (the Casino) in Milwaukee, Wisconsin, as well as a valet parking facility under the Casino (collectively, the Parking Facility). The Parking Facility contained 205-watt metal halide-type lights that, for security reasons, operated 24 hours per day, 7 days per week. Starting on August 30, 2010, the Tribe replaced these fixtures with 1,760 state-of-the-art, energy efficient 55-Watt LED lights. This project resulted in an immediate average reduction in monthly peak demand of 238 kW over the fourth quarter of 2010. The average reduction in monthly peak demand from October 1 through December 31, 2010 translates into a forecast annual electrical energy reduction of approximately 1,995,000 kWh or 47.3% of the pre-project demand. This project was technically effective, economically feasible, and beneficial to the public not only in terms of long term energy efficiency and associated emissions reductions, but also in the short-term jobs provided for the S.E. Wisconsin region. The project was implemented, from approval by U.S. Department of Energy (DOE) to completion, in less than 6 months. The project utilized off-the-shelf proven technologies that were fabricated locally and installed by local trade contractors.

  17. Impact of the organic halide salt on final perovskite composition for photovoltaic applications

    SciTech Connect (OSTI)

    Moore, David T.; Sai, Hiroaki; Wee Tan, Kwan; Estroff, Lara A.; Wiesner, Ulrich

    2014-08-01

    The methylammonium lead halide perovskites have shown significant promise as a low-cost, second generation, photovoltaic material. Despite recent advances, however, there are still a number of fundamental aspects of their formation as well as their physical and electronic behavior that are not well understood. In this letter we explore the mechanism by which these materials crystallize by testing the outcome of each of the reagent halide salts. We find that components of both salts, lead halide and methylammonium halide, are relatively mobile and can be readily exchanged during the crystallization process when the reaction is carried out in solution or in the solid state. We exploit this fact by showing that the perovskite structure is formed even when the lead salt's anion is a non-halide, leading to lower annealing temperature and time requirements for film formation. Studies into these behaviors may ultimately lead to improved processing conditions for photovoltaic films.

  18. The concept of the use of recycled uranium for increasing the degree of security of export deliveries of fuel for light-water reactors

    SciTech Connect (OSTI)

    Alekseev, P. N.; Ivanov, E. A.; Nevinitsa, V. A.; Ponomarev-Stepnoi, N. N.; Rumyantsev, A. N.; Shmelev, V. M. [Russian Research Center Kurchatov Institute (Russian Federation); Borisevich, V. D.; Smirnov, A. Yu.; Sulaberidze, G. A. [National Nuclear Research University MEPhI (Russian Federation)

    2010-12-15

    The present paper deals with investigation of the possibilities for reducing the risk of proliferation of fissionable materials by means of increasing the degree of protection of fresh fuel intended for light-water reactors against unsanctioned use in the case of withdrawal of a recipient country of deliveries from IAEA safeguards. It is shown that the use of recycled uranium for manufacturing export nuclear fuel makes transfer of nuclear material removed from the fuel assemblies for weapons purposes difficult because of the presence of isotope {sup 232}U, whose content increases when one attempts to enrich uranium extracted from fresh fuel. In combination with restricted access to technologies for isotope separation by means of establishing international centers for uranium enrichment, this technical measure can significantly reduce the risk of proliferation associated with export deliveries of fuel made of low-enriched uranium. The assessment of a maximum level of contamination of nuclear material being transferred by isotope {sup 232}U for the given isotope composition of the initial fuel is obtained. The concept of further investigations of the degree of security of export deliveries of fuel assemblies with recycled uranium intended for light-water reactors is suggested.

  19. sup 3 P Hg, Cd, and Zn photosensitized chemistry of vinyl halides in krypton matrix

    SciTech Connect (OSTI)

    Cartland, H.E.; Pimentel, G.C. )

    1990-01-25

    The reaction of group IIB metals in the {sup 3}P state with vinyl fluoride, chloride, and bromide is studied in krypton matrix. The primary process in all cases is hydrogen halide elimination to form a hydrogen halide/acetylene hydrogen-bonded complex. Insertion of metal atoms into C-Cl and C-Br bonds, but not into C-H and C-F bonds, is also observed. The insertion photochemistry can be explained by a mechanism which requires that the process occur on a triplet surface with the vinyl halide in the planar ground-state conformation.

  20. Two-photon pumped lead halide perovskite nanowire lasers

    E-Print Network [OSTI]

    Gu, Zhiyuan; Sun, Wenzhao; Li, Jinakai; Liu, Shuai; Song, Qinghai; Xiao, Shumin

    2015-01-01

    Solution-processed lead halide perovskites have shown very bright future in both solar cells and microlasers. Very recently, the nonlinearity of perovskites started to attract considerable research attention. Second harmonic generation and two-photon absorption have been successfully demonstrated. However, the nonlinearity based perovskite devices such as micro- & nano- lasers are still absent. Here we demonstrate the two-photon pumped nanolasers from perovskite nanowires. The CH3NH3PbBr3 perovskite nanowires were synthesized with one-step solution self-assembly method and dispersed on glass substrate. Under the optical excitation at 800 nm, two-photon pumped lasing actions with periodic peaks have been successfully observed at around 546 nm. The obtained quality (Q) factors of two-photon pumped nanolasers are around 960, and the corresponding thresholds are about 674?J=cm2. Both the Q factors and thresholds are comparable to conventional whispering gallery modes in two-dimensional polygon microplates. Ou...

  1. Enhanced Quantum Efficiency From Hybrid Cesium Halide/Copper Photocathode

    SciTech Connect (OSTI)

    Kong, Lingmei; Joly, Alan G.; Droubay, Timothy C.; Gong, Yu; Hess, Wayne P.

    2014-04-28

    The quantum efficiency of Cu is found to increase dramatically when coated by a CsI film and then irradiated by a UV laser. Over three orders of magnitude quantum efficiency enhancement at 266 nm is observed in CsI/Cu(100), indicating potential application in future photocathode devices. Upon laser irradiation, a large work function reduction to a value less than 2 eV is also observed, significantly greater than for similarly treated CsBr/Cu(100). The initial QE enhancement, prior to laser irradiation, is attributed to interface interaction, surface cleanliness and the intrinsic properties of the Cs halide film. Further QE enhancement following activation is attributed to formation of inter-band states and Cs metal accumulation at the interface induced by laser irradiation.

  2. Negishi Coupling of Secondary Alkylzinc Halides with Aryl Bromides and Chlorides

    E-Print Network [OSTI]

    Han, Chong

    An efficient palladium-catalyzed process has been developed for Negishi coupling of secondary alkylzinc halides with a wide range of aryl bromides and activated aryl chlorides. A palladium catalyst composed of a new ...

  3. Size-dependent Photon Emission from Organometal Halide Perovskite Nanocrystals Embedded in an Organic Matrix

    E-Print Network [OSTI]

    Di, Dawei; Musselman, Kevin P.; Li, Guangru; Sadhanala, Aditya; Ievskaya, Yulia; Song, Qilei; Tan, Zhi-Kuang; Lai, May Ling; MacManus-Driscoll, Judith L.; Greenham, Neil C.; Friend, Richard H.

    2015-01-14

    In recent years, organometal halide perovskite materials have attracted significant research interest in the field of optoelectronics. Here we introduce a simple and low temperature route for the formation of self-assembled perovskite nanocrystals...

  4. Methods for synthesizing alane without the formation of adducts and free of halides

    DOE Patents [OSTI]

    Zidan, Ragaiy; Knight, Douglas A; Dinh, Long V

    2013-02-19

    A process is provided to synthesize an alane without the formation of alane adducts as a precursor. The resulting product is a crystallized .alpha.-alane and is a highly stable product and is free of halides.

  5. A Solid-State 199Hg NMR Study of Mercury Halides

    E-Print Network [OSTI]

    Taylor, Robert E; Bai, Shi; Dybowski, Cecil

    2011-01-01

    550 (1998), 89-99. [25] R. E. Taylor, C. T. Carver, R. E.7 (1997), 333-336. [33] R. E. Taylor, Concepts Magn. Reson.Study of Mercury Halides R. E. Taylor 1 *, Shi Bai 2 , and

  6. NNSA Announces 2014 Security Professional of the Year Awards...

    National Nuclear Security Administration (NNSA)

    Nuclear Materials Safeguards and Security Upgrade Project (NMSSUP) Phase II sensors, lighting, fences, and entry control facilities. NMSSUP delivered security improvements to Los...

  7. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  8. A mechanistic study of aryl halide reactions with lithium aluminum hydride 

    E-Print Network [OSTI]

    Chung, Fu-Fan

    1980-01-01

    A M:"CHA~JISTIC STUDv OF ARYL HALID RHAC IC~JS ' ITH LITHIUM ALUM 'J"M HYDRIDE A Thesis FU-FAJJ CHUI'JG Submitted to the Graduate College of Texas ARM University in nartial fulfillment of the reauirement for the degree of MASTER OF SCI- JC... August Jo80 Major Subject: Chemistry A MECHANISTIC STUDY OF ARYL HALIDE REACTIONS 1'IITH LITHIUM ALUMINUM HYDRIDE A Thesis by FU-FAN CHUNG Approved as to style and content by; (Chairman of Co ittee) (Member) , . 7 1 (Member) (Member) i (Head...

  9. Preferential Eu Site Occupation and Its Consequences in the Ternary Luminescent HalidesAB2I5:Eu2+(A=Li–Cs;B=Sr, Ba)

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Fang, C.? M.; Biswas, Koushik

    2015-07-22

    Several rare-earth-doped, heavy-metal halides have recently been identified as potential next-generation luminescent materials with high efficiency at low cost. AB2I5:Eu2+ (A=Li–Cs; B=Sr, Ba) is one such family of halides. Its members, such as CsBa2I5:Eu2+ and KSr2I5:Eu2+, are currently being investigated as high-performance scintillators with improved sensitivity, light yield, and energy resolution less than 3% at 662 keV. Within the AB2I5 family, our first-principles-based calculations reveal two remarkably different trends in Eu site occupation. The substitutional Eu ions occupy both eightfold-coordinated B1(VIII) and the sevenfold-coordinated B2(VII) sites in the Sr-containing compounds. However, in the Ba-containing crystals, Eu ions strongly prefer themore »B2(VII)sites. This random versus preferential distribution of Eu affects their electronic properties. The calculations also suggest that in the Ba-containing compounds one can expect the formation of Eu-rich domains. These results provide atomistic insight into recent experimental observations about the concentration and temperature effects in Eu-doped CsBa2I5. We discuss the implications of our results with respect to luminescent properties and applications. We also hypothesize Sr, Ba-mixed quaternary iodides ABaVIIISrVIII5:Eu as scintillators having enhanced homogeneity and electronic properties.« less

  10. Palladium-catalyzed reaction of allyl halides with a-diazocarbonyl Shufeng Chen and Jianbo Wang*

    E-Print Network [OSTI]

    Wang, Jianbo

    Palladium-catalyzed reaction of allyl halides with a-diazocarbonyl compoundsw Shufeng Chen-Allylic palladium complexes are important intermediates in palladium-catalyzed reactions.1 The p-allylic palladium,3-dicarbonyl compounds.2 In connection to our recent interest in the palladium-catalyzed reaction of diazo

  11. A VIBRATIONAL SPECTROSCOPIC STUDY OF AQUEOUS HYDROGEN HALIDE SOLUTIONS: APPLICATION TO ATMOSPHERIC AEROSOL CHEMISTRY

    E-Print Network [OSTI]

    Heterogeneous reactions on the surfaces of atmospheric aerosols play an important role in atmospheric chemistryA VIBRATIONAL SPECTROSCOPIC STUDY OF AQUEOUS HYDROGEN HALIDE SOLUTIONS: APPLICATION TO ATMOSPHERIC AEROSOL CHEMISTRY A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master

  12. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  13. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  14. Electroluminescence from Organometallic Lead Halide Perovskite - Conjugated Polymer Diodes

    E-Print Network [OSTI]

    Sadhanala, Aditya; Kumar, Abhishek; Pathak, Sandeep; Rao, Akshay; Steiner, Ullrich; Greenham, Neil C.; Snaith, Henry J.; Friend, Richard H.

    2015-02-19

    Organometallic lead perovskite-based solar cells can be converted to light-emitting diodes by engineering the current density. Diodes are fabricated with adjacent perovskite and conjugated polymer layers using orthogonal solvents. Under forward bias...

  15. GATEWAY Demonstrations: Trial Demonstration of Area Lighting Retrofit, Yuma Border Patrol, Yuma, Arizona

    SciTech Connect (OSTI)

    Wilkerson, A. M.; McCullough, J. J.

    2014-12-31

    Along the Yuma Sector Border Patrol Area in Yuma, Arizona, the GATEWAY program conducted a trial demonstration in which the incumbent quartz metal halide area lighting was replaced with LED at three pole locations at the Yuma Sector Border Patrol Area in Yuma, Arizona. The retrofit was documented to better understand LED technology performance in high-temperature environments.

  16. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  17. Enhanced open voltage of BiFeO{sub 3} polycrystalline film by surface modification of organolead halide perovskite

    SciTech Connect (OSTI)

    Zhao, Pengjun; Bian, Liang; Xu, Jinbao Chang, Aimin; Wang, Lei

    2014-07-07

    Inorganic-organolead halide perovskite CH{sub 3}NH{sub 3}PbI{sub 3} modified BiFeO{sub 3} polycrystalline film has been established. The composite photoelectrode presents much larger open voltage and several magnitudes superior photoelectric conversion performance in comparison to the ordinary BiFeO{sub 3} polycrystalline film. The I-V curve shows that the short-circuit current (J{sub sc}) is 1.74?mA·cm{sup ?2} and open-circuit voltage (V{sub oc}) is 1.62?V, the device's photon to current efficiency is over 1%. The large open voltage and high photovoltaic efficiency is believed to attributed to the spontaneous polarization of composite perovskite induced by BiFeO{sub 3} lattice and modified reduced work function of the modified BiFeO{sub 3} surface. Our results clearly show that the present BiFeO{sub 3}-CH{sub 3}NH{sub 3}PbI{sub 3} planar device is capable to generate a large voltage in macro scale under visible light, leading an approach to further applications on photodetectors and optoelectronic switch.

  18. Ligand-Controlled Palladium-Catalyzed Regiodivergent Suzuki–Miyaura Cross-Coupling of Allylboronates and Aryl Halides

    E-Print Network [OSTI]

    Yang, Yang

    An orthogonal set of catalyst systems has been developed for the Suzuki–Miyaura coupling of 3,3-disubstituted and 3-monosubstituted allylboronates with (hetero)aryl halides. These methods allow for the highly selective ...

  19. High Photoluminescence E?ciency and Optically Pumped Lasing in Solution-Processed Mixed Halide Perovskite Semiconductors

    E-Print Network [OSTI]

    Deschler, Felix; Price, Michael; Pathak, Sandeep; Klintberg, Lina E.; Jarausch, David-Dominik; Higler, Ruben; Hu?ttner, Sven; Leijtens, Tomas; Stranks, Samuel D.; Snaith, Henry J.; Atatu?re, Mete; Phillips, Richard T.; Friend, Richard H.

    2014-03-24

    The study of the photo-physical properties of organic-metallic lead-halide perovskites, which demonstrate excellent photovoltaic performance in devices with electron- and hole-accepting layers, helps to understand their charge photo...

  20. Palladium-Catalyzed Hydroxylation of Aryl and Heteroaryl Halides Enabled by the Use of a Palladacycle Precatalyst

    E-Print Network [OSTI]

    Cheung, Chi Wai

    A method for the hydroxylation of aryl and heteroaryl halides, promoted by a catalyst based on a biarylphosphine ligand tBuBrettPhos (L5) and its corresponding palladium precatalyst (1), is described. The reactions allow ...

  1. Method for hydrocracking a heavy polynuclear hydrocarbonaceous feedstock in the presence of a molten metal halide catalyst

    DOE Patents [OSTI]

    Gorin, Everett (San Rafael, CA)

    1981-01-01

    A method for hydrocracking a heavy polynuclear hydrocarbonaceous feedstock to produce lighter hydrocarbon fuels by contacting the feedstock with hydrogen in the presence of a molten metal halide catalyst, the method comprising: mixing the feedstock with a heavy naphtha fraction which has an initial boiling point from about 100.degree. to about 160.degree. C. with a boiling point difference between the initial boiling point and the final boiling point of no more than about 50.degree. C. to produce a mixture; thereafter contacting the mixture with partially spent molten metal halide and hydrogen under temperature and pressure conditions so that the temperature is near the critical temperature of the heavy naphtha fraction; separating at least a portion of the heavy naphtha fraction and lighter hydrocarbon fuels from the partially spent molten metal halide, unreacted feedstock and reaction products; thereafter contacting the partially spent molten metal halide, unreacted feedstock and reaction products with hydrogen and fresh molten metal halide in a hydrocracking zone to produce additional lighter hydrocarbon fuels and separating at least a major portion of the lighter hydrocarbon fuels from the spent molten metal halide.

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  4. Investigation into Nanostructured Lanthanum Halides and CeBr{sub 3} for Nuclear Radiation Detection

    SciTech Connect (OSTI)

    Guss, P., Guise, R., Mukhopadhyay, S., Yuan, D.

    2011-06-22

    This slide-show presents work on radiation detection with nanostructured lanthanum halides and CeBr{sub 3}. The goal is to extend the gamma energy response on both low and high-energy regimes by demonstrating the ability to detect low-energy x-rays and relatively high-energy activation prompt gamma rays simultaneously using the nano-structured lanthanum bromide, lanthanum fluoride, cerium bromide, or other nanocrystal material. Homogeneous and nano structure cases are compared.

  5. Metal Halide Surface Treatment of Quantum Dots - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on dark matter ByMentor-ProtegeFrom the Director HereMetal

  6. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec

    2014-08-31

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  7. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  8. Halide-Dependent Electronic Structure of Organolead Perovskite Andrei Buin, Riccardo Comin, Jixian Xu, Alexander H. Ip, and Edward H. Sargent*

    E-Print Network [OSTI]

    Sargent, Edward H. "Ted"

    Halide-Dependent Electronic Structure of Organolead Perovskite Materials Andrei Buin, Riccardo Engineering, University of Toronto, Toronto, Ontario, Canada M5S 3G4 ABSTRACT: Organometal halide perovskites perovskite-based photovoltaic technology. In addition to this, the performance of perovskite-based devices

  9. Fabrication of large-volume, low-cost ceramic lanthanum halide scintillators for gamma ray detection : final report for DHS/DNDO/TRDD project TA-01-SL01.

    SciTech Connect (OSTI)

    Boyle, Timothy J.; Ottley, Leigh Anna M.; Yang, Pin; Chen, Ching-Fong; Sanchez, Margaret R.; Bell, Nelson Simmons

    2008-10-01

    This project uses advanced ceramic processes to fabricate large, optical-quality, polycrystalline lanthanum halide scintillators to replace small single crystals produced by the conventional Bridgman growth method. The new approach not only removes the size constraint imposed by the growth method, but also offers the potential advantages of both reducing manufacturing cost and increasing production rate. The project goal is to fabricate dense lanthanum halide ceramics with a preferred crystal orientation by applying texture engineering and solid-state conversion to reduce the thermal mechanical stress in the ceramic and minimize scintillation light scattering at grain boundaries. Ultimately, this method could deliver the sought-after high sensitivity and <3% energy resolution at 662 keV of lanthanum halide scintillators and unleash their full potential for advanced gamma ray detection, enabling rapid identification of radioactive materials in a variety of practical applications. This report documents processing details from powder synthesis, seed particle growth, to final densification and texture development of cerium doped lanthanum bromide (LaBr{sub 3}:Ce{sup +3}) ceramics. This investigation demonstrated that: (1) A rapid, flexible, cost efficient synthesis method of anhydrous lanthanum halides and their solid solutions was developed. Several batches of ultrafine LaBr{sub 3}:Ce{sup +3} powder, free of oxyhalide, were produced by a rigorously controlled process. (2) Micron size ({approx} 5 {micro}m), platelet shape LaBr{sub 3} seed particles of high purity can be synthesized by a vapor phase transport process. (3) High aspect-ratio seed particles can be effectively aligned in the shear direction in the ceramic matrix, using a rotational shear-forming process. (4) Small size, highly translucent LaBr{sub 3} (0.25-inch diameter, 0.08-inch thick) samples were successfully fabricated by the equal channel angular consolidation process. (5) Large size, high density, translucent LaBr{sub 3} ceramics samples (3-inch diameter, > 1/8-inch thick) were fabricated by hot pressing, demonstrating the superior manufacturability of the ceramic approach over single crystal growth methods in terms of size capability and cost. (6) Despite all these advances, evidence has shown that LaBr{sub 3} is thermally unstable at temperatures required for the densification process. This is particularly true for material near the surface where lattice defects and color centers can be created as bromine becomes volatile at high temperatures. Consequently, after densification these samples made using chemically prepared ultrafine powders turned black. An additional thermal treatment in a flowing bromine condition proved able to reduce the darkness of the surface layer for these densified samples. These observations demonstrated that although finer ceramic powders are desirable for densification due to a stronger driving force from their large surface areas, the same desirable factor can lead to lattice defects and color centers when these powders are densified at higher temperatures where material near the surface becomes thermally unstable.

  10. Band gaps and structural properties of graphene halides and their derivates: A hybrid functional study with localized orbital basis sets

    E-Print Network [OSTI]

    Karlický, František; Otyepka, Michal; 10.1063/1.4736998

    2012-01-01

    DFT calculations of the electronic structure of graphane and stoichiometrically halogenated graphene derivatives (fluorographene and other analogous graphene halides) show (i) localized orbital basis sets can be successfully and effectively used for such 2D materials; (ii) several functionals predict that the band gap of graphane is greater than that of fluorographene, whereas HSE06 gives the opposite trend; (iii) HSE06 functional predicts quite good values of band gaps w.r.t benchmark theoretical and experimental data; (iv) the zero band gap of graphene is opened by hydrogenation and halogenation and strongly depends on the chemical composition of mixed graphene halides; (v) the stability of graphene halides decreases sharply with increasing size of the halogen atom - fluorographene is stable, whereas graphene iodide spontaneously decomposes. In terms of band gap and stability, the C2FBr, and C2HBr derivatives seem to be promising materials, e.g., for (opto)electronics applications, because their band gaps a...

  11. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  12. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  13. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  14. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  15. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  16. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  17. Transition metal ion-assisted photochemical generation of alkyl halides and hydrocarbons from carboxylic acids

    SciTech Connect (OSTI)

    Carraher, Jack; Pestovsky, Oleg; Bakac, Andreja

    2012-03-14

    Near-UV photolysis of aqueous solutions of propionic acid and aqueous Fe3+ in the absence of oxygen generates a mixture of hydrocarbons (ethane, ethylene and butane), carbon dioxide, and Fe2+. The reaction becomes mildly catalytic (about five turnovers) in the presence of oxygen which converts a portion of alkyl radicals to oxidizing intermediates that reoxidize Fe2+. The photochemistry in the presence of halide ions (X? = Cl?, Br?) generates ethyl halides via halogen atom abstraction from FeXn3?n by ethyl radicals. Near-quantitative yields of C2H5X are obtained at ?0.05 M X?. Competition experiments with Co(NH3)5Br2+ provided kinetic data for the reaction of ethyl radicals with FeCl2+ (k = (4.0 ± 0.5) × 106 M?1 s?1) and with FeBr2+ (k = (3.0 ± 0.5) × 107 M?1 s?1). Photochemical decarboxylation of propionic acid in the presence of Cu2+ generates ethylene and Cu+. Longer-chain acids also yield alpha olefins as exclusive products. These reactions become catalytic under constant purge with oxygen which plays a dual role. It reoxidizes Cu+ to Cu2+, and removes gaseous olefins to prevent accumulation of Cu+(olefin) complexes and depletion of Cu2+. The results underscore the profound effect that the choice of metal ions, the medium, and reaction conditions exert on the photochemistry of carboxylic acids.

  18. Calcium manganate: A promising candidate as buffer layer for hybrid halide perovskite photovoltaic-thermoelectric systems

    SciTech Connect (OSTI)

    Zhao, Pengjun; Wang, Hongguang; Kong, Wenwen; Xu, Jinbao Wang, Lei; Ren, Wei; Bian, Liang; Chang, Aimin

    2014-11-21

    We have systematically studied the feasibility of CaMnO{sub 3} thin film, an n-type perovskite, to be utilized as the buffer layer for hybrid halide perovskite photovoltaic-thermoelectric device. Locations of the conduction band and the valence band, spontaneous polarization performance, and optical properties were investigated. Results indicate the energy band of CaMnO{sub 3} can match up well with that of CH{sub 3}NH{sub 3}PbI{sub 3} on separating electron-hole pairs. In addition, the consistent polarization angle helps enlarge the open circuit voltage of the composite system. Besides, CaMnO{sub 3} film shows large absorption coefficient and low extinction coefficient under visible irradiation, demonstrating high carrier concentration, which is beneficial to the current density. More importantly, benign thermoelectric properties enable CaMnO{sub 3} film to assimilate phonon vibration from CH{sub 3}NH3PbI{sub 3}. All the above features lead to a bright future of CaMnO{sub 3} film, which can be a promising candidate as a buffer layer for hybrid halide perovskite photovoltaic-thermoelectric systems.

  19. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  20. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Challenges of Cyber Security Education at the

    E-Print Network [OSTI]

    Sandhu, Ravi

    for Graduate education in many high-tech high What is special about cyber security? Inertia will not fix-Leading Research with Real This is a challenge for Graduate education tech high-touch areas. What is special about with Real-World Impact! #12;Graduate Cyber Security Education Tech- Light Tech- Medium World

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  7. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  8. High lumen compact fluorescents boost light output in new fixtures

    SciTech Connect (OSTI)

    1992-12-31

    Some compact fluorescent lamps aren`t so compact. General Electric (GE), OSRAM, and Philips have been expanding offerings in longer, more powerful, hard wired CFLs that generate enough light to serve applications once limited to conventional fluorescents and metal halide systems. All three of these manufacturers have for some time offered 18- to 40-watt high-output CFLs, which use a fluorescent tube doubled back on itself to produce a lot of light in a compact source. Now GE has introduced an even larger, more powerful 50-watt unit, and OSRAM is soon to follow suit with a 55-watt lamp. These new entries to the field of turbocharged CFLs can provide general lighting at ceiling heights of 12 feet or more as well as indirect lighting, floodlighting, and wall washing. They are such a concentrated source of light that they can provide the desired illumination using fewer lamps and fixtures than would be needed with competing sources.

  9. Ultrabroadband Quantum-Secured Communication

    E-Print Network [OSTI]

    Quntao Zhuang; Zheshen Zhang; Justin Dove; Franco N. C. Wong; Jeffrey H. Shapiro

    2015-08-06

    We propose a two-way secure-communication protocol in which Alice uses an amplified spontaneous emission source while Bob employs binary phase-shift keying and an optical amplifier. Against an eavesdropper who captures all the light lost in fibers linking Alice and Bob, this protocol is capable of 3.5 Gbps quantum-secured direct communication at 50 km range. If Alice augments her terminal with a spontaneous parametric downconverter and both Alice and Bob add channel monitors, they can realize 2 Gbps quantum key distribution at that range against an eavesdropper who injects her own light into Bob's terminal. Compared with prevailing quantum key distribution methods, this protocol has the potential to significantly increase secure key rates at long distances by employing many ultrabroadband photons per key bit to mitigate channel loss.

  10. Spatial and time-dependent distribution of plasma parameters in the metal-halide arc lamp

    E-Print Network [OSTI]

    Khakhaev, A; Ekimov, K; Soloviev, A; Khakhaev, Anatoly; Luizova, Lidia; Ekimov, Konstantin; Soloviev, Alexey

    2004-01-01

    It was shown by several authors that closed high pressure arc a.c. discharge in mercury vapors with addition of metal halide cannot be described in frames of the local thermodynamic equilibrium (LTE) model. However some plasma parameters (electron and high lying excited states densities as well as Hg metastable levels densities) are assumed to be in equilibrium with electron temperature and these assumptions are applied in plasma diagnostics. To verify these supposition the method of local plasma spectroscopy based on spatial and temporal distribution of spectral line profiles was developed. The experimental set up is based on diffraction spectrometer with large aperture, spatial scanning device and photodetector, which allows to carry out the measurements in chosen phases of current period. The software for data acquisition and processing is based on LabVIEW system. The original method of joint data processing was applied to data arrays containing spatial, spectral and temporal distribution of a source surfa...

  11. Many exterior entry lights in residential and commercial applications use two-

    E-Print Network [OSTI]

    , and replacement CFLs are not widely stocked. The Light-Emitting Diode (LED) Hybrid Security Fixture combines

  12. Nickel-catalyzed cross-couplings of unactivated secondary and tertiary alkyl halides and photoinduced copper-mediated asymmetric C-N cross-couplings

    E-Print Network [OSTI]

    Zultanski, Susan L. (Susan Lyn)

    2013-01-01

    Chapter 1 describes the development of two nickel-catalyzed Suzuki cross-coupling methodologies that employ alkyl halides as electrophiles. In Section 1.1, asymmetric [gamma]-alkylation relative to a carbonyl group is ...

  13. Light-Light Scattering

    E-Print Network [OSTI]

    Naohiro Kanda

    2011-06-03

    For a long time, it is believed that the light by light scattering is described properly by the Lagrangian density obtained by Heisenberg and Euler. Here, we present a new calculation which is based on the modern field theory technique. It is found that the light-light scattering is completely different from the old expression. The reason is basically due to the unphysical condition (gauge condition) which was employed by the QED calcualtion of Karplus and Neumann. The correct cross section of light-light scattering at low energy of $(\\frac{\\omega}{m} \\ll 1)$ can be written as $ \\displaystyle{\\frac{d\\sigma}{d\\Omega}=\\frac{1}{(6\\pi)^2}\\frac{\\alpha^4} {(2\\omega)^2}(3+2\\cos^2\\theta +\\cos^4\\theta)}$.

  14. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  15. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  16. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  17. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  1. Highly efficient light management for perovskite solar cells

    E-Print Network [OSTI]

    Wang, Dong-Lin; Hou, Guo-Jiao; Zhu, Zhen-Gang; Yan, Qing-Bo; Su, Gang

    2015-01-01

    Organic-inorganic halide perovskite solar cells have enormous potential to impact the existing photovoltaic industry. As realizing a higher conversion efficiency of the solar cell is still the most crucial task, a great number of schemes were proposed to minimize the carrier loss by optimizing the electrical properties of the perovskite solar cells. Here, we focus on another significant aspect that is to minimize the light loss by optimizing the light management to gain a high efficiency for perovskite solar cells. In our scheme, the slotted and inverted prism structured SiO2 layers are adopted to trap more light into the solar cells, and a better transparent conducting oxide layer is employed to reduce the parasitic absorption. For such an implementation, the efficiency and the serviceable angle of the perovskite solar cell can be promoted impressively. This proposal would shed new light on developing the high-performance perovskite solar cells.

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  5. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  6. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  7. Calcium looping process for high purity hydrogen production integrated with capture of carbon dioxide, sulfur and halides

    DOE Patents [OSTI]

    Ramkumar, Shwetha; Fan, Liang-Shih

    2013-07-30

    A process for producing hydrogen comprising the steps of: (i) gasifying a fuel into a raw synthesis gas comprising CO, hydrogen, steam, sulfur and halide contaminants in the form of H.sub.2S, COS, and HX, wherein X is a halide; (ii) passing the raw synthesis gas through a water gas shift reactor (WGSR) into which CaO and steam are injected, the CaO reacting with the shifted gas to remove CO.sub.2, sulfur and halides in a solid-phase calcium-containing product comprising CaCO.sub.3, CaS and CaX.sub.2; (iii) separating the solid-phase calcium-containing product from an enriched gaseous hydrogen product; and (iv) regenerating the CaO by calcining the solid-phase calcium-containing product at a condition selected from the group consisting of: in the presence of steam, in the presence of CO.sub.2, in the presence of synthesis gas, in the presence of H.sub.2 and O.sub.2, under partial vacuum, and combinations thereof.

  8. Nanostructured Lanthanum Halides and CeBr3 for Nuclear Radiation and Detection

    SciTech Connect (OSTI)

    Paul Guss, Sanjoy Mukhopadhyay, Ron Guise, Ding Yuan

    2010-06-09

    Scintillator materials are used to detect, and in some cases identify, gamma rays. Higher performance scintillators are expensive, hard to manufacture, fragile, and sometimes require liquid nitrogen or cooling engines. But whereas lower-quality scintillators are cheap, easy to manufacture, and more rugged, their performance is lower. At issue: can the desirable qualities of high-and low-performance scintillators be combined to achieve better performance at lower cost? Preliminary experiments show that a LaF{sub 3}:Ce oleic acid-based nanocomposite exhibits a photopeak when exposed to {sup 137}Cs source gamma-radiation. The chemical synthesis of the cerium-doped lanthanum halide nanoparticles are scalable and large quantities of material can be produced at a time, unlike typical crystal growth processes such as the Bridgeman process. Using a polymer composite (Figure 1), produced by LANL, initial measurements of the unloaded and 8% LaF{sub 3}:Ce-loaded sample have been made using {sup 137}Cs sources. Figure 2 shows an energy spectrum acquired for CeF{sub 3}. The lighter plot is the measured polymer-only spectrum and the black plot is the spectrum from the nanocomposite scintillator. As the development of this material continues, the energy resolution is expected to improve and the photopeak-to-Compton ratio will become greater at higher loadings. These measurements show the expected Compton edge in the polymer-only sample, and the Compton edge and photo-peak expected in the nanophosphor composites that LANL has produced. Using a porous VYCORR with CdSe/ZnS core shell quantum dots, Letant has demonstrated that he has obtained signatures of the 241Am photopeak with energy resolution as good at NaI (Figure 3). We begin with the fact that CeBr{sub 3} crystals do not have a self-activity component as strong as the lanthanum halides. The radioactive 0.090% {sup 138}La component of lanthanum leads to significant self-activity, which will be a problem for very large detector volumes. Yet a significant strength of the nanostructure detector concept is the ability to create extremely large detector volumes by mixing nanoparticles into a transparent matrix. This would argue for use of nanoparticles other than lanthanum halides. Nanocomposites are easy to prepare; it is much less costly to use nanocomposites than to grow large whole crystals of these materials. The material can be fabricated at an industrial scale, further reducing cost. This material potentially offers the performance of $300/cc material (e.g., lanthanum bromide) at a cost of $1/cc. Because the material acts as a plastic, it is rugged and flexible, and can be made in large sheets, increasing the sensitivity of a detector using it. It would operate at ambient temperatures. Very large volumes of detector may be produced at greatly reduced cost, enhancing the non-proliferation posture of the nation for the same dollar value.

  9. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  10. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  13. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  14. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  15. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  16. Radiation-induced defects in GaN bulk grown by halide vapor phase epitaxy

    SciTech Connect (OSTI)

    Duc, Tran Thien; Pozina, Galia; Son, Nguyen Tien; Janzén, Erik; Hemmingsson, Carl; Ohshima, Takeshi

    2014-09-08

    Defects induced by electron irradiation in thick free-standing GaN layers grown by halide vapor phase epitaxy were studied by deep level transient spectroscopy. In as-grown materials, six electron traps, labeled D2 (E{sub C}–0.24?eV), D3 (E{sub C}–0.60?eV), D4 (E{sub C}–0.69?eV), D5 (E{sub C}–0.96?eV), D7 (E{sub C}–1.19?eV), and D8, were observed. After 2?MeV electron irradiation at a fluence of 1?×?10{sup 14?}cm{sup ?2}, three deep electron traps, labeled D1 (E{sub C}–0.12?eV), D5I (E{sub C}–0.89?eV), and D6 (E{sub C}–1.14?eV), were detected. The trap D1 has previously been reported and considered as being related to the nitrogen vacancy. From the annealing behavior and a high introduction rate, the D5I and D6 centers are suggested to be related to primary intrinsic defects.

  17. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  18. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  1. Trial Demonstration of Area Lighting Retrofit: Yuma Border Patrol, Yuma Arizona

    SciTech Connect (OSTI)

    Wilkerson, Andrea M.; McCullough, Jeffrey J.

    2014-12-30

    The Yuma Sector Border Patrol Area is a high flux lighting application in a high temperature environment, presenting a formidable challenge for light-emitting diodes (LEDs). This retrofit is an Energy Savings Performance Contract ENABLE project under the U.S. Department of Energy (DOE) Federal Energy Management Program. If high flux LED technology performs well in a region with high ambient temperature and solar radiation, it can perform well in most outdoor environments. The design process for the Yuma retrofit has already provided valuable knowledge to CBP and DOE. The LED lighting system selected for the retrofit is expected to reduce energy consumption 69% compared to the incumbent quartz metal halide (QMH) lighting system. If the LED lighting system is installed, GATEWAY will continue to document and disseminate information regarding the installation and long-term performance so that others may also gain valuable knowledge from the Yuma Sector Border Patrol Area lighting retrofit.

  2. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  3. Methyl halide and biogenic volatile organic compound fluxes from perennial bioenergy crops and annual arable crops 

    E-Print Network [OSTI]

    Morrison, Eilidh Christina

    2013-11-28

    The depletion of fossil fuel resources, pollution concerns and the challenge of energy security are driving the search for renewable energy sources. The use of lignocellulosic plant biomass as an energy source is increasing ...

  4. Smart Lighting Controller!! Smart lighting!

    E-Print Network [OSTI]

    Anderson, Betty Lise

    'll build the circuit! We'll use an LED to represent the room lights! #12;4! Block diagram! Battery! Rail! #12;23! LED: light-emitting diode! Diode conducts current in only one direction! When current flows1! Smart Lighting Controller!! #12;2! Smart lighting! No need to spend energy lighting the room if

  5. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  6. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  7. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  8. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  9. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  10. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  11. Chemistry of gaseous lower halides of uranium. Technical progress report, 1 September 1979-1 April 1980

    SciTech Connect (OSTI)

    Hildenbrand, D.L.

    1980-04-15

    The gaseous uranium species UF, UF/sub 2/, UF/sub 3/, and UF/sub 4/ were generated in effusion cell beams by vaporization of UF/sub 4/(s) under reducing conditions, and they were identified and studied by mass spectrometry. From extensive second-law studies of reaction equilibria involving these species and several reaction partners used as reference standards, the individual bond dissociation energies and standard enthalpies of formation of the U-F species were derived. Reaction entropies derived from the slope data indicate that the electronic entropies of the U-F species are substantial, and are comparable to or larger than that of atomic uranium. Additional thermochemical measurements were made to establish the properties of several Ag and Cu monohalides that have been or will be used as reference standards in the uranium halide measurements. From studies of the sublimation and decomposition of uranyl fluoride, UO/sub 2/F/sub 2/(s), the enthalpy of sublimation of UO/sub 2/F/sub 2/(g), has been determined, and another gaseous oxyfluoride, UOF/sub 4/(g), has been tentatively identified. The gaseous products of decomposition of UO/sub 2/F/sub 2/(s) observed by mass spectrometry differ from those postulated by other investigators, indicating that the mechanism of decomposition has not been clearly established. A search of the thermochemical literature on uranium halides has been completed.

  12. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  13. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  15. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  16. Halide, Chromate, and Phosphate Impacts on LAW Glass for Dynamic Flowsheet 24590-WTP-MCR-PET-09-0037, Rev. 1

    SciTech Connect (OSTI)

    Gimpel, Rodney F.; Kruger, Albert A.

    2013-12-16

    Revision 1 of this Model Change Request changed Equation 6 in Attachment Al only. Melter studies have shown that halide, chromium, and phosphates can cause precipitation of solids that can interfer the melting process. Pilot melter data now shows what concentrations LAW glass can tolerate. These limits shall be incorporated into the existing LAW glass algorithm per Attachment Al.

  17. 1302 J. Phys. Chem. 1981, 85,1302-1305 PhotochemicalIsotope Separation of Hg-196 by Reaction with Hydrogen Halides

    E-Print Network [OSTI]

    chloride as substrate with added butadiene. The enrichment is definedhere asthe finalisotopicabundanceover amounts of the hydrogen halide (HC1,HBr, or HI) gas to be mixed with a fractional amount of l,&butadiene are of the highest purity commercially available (>99.9% for HC1). Before entry into the reaction cell, the butadiene

  18. Light Properties Light travels at the speed of light `c'

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    LIGHT!! #12;Light Properties Light travels at the speed of light `c' C = 3 x 108 m/s Or 190,000 miles/second!! Light could travel around the world about 8 times in one second #12;What is light?? Light is a "wave packet" A photon is a "light particle" #12;Electromagnetic Radiation and You Light is sometimes

  19. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  1. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  2. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  3. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  4. Lighting Research Group FinalReportOctober1999

    E-Print Network [OSTI]

    to improve the lighting quality and energy efficiency of the lighting system at the Social Security lighting quality, will provide an energy efficient solution and will be about the same cost as the direct Building in Richmond CA is being renovated. The firm of Beyez & Patel was retained to perform a site

  5. Optical emission spectroscopy of metal-halide lamps: Radially resolved atomic state distribution functions of Dy and Hg

    SciTech Connect (OSTI)

    Nimalasuriya, T.; Flikweert, A.J.; Stoffels, W.W.; Haverlag, M.; Mullen, J.J.A.M. van der; Pupat, N.B.M. [Department of Applied Physics, Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven (Netherlands); Ecole Nationale Superieure de Chimie de Paris, 11 Rue Pierre et Marie Curie, 75005 Paris (France)

    2006-03-01

    Absolute line intensity measurements are performed on a metal-halide lamp. Several transitions of atomic and ionic Dy and atomic Hg are measured at different radial positions from which we obtain absolute atomic and ionic Dy intensity profiles. From these profiles we construct the radially resolved atomic state distribution function (ASDF) of the atomic and ionic Dy and the atomic Hg. From these ASDFs several quantities are determined as functions of radial position, such as the (excitation) temperature, the ion ratio Hg{sup +}/Dy{sup +}, the electron density, the ground state, and the total density of Dy atoms and ions. Moreover, these ASDFs give us insight about the departure from equilibrium. The measurements show a hollow density profile for the atoms and the ionization of atoms in the center. In the outer parts of the lamp molecules dominate.

  6. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  7. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  8. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  9. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  10. Density functional theory study on the interstitial chemical shifts of main-group-element centered hexazirconium halide clusters; synthetic control of speciation in [(Zr6ZCl12)] (Z = B, C)-based mixed ligand complexes 

    E-Print Network [OSTI]

    Shen, Jingyi

    2005-08-29

    The correlation between NMR chemical shifts of interstitial atoms and electronic structures of boron- and carbon-centered hexazirconium halide clusters was investigated by density functional theory (DFT) calculation. The ...

  11. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  14. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  15. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  16. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  17. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  18. Cerenkov Light

    ScienceCinema (OSTI)

    Slifer, Karl

    2014-05-22

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  19. Cerenkov Light

    SciTech Connect (OSTI)

    Slifer, Karl

    2013-06-13

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  20. Lighting Renovations

    Broader source: Energy.gov [DOE]

    When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. Outlook for Light-Duty-Vehicle Fuel Demand | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Outlook for Light-Duty-Vehicle Fuel Demand Outlook for Light-Duty-Vehicle Fuel Demand Gasoline and distillate demand impact of the Energy Independance and Security Act of 2007...

  4. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  5. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  6. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  7. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  8. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  9. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  10. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  11. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  12. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  13. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  14. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  17. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  18. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  19. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  20. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  1. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  2. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  3. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  5. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  6. Lighting in the Library

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    by your library lights E Kilowatt-hours consumed by your library lights F Annual cost of operating your library lights H Current lighting index for your library ...

  7. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  8. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  9. Light's Darkness

    ScienceCinema (OSTI)

    Padgett, Miles [University of Glasgow, Glasgow, Scotland

    2010-01-08

    Optical vortices and orbital angular momentum are currently topical subjects in the optics literature. Although seemingly esoteric, they are, in fact, the generic state of light and arise whenever three or more plane waves interfere. To be observed by eye the light must be monochromatic. Laser speckle is one such example, where the optical energy circulates around each black spot, giving a local orbital angular momentum. This talk with report three on-going studies. First, when considering a volume of interfering waves, the laser specs map out threads of complete darkness embedded in the light. Do these threads form loops? Links? Or even knots? Second, when looking through a rapidly spinning window, the image of the world on the other side is rotated: true or false? Finally, the entanglement of orbital angular momentum states means measuring how the angular position of one photons sets the angular momentum of another: is this an angular version of the EPR (Einstein, Podolsky, and Rosen) paradox?

  10. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  11. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  12. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  13. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  14. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  16. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  18. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  20. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  1. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  3. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  4. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  5. Types of Lights Types of Lights

    E-Print Network [OSTI]

    1 Types of Lights Types of Lights q So far we have studied point lights ­ Radiate in all direc7ons q Other lights ­ Direc7onal lights (posi7on-independent) ­ Spotlights #12;2 Direc1onal Lights q Shine in a single, uniform direc7on q All rays

  6. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  7. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  8. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  9. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  10. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  11. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  12. Light Computing

    E-Print Network [OSTI]

    Gordon Chalmers

    2006-10-13

    A configuration of light pulses is generated, together with emitters and receptors, that allows computing. The computing is extraordinarily high in number of flops per second, exceeding the capability of a quantum computer for a given size and coherence region. The emitters and receptors are based on the quantum diode, which can emit and detect individual photons with high accuracy.

  13. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  14. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  18. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  19. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  20. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  1. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  2. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  3. Lead (II) selenite halides Pb{sub 3}(SeO{sub 3}){sub 2}X{sub 2} (X = Br, I): Synthesis and crystal structure

    SciTech Connect (OSTI)

    Berdonosov, P. S., E-mail: berdonosov@inorg.chem.msu.ru; Olenev, A. V.; Dolgikh, V. A. [Moscow State University (Russian Federation)

    2012-03-15

    Two lead selenite halides, Pb{sub 3}(SeO{sub 3}){sub 2}Br{sub 2} and Pb{sub 3}(SeO{sub 3}){sub 2}I{sub 2}, have been prepared by solid-phase synthesis and structurally characterized. These compounds are isotypic and can be considered 3D with a microporous framework composed of lead polyhedra (distorted Archimedean antiprisms formed by oxygen and halogen atoms). The framework contains channels oriented in the [010] direction. These channels contain selenium atoms, which are bound with framework oxygen atoms belonging to different lead polyhedra.

  4. On the Semantic Security of Functional Encryption Schemes Manuel Barbosa1 and Pooya Farshim2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and impossibility results for adaptive token-extraction attack scenarios that shed further light on the potential the equivalence result of O'Neill between indistinguishability and semantic security to restricted adaptive token, and hence natural approaches to prove its (restricted) adaptive security fail. This complements the equiv

  5. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  6. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  9. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  10. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  11. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  12. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  13. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  14. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  15. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  16. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  17. Enhanced Performance in Fluorene-Free Organometal Halide Perovskite Light Emitting Diodes using Tunable, Low Electron-Affinity Oxide Electron-Injectors

    E-Print Network [OSTI]

    Hoye, Robert L. Z.; Chua, Matthew R.; Musselman, Kevin P.; Li, Guangru; Lai, May-Ling; Tan, Zhi-Kuang; Greenham, Neil C.; MacManus-Driscoll, Judith L.; Friend, Richard H.; Credgington, Dan

    2015-01-09

    pyrolysis, which is the common method for producing metal oxides in hybrid LEDs, requires deposition temperatures >350 °C. This renders it incompatible with fl exible polymer substrates or direct deposi- tion onto perovskites. [ 3,18,19 ] In this work, we...

  18. Lighting system with thermal management system having point contact synthetic jets

    DOE Patents [OSTI]

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2013-12-10

    Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  19. Residential Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMassR&D100Nationalquestionnaires 0 Averagequestionnaires 7tniLighting Sign In

  20. EDA for Secure and Dependable Cybercars: Challenges and Opportunities

    E-Print Network [OSTI]

    EDA for Secure and Dependable Cybercars: Challenges and Opportunities Farinaz Koushanfar Electrical, but is also driven by the unprecedented levels of intra- and inter-car connections and communications as well they provide a gateway between modern cars and their surroundings (e.g., traffic lights), devices (e

  1. Adaptively Secure Coin-Flipping, Revisited Shafi Goldwasser1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this setting. We then shed light on the connection between adaptive and strongly adaptive adversariesAdaptively Secure Coin-Flipping, Revisited Shafi Goldwasser1 , Yael Tauman Kalai2 , and Sunoo Park3' bits, can tolerate t(n) = O( n) even in the presence of adaptive corruptions, and they conjectured

  2. LED Lighting Basics

    Broader source: Energy.gov [DOE]

    Light-Emitting diodes (LEDs) efficiently produce light in a fundamentally different way than any legacy or traditional source of light.

  3. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  4. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  5. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  6. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  7. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  8. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  9. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  10. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  11. Magnetic Transitions in Iron Porphyrin Halides by Inelastic Neutron Scattering and Ab-initio Studies of Zero-Field Splittings

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Stavretis, Shelby E.; Atanasov, Mihail; Podlesnyak, Andrey A.; Hunter, Seth C.; Neese, Frank; Xue, Zi-Ling

    2015-10-02

    Zero-field splitting (ZFS) parameters of nondeuterated metalloporphyrins [Fe(TPP)X] (X = F, Br, I; H2TPP = tetraphenylporphyrin) are determined by inelastic neutron scattering (INS). The ZFS values are D = 4.49(9) cm–1 for tetragonal polycrystalline [Fe(TPP)F], and D = 8.8(2) cm–1, E = 0.1(2) cm–1 and D = 13.4(6) cm–1, E = 0.3(6) cm–1 for monoclinic polycrystalline [Fe(TPP)Br] and [Fe(TPP)I], respectively. Along with our recent report of the ZFS value of D = 6.33(8) cm–1 for tetragonal polycrystalline [Fe(TPP)Cl], these data provide a rare, complete determination of ZFS parameters in a metalloporphyrin halide series. The electronic structure of [Fe(TPP)X] (X =more »F, Cl, Br, I) has been studied by multireference ab initio methods: the complete active space self-consistent field (CASSCF) and the N-electron valence perturbation theory (NEVPT2) with the aim of exploring the origin of the large and positive zero-field splitting D of the 6A1 ground state. D was calculated from wave functions of the electronic multiplets spanned by the d5 configuration of Fe(III) along with spin–orbit coupling accounted for by quasi degenerate perturbation theory. Results reproduce trends of D from inelastic neutron scattering data increasing in the order from F, Cl, Br, to I. A mapping of energy eigenvalues and eigenfunctions of the S = 3/2 excited states on ligand field theory was used to characterize the ?- and ?-antibonding effects decreasing from F to I. This is in agreement with similar results deduced from ab initio calculations on CrX63- complexes and also with the spectrochemical series showing a decrease of the ligand field in the same directions. A correlation is found between the increase of D and decrease of the ?- and ?-antibonding energies e?X (? = ?, ?) in the series from X = F to I. Analysis of this correlation using second-order perturbation theory expressions in terms of angular overlap parameters rationalizes the experimentally deduced trend. Furthermore, D parameters from CASSCF and NEVPT2 results have been calibrated against those from the INS data, yielding a predictive power of these approaches. Methods to improve the quantitative agreement between ab initio calculated and experimental D and spectroscopic transitions for high-spin Fe(III) complexes are proposed.« less

  12. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  14. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  15. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  16. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  17. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  18. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  19. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  20. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  1. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  2. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  3. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  4. Sandia Energy - (Lighting and) Solid-State Lighting: Science...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (Lighting and) Solid-State Lighting: Science, Technology, Economic Perspectives Home Energy Research EFRCs Solid-State Lighting Science EFRC (Lighting and) Solid-State Lighting:...

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  6. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  7. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  8. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    advantage. Joint Actinide Shock Physics Experimental Research * Two-Stage light-gas gun used to study plutonium and other materials under high pressures, strain rates and...

  9. NREL: Transportation Research - Transportation Secure Data Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines lightGeospatial ToolkitSMARTSWorking WithSuccessTransportation Secure Data

  10. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  11. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  12. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  13. Sustainable Office Lighting Options

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Sustainable Office Lighting Options Task Lighting: Task lighting is a localized method of lighting a workspace so that additional, unnecessary lighting is eliminated, decreasing energy usage and costs. Illumination levels in the targeted work areas are higher with task lighting than with the ambient levels

  14. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  15. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  16. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  17. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  18. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  19. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  20. Dual LED/incandescent security fixture

    DOE Patents [OSTI]

    Gauna, Kevin Wayne

    2005-06-21

    A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  3. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  4. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  5. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  6. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  8. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  10. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  11. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  12. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  13. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  14. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  15. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  16. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  17. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  18. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  19. Bio-Inspired Cyber Security for Smart Grid Deployments

    SciTech Connect (OSTI)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  20. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  1. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  2. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  3. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  4. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  5. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  6. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  7. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  8. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  9. Geoscience research for energy security

    SciTech Connect (OSTI)

    Not Available

    1987-02-01

    This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

  10. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  11. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  12. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  13. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  14. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  15. Lighting Options for Homes.

    SciTech Connect (OSTI)

    Baker, W.S.

    1991-04-01

    This report covers many aspects of various lighting options for homes. Types of light sources described include natural light, artificial light, incandescent lamps, fluorescent lamps, and high intensity discharge lamps. A light source selection guide gives the physical characteristics of these, design considerations, and common applications. Color, strategies for efficient lighting, and types of lighting are discussed. There is one section giving tips for various situations in specific rooms. Rooms and types of fixtures are shown on a matrix with watts saved by using the recommended type lighting for that room and room location. A major emphasis of this report is saving energy by utilizing the most suitable, recommended lighting option. (BN)

  16. Mobile lighting apparatus

    DOE Patents [OSTI]

    Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

    2013-05-14

    A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

  17. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  18. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  19. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  1. Practical image based lighting 

    E-Print Network [OSTI]

    Lee, Jaemin

    2003-01-01

    information is lighting. Image based lighting that is developed to recover illumination information of the real world from photographs has recently been popular in computer graphics. In this thesis we present a practical image based lighting method. Our...

  2. Light in the city

    E-Print Network [OSTI]

    Srinivasan, Kavita, 1976-

    2002-01-01

    This thesis focuses on enhancing the awareness of light for the pedestrian,and using light as a way of revealing the structure of the city and its relation to the cosmos. It proposes that aesthetic qualities of light inform ...

  3. Advances in Lighting 

    E-Print Network [OSTI]

    Tumber, A. J.

    1981-01-01

    Increasing electricity costs have made a significant impact on lighting. The Illuminating Engineering society (I.E.S.) and the lighting industry are producing new standards, procedures and products to make lighting more appropriate and energy...

  4. Natural lighting and skylights 

    E-Print Network [OSTI]

    Evans, Benjamin Hampton

    1961-01-01

    There are many physiological and psychological factors which enter into the proper design of space for human occupancy. One of these elements is light. Both natural light and manufactured light are basic tools with which any designer must work...

  5. Specific light in sculpture

    E-Print Network [OSTI]

    Powell, John William

    1989-01-01

    Specific light is defined as light from artificial or altered natural sources. The use and manipulation of light in three dimensional sculptural work is discussed in an historic and contemporary context. The author's work ...

  6. Advanced Demand Responsive Lighting

    E-Print Network [OSTI]

    Advanced Demand Responsive Lighting Host: Francis Rubinstein Demand Response Research Center demand responsive lighting systems ­ Importance of dimming ­ New wireless controls technologies · Advanced Demand Responsive Lighting (commenced March 2007) #12;Objectives · Provide up-to-date information

  7. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  8. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  9. Light Duty Combustion Research: Advanced Light-Duty Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments 2009 DOE Hydrogen Program and...

  10. Lighting in Commercial Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    are also under consideration. Outside the DOE, the Environmental Protection Agency's Green Lights program promotes energy-efficient lighting as a means to reducing...

  11. Lighting in Commercial Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    Motivation and Computation of Lighting Measures Floorspace by Lighting Equipment Configuration As described in Appendix A, for each building b, the CBECS data set has the total...

  12. Lighting in Commercial Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    more comprehensive understanding of commercial lighting and the potential for lighting energy savings. Steps to build on this analysis can be taken in many directions. One...

  13. Leavenworth Tree Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Join HERO for our annual Leavenworth Tree Lighting Ceremony & Shopping SATURDAY DECEMBER 12, 2015 Leavenworth Christmas Lighting Festival Visitors return year after year for some...

  14. Lighting in Commercial Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    light by passing electricity through mercury vapor, which causes the fluorescent coating to glow or fluoresce. High-Efficiency Ballast (HEB): A lighting conservation feature...

  15. Exciting White Lighting

    Broader source: Energy.gov [DOE]

    Windows that emit light and are more energy efficient? Universal Display’s PHOLED technology enables windows that have transparent light-emitting diodes in them.

  16. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  17. Measuring Light Reflectance of BGO Crystal Surfaces

    E-Print Network [OSTI]

    Janecek, Martin

    2009-01-01

    by the National Nuclear Security Administration, Office ofby the National Nuclear Security Administration, Office of

  18. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  19. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta; Shankar, Harihar; Joshi, Sunjoy

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  20. Lighting Controls | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Controls Lighting Controls Use lighting controls to automatically turn lights on and off as needed, and save energy. | Photo courtesy of iStockphoto.comMaliketh. Use lighting...

  1. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  2. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  3. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  4. Fiber optic security seal including plural Bragg gratings

    DOE Patents [OSTI]

    Forman, P.R.

    1994-09-27

    An optical security system enables the integrity of a container seal to be remotely interrogated. A plurality of Bragg gratings is written holographically into the core of at least one optical fiber placed about the container seal, where each Bragg grating has a predetermined location and a known frequency for reflecting incident light. A time domain reflectometer is provided with a variable frequency light output that corresponds to the reflecting frequencies of the Bragg gratings to output a signal that is functionally related to the location and reflecting frequency of each of the Bragg gratings. 2 figs.

  5. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  6. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  7. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  8. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  9. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  10. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  11. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  12. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  14. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  19. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  20. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  1. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  2. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  3. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  5. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  7. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  9. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  10. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  15. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  16. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  17. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  18. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  19. Pedestrian Friendly Outdoor Lighting

    SciTech Connect (OSTI)

    Miller, N. J.; Koltai, R. N.; McGowan, T. K.

    2013-12-01

    The GATEWAY program followed two pedestrian-scale lighting projects that required multiple mockups – one at Stanford University in California and the other at Chautauqua Institution in upstate New York. The report provides insight into pedestrian lighting criteria, how they differ from street and area lighting criteria, and how solid-state lighting can be better applied in pedestrian applications.

  20. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  1. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  2. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  3. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  4. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  5. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  7. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  8. Gamma ray spectroscopy employing divalent europium-doped alkaline earth halides and digital readout for accurate histogramming

    DOE Patents [OSTI]

    Cherepy, Nerine Jane; Payne, Stephen Anthony; Drury, Owen B; Sturm, Benjamin W

    2014-11-11

    A scintillator radiation detector system according to one embodiment includes a scintillator; and a processing device for processing pulse traces corresponding to light pulses from the scintillator, wherein pulse digitization is used to improve energy resolution of the system. A scintillator radiation detector system according to another embodiment includes a processing device for fitting digitized scintillation waveforms to an algorithm based on identifying rise and decay times and performing a direct integration of fit parameters. A method according to yet another embodiment includes processing pulse traces corresponding to light pulses from a scintillator, wherein pulse digitization is used to improve energy resolution of the system. A method in a further embodiment includes fitting digitized scintillation waveforms to an algorithm based on identifying rise and decay times; and performing a direct integration of fit parameters. Additional systems and methods are also presented.

  9. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  10. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  12. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  13. Reduced ultraviolet light induced degradation and enhanced light harvesting using YVO{sub 4}:Eu{sup 3+} down-shifting nano-phosphor layer in organometal halide perovskite solar cells

    SciTech Connect (OSTI)

    Chander, Nikhil; Chandrasekhar, P. S.; Thouti, Eshwar; Swami, Sanjay Kumar; Dutta, Viresh; Komarala, Vamsi K.; Khan, A. F.

    2014-07-21

    We report a simple method to mitigate ultra-violet (UV) degradation in TiO{sub 2} based perovskite solar cells (PSC) using a transparent luminescent down-shifting (DS) YVO{sub 4}:Eu{sup 3+} nano-phosphor layer. The PSC coated with DS phosphor showed an improvement in stability under prolonged illumination retaining more than 50% of its initial efficiency, whereas PSC without the phosphor layer degraded to ?35% of its initial value. The phosphor layer also provided ?8.5% enhancement in photocurrent due to DS of incident UV photons into additional red photons. YVO{sub 4}:Eu{sup 3+} layer thus served a bi-functional role in PSC by reducing photo-degradation as well as enhancing energy conversion efficiency.

  14. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  15. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  16. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  17. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  18. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  19. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  20. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01

    plants as a form of energy security in the absence of suffi-can be drawn. The energy security situation and outlook areregional cooperation on energy and security issues in Asia.

  1. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  2. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  3. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat’,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  4. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    myths and facts behind cyber security risks for industrialJ. and Hieb, J. [2007], ‘Cyber security risk assessment forOn Cyber Security for Networked Control Systems by Saurabh

  5. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  6. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  7. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  8. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  9. Water Scarcity, Security and democracy

    E-Print Network [OSTI]

    Water Scarcity, Security and democracy: a Mediterranean Mosaic edited by Francesca de châtel, Gail holst-WarhaFt and taMMo steenhuis #12;#12;Water Scarcity, Security and democracy: a mediterranean moSaic #12;© 2014 by Global Water Partnership Mediterranean, Cornell University and the Atkinson Center

  10. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  11. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  12. Distributed Internet Security and Measurement

    E-Print Network [OSTI]

    New Mexico, University of

    , New Mexico May, 2009 #12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico May

  13. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  14. Tips: Lighting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tips: Lighting Tips: Lighting Lighting choices save you money. Energy-efficient light bulbs are available in a wide variety of sizes and shapes. Lighting choices save you money....

  15. Testimony to the U.S. House of Representatives Science Committee IMPROVING THE NATION'S ENERGY SECURITY: CAN CARS AND TRUCKS

    E-Print Network [OSTI]

    SECURITY: CAN CARS AND TRUCKS BE MADE MORE FUEL EFFICIENT? 2:00 pm, Wednesday, February 9, 2005 Rayburn standards were effective in raising passenger car and light truck fuel economy and curbing the growth, regardless of its product mix. Manufacturers emphasizing larger light trucks and passenger cars will clearly

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  17. (No) Security in Automation!?

    E-Print Network [OSTI]

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  18. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  19. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01

    impacts and responses to environmental change making it anhuman security or environmental change if the lecturer isReview: Global Environmental Change and Human Security By

  20. Developing Secure Power Systems Professional Competence: Alignment...

    Energy Savers [EERE]

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  1. Transportation Safeguards & Security Test Bed (TSSTB) | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Safeguards and Security Test Bed May 30, 2013 The Transportation Safeguards and Security Test Bed consists of a test-bed vehicle and a monitoringlaboratorytraining...

  2. Control Systems Security Standards: Accomplishments And Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    that need to be made toward meeting the priority strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards:...

  3. Energy Security Planning for Sustainable Buildings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    capabilities are sufficient to serve their most critical needs during a prolonged outage. Energy Security Assessments For analysis and planning, see Performing Energy Security...

  4. Lemnos Interoperable Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements,...

  5. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  6. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Environmental Management (EM)

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  7. Nuclear Security Conference 2010 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his...

  8. 2014 Headquarters Facilities Master Security Plan- Acronyms

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Acronyms A list of the acronyms contained in the 2014 Headquarters Facilities Master Security Plan (HQFMSP).

  9. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  10. Nevada National Security Site Waste Acceptance Criteria

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office Environmental...

  11. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  12. Enforcement Letter, National Security Technologies, LLC - November...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 13, 2007 Enforcement Letter, National Security Technologies, LLC - November 13, 2007 November 13, 2007 Issued to National Security Technologies, LLC related to an...

  13. Consent Order, Lawrence Livermore National National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lawrence Livermore National National Security, LLC - WCO-2010-01 Consent Order, Lawrence Livermore National National Security, LLC - WCO-2010-01 October 29, 2010 Issued to Lawrence...

  14. Voluntary Protection Program Onsite Review, National Security...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - February 2015 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - February 2015 February 2015 Recertification of...

  15. Independent Activity Report, Nevada National Security Site -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR...

  16. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security Enforcement Preliminary Notice of Violation...

  17. Voluntary Protection Program Onsite Review, National Security...

    Energy Savers [EERE]

    January 2009 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - January 2009 January 2009 Evaluation to determine whether the National Security...

  18. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat...

  19. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  20. National Nuclear Security Administration Appropriation and Program...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

  1. National Nuclear Security Administration Fact Sheet Preliminary...

    Energy Savers [EERE]

    Worker Safety and Health Violations at Nevada National Security Site On August 25, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of...

  2. Control Systems Security Publications Library | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Metrics for Process Control Systems - September 2007 Security Framework for Control System Data Classification and Protection - July 2007 Secure ICCP Integration...

  3. Preferential Eu Site Occupation and Its Consequences in the Ternary Luminescent HalidesAB2I5:Eu2+(A=LiCs;B=Sr, Ba)

    SciTech Connect (OSTI)

    Fang, C.? M.; Biswas, Koushik

    2015-07-22

    Several rare-earth-doped, heavy-metal halides have recently been identified as potential next-generation luminescent materials with high efficiency at low cost. AB2I5:Eu2+ (A=Li–Cs; B=Sr, Ba) is one such family of halides. Its members, such as CsBa2I5:Eu2+ and KSr2I5:Eu2+, are currently being investigated as high-performance scintillators with improved sensitivity, light yield, and energy resolution less than 3% at 662 keV. Within the AB2I5 family, our first-principles-based calculations reveal two remarkably different trends in Eu site occupation. The substitutional Eu ions occupy both eightfold-coordinated B1(VIII) and the sevenfold-coordinated B2(VII) sites in the Sr-containing compounds. However, in the Ba-containing crystals, Eu ions strongly prefer the B2(VII)sites. This random versus preferential distribution of Eu affects their electronic properties. The calculations also suggest that in the Ba-containing compounds one can expect the formation of Eu-rich domains. These results provide atomistic insight into recent experimental observations about the concentration and temperature effects in Eu-doped CsBa2I5. We discuss the implications of our results with respect to luminescent properties and applications. We also hypothesize Sr, Ba-mixed quaternary iodides ABaVIIISrVIII5:Eu as scintillators having enhanced homogeneity and electronic properties.

  4. Deficiencies of Lighting Codes and Ordinances in Controlling Light Pollution from Parking Lot Lighting Installations

    E-Print Network [OSTI]

    Royal, Emily

    2012-05-31

    The purpose of this research was to identify the main causes of light pollution from parking lot electric lighting installations and highlight the deficiencies of lighting ordinances in preventing light pollution. Using an industry-accepted lighting...

  5. OpenGL Lighting 13. OpenGL Lighting

    E-Print Network [OSTI]

    McDowell, Perry

    OpenGL Lighting 13. OpenGL Lighting · Overview of Lighting in OpenGL In order for lighting to have an effect in OpenGL, two things are required: A light An object to be lit Lights can be set to any color determine how they reflect the light which hits them. The color(s) of an object is determined

  6. CONNECTED LIGHTING SYSTEMS MEETING

    Office of Energy Efficiency and Renewable Energy (EERE)

    There is a lot of buzz today about the Internet of Things and the convergence of intelligent controllable light sources, communication networks, sensors, and data exchange in future lighting...

  7. Fast Light, Fast Neutrinos?

    E-Print Network [OSTI]

    Kevin Cahill

    2011-10-10

    In certain media, light has been observed with group velocities faster than the speed of light. The recent OPERA report of superluminal 17 GeV neutrinos may describe a similar phenomenon.

  8. Kyler Nelson Light Timer

    E-Print Network [OSTI]

    Kachroo, Pushkin

    designated by the user, the Arduino board will dim the light to save energy. The user designates the time instance, the light is dimmed using pulse width modulation (PWM) in the Arduino's pin number 11

  9. Automatic lighting controls demonstration

    SciTech Connect (OSTI)

    Rubinstein, F.; Verderber, R.

    1990-03-01

    The purpose of this work was to demonstrate, in a real building situation, the energy and peak demand reduction capabilities of an electronically ballasted lighting control system that can utilize all types of control strategies to efficiently manage lighting. The project has demonstrated that a state-of-the-art electronically ballasted dimmable lighting system can reduce energy and lighting demand by as least 50% using various combinations of control strategies. By reducing light levels over circulation areas (tuning) and reducing after hours light levels to accommodate the less stringent lighting demands of the cleaning crew (scheduling), lighting energy consumption on weekdays was reduced an average of 54% relative to the initial condition. 10 refs., 14 figs., 3 tabs.

  10. Lighting and Daylight Harvesting 

    E-Print Network [OSTI]

    Bos, J.

    2011-01-01

    in 1992 to serve the lighting design needs of the architectural and interior design communities. With over fifty years of combined experience, our areas of expertise range from architectural and theatrical lighting to custom fixture design. Bos... Lighting Design We are active members of the International Association of Lighting Designers, the American Institute of Architects, the Illuminating Engineering Society, International Dark Skies Association and the United States Green Building Council...

  11. LED Lighting Retrofit 

    E-Print Network [OSTI]

    Shaw-Meadow, N.

    2011-01-01

    kWh is the one that never gets used? ?Dedicated to making environmentally responsible products? Ringdale Introduction LED Roadway Lighting Better Light, Fewer Watts. Period. Nathan Shaw-Meadow LED Lighting Specialist Ringdale ActiveLED ESL.../exponential efficiency growth often deters investment today 7 Challenges to Implementation ESL-KT-11-11-57 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 ? Municipal Street Light Case Study 8 ? Replaced 400W High Pressure Sodium fixtures with 52W Active...

  12. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  13. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    is caused due to an error within the delay feature and can be exploited to consume all web server instances via multiple failed login attempts. IMPACT: Drupal Login Security...

  14. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a...

  15. Light emitting device comprising phosphorescent materials for white light generation

    DOE Patents [OSTI]

    Thompson, Mark E.; Dapkus, P. Daniel

    2014-07-22

    The present invention relates to phosphors for energy downconversion of high energy light to generate a broadband light spectrum, which emit light of different emission wavelengths.

  16. And the Oscar for Sustainable Mobile Lighting Goes to.... Lighting...

    Energy Savers [EERE]

    And the Oscar for Sustainable Mobile Lighting Goes to.... Lighting Up Operations with Hydrogen and Fuel Cell Technology And the Oscar for Sustainable Mobile Lighting Goes to.......

  17. Lighting Design | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Design Lighting Design Energy-efficient indoor and outdoor lighting design focuses on ways to improve both the quality and efficiency of lighting. | Photo courtesy of...

  18. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  19. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  20. Meeting Federal Energy Security Requirements

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  1. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  2. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  3. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  4. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  5. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  6. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threatand the Threat of Climate Change,” The CNA Corporation, 2007

  7. Homeland Security Issues for Facilities 

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01

    The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become...

  8. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  9. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  10. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  11. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  12. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  13. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  14. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  15. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  16. 7: Network Security Comp 361, Fall 2003

    E-Print Network [OSTI]

    Golin, Mordecai J.

    "securely" Trudy (intruder) may intercept, delete, add messages secure sender secure receiver channel Alice, Alice be? ... well, real-life Bobs and Alices! Web browser/server for electronic transactions (e updates other examples? #12;7: Network Security 6 Comp 361, Fall 2003 There are bad guys (and girls) out

  17. A Graphical Approach to Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    A Graphical Approach to Security Risk Analysis Doctoral Dissertation by Ida Hogganvik Submitted to security risk analysis i Acknowledgements First of all, I would like to thank my supervisor Ketil Střlen to security risk analysis #12;A graphical approach to security risk analysis iii List of Original Publications

  18. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    operate in Ř transport mode · end-to-end Ř tunnel mode · security-gateway to security-gateway v transport Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi Sandhu 2001 IP TUNNELING Source mode and tunnel model can coexist #12;7© Ravi Sandhu 2001 IP TUNNELING C A B D Public Internet Internal

  19. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode · end-to-end tunnel mode · security-gateway to security-gateway transport mode and tunnel model can coexist #12;7© Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi

  20. Are We Compromised? Modelling Security Assessment Games

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    against cyber-attacks. A security assessment is the process of determining how effectively an entity being examples of cyber attacks that fit this profile are the security breach at RSA Data Security [6Are We Compromised? Modelling Security Assessment Games Viet Pham and Carlos Cid Information

  1. Cyber Security Research: A Personal Perspective

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed It will be messy but need not be chaotic! Cyber security research and practice are loosing ground © Ravi Sandhu 2 with Real-World Impact! Cyber Security Scope #12; What is fundamental to cyber security? Where

  2. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  3. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act

  4. INSTITUTE FOR CYBER SECURITY Purpose-Centric

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security (ICS) University of Texas at San Antonio September 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Butler

  5. NISTIR 7621 Small Business Information Security

    E-Print Network [OSTI]

    . .......................................8 3.3 Security concerns about popup windows and other hacker tricks

  6. Towards Collaborative Robots for Infrastructure Security Applications

    E-Print Network [OSTI]

    Guo, Yi

    , infrastructure security and monitoring of sensitive national security sites (e.g. nuclear facilities, powerTowards Collaborative Robots for Infrastructure Security Applications Yi Guo School of Electrical.madhavan@nist.gov Abstract-- We discuss techniques towards using collaborative robots for infrastructure security

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  8. Light extraction from organic light-emitting diodes for lighting applications by sand-blasting

    E-Print Network [OSTI]

    Light extraction from organic light-emitting diodes for lighting applications by sand@ust.hk Abstract: Light extraction from organic light-emitting diodes (OLEDs) by scattering the light is one of the effective methods for large-area lighting applications. In this paper, we present a very simple and cost

  9. Induction Lighting: An Old Lighting Technology Made New Again

    Broader source: Energy.gov [DOE]

    Induction lighting is one of the best kept secrets in energy-efficient lighting. Simply stated, induction lighting is essentially a fluorescent light without electrodes or filaments, the items that...

  10. Motivation to study security of control systems. Our Results/Contribution. Summary. Security constrained control under

    E-Print Network [OSTI]

    Hu, Fei

    Motivation to study security of control systems. Our Results/Contribution. Summary. Security Secure control systems UC Berkeley #12;Motivation to study security of control systems. Our Results/Contribution. Summary. Outline. Motivation to study security of control systems. Distributed control systems

  11. On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud ABSTRACT Secure data intensive computing in the cloud is challenging, in- volving a complicated tradeoff among security owners will not be likely to use public clouds to process their sensitive data. Secure computation

  12. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  13. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University networks and data products. But as technology becomes more complex, security threats also become more

  14. Lighting the Night: Technology, Urban Life and the Evolution of Street Lighting [Light in Place

    E-Print Network [OSTI]

    Holden, Alfred

    1992-01-01

    Electrical 16. "Highway Lighting by So­ dium Vapor Lamps,"Possibilities of Street: Lighting Improve­ ments," TheLaunches Broad Street Lighting Promotion Campaign," The

  15. ECE 466: LED Lighting Systems -Incandescent lightings rise and

    E-Print Network [OSTI]

    Connors, Daniel A.

    ECE 466: LED Lighting Systems - Incandescent lightings rise and demise via government policy - Alternative Fluorescent light sources and compact fluorescent lights (CFL) to incandescents - Alternative LED light sources - Color index as well as Watts to Lumens efficiency available from all three light sources

  16. Lighting and Surfaces 11.1 Introduction to Lighting

    E-Print Network [OSTI]

    Boyd, John P.

    Chapter 11 Lighting and Surfaces 11.1 Introduction to Lighting Three-dimensional surfaces can react to light, and how computer graphics simulates this. There are three species of light (or "illumination models"): 1. Intrinsic (self-emitting) 2. Ambient light (sometimes called "diffuse light") 3

  17. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  18. Parameters influencing the deposition of methylammonium lead halide iodide in hole conductor free perovskite-based solar cells

    SciTech Connect (OSTI)

    Cohen, Bat-El; Gamliel, Shany; Etgar, Lioz

    2014-08-01

    Perovskite is a promising light harvester for use in photovoltaic solar cells. In recent years, the power conversion efficiency of perovskite solar cells has been dramatically increased, making them a competitive source of renewable energy. An important parameter when designing high efficiency perovskite-based solar cells is the perovskite deposition, which must be performed to create complete coverage and optimal film thickness. This paper describes an in-depth study on two-step deposition, separating the perovskite deposition into two precursors. The effects of spin velocity, annealing temperature, dipping time, and methylammonium iodide concentration on the photovoltaic performance are studied. Observations include that current density is affected by changing the spin velocity, while the fill factor changes mainly due to the dipping time and methylammonium iodide concentration. Interestingly, the open circuit voltage is almost unaffected by these parameters. Hole conductor free perovskite solar cells are used in this work, in order to minimize other possible effects. This study provides better understanding and control over the perovskite deposition through highly efficient, low-cost perovskite-based solar cells.

  19. Sandia Energy - Light Creation Materials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Light Creation Materials Home Energy Research EFRCs Solid-State Lighting Science EFRC Overview Light Creation Materials Light Creation MaterialsAlyssa Christy2015-03-26T16:28:52+00...

  20. Arnold Schwarzenegger LIGHTING RESEARCH PROGRAM

    E-Print Network [OSTI]

    Project Summaries ELEMENT 2: ADVANCE LIGHTING TECHNOLOGIES PROJECT 2.1 LIGHT EMITTING DIODE (LED light emitting diodes (LED) technology for general lighting applications by developing a task lamp