Sample records for halide lighting security

  1. Metal-halide perovskites for photovoltaic and light-emitting...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal-halide perovskites for photovoltaic and light-emitting devices September 15, 2015 at 4:30 pm36-428 Sam Stranks Massachusetts Institute of Technology peopleStranks...

  2. Metallic halide lights and lighting systems. (Latest citations from the US Patent Bibliographic file with exemplary claims). Published Search

    SciTech Connect (OSTI)

    Not Available

    1994-11-01T23:59:59.000Z

    The bibliography contains citations of selected patents concerning the design and operation of metallic halide lights and lighting systems. High pressure, high intensity, and low wattage discharge lamps are described. Citations discuss power sources, lamp life, lamp control circuits, thermal switches, and heat reflective coatings. Applications in sport stadium lighting, vehicle headlights, and crop-lighting are included. (Contains a minimum of 170 citations and includes a subject term index and title list.)

  3. Bright Light-Emitting Diodes based on Organometal Halide Perovskite

    E-Print Network [OSTI]

    Tan, Zhi-Kuang; Moghaddam, Reza Saberi; Lai, May Ling; Docampo, Pablo; Higler, Ruben; Deschler, Felix; Price, Michael; Sadhanala, Aditya; Pazos, Luis M.; Credgington, Dan; Hanusch, Fabian; Bein, Thomas; Snaith, Henry J.; Friend, Richard H.

    2014-08-03T23:59:59.000Z

    a Keithley 2400 Source Measure Unit (SMU). Photon flux was measured simultaneously using a calibrated silicon photodiode centered over the light-emitting pixel. Radiance in W sr-1 m-2 and luminance in cd m-2 10 were calculated based...

  4. Lutetium gadolinium halide scintillators

    SciTech Connect (OSTI)

    Shah, Kanai S. (Newton, MA); Higgins, William M (Westborough, MA); Van Loef, Edgar V (Allston, MA); Glodo, Jaroslaw (Allston, MA)

    2010-07-13T23:59:59.000Z

    Lutetium gadolinium halide scintillators, devices and methods, including a composition having the formula Lu.sub.xGd.sub.(1-x)Halide and a dopant.

  5. Emission and spectral characteristics of electrodeless indium halide lamp

    SciTech Connect (OSTI)

    Takeda, M.; Hochi, A.; Horii, S.; Matsuoka, T. [Matsushita Electric Industrial Co., Ltd., Kyoto (Japan). Lighting Research Lab.

    1997-12-31T23:59:59.000Z

    The electrodeless HID lamp excited by microwave has been intensively investigated because of its long life, high efficacy and environmental aspect. This study reports excellent emission and spectral characteristics of electrodeless HID lamp containing indium halides. The authors investigate InI and InBr as ingredients, and measure the microwave excited spectra and luminous intensities of lamps which are made from spherical silica glass in 10--40 mm outer diameter and with various amounts of halides. It is well known that such indium halides in the usual metal-halide lamps have strong blue line emission at 410 and 451nm. But, in the authors` microwave excited lamps, continuous spectrum can be observed in addition in the visible region. Increasing input of power of microwave makes this continuous spectrum stronger. Below 1kW microwave input power, the spectrum of InBr lamp almost resembled the CIE standard illuminant D65. As a consequence of the spectrum, they found that the color rendering and the duv of InBr lamp were excellent as high as 95 and smaller than 0.002, respectively, in the region of 400--800W input power. The efficacy higher than 100 lm/W was further achieved at 400W. The authors confirm that the microwave excited indium halides lamps can be applicable to many fields of lighting.

  6. Actinide halide complexes

    DOE Patents [OSTI]

    Avens, Larry R. (Los Alamos, NM); Zwick, Bill D. (Santa Fe, NM); Sattelberger, Alfred P. (Los Alamos, NM); Clark, David L. (Los Alamos, NM); Watkin, John G. (Los Alamos, NM)

    1992-01-01T23:59:59.000Z

    A compound of the formula MX.sub.n L.sub.m wherein M is a metal atom selected from the group consisting of thorium, plutonium, neptunium or americium, X is a halide atom, n is an integer selected from the group of three or four, L is a coordinating ligand selected from the group consisting of aprotic Lewis bases having an oxygen-, nitrogen-, sulfur-, or phosphorus-donor, and m is an integer selected from the group of three or four for monodentate ligands or is the integer two for bidentate ligands, where the sum of n+m equals seven or eight for monodentate ligands or five or six for bidentate ligands, a compound of the formula MX.sub.n wherein M, X, and n are as previously defined, and a process of preparing such actinide metal compounds including admixing the actinide metal in an aprotic Lewis base as a coordinating solvent in the presence of a halogen-containing oxidant, are provided.

  7. Actinide halide complexes

    DOE Patents [OSTI]

    Avens, L.R.; Zwick, B.D.; Sattelberger, A.P.; Clark, D.L.; Watkin, J.G.

    1992-11-24T23:59:59.000Z

    A compound is described of the formula MX[sub n]L[sub m] wherein M is a metal atom selected from the group consisting of thorium, plutonium, neptunium or americium, X is a halide atom, n is an integer selected from the group of three or four, L is a coordinating ligand selected from the group consisting of aprotic Lewis bases having an oxygen-, nitrogen-, sulfur-, or phosphorus-donor, and m is an integer selected from the group of three or four for monodentate ligands or is the integer two for bidentate ligands, where the sum of n+m equals seven or eight for monodentate ligands or five or six for bidentate ligands. A compound of the formula MX[sub n] wherein M, X, and n are as previously defined, and a process of preparing such actinide metal compounds are described including admixing the actinide metal in an aprotic Lewis base as a coordinating solvent in the presence of a halogen-containing oxidant.

  8. Preparation of cerium halide solvate complexes

    DOE Patents [OSTI]

    Vasudevan, Kalyan V; Smith, Nickolaus A; Gordon, John C; McKigney, Edward A; Muenchaussen, Ross E

    2013-08-06T23:59:59.000Z

    Crystals of a solvated cerium(III) halide solvate complex resulted from a process of forming a paste of a cerium(III) halide in an ionic liquid, adding a solvent to the paste, removing any undissolved solid, and then cooling the liquid phase. Diffusing a solvent vapor into the liquid phase also resulted in crystals of a solvated cerium(III) halide complex.

  9. Development of Halide and Oxy-Halides for Isotopic Separations

    SciTech Connect (OSTI)

    Leigh R. Martin; Aaron T. Johnson; Jana Pfeiffer; Martha R. Finck

    2014-10-01T23:59:59.000Z

    The goal of this project was to synthesize a volatile form of Np for introduction into mass spectrometers at INL. Volatile solids of the 5f elements are typically those of the halides (e.g. UF6), however fluorine is highly corrosive to the sensitive internal components of the mass separator, and the other volatile halides exist as several different stable isotopes in nature. However, iodide is both mono-isotopic and volatile, and as such presents an avenue for creation of a form of Np suitable for introduction into the mass separator. To accomplish this goal, the technical work in the project sought to establish a novel synthetic route for the conversion NpO2+ (dissolved in nitric acid) to NpI3 and NpI4.

  10. Halide and Oxy-halide Eutectic Systems for High Performance High...

    Broader source: Energy.gov (indexed) [DOE]

    Q2 Halide and Oxy-Halide Eutectic Systems for High Performance High Temperature Heat Transfer Fluids Corrosion in Very High-Temperature Molten Salt for Next Generation CSP Systems...

  11. Diamond films treated with alkali-halides

    DOE Patents [OSTI]

    Anderson, D.F.; Kwan, S.W.

    1997-04-08T23:59:59.000Z

    A secondary electron emitter is provided and includes a substrate with a diamond film, the diamond film is treated or coated with an alkali-halide. 5 figs.

  12. Lanthanide doped strontium barium mixed halide scintillators

    SciTech Connect (OSTI)

    Gundiah, Gautam; Bizarri, Gregory; Hanrahan, Stephen M; Bourret-Courchesne, Edith; Derenzo, Stephen E

    2013-07-16T23:59:59.000Z

    The present invention provides for a composition comprising an inorganic scintillator comprising a lanthanide-doped strontium barium mixed halide useful for detecting nuclear material.

  13. anhydrous transcurium halides: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of metal halide lamps are investigated, including acoustic resonance, spectral energy, and luminous efficacy. To operate metal halide lamps at intended conditions, (more)...

  14. Enhanced Quantum Efficiency From Hybrid Cesium Halide/Copper...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Efficiency From Hybrid Cesium HalideCopper Photocathode. Enhanced Quantum Efficiency From Hybrid Cesium HalideCopper Photocathode. Abstract: The quantum efficiency of Cu...

  15. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema (OSTI)

    Julia Phillips

    2010-01-08T23:59:59.000Z

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  16. Halide and Oxy-Halide Eutectic Systems for High-Performance,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    computational modeling along with rapid material screening methods to identify halide salt mixtures with a melting point below 250C that are stable at temperatures well above...

  17. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    SciTech Connect (OSTI)

    Thomas, L.L.; Strait, R.S. [Lawrence Livermore National Lab., CA (United States). Fission Energy and Systems Safety Program

    1994-10-01T23:59:59.000Z

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient.

  18. Oxidation of hydrogen halides to elemental halogens

    DOE Patents [OSTI]

    Rohrmann, Charles A. (Kennewick, WA); Fullam, Harold T. (Richland, WA)

    1985-01-01T23:59:59.000Z

    A process for oxidizing hydrogen halides having substantially no sulfur impurities by means of a catalytically active molten salt is disclosed. A mixture of the subject hydrogen halide and an oxygen bearing gas is contacted with a molten salt containing an oxidizing catalyst and alkali metal normal sulfates and pyrosulfates to produce an effluent gas stream rich in the elemental halogen and substantially free of sulfur oxide gases.

  19. New Energy Efficiency Standards for Metal Halide Lamp Fixtures...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Metal Halide Lamp Fixtures to Save on Energy Bills and Reduce Carbon Pollution New Energy Efficiency Standards for Metal Halide Lamp Fixtures to Save on Energy Bills and Reduce...

  20. Modelling Additive Transport in Metal Halide Lamps

    E-Print Network [OSTI]

    Eindhoven, Technische Universiteit

    doctor aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr.ir. C.J. van-DATA LIBRARY TECHNISCHE UNIVERSITEIT EINDHOVEN Beks, Mark Louwrens Modelling Additive Transport in Metal Halide Lamps/ door Beks, M.L. - Eindhoven : Technische Universiteit Eindhoven, 2008. Proefschrift. ISBN: 978

  1. J. Am. Chem. SOC.1991, 113,9575-9585 9575 Mixed Aggregation of Lithium Enolates and Lithium Halides

    E-Print Network [OSTI]

    Collum, David B.

    J. Am. Chem. SOC.1991, 113,9575-9585 9575 Mixed Aggregation of Lithium Enolates and Lithium Halides with Lithium 2,2,6,6-Tetramethylpiperidide(LiTMP) Patricia L. Hall, James H. Gilchrist, Aidan T. Harrison]-lithiumdi-tert-butylamide and conformationally locked [6Li]-lithium2,2,4,6,6-pentamethylpiperidide shed further light

  2. Process and composition for drying of gaseous hydrogen halides

    DOE Patents [OSTI]

    Tom, Glenn M. (New Milford, CT); Brown, Duncan W. (Wilton, CT)

    1989-08-01T23:59:59.000Z

    A process for drying a gaseous hydrogen halide of the formula HX, wherein X is selected from the group consisting of bromine, chlorine, fluorine, and iodine, to remove water impurity therefrom, comprising: contacting the water impurity-containing gaseous hydrogen halide with a scavenger including a support having associated therewith one or more members of the group consisting of: (a) an active scavenging moiety selected from one or more members of the group consisting of: (i) metal halide compounds dispersed in the support, of the formula MX.sub.y ; and (ii) metal halide pendant functional groups of the formula -MX.sub.y-1 covalently bonded to the support, wherein M is a y-valent metal, and y is an integer whose value is from 1 to 3; (b) corresponding partially or fully alkylated compounds and/or pendant functional groups, of the metal halide compounds and/or pendant functional groups of (a); wherein the alkylated compounds and/or pendant functional groups, when present, are reactive with the gaseous hydrogen halide to form the corresponding halide compounds and/or pendant functional groups of (a); and M being selected such that the heat of formation, .DELTA.H.sub.f of its hydrated halide, MX.sub.y.(H.sub.2 O).sub.n, is governed by the relationship: .DELTA.H.sub.f .gtoreq.n.times.10.1 kilocalories/mole of such hydrated halide compound wherein n is the number of water molecules bound to the metal halide in the metal halide hydrate. Also disclosed is an appertaining scavenger composition and a contacting apparatus wherein the scavenger is deployed in a bed for contacting with the water impurity-containing gaseous hydrogen halide.

  3. Halide electroadsorption on single crystal surfaces

    SciTech Connect (OSTI)

    Ocko, B.M. [Brookhaven National Lab., Upton, NY (United States). Dept. of Physics; Wandlowski, T. [Univ. of Ulm (Germany). Dept. of Electrochemistry

    1997-07-01T23:59:59.000Z

    The structure and phase behavior of halides have been investigated on single crystals of Ag and Au using synchrotron x-ray scattering techniques. The adlayer coverages are potential dependent. For all halides studied the authors found that with increasing potential, at a critical potential, a disordered adlayer transforms into an ordered structure. Often these ordered phases are incommensurate and exhibit potential-dependent lateral separations (electrocompression). The authors have analyzed the electrocompression in terms of a model which includes lateral interactions and partial charge. A continuous compression is not observed for Br on Ag(100). Rather, they find that the adsorption is site-specific (lattice gas) in both the ordered and disordered phases. The coverage increases with increasing potential and at a critical potential the disordered phase transforms to a well-ordered commensurate structure.

  4. Lanthanide-halide based humidity indicators

    DOE Patents [OSTI]

    Beitz, James V. (Hinsdale, IL); Williams, Clayton W. (Chicago, IL)

    2008-01-01T23:59:59.000Z

    The present invention discloses a lanthanide-halide based humidity indicator and method of producing such indicator. The color of the present invention indicates the humidity of an atmosphere to which it is exposed. For example, impregnating an adsorbent support such as silica gel with an aqueous solution of the europium-containing reagent solution described herein, and dehydrating the support to dryness forms a substance with a yellow color. When this substance is exposed to a humid atmosphere the water vapor from the air is adsorbed into the coating on the pore surface of the silica gel. As the water content of the coating increases, the visual color of the coated silica gel changes from yellow to white. The color change is due to the water combining with the lanthanide-halide complex on the pores of the gel.

  5. americium halides: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or nickel-catalyzed cross-coupling reactions using unactivated alkyl electrophiles (e.g., halides and sulfonates). Although aryl and alkenyl ... Zhou, Jianrong (Jianrong Steve)...

  6. Lanthanum halide scintillators for time-of-flight 3-D pet

    DOE Patents [OSTI]

    Karp, Joel S. (Glenside, PA); Surti, Suleman (Philadelphia, PA)

    2008-06-03T23:59:59.000Z

    A Lanthanum Halide scintillator (for example LaCl.sub.3 and LaBr.sub.3) with fast decay time and good timing resolution, as well as high light output and good energy resolution, is used in the design of a PET scanner. The PET scanner includes a cavity for accepting a patient and a plurality of PET detector modules arranged in an approximately cylindrical configuration about the cavity. Each PET detector includes a Lanthanum Halide scintillator having a plurality of Lanthanum Halide crystals, a light guide, and a plurality of photomultiplier tubes arranged respectively peripherally around the cavity. The good timing resolution enables a time-of-flight (TOF) PET scanner to be developed that exhibits a reduction in noise propagation during image reconstruction and a gain in the signal-to-noise ratio. Such a PET scanner includes a time stamp circuit that records the time of receipt of gamma rays by respective PET detectors and provides timing data outputs that are provided to a processor that, in turn, calculates time-of-flight (TOF) of gamma rays through a patient in the cavity and uses the TOF of gamma rays in the reconstruction of images of the patient.

  7. Magnetic polarizations of electrons at dislocations in alkali halides

    E-Print Network [OSTI]

    McClurg, Gene Roark

    1969-01-01T23:59:59.000Z

    interval. 25 NAGNETIC POLARIZATIONS OF ELECTRONS AT DISLOCATIONS IN ALKALI HALIDES 1. INTRODUCTION. The new magnetic effects observed in our laboratory on a number of single crystals of alkali halides are thought to be caused by electrons trapped... on d1slocations. The magnet1c properties are perhaps more interesting as a bas1c contribution to the sc1ence of magnetism than to a knowledge of d. islocations 1n these very pure, optically clear, s1ngle crystals of alkal1 halides. The gross magnet...

  8. Cross-coupling reactions of unactivated alkyl halides

    E-Print Network [OSTI]

    Zhou, Jianrong (Jianrong Steve)

    2005-01-01T23:59:59.000Z

    My graduate research at MIT has been focused on the development of palladium- or nickel-catalyzed cross-coupling reactions using unactivated alkyl electrophiles (e.g., halides and sulfonates). Although aryl and alkenyl ...

  9. Reactions of nitrogen heterocycle-organolithium intermediates with lead halides

    E-Print Network [OSTI]

    Kinney, Jerry Neal

    1970-01-01T23:59:59.000Z

    REACTIONS OF NITROGEN HETEROCYCLE- ORGANOLITHIUM INTERMEDIATES WITH LEAD HALIDES A Thesis by JERRY HEAL KINNEY Submitted to the Graduate College of Texas ALM University In partial fulfillment of the requirement for the degree ot MASTER...) (Mem er) December 1970 ABSTRACT Reactions of Nitrogen Heterocycle-Organollthium intermediates With Lead Halides. (December l970) Jerry Neal Kinney, B. S. , Texas AE, M University Directed by: Dr. Choo-Seng Giam Reactions of nitrogen heterocycle...

  10. Advances in the growth of alkaline-earth halide single crystals for scintillator detectors

    SciTech Connect (OSTI)

    Boatner, Lynn A [ORNL; Ramey, Joanne Oxendine [ORNL; Kolopus, James A [ORNL; Neal, John S [ORNL; Cherepy, Nerine [Lawrence Livermore National Laboratory (LLNL); Payne, Stephen A. [Lawrence Livermore National Laboratory (LLNL); Beck, P [Lawrence Livermore National Laboratory (LLNL); Burger, Arnold [Fisk University, Nashville; Rowe, E [Fisk University, Nashville; Bhattacharya, P. [Fisk University, Nashville

    2014-01-01T23:59:59.000Z

    Alkaline-earth scintillators such as strontium iodide and other alkaline-earth halides activated with divalent europium represent some of the most efficient and highest energy resolution scintillators for use as gamma-ray detectors in a wide range of applications. These applications include the areas of nuclear nonproliferation, homeland security, the detection of undeclared nuclear material, nuclear physics and materials science, medical diagnostics, space physics, high energy physics, and radiation monitoring systems for first responders, police, and fire/rescue personnel. Recent advances in the growth of large single crystals of these scintillator materials hold the promise of higher crystal yields and significantly lower detector production costs. In the present work, we describe new processing protocols that, when combined with our molten salt filtration methods, have led to advances in achieving a significant reduction of cracking effects during the growth of single crystals of SrI2:Eu2+. In particular, we have found that extended pumping on the molten crystal-growth charge under vacuum for time periods extending up to 48 hours is generally beneficial in compensating for variations in the alkaline-earth halide purity and stoichiometry of the materials as initially supplied by commercial sources. These melt-pumping and processing techniques are now being applied to the purification of CaI2:Eu2+ and some mixed-anion europium-doped alkaline-earth halides prior to single-crystal growth by means of the vertical Bridgman technique. The results of initial studies of the effects of aliovalent doping of SrI2:Eu2+ on the scintillation characteristics of this material are also described.

  11. Data:F0cc7cde-b490-462d-a22a-7b05b67588be | Open Energy Information

    Open Energy Info (EERE)

    Waverly Municipal Elec Utility Effective date: End date if known: Rate name: Security Lighting: 1000 Watt Metal Halide Sector: Lighting Description: Application Area security...

  12. Data:D4756294-e8a1-4be5-b639-42f0330152cb | Open Energy Information

    Open Energy Info (EERE)

    Waverly Municipal Elec Utility Effective date: End date if known: Rate name: Security Lighting: 50 Watt Metal Halide or HPS Sector: Lighting Description: Application Area security...

  13. Process for oxidation of hydrogen halides to elemental halogens

    DOE Patents [OSTI]

    Lyke, Stephen E. (Middleton, WI)

    1992-01-01T23:59:59.000Z

    An improved process for generating an elemental halogen selected from chlorine, bromine or iodine, from a corresponding hydrogen halide by absorbing a molten salt mixture, which includes sulfur, alkali metals and oxygen with a sulfur to metal molar ratio between 0.9 and 1.1 and includes a dissolved oxygen compound capable of reacting with hydrogen halide to produce elemental halogen, into a porous, relatively inert substrate to produce a substrate-supported salt mixture. Thereafter, the substrate-supported salt mixture is contacted (stage 1) with a hydrogen halide while maintaining the substrate-supported salt mixture during the contacting at an elevated temperature sufficient to sustain a reaction between the oxygen compound and the hydrogen halide to produce a gaseous elemental halogen product. This is followed by purging the substrate-supported salt mixture with steam (stage 2) thereby recovering any unreacted hydrogen halide and additional elemental halogen for recycle to stage 1. The dissolved oxygen compound is regenerated in a high temperature (stage 3) and an optical intermediate temperature stage (stage 4) by contacting the substrate-supported salt mixture with a gas containing oxygen whereby the dissolved oxygen compound in the substrate-supported salt mixture is regenerated by being oxidized to a higher valence state.

  14. Vitrification of IFR and MSBR halide salt reprocessing wastes

    SciTech Connect (OSTI)

    Siemer, D.D. [Idaho National Laboratory, 12N 3167E, Idaho Falls, ID 83402 (United States)

    2013-07-01T23:59:59.000Z

    Both of the genuinely sustainable (breeder) nuclear fuel cycles (IFR - Integral Fast Reactor - and MSBR - Molten Salt Breeder Reactor -) studied by the USA's national laboratories would generate high level reprocessing waste (HLRW) streams consisting of a relatively small amount ( about 4 mole %) of fission product halide (chloride or fluoride) salts in a matrix comprised primarily (about 95 mole %) of non radioactive alkali metal halide salts. Because leach resistant glasses cannot accommodate much of any of the halides, most of the treatment scenarios previously envisioned for such HLRW have assumed a monolithic waste form comprised of a synthetic analog of an insoluble crystalline halide mineral. In practice, this translates to making a 'substituted' sodalite ('Ceramic Waste Form') of the IFR's chloride salt-based wastes and fluoroapatite of the MSBR's fluoride salt-based wastes. This paper discusses my experimental studies of an alternative waste management scenario for both fuel cycles that would separate/recycle the waste's halide and immobilize everything else in iron phosphate (Fe-P) glass. It will describe both how the work was done and what its results indicate about how a treatment process for both of those wastes should be implemented (fluoride and chloride behave differently). In either case, this scenario's primary advantages include much higher waste loadings, much lower overall cost, and the generation of a product (glass) that is more consistent with current waste management practices. (author)

  15. Development of a Web-based Emissions Reduction Calculator for Street Light and Traffic Light Retrofits

    E-Print Network [OSTI]

    Liu, Z.; Gilman, D.; Haberl, J. S.; Culp, C.

    2005-01-01T23:59:59.000Z

    , street lights and traffic lights represent one of the largest categories of electricity used by a city. By retrofitting the street lights with energy efficient lamps such as high pressure sodium and metal halide and traffic lights with light-emitting... diode (LED) traffic signals, a city 1 In the 2003 and 2005 Texas State legislative sessions, the emissions reductions legislation in Senate Bill 5 was modified by House bill 3235, and House bill 1365...

  16. Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us countLighting Sign In About | Careers |

  17. Replacement of Lighting Fixtures with LED Energy Efficient Lights at the Parking Facility, Milwaukee, Wisconsin

    SciTech Connect (OSTI)

    David Brien

    2012-06-21T23:59:59.000Z

    The Forest County Potawatomi Community (FCPC or Tribe) owns a six-story parking facility adjacent to its Potawatomi Bingo Casino (the Casino) in Milwaukee, Wisconsin, as well as a valet parking facility under the Casino (collectively, the Parking Facility). The Parking Facility contained 205-watt metal halide-type lights that, for security reasons, operated 24 hours per day, 7 days per week. Starting on August 30, 2010, the Tribe replaced these fixtures with 1,760 state-of-the-art, energy efficient 55-Watt LED lights. This project resulted in an immediate average reduction in monthly peak demand of 238 kW over the fourth quarter of 2010. The average reduction in monthly peak demand from October 1 through December 31, 2010 translates into a forecast annual electrical energy reduction of approximately 1,995,000 kWh or 47.3% of the pre-project demand. This project was technically effective, economically feasible, and beneficial to the public not only in terms of long term energy efficiency and associated emissions reductions, but also in the short-term jobs provided for the S.E. Wisconsin region. The project was implemented, from approval by U.S. Department of Energy (DOE) to completion, in less than 6 months. The project utilized off-the-shelf proven technologies that were fabricated locally and installed by local trade contractors.

  18. The concept of the use of recycled uranium for increasing the degree of security of export deliveries of fuel for light-water reactors

    SciTech Connect (OSTI)

    Alekseev, P. N.; Ivanov, E. A.; Nevinitsa, V. A.; Ponomarev-Stepnoi, N. N.; Rumyantsev, A. N.; Shmelev, V. M. [Russian Research Center Kurchatov Institute (Russian Federation); Borisevich, V. D.; Smirnov, A. Yu.; Sulaberidze, G. A. [National Nuclear Research University MEPhI (Russian Federation)

    2010-12-15T23:59:59.000Z

    The present paper deals with investigation of the possibilities for reducing the risk of proliferation of fissionable materials by means of increasing the degree of protection of fresh fuel intended for light-water reactors against unsanctioned use in the case of withdrawal of a recipient country of deliveries from IAEA safeguards. It is shown that the use of recycled uranium for manufacturing export nuclear fuel makes transfer of nuclear material removed from the fuel assemblies for weapons purposes difficult because of the presence of isotope {sup 232}U, whose content increases when one attempts to enrich uranium extracted from fresh fuel. In combination with restricted access to technologies for isotope separation by means of establishing international centers for uranium enrichment, this technical measure can significantly reduce the risk of proliferation associated with export deliveries of fuel made of low-enriched uranium. The assessment of a maximum level of contamination of nuclear material being transferred by isotope {sup 232}U for the given isotope composition of the initial fuel is obtained. The concept of further investigations of the degree of security of export deliveries of fuel assemblies with recycled uranium intended for light-water reactors is suggested.

  19. Impact of the organic halide salt on final perovskite composition for photovoltaic applications

    SciTech Connect (OSTI)

    Moore, David T.; Sai, Hiroaki; Wee Tan, Kwan; Estroff, Lara A.; Wiesner, Ulrich, E-mail: ubw1@cornell.edu [Department of Materials Science and Engineering, Cornell University, Ithaca, New York 14853 (United States)

    2014-08-01T23:59:59.000Z

    The methylammonium lead halide perovskites have shown significant promise as a low-cost, second generation, photovoltaic material. Despite recent advances, however, there are still a number of fundamental aspects of their formation as well as their physical and electronic behavior that are not well understood. In this letter we explore the mechanism by which these materials crystallize by testing the outcome of each of the reagent halide salts. We find that components of both salts, lead halide and methylammonium halide, are relatively mobile and can be readily exchanged during the crystallization process when the reaction is carried out in solution or in the solid state. We exploit this fact by showing that the perovskite structure is formed even when the lead salt's anion is a non-halide, leading to lower annealing temperature and time requirements for film formation. Studies into these behaviors may ultimately lead to improved processing conditions for photovoltaic films.

  20. Oxide Film Aging on Alloy 22 in Halide Containing Solutions

    SciTech Connect (OSTI)

    Rodriguez, Martin A.; Carranza, Ricardo M. [Dept. Materiales, Comision Nacional de Energia Atomica, Av. Gral. Paz 1499, Villa Maipu, 1650 (Argentina); Rebak, Raul B. [Lawrence Livermore National Laboratory, 7000 East Ave, L-631, Livermore, CA, 94550-9698 (United States)

    2007-07-01T23:59:59.000Z

    Passive and corrosion behaviors of Alloy 22 in chloride and fluoride containing solutions, changing the heat treatment of the alloy, the halide concentration and the pH of the solutions at 90 deg. C, was investigated. The study was implemented using electrochemical techniques, which included open circuit potential monitoring over time, potentiodynamic polarization and electrochemical impedance spectroscopy (EIS) measurements carried out at open circuit and at passivity potentials. Corrosion rates obtained by EIS measurements after 24 h immersion in naturally aerated solutions were below 0.5 {mu}m/year. The corrosion rates were practically independent of solution pH, alloy heat treatment and halide ion nature and concentration. EIS low frequency resistance values increased with applied potential in the passive domain and with polarization time in pH 6 - 1 M NaCl at 90 deg. C. This effect was attributed to an increase in the oxide film thickness and oxide film aging. High frequency capacitance measurements indicated that passive oxide on Alloy 22 presented a double n-type/p-type semiconductor behavior in the passive potential range. (authors)

  1. A new polarizable force field for alkali and halide ions

    SciTech Connect (OSTI)

    Kiss, Péter T.; Baranyai, András [Institute of Chemistry, Eötvös University, 1518 Budapest 112, PO BOX 32 (Hungary)

    2014-09-21T23:59:59.000Z

    We developed transferable potentials for alkali and halide ions which are consistent with our recent model of water [P. T. Kiss and A. Baranyai, J. Chem. Phys. 138, 204507 (2013)]. Following the approach used for the water potential, we applied Gaussian charge distributions, exponential repulsion, and r{sup ?6} attraction. One of the two charges of the ions is fixed to the center of the particle, while the other is connected to this charge by a harmonic spring to express polarization. Polarizability is taken from quantum chemical calculations. The repulsion between different species is expressed by the combining rule of Kong [J. Chem. Phys. 59, 2464 (1972)]. Our primary target was the hydration free energy of ions which is correct within the error of calculations. We calculated water-ion clusters up to 6 water molecules, and, as a crosscheck, we determined the density and internal energy of alkali-halide crystals at ambient conditions with acceptable accuracy. The structure of hydrated ions was also discussed.

  2. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  3. Low-Pressure Sodium Lighting Basics

    Broader source: Energy.gov [DOE]

    Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color rendition. Typical applications include highway and security lighting, where color is not important.

  4. Methods for synthesizing alane without the formation of adducts and free of halides

    SciTech Connect (OSTI)

    Zidan, Ragaiy; Knight, Douglas A; Dinh, Long V

    2013-02-19T23:59:59.000Z

    A process is provided to synthesize an alane without the formation of alane adducts as a precursor. The resulting product is a crystallized .alpha.-alane and is a highly stable product and is free of halides.

  5. A Solid-State 199Hg NMR Study of Mercury Halides

    E-Print Network [OSTI]

    Taylor, Robert E; Bai, Shi; Dybowski, Cecil

    2011-01-01T23:59:59.000Z

    550 (1998), 89-99. [25] R. E. Taylor, C. T. Carver, R. E.7 (1997), 333-336. [33] R. E. Taylor, Concepts Magn. Reson.Study of Mercury Halides R. E. Taylor 1 *, Shi Bai 2 , and

  6. Negishi Coupling of Secondary Alkylzinc Halides with Aryl Bromides and Chlorides

    E-Print Network [OSTI]

    Han, Chong

    An efficient palladium-catalyzed process has been developed for Negishi coupling of secondary alkylzinc halides with a wide range of aryl bromides and activated aryl chlorides. A palladium catalyst composed of a new ...

  7. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01T23:59:59.000Z

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  8. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  9. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  10. Amino Alcohols as Ligands for Nickel-Catalyzed Suzuki Reactions of Unactivated Alkyl Halides, Including Secondary Alkyl Chlorides, with

    E-Print Network [OSTI]

    Fu, Gregory C.

    Amino Alcohols as Ligands for Nickel-Catalyzed Suzuki Reactions of Unactivated Alkyl Halides February 27, 2006; E-mail: gcf@mit.edu Early work in the area of palladium- and nickel-catalyzed cross of unactivated secondary alkyl halides is based on nickel/bathophenanthroline.4 This method can be applied

  11. Solid-State NMR/NQR and First-Principles Study of Two Niobium Halide Cluster Compounds

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Solid-State NMR/NQR and First-Principles Study of Two Niobium Halide Cluster Compounds Berislav : 10.1016/j.ssnmr.2014.02.001 #12;2 Abstract Two hexanuclear niobium halide cluster compounds solid-state NMR/NQR techniques and PAW/GIPAW calculations. For niobium sites the NMR parameters were

  12. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  13. A mechanistic study of aryl halide reactions with lithium aluminum hydride 

    E-Print Network [OSTI]

    Chung, Fu-Fan

    1980-01-01T23:59:59.000Z

    A M:"CHA~JISTIC STUDv OF ARYL HALID RHAC IC~JS ' ITH LITHIUM ALUM 'J"M HYDRIDE A Thesis FU-FAJJ CHUI'JG Submitted to the Graduate College of Texas ARM University in nartial fulfillment of the reauirement for the degree of MASTER OF SCI- JC... August Jo80 Major Subject: Chemistry A MECHANISTIC STUDY OF ARYL HALIDE REACTIONS 1'IITH LITHIUM ALUMINUM HYDRIDE A Thesis by FU-FAN CHUNG Approved as to style and content by; (Chairman of Co ittee) (Member) , . 7 1 (Member) (Member) i (Head...

  14. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  15. Transport phenomena in metal-halide lamps a poly-diagnostic study

    E-Print Network [OSTI]

    Eindhoven, Technische Universiteit

    UNIVERSITEIT EINDHOVEN Nimalasuriya, Tanya Transport phenomena in metal-halide lamps : a poly-diagnostic study / by Tanya Nimalasuriya. - Eindhoven : Technische Universiteit Eindhoven, 2007. Proefschrift. ISBN 978 aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr.ir. C.J. van

  16. Combined Cryo and Room-Temperature Ball Milling to Produce Ultrafine Halide Crystallites

    E-Print Network [OSTI]

    Srivastava, Kumar Vaibhav

    Combined Cryo and Room-Temperature Ball Milling to Produce Ultrafine Halide Crystallites AKASH milling at cryogenic temperature as well as room temperature (RT) has been carried out to prepare out in a high-energy ball mill, and it involves repeated deformation, cold-welding, fractur- ing

  17. COLOUR CENTRES IN DOPED ALKALI HALIDES. THE ROLE OF OXYGEN AND TITANIUM

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    COLOUR CENTRES IN DOPED ALKALI HALIDES. THE ROLE OF OXYGEN AND TITANIUM IN THE LUMINESCENCE OF Li that the luminescence occurs by hole capture at a titanium defect site. However electron spin resonance has shown that the titanium is incorporated in the crystal as Ti3+ and Ti4+ ions with the possibility of charge compensa- tion

  18. alkali halide-alkaline earth: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    alkali halide-alkaline earth First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Long range interactions...

  19. Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting...

    Broader source: Energy.gov (indexed) [DOE]

    conducting a major overhaul of its outdoor lighting (replacing 2,000 fixtures with LED lights), while boosting safety and security throughout the site. mcbquantico2014.pdf More...

  20. Lighting Research Group FinalReportOctober1999

    E-Print Network [OSTI]

    Lighting Research Group FinalReportOctober1999 Lighting Recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA #12;Final Report Lighting Recommendations to improve the lighting quality and energy efficiency of the lighting system at the Social Security

  1. Metal-halide perovskites for photovoltaic and light-emitting devices |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighand Retrievals from aRodMIT-Harvard Center for Excitonics

  2. Advanced lighting guidelines: 1993. Final report

    SciTech Connect (OSTI)

    Eley, C.; Tolen, T.M. [Eley Associates, San Francisco, CA (United States); Benya, J.R. [Luminae Souter Lighting Design, San Francisco, CA (United States); Rubinstein, F.; Verderber, R. [Lawrence Berkeley Lab., CA (United States)

    1993-12-31T23:59:59.000Z

    The 1993 Advanced Lighting Guidelines document consists of twelve guidelines that provide an overview of specific lighting technologies and design application techniques utilizing energy-efficient lighting practice. Lighting Design Practice assesses energy-efficient lighting strategies, discusses lighting issues, and explains how to obtain quality lighting design and consulting services. Luminaires and Lighting Systems surveys luminaire equipment designed to take advantage of advanced technology lamp products and includes performance tables that allow for accurate estimation of luminaire light output and power input. The additional ten guidelines -- Computer-Aided Lighting Design, Energy-Efficient Fluorescent Ballasts, Full-Size Fluorescent Lamps, Compact Fluorescent Lamps, Tungsten-Halogen Lamps, Metal Halide and HPS Lamps, Daylighting and Lumen Maintenance, Occupant Sensors, Time Scheduling Systems, and Retrofit Control Technologies -- each provide a product technology overview, discuss current products on the lighting equipment market, and provide application techniques. This document is intended for use by electric utility personnel involved in lighting programs, lighting designers, electrical engineers, architects, lighting manufacturers` representatives, and other lighting professionals.

  3. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01T23:59:59.000Z

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  4. Enhanced open voltage of BiFeO{sub 3} polycrystalline film by surface modification of organolead halide perovskite

    SciTech Connect (OSTI)

    Zhao, Pengjun [Key Laboratory of Functional Materials and Devices for Special Environments, Chinese Academy of Sciences, Xinjiang Key Laboratory of Electronic Information Materials and Devices, Xinjiang Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Urumqi 830011 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Bian, Liang; Xu, Jinbao, E-mail: xujb@ms.xjb.ac.cn; Chang, Aimin [Key Laboratory of Functional Materials and Devices for Special Environments, Chinese Academy of Sciences, Xinjiang Key Laboratory of Electronic Information Materials and Devices, Xinjiang Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Urumqi 830011 (China); Wang, Lei [Key Laboratory of Functional Materials and Devices for Special Environments, Chinese Academy of Sciences, Xinjiang Key Laboratory of Electronic Information Materials and Devices, Xinjiang Technical Institute of Physics and Chemistry, Chinese Academy of Sciences, Urumqi 830011 (China); Department of Research and Development, Shanghai Shanshan Tech. Co., Ltd., Shanghai 201209, China and Department of Chemistry, Zhejiang University, Hangzhou 310027 (China)

    2014-07-07T23:59:59.000Z

    Inorganic-organolead halide perovskite CH{sub 3}NH{sub 3}PbI{sub 3} modified BiFeO{sub 3} polycrystalline film has been established. The composite photoelectrode presents much larger open voltage and several magnitudes superior photoelectric conversion performance in comparison to the ordinary BiFeO{sub 3} polycrystalline film. The I-V curve shows that the short-circuit current (J{sub sc}) is 1.74?mA·cm{sup ?2} and open-circuit voltage (V{sub oc}) is 1.62?V, the device's photon to current efficiency is over 1%. The large open voltage and high photovoltaic efficiency is believed to attributed to the spontaneous polarization of composite perovskite induced by BiFeO{sub 3} lattice and modified reduced work function of the modified BiFeO{sub 3} surface. Our results clearly show that the present BiFeO{sub 3}-CH{sub 3}NH{sub 3}PbI{sub 3} planar device is capable to generate a large voltage in macro scale under visible light, leading an approach to further applications on photodetectors and optoelectronic switch.

  5. High Photoluminescence E?ciency and Optically Pumped Lasing in Solution-Processed Mixed Halide Perovskite Semiconductors

    E-Print Network [OSTI]

    Deschler, Felix; Price, Michael; Pathak, Sandeep; Klintberg, Lina E.; Jarausch, David-Dominik; Higler, Ruben; Hu?ttner, Sven; Leijtens, Tomas; Stranks, Samuel D.; Snaith, Henry J.; Atatu?re, Mete; Phillips, Richard T.; Friend, Richard H.

    2014-03-24T23:59:59.000Z

    The study of the photo-physical properties of organic-metallic lead-halide perovskites, which demonstrate excellent photovoltaic performance in devices with electron- and hole-accepting layers, helps to understand their charge photo...

  6. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec

    2014-08-31T23:59:59.000Z

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  7. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Determination of oxygen in molten alkali halide salts by proton activation analysis

    SciTech Connect (OSTI)

    Wai, C.M.; Dysart, M.E.

    1986-12-01T23:59:59.000Z

    The authors have recently used a lanthanum fluoride precipitation method to separate /sup 18/F produced from proton activation of /sup 18/O in alkali chloride and fluoride salts. The procedure was developed for studying dissolved oxide species in alkali halide melts. Determination of oxygen in these systems is important for research in batteries and in extractive metallurgy utilizing molten salts as solvents. The details are given oxygen determination in alkali chloride and fluoride systems.

  10. LEDs for Energy Efficient Greenhouse Lighting

    E-Print Network [OSTI]

    Singh, Devesh; Meinhardt-Wollweber, Merve; Roth, Bernhard

    2014-01-01T23:59:59.000Z

    Light energy is an important factor for plant growth. In regions where the natural light source, i.e. solar radiation, is not sufficient for growth optimization, additional light sources are being used. Traditional light sources such as high pressure sodium lamps and other metal halide lamps are not very efficient and generate high radiant heat. Therefore, new sustainable solutions should be developed for energy efficient greenhouse lighting. Recent developments in the field of light source technologies have opened up new perspectives for sustainable and highly efficient light sources in the form of light-emitting diodes, i.e. LEDs, for greenhouse lighting. This review focuses on the potential of LEDs to replace traditional light sources in the greenhouse. In a comparative economic analysis of traditional vs. LED lighting, we show that the introduction of LEDs allows reduction of the production cost of vegetables in the long-run of several years, due to the high energy efficiency, low maintenance cost and lon...

  11. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  12. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  13. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. Bandgap calculations and trends of organometal halide perovskites

    SciTech Connect (OSTI)

    Castelli, Ivano E., E-mail: ivca@fysik.dtu.dk; Thygesen, Kristian S.; Jacobsen, Karsten W. [Center for Atomic-scale Materials Design (CAMD), Department of Physics, Technical University of Denmark, DK 2800 Kgs. Lyngby (Denmark); García-Lastra, Juan María [Center for Atomic-scale Materials Design (CAMD), Department of Physics, Technical University of Denmark, DK 2800 Kgs. Lyngby (Denmark); Department of Energy Conversion and Storage, Technical University of Denmark, DK 4000 Roskilde (Denmark)

    2014-08-01T23:59:59.000Z

    Energy production from the Sun requires a stable efficient light absorber. Promising candidates in this respect are organometal perovskites (ABX{sub 3}), which have been intensely investigated during the last years. Here, we have performed electronic structure calculations of 240 perovskites composed of Cs, CH{sub 3}NH{sub 3}, and HC(NH{sub 2}){sub 2} as A-cation, Sn and Pb as B-ion, and a combination of Cl, Br, and I as anions. The calculated gaps span over a region from 0.5 to 5.0 eV. In addition, the trends over bandgaps have been investigated: the bandgap increases with an increase of the electronegativities of the constituent species, while it reduces with an increase of the lattice constants of the system.

  16. Fabrication of large-volume, low-cost ceramic lanthanum halide scintillators for gamma ray detection : final report for DHS/DNDO/TRDD project TA-01-SL01.

    SciTech Connect (OSTI)

    Boyle, Timothy J.; Ottley, Leigh Anna M.; Yang, Pin; Chen, Ching-Fong; Sanchez, Margaret R.; Bell, Nelson Simmons

    2008-10-01T23:59:59.000Z

    This project uses advanced ceramic processes to fabricate large, optical-quality, polycrystalline lanthanum halide scintillators to replace small single crystals produced by the conventional Bridgman growth method. The new approach not only removes the size constraint imposed by the growth method, but also offers the potential advantages of both reducing manufacturing cost and increasing production rate. The project goal is to fabricate dense lanthanum halide ceramics with a preferred crystal orientation by applying texture engineering and solid-state conversion to reduce the thermal mechanical stress in the ceramic and minimize scintillation light scattering at grain boundaries. Ultimately, this method could deliver the sought-after high sensitivity and <3% energy resolution at 662 keV of lanthanum halide scintillators and unleash their full potential for advanced gamma ray detection, enabling rapid identification of radioactive materials in a variety of practical applications. This report documents processing details from powder synthesis, seed particle growth, to final densification and texture development of cerium doped lanthanum bromide (LaBr{sub 3}:Ce{sup +3}) ceramics. This investigation demonstrated that: (1) A rapid, flexible, cost efficient synthesis method of anhydrous lanthanum halides and their solid solutions was developed. Several batches of ultrafine LaBr{sub 3}:Ce{sup +3} powder, free of oxyhalide, were produced by a rigorously controlled process. (2) Micron size ({approx} 5 {micro}m), platelet shape LaBr{sub 3} seed particles of high purity can be synthesized by a vapor phase transport process. (3) High aspect-ratio seed particles can be effectively aligned in the shear direction in the ceramic matrix, using a rotational shear-forming process. (4) Small size, highly translucent LaBr{sub 3} (0.25-inch diameter, 0.08-inch thick) samples were successfully fabricated by the equal channel angular consolidation process. (5) Large size, high density, translucent LaBr{sub 3} ceramics samples (3-inch diameter, > 1/8-inch thick) were fabricated by hot pressing, demonstrating the superior manufacturability of the ceramic approach over single crystal growth methods in terms of size capability and cost. (6) Despite all these advances, evidence has shown that LaBr{sub 3} is thermally unstable at temperatures required for the densification process. This is particularly true for material near the surface where lattice defects and color centers can be created as bromine becomes volatile at high temperatures. Consequently, after densification these samples made using chemically prepared ultrafine powders turned black. An additional thermal treatment in a flowing bromine condition proved able to reduce the darkness of the surface layer for these densified samples. These observations demonstrated that although finer ceramic powders are desirable for densification due to a stronger driving force from their large surface areas, the same desirable factor can lead to lattice defects and color centers when these powders are densified at higher temperatures where material near the surface becomes thermally unstable.

  17. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  1. Interactive Montages of Sprites for Indexing and Summarizing Security Video

    E-Print Network [OSTI]

    Pal, Chris

    for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial slowly occurring lighting changes and alterations of camera position. To achieve this, we compute a MAP

  2. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  3. Many exterior entry lights in residential and commercial applications use two-

    E-Print Network [OSTI]

    , and replacement CFLs are not widely stocked. The Light-Emitting Diode (LED) Hybrid Security Fixture combines

  4. A mechanistic study of aryl halide reactions with lithium aluminum hydride

    E-Print Network [OSTI]

    Chung, Fu-Fan

    1980-01-01T23:59:59.000Z

    A M:"CHA~JISTIC STUDv OF ARYL HALID RHAC IC~JS ' ITH LITHIUM ALUM 'J"M HYDRIDE A Thesis FU-FAJJ CHUI'JG Submitted to the Graduate College of Texas ARM University in nartial fulfillment of the reauirement for the degree of MASTER OF SCI- JC... of this stud!y :a to investigate possibility o f a. fr ee r a . 1 ca machina=--. by;;h:ch ". thium alum'num hydride may reduce organic ccmnounds. evzcus results have irdicated that thc reductior of o-allylcxy- 'oenzene diazonium icn by . ributyltin hydrioe...

  5. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  6. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  7. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  8. High voltage ignition of high pressure microwave powered UV light sources

    SciTech Connect (OSTI)

    Frank, J.D.; Cekic, M.; Wood, C.H. [Fusion U.V. Curing Systems Corp., Gaithersburg, MD (United States)

    1997-12-31T23:59:59.000Z

    Industrial microwave powered (electrodeless) light sources have been limited to quiescent pressures of {approximately}300 Torr of buffer gas and metal-halide fills. The predominant reason for such restrictions has been the inability to microwave ignite the plasma due to the collisionality of higher pressure fills and/or the electronegativity of halide bulb chemistries. Commercially interesting bulb fills require electric fields for ionization that are often large multiples of the breakdown voltage for air. Many auxiliary ignition methods are evaluated for efficiency and practicality before the choice of a high-voltage system with a retractable external electrode. The scheme utilizes a high voltage pulse power supply and a novel field emission source. Acting together they create localized condition of pressure reduction and high free electron density. This allows the normal microwave fields to drive this small region into avalanche, ignite the bulb, and heat the plasma to its operating point (T{sub e} {approx} 0.5 eV). This process is currently being used in a new generation of lamps, which are using multi-atmospheric excimer laser chemistries and pressure and constituent enhanced metal-halide systems. At the present time, production prototypes produce over 900 W of radiation in a 30 nm band, centered at 308 nm. Similarly, these prototypes when loaded with metal-halide bulb fills produce over 1 kW of radiation in 30 nm wide bands, centered about the wavelength of interest.

  9. Evaluation of Methods to Increase Light Under Ferry Terminals

    SciTech Connect (OSTI)

    Blanton, Susan L.; Thom, Ronald M.; Borde, Amy B.; Diefenderfer, Heida L.; Southard, John A.

    2002-01-02T23:59:59.000Z

    To address concerns of resource agencies about the potential impacts of ferry terminal expansion on valuable habitat functions and resource use of nearshore areas, the Pacific Northwest National Laboratory (PNNL), in partnership with the Washington State Department of Transportation (WSDOT), conducted field trials with off-the-shelf products that promote light passage through dock structures. These products included a SunTunnel, deck prisms, and a metal halide greenhouse light. Light measurements (photosynthetically active radiation, PAR) were also recorded beneath glass blocks and a metal grating installed at Clinton Ferry Terminal on Whidbey Island, WA. A review of other studies measuring the effects of dock shading and alternate dock materials was conducted. PAR measurements from this study were related to minimum requirements for eelgrass Zostera marina photosynthesis and to the known maximum photosynthetic ?saturation? rate for Z. marina. We also related PAR measurements to what we know about light effects on juvenile salmonid feeding and passage under overwater structures. Of the light technologies tested, the metal halide light, SunTunnel, glass blocks, and grating potentially provide enough light for eelgrass growth underneath a ferry terminal with similar construction to the Clinton Ferry Terminal. All of these technologies would potentially provide adequate light under conditions where eelgrass is located at its upper depth limit and a dock is close to the water surface. Light levels needed to allow fish to feed and to form schools are low (~ 1-2 mmol/m2/s), and much less than those required for photosynthesis. Our research indicates that installing any of the tested light products would likely maintain light levels under the dock above those required for active feeding by juvenile salmonids.

  10. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  11. Development of a Phosphate Ceramic as a Host for Halide-contaminated Plutonium Pyrochemical Reprocessing Wastes

    SciTech Connect (OSTI)

    Metcalfe, Brian; Fong, Shirley K.; Gerrard, Lee A.; Donald, Ian W.; Strachan, Denis M.; Scheele, Randall D.

    2007-03-31T23:59:59.000Z

    The presence of halide anions in four types of wastes arising from the pyrochemical reprocessing of plutonium required an immobilization process to be developed in which not only the actinide cations but also the halide anions were immobilized in a durable waste form. At AWE, we have developed such a process using Ca3(PO4)2 as the host material. Successful trials of the process with actinide- and Cl-bearing Type I waste were carried out at PNNL where the immobilization of the waste in a form resistant to aqueous leaching was confirmed. Normalized mass losses determined at 40°C and 28 days were 12 x 10-6 g?m-2 and 2.7 x 10-3 g?m-2 for Pu and Cl, respectively. Accelerated radiation-induced damage effects are being determined with specimens containing 238Pu. No changes in the crystalline lattice have been detected with XRD after the 239Pu equivalent of 400 years ageing. Confirmation of the process for Type II waste (a oxyhydroxide-based waste) is currently underway at PNNL. Differences in the ionic state of Pu in the four types of waste have required different surrogates to be used. Samarium chloride was used successfully as a surrogate for both Pu(III) and Am(III) chlorides. Initial investigations into the use of HfO2 as the surrogate for Pu(IV) oxide in Type II waste indicated no significant differences.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  14. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  15. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  16. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  1. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  5. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  6. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  7. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  8. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  9. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  10. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  11. Nickel-catalyzed cross-couplings of unactivated secondary and tertiary alkyl halides and photoinduced copper-mediated asymmetric C-N cross-couplings

    E-Print Network [OSTI]

    Zultanski, Susan L. (Susan Lyn)

    2013-01-01T23:59:59.000Z

    Chapter 1 describes the development of two nickel-catalyzed Suzuki cross-coupling methodologies that employ alkyl halides as electrophiles. In Section 1.1, asymmetric [gamma]-alkylation relative to a carbonyl group is ...

  12. Highly efficient light management for perovskite solar cells

    E-Print Network [OSTI]

    Wang, Dong-Lin; Hou, Guo-Jiao; Zhu, Zhen-Gang; Yan, Qing-Bo; Su, Gang

    2015-01-01T23:59:59.000Z

    Organic-inorganic halide perovskite solar cells have enormous potential to impact the existing photovoltaic industry. As realizing a higher conversion efficiency of the solar cell is still the most crucial task, a great number of schemes were proposed to minimize the carrier loss by optimizing the electrical properties of the perovskite solar cells. Here, we focus on another significant aspect that is to minimize the light loss by optimizing the light management to gain a high efficiency for perovskite solar cells. In our scheme, the slotted and inverted prism structured SiO2 layers are adopted to trap more light into the solar cells, and a better transparent conducting oxide layer is employed to reduce the parasitic absorption. For such an implementation, the efficiency and the serviceable angle of the perovskite solar cell can be promoted impressively. This proposal would shed new light on developing the high-performance perovskite solar cells.

  13. Development of a Phosphate Ceramic as a Host for Halide-Contaminated Plutonium Pyrochemical Reprocessing Wastes

    SciTech Connect (OSTI)

    Metcalfe, Brian; Fong, Shirley; Gerrard, Lee; Donald, Ian [MSRD, AWE plc, AWE Aldermaston, Reading, RG7 4PR (United Kingdom); Strachan, Denis; Scheele, Randall [PNNL, Richland, WA, 99352 (United States)

    2007-07-01T23:59:59.000Z

    The presence of halide anions in four types of wastes arising from the pyrochemical reprocessing of plutonium required an immobilization process to be developed in which not only the actinide cations but also the halide anions were immobilized in a durable, leach resistant form. AWE has developed such a process using Ca{sub 3}(PO{sub 4}){sub 2} as the host material. Successful trials of the process using actinide-doped Type I waste (essentially a chloride-based waste) were carried out at PNNL where the immobilization of the waste in a form resistant to aqueous leaching was confirmed. Normalized mass losses determined using a modified MCC-1 test at 40 deg. C/28 days were 12 x 10{sup -6} g.m{sup -2} and 2.7 x 10{sup -3} g.m{sup -2} for Pu and Cl, respectively. Accelerated radiation-induced damage effects are being determined with specimens containing {sup 238}Pu. No changes in the crystalline lattice have been detected with XRD after the {sup 239}Pu equivalent of 400 years ageing. Confirmation of the process for Type II waste (an oxyhydroxide-based waste) is currently underway at PNNL. Differences in the ionic state of plutonium in the four types of waste have required different surrogates to be used. Samarium chloride was used successfully as a surrogate for both Pu(III) and Am(III) chlorides. Early investigations into the use of HfO{sub 2} as the surrogate for Pu(IV) oxide in Type II waste showed some apparent differences in the phase assemblages of the surrogate and actinide-based products. However XRD examination of the products at higher resolution has demonstrated there is no significant difference and that for this work HfO{sub 2} is a suitable surrogate for PuO{sub 2}. (authors)

  14. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  15. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  16. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  17. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01T23:59:59.000Z

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  18. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  19. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  20. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  1. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  2. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  3. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  4. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  5. Calcium looping process for high purity hydrogen production integrated with capture of carbon dioxide, sulfur and halides

    DOE Patents [OSTI]

    Ramkumar, Shwetha; Fan, Liang-Shih

    2013-07-30T23:59:59.000Z

    A process for producing hydrogen comprising the steps of: (i) gasifying a fuel into a raw synthesis gas comprising CO, hydrogen, steam, sulfur and halide contaminants in the form of H.sub.2S, COS, and HX, wherein X is a halide; (ii) passing the raw synthesis gas through a water gas shift reactor (WGSR) into which CaO and steam are injected, the CaO reacting with the shifted gas to remove CO.sub.2, sulfur and halides in a solid-phase calcium-containing product comprising CaCO.sub.3, CaS and CaX.sub.2; (iii) separating the solid-phase calcium-containing product from an enriched gaseous hydrogen product; and (iv) regenerating the CaO by calcining the solid-phase calcium-containing product at a condition selected from the group consisting of: in the presence of steam, in the presence of CO.sub.2, in the presence of synthesis gas, in the presence of H.sub.2 and O.sub.2, under partial vacuum, and combinations thereof.

  6. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  7. Environmental and health aspects of lighting: Mercury

    SciTech Connect (OSTI)

    Clear, R.; Berman, S.

    1993-07-01T23:59:59.000Z

    Most discharge lamps, including fluorescent lamps, metal halide lamps, and high pressure sodium lamps, contain Mercury, a toxic chemical. Lighting professionals need to be able to respond to questions about the direct hazards of Mercury from accidentally breaking lamps, and the potential environmental hazards of lamp operation and disposal. We calculated the exposures that could occur from an accidental breakage of lamps. Acute poisoning appears almost impossible. Under some circumstances a sealed environment, such as a space station, could be contaminated enough to make it unhealthy for long-term occupation. Mercury becomes a potential environmental hazard after it becomes methylated. Mercury is methylated in aquatic environments, where it may accumulate in fish, eventually rendering them toxic to people and other animals. Lighting causes Mercury to enter the environment directly from lamp disposal, and indirectly from power plant emissions. The environmental tradeoffs between incandescent and discharge lamps depend upon the amounts released by these two sources, their local concentrations, and their probabilities of being methylated. Indirect environmental effects of lighting also include the release of other heavy metals (Cadmium, Lead and Arsenic), and other air pollutants and carbon dioxide that are emitted by fossil fuel power plants. For a given light output, the level of power plant emissions depends upon the efficacy of the light source, and is thus much larger for incandescent lamps than for fluorescent or discharge lamps. As disposal and control technologies change the relative direct and indirect emissions from discharge and incandescent lamps will change.

  8. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  9. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  10. Trial Demonstration of Area Lighting Retrofit: Yuma Border Patrol, Yuma Arizona

    SciTech Connect (OSTI)

    Wilkerson, Andrea M.; McCullough, Jeffrey J.

    2014-12-30T23:59:59.000Z

    The Yuma Sector Border Patrol Area is a high flux lighting application in a high temperature environment, presenting a formidable challenge for light-emitting diodes (LEDs). This retrofit is an Energy Savings Performance Contract ENABLE project under the U.S. Department of Energy (DOE) Federal Energy Management Program. If high flux LED technology performs well in a region with high ambient temperature and solar radiation, it can perform well in most outdoor environments. The design process for the Yuma retrofit has already provided valuable knowledge to CBP and DOE. The LED lighting system selected for the retrofit is expected to reduce energy consumption 69% compared to the incumbent quartz metal halide (QMH) lighting system. If the LED lighting system is installed, GATEWAY will continue to document and disseminate information regarding the installation and long-term performance so that others may also gain valuable knowledge from the Yuma Sector Border Patrol Area lighting retrofit.

  11. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  12. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  14. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  15. Evaluation of Methods to Increase Light under Large Overwater Structures

    SciTech Connect (OSTI)

    Sargeant, Susan L.; Thom, Ronald M.; Diefenderfer, Heida L.; Borde, Amy B.; Southard, John A.

    2003-03-31T23:59:59.000Z

    To address resource agency concerns about potential impacts of ferry terminal expansion on habitat functions and resource use of nearshore areas, the Pacific Northwest National Laboratory, in partnership with the Washington State Department of Transportation, conducted field trials with several products that promote light passage through dock structures. Photosynthetically active radiation (PAR) measurements were compared with known minimum requirements for survival of eelgrass, Zostera marina, which provides critical habitat for the federally listed chinook salmon, Oncorhynchus tshawytscha. PAR measurements were also related to what is known about the effects of light on juvenile salmonid feeding and passage under overwater structures. In general, the products predicted to provide the most to the least light were the grating, SunTunnel, metal halide greenhouse light, and prisms. All the light technologies tested could provide enough light for eelgrass underneath a ferry terminal, though multiples of some devices would be required. Because less light is required for fish to feed than for photosynthesis, any of the products would provide enough light for juvenile salmon to feed under the structure. The number and placement of these devices could be arranged to maximize light penetration for particular purposes in different situations.

  16. Deposition of refractory metal films by rare-gas halide laser photodissociation of metal carbonyls

    SciTech Connect (OSTI)

    Flynn, D.K.; Steinfeld, J.I.; Sethi, D.S.

    1986-06-01T23:59:59.000Z

    Films of Cr, Mo, and W on quartz, Pyrex, Suprasil, and Al substrates were deposited by photodissociation of the respective hexacarbonyls using focused and pulsed radiation from rare-gas halide lasers. Cr was deposited by dissociation of Cr(CO)/sub 6/ using XeF (308 nm), KrF (249 nm), and ArF (193 nm) lasers. Mo and W were deposited from their respective hexacarbonyls at 249 and 193 nm. Pulse energies varied between 8 and 12 mJ. Pulse rates of 10--60 Hz were used. The pulse duration was about 10 ns. Depositions with substrates both parallel and perpendicular to the excimer radiation were attempted. Only in the case of perpendicular configuration were strongly adherent films observed. The deposition rates for thicknesses up to 3000 A appeared to be independent of the pulse rate for all three metals. The films exhibited strong adhesion to the substrate. Scanning electron microscope photographs of the films revealed the presence of continuous metal layers. Auger and x-ray analyses of the films indicated contamination from carbon and oxygen. The source of these impurities is most likely to be CO produced in the decarbonylation of the parent hexacarbonyl. Adhesion to the substrate is apparently enhanced by laser stimulated generation of strong binding sites on the surface.

  17. Smart lighting: New Roles for Light

    E-Print Network [OSTI]

    Salama, Khaled

    Smart lighting: New Roles for Light in the Solid State Lighting World Robert F. Karlicek, Jr. Director, Smart Lighting Engineering Research Center Professor, Electrical, Systems and Computer Lighting · What is Smart Lighting · Technology Barriers to Smart Lighting · Visible Light Communications

  18. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  19. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  20. Commercial Lighting

    Broader source: Energy.gov [DOE]

    Commercial lighting accounts for more than 20 percent of total commercial building energy use. The Energy Department works to reduce lighting energy use through research and deployment.

  1. Methyl halide and biogenic volatile organic compound fluxes from perennial bioenergy crops and annual arable crops 

    E-Print Network [OSTI]

    Morrison, Eilidh Christina

    2013-11-28T23:59:59.000Z

    The depletion of fossil fuel resources, pollution concerns and the challenge of energy security are driving the search for renewable energy sources. The use of lignocellulosic plant biomass as an energy source is increasing ...

  2. Lecture 13: Control System Cyber Security

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  3. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  4. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  5. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  6. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  7. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  8. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  9. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  10. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  11. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  12. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  13. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  15. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  16. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  18. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  19. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  20. Light Properties Light travels at the speed of light `c'

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    LIGHT!! #12;Light Properties Light travels at the speed of light `c' C = 3 x 108 m/s Or 190,000 miles/second!! Light could travel around the world about 8 times in one second #12;What is light?? Light is a "wave packet" A photon is a "light particle" #12;Electromagnetic Radiation and You Light is sometimes

  1. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  4. Gas Phase Chromatography of some Group 4, 5, and 6 Halides

    SciTech Connect (OSTI)

    Sylwester, Eric Robert

    1998-10-01T23:59:59.000Z

    Gas phase chromatography using The Heavy Element Volatility Instrument (HEVI) and the On Line Gas Apparatus (OLGA III) was used to determine volatilities of ZrBr{sub 4}, HfBr{sub 4}, RfBr{sub 4}, NbBr{sub 5}, TaOBr{sub 3}, HaCl{sub 5}, WBr{sub 6}, FrBr, and BiBr{sub 3}. Short-lived isotopes of Zr, Hf, Rf, Nb, Ta, Ha, W, and Bi were produced via compound nucleus reactions at the 88-Inch Cyclotron at Lawrence Berkeley National Laboratory and transported to the experimental apparatus using a He gas transport system. The isotopes were halogenated, separated from the other reaction products, and their volatilities determined by isothermal gas phase chromatography. Adsorption Enthalpy ({Delta}H{sub a}) values for these compounds were calculated using a Monte Carlo simulation program modeling the gas phase chromatography column. All bromides showed lower volatility than molecules of similar molecular structures formed as chlorides, but followed similar trends by central element. Tantalum was observed to form the oxybromide, analogous to the formation of the oxychloride under the same conditions. For the group 4 elements, the following order in volatility and {Delta}H{sub a} was observed: RfBr{sub 4} > ZrBr{sub 4} > HfBr{sub 4}. The {Delta}H{sub a} values determined for the group 4, 5, and 6 halides are in general agreement with other experimental data and theoretical predictions. Preliminary experiments were performed on Me-bromides. A new measurement of the half-life of {sup 261}Rf was performed. {sup 261}Rf was produced via the {sup 248}Cm({sup 18}O, 5n) reaction and observed with a half-life of 74{sub -6}{sup +7} seconds, in excellent agreement with the previous measurement of 78{sub -6}{sup +11} seconds. We recommend a new half-life of 75{+-}7 seconds for {sup 261}Rf based on these two measurements. Preliminary studies in transforming HEVI from an isothermal (constant temperature) gas phase chromatography instrument to a thermochromatographic (variable temperature) instrument have been completed. Thermochromatography is a technique that can be used to study the volatility and {Delta}H{sub a} of longer-lived isotopes off-line, Future work will include a comparison between the two techniques and the use of thermochromatography to study isotopes in a wider range of half-lives and molecular structures.

  5. Halide, Chromate, and Phosphate Impacts on LAW Glass for Dynamic Flowsheet 24590-WTP-MCR-PET-09-0037, Rev. 1

    SciTech Connect (OSTI)

    Gimpel, Rodney F.; Kruger, Albert A.

    2013-12-16T23:59:59.000Z

    Revision 1 of this Model Change Request changed Equation 6 in Attachment Al only. Melter studies have shown that halide, chromium, and phosphates can cause precipitation of solids that can interfer the melting process. Pilot melter data now shows what concentrations LAW glass can tolerate. These limits shall be incorporated into the existing LAW glass algorithm per Attachment Al.

  6. Smart Lighting Controller!! Smart lighting!

    E-Print Network [OSTI]

    Anderson, Betty Lise

    1! Smart Lighting Controller!! #12;2! Smart lighting! No need to spend energy lighting the room if://blogs.stthomas.edu/realestate/2011/01/24/residential-real-estate-professionals-how-do-you- develop feedback! There is a connection between the output and the input! Therefore forces inputs to same voltage

  7. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  8. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  9. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  10. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  11. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  13. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  14. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  15. Cerenkov Light

    ScienceCinema (OSTI)

    Slifer, Karl

    2014-05-22T23:59:59.000Z

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  16. Cerenkov Light

    SciTech Connect (OSTI)

    Slifer, Karl

    2013-06-13T23:59:59.000Z

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  17. Lighting Renovations

    Broader source: Energy.gov [DOE]

    When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

  18. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  19. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  20. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  1. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  2. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  3. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  4. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  5. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  6. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  7. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  8. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  9. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  10. Sensitivity of alkali halide scintillating calorimeters with particle identification to investigate the DAMA dark matter detection claim

    E-Print Network [OSTI]

    Patrick Nadeau; Michael Clark; P. C. F. Di Stefano; J. -C. Lanfranchi; S. Roth; M. von Sivers; Itay Yavin

    2015-04-07T23:59:59.000Z

    Scintillating calorimeters are cryogenic detectors combining a measurement of scintillation with one of phonons to provide particle identification. In view of developing alkali halide devices of this type able to check the DAMA/LIBRA claim for the observation of dark matter, we have simulated detector performances to determine their sensitivity by two methods with little model-dependence. We conclude that if performance of the phonon channel can be brought in line with those of other materials, an exposure of 10 kg-days would suffice to check the DAMA/LIBRA claim in standard astrophysical scenarios. Additionally, a fairly modest array of 5 kg with background rejection would be able to directly check the DAMA/LIBRA modulation result in 2 years.

  11. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  12. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  13. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  14. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  15. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  16. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  17. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  19. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  20. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  3. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  4. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  5. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  6. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  7. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  8. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  9. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  10. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  11. Front lighted optical tooling method and apparatus

    DOE Patents [OSTI]

    Stone, W.J.

    1983-06-30T23:59:59.000Z

    An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument.

  12. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  13. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  14. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  15. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  16. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  17. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  18. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  19. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  20. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  1. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  2. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  3. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  5. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  7. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  8. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  9. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  10. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  11. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  12. Light Computing

    E-Print Network [OSTI]

    Gordon Chalmers

    2006-10-13T23:59:59.000Z

    A configuration of light pulses is generated, together with emitters and receptors, that allows computing. The computing is extraordinarily high in number of flops per second, exceeding the capability of a quantum computer for a given size and coherence region. The emitters and receptors are based on the quantum diode, which can emit and detect individual photons with high accuracy.

  13. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  14. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  15. THE EFFECTS OF HALIDE MODIFIERS ON THE SORPTION KINETICS OF THE LI-MG-N-H SYSTEM

    SciTech Connect (OSTI)

    Anton, D.; Gray, J.; Price, C.; Lascola, R.

    2011-07-20T23:59:59.000Z

    The effects of different transition metal halides (TiCl{sub 3}, VCl{sub 3}, ScCl{sub 3} and NiCl{sub 2}) on the sorption properties of the 1:1 molar ratio of LiNH{sub 2} to MgH{sub 2} are investigated. The modified mixtures were found to contain LiNH{sub 2}, MgH{sub 2} and LiCl. TGA results showed that the hydrogen desorption temperature was reduced with the modifier addition in this order: TiCl{sub 3} > ScCl{sub 3} > VCl{sub 3} > NiCL{sub 2}. Ammonia release was not significantly reduced resulting in a weight loss greater than the theoretical hydrogen storage capacity of the material. The isothermal sorption kinetics of the modified systems showed little improvement after the first dehydrogenation cycle over the unmodified system but showed drastic improvement in rehydrogenation cycles. X-ray diffraction and Raman spectroscopy identified the cycled material to be composed of LiH, MgH{sub 2}, Mg(NH{sub 2}){sub 2} and Mg{sub 3}N{sub 2}.

  16. Lighting system with thermal management system having point contact synthetic jets

    DOE Patents [OSTI]

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2013-12-10T23:59:59.000Z

    Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  17. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  18. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  19. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  20. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  1. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  2. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  3. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  4. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  5. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  6. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  7. Residential Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical squestionnairesquestionnaires AgreementLighting

  8. Energy Efficiency and Conservation Block Grant Program

    Broader source: Energy.gov (indexed) [DOE]

    1) Upgrade lighting and metal halide fixtures along Emma Street with light-emitting diode (LED) fixtures; 2) replace metal halide fixtures in Murphy and Hunt Parks; 3)...

  9. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  10. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  11. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  12. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  13. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  14. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  15. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  16. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  17. Demonstration Assessment of Light-Emitting Diode (LED) Parking Lot Lighting in Leavenworth, KS

    SciTech Connect (OSTI)

    Myer, Michael; Kinzey, Bruce R.; Curry, Ku'uipo

    2011-05-06T23:59:59.000Z

    This report describes the process and results of a demonstration of solid-state lighting (SSL) technology in a commercial parking lot lighting application, under the U.S. Department of Energy (DOE) Solid-State Lighting Technology GATEWAY Demonstration Program. The parking lot is for customers and employees of a Walmart Supercenter in Leavenworth, Kansas and this installation represents the first use of the LED Parking Lot Performance Specification developed by the DOE’s Commercial Building Energy Alliance. The application is a parking lot covering more than a half million square feet, lighted primarily by light-emitting diodes (LEDs). Metal halide wall packs were installed along the building facade. This site is new construction, so the installed baseline(s) were hypothetical designs. It was acknowledged early on that deviating from Walmart’s typical design would reduce the illuminance on the site. Walmart primarily uses 1000W pulse-start metal halide (PMH) lamps. In order to provide a comparison between both typical design and a design using conventional luminaires providing a lower illuminance, a 400W PMH design was also considered. As mentioned already, the illuminance would be reduced by shifting from the PMH system to the LED system. The Illuminating Engineering Society of North America (IES) provides recommended minimum illuminance values for parking lots. All designs exceeded the recommended illuminance values in IES RP-20, some by a wider margin than others. Energy savings from installing the LED system compared to the different PMH systems varied. Compared to the 1000W PMH system, the LED system would save 63 percent of the energy. However, this corresponds to a 68 percent reduction in illuminance as well. In comparison to the 400W PMH system, the LED system would save 44 percent of the energy and provide similar minimum illuminance values at the time of relamping. The LED system cost more than either of the PMH systems when comparing initial costs. However, when the life-cycle costs from energy and maintenance were factored into the scenario, the LED system had lower costs at the end of a 10-year analysis period. The LED system had a 6.1 year payback compared to the 1000W PMH system and a 7.5 year payback versus the 400W PMH system. The costs reflect high initial cost for the LED luminaire, plus more luminaires and (subsequently) more poles for the LED system. The other major issue affecting cost effectiveness was that Leavenworth, Kansas has very low electricity costs. The melded rate for this site was $0.056 per kWh for electricity. However, if the national electricity rate of $0.1022/kWh was used the payback would change to between four and five years for the LED system. This demonstration met the GATEWAY requirements of saving energy, matching or improving illumination, and being cost effective. The project also demonstrated that the Commercial Building Energy Alliance (CBEA) specification works in practice. Walmart appreciated having an entire site lighted by LEDs to gain more experience with the technology. Walmart is reviewing the results of the demonstration as they consider their entire real estate portfolio.

  18. Lighting Inventory Lighting Theatre and Drama

    E-Print Network [OSTI]

    Indiana University

    Lighting Inventory Lighting Theatre and Drama Description Totals R.Halls Wells- Metz Light ERS ETC SourceFour 25 25 50 degree ERS Strand Lighting 64 14 24 12 14 36 degree ERS ETC Source Four 15 15 36 degree ERS Strand Lighting 124 60 58 2 4 26 degree ERS ETC SourceFour 2 2 26 degree ERS Strand

  19. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  20. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  1. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  2. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  3. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  4. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  5. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  6. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  7. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  8. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  9. LED Lighting Basics

    Broader source: Energy.gov [DOE]

    Light-Emitting diodes (LEDs) efficiently produce light in a fundamentally different way than any legacy or traditional source of light.

  10. Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count theLienertLift Forces in a Light

  11. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  12. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  13. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  14. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  15. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  16. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  17. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  18. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  19. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  20. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    initiatives to be accomplished within the next five years using light technologies and best practices to provide enterprise-wide services in a cost effective and efficient...

  2. Dual LED/incandescent security fixture

    DOE Patents [OSTI]

    Gauna, Kevin Wayne

    2005-06-21T23:59:59.000Z

    A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

  3. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  4. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  5. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  6. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  7. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  8. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  9. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  10. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  11. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  12. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  13. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  15. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  16. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  17. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  20. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  1. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  2. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  4. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  5. Lead (II) selenite halides Pb{sub 3}(SeO{sub 3}){sub 2}X{sub 2} (X = Br, I): Synthesis and crystal structure

    SciTech Connect (OSTI)

    Berdonosov, P. S., E-mail: berdonosov@inorg.chem.msu.ru; Olenev, A. V.; Dolgikh, V. A. [Moscow State University (Russian Federation)

    2012-03-15T23:59:59.000Z

    Two lead selenite halides, Pb{sub 3}(SeO{sub 3}){sub 2}Br{sub 2} and Pb{sub 3}(SeO{sub 3}){sub 2}I{sub 2}, have been prepared by solid-phase synthesis and structurally characterized. These compounds are isotypic and can be considered 3D with a microporous framework composed of lead polyhedra (distorted Archimedean antiprisms formed by oxygen and halogen atoms). The framework contains channels oriented in the [010] direction. These channels contain selenium atoms, which are bound with framework oxygen atoms belonging to different lead polyhedra.

  6. Visitor ParkingP Blue Light Security Phones

    E-Print Network [OSTI]

    Vertes, Akos

    Hensley Residence Hall 15 Tennis Courts/Parking Garage*7 Cole Residence Hall 16 Dorothy Williamson Clock8 Entrance The Vern Express (Connects the Foggy Bottom & Mount Vernon campuses) GW Police P To: Mac

  7. Enhanced Performance in Fluorene-Free Organometal Halide Perovskite Light Emitting Diodes using Tunable, Low Electron-Affinity Oxide Electron-Injectors

    E-Print Network [OSTI]

    Hoye, Robert L. Z.; Chua, Matthew R.; Musselman, Kevin P.; Li, Guangru; Lai, May-Ling; Tan, Zhi-Kuang; Greenham, Neil C.; MacManus-Driscoll, Judith L.; Friend, Richard H.; Credgington, Dan

    2015-01-09T23:59:59.000Z

    perovskites using an ALD-based technique is typically challenging because conventional ALD requires pumping down to vacuum, which increases the deposition time and reduces scalability.[21] In particular, this would require heating the perovskite (typically... deposited in open-air at low temperatures (150 °C or below).[22,25] We were therefore able to directly load and unload the samples from the substrate holder, resulting in the samples only being heated for the time required to deposit the films (3 min...

  8. Geoscience research for energy security

    SciTech Connect (OSTI)

    Not Available

    1987-02-01T23:59:59.000Z

    This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

  9. Sustainable Office Lighting Options

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Sustainable Office Lighting Options Task Lighting: Task lighting is a localized method of lighting a workspace so that additional, unnecessary lighting is eliminated, decreasing energy usage and costs. Illumination levels in the targeted work areas are higher with task lighting than with the ambient levels

  10. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  11. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  12. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  13. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  14. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  15. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  16. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01T23:59:59.000Z

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  17. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  18. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  19. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  20. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  1. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  2. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  3. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

    2009-01-01T23:59:59.000Z

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  4. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  5. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  6. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  7. Lighting Options for Homes.

    SciTech Connect (OSTI)

    Baker, W.S.

    1991-04-01T23:59:59.000Z

    This report covers many aspects of various lighting options for homes. Types of light sources described include natural light, artificial light, incandescent lamps, fluorescent lamps, and high intensity discharge lamps. A light source selection guide gives the physical characteristics of these, design considerations, and common applications. Color, strategies for efficient lighting, and types of lighting are discussed. There is one section giving tips for various situations in specific rooms. Rooms and types of fixtures are shown on a matrix with watts saved by using the recommended type lighting for that room and room location. A major emphasis of this report is saving energy by utilizing the most suitable, recommended lighting option. (BN)

  8. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  9. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  10. Mobile lighting apparatus

    DOE Patents [OSTI]

    Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

    2013-05-14T23:59:59.000Z

    A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

  11. Light disappears rapidly (exponentially)

    E-Print Network [OSTI]

    Kudela, Raphael M.

    #12;#12;#12;#12;Light disappears rapidly (exponentially) with depth At the same time, the color of the light shifts #12;#12;#12;#12;· Euphotic zone ­ plentiful light ­ 0-100 m (about) · Dysphotic zone ­ very, very little light ­ 100-1000 m (about) · Aphotic zone ­ no light ­ below 1000 m #12;Sunlight in Water

  12. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  13. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  15. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  16. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  17. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  18. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  19. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  20. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  1. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

  2. New Light Sources for Tomorrow's Lighting Designs

    E-Print Network [OSTI]

    Krailo, D. A.

    can ever be saved on that monthly energy bill. During the past several years, many new light sources have been developed and introduced. These product introductions have not been limited to anyone lamp type, but instead may be found in fila ment..., fluorescent and high intensity discharge lamp families. Man , ufacturers of light sources have two basic goals for new product development. These goals are high efficiency lighting and improved colo'r rendering properties. High efficiency lighting may take...

  3. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  4. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  5. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  6. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  7. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  8. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  9. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  10. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  11. EK101 Engineering Light Smart Lighting

    E-Print Network [OSTI]

    Bifano, Thomas

    EK101 Engineering Light Smart Lighting Homework for 9/10 1. Make an estimate (using if the patent is granted.) 3. What is a lumen? A lux? How are the two related? How would you use a lux meter, (Lux, Lumens/m2) Luminous Flux: Perceivable light power from a source, (Lumens) Use the lux meter

  12. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  13. Specific light in sculpture

    E-Print Network [OSTI]

    Powell, John William

    1989-01-01T23:59:59.000Z

    Specific light is defined as light from artificial or altered natural sources. The use and manipulation of light in three dimensional sculptural work is discussed in an historic and contemporary context. The author's work ...

  14. Light Duty Combustion Research: Advanced Light-Duty Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments 2009 DOE Hydrogen Program and...

  15. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  16. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  17. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  18. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  19. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  20. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  1. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  2. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  3. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  4. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  5. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  6. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  8. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  9. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  10. Exciting White Lighting

    Broader source: Energy.gov [DOE]

    Windows that emit light and are more energy efficient? Universal Display’s PHOLED technology enables windows that have transparent light-emitting diodes in them.

  11. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  12. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  13. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  14. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  15. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01T23:59:59.000Z

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  16. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  17. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  18. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  19. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  20. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  1. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  2. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  3. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  4. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  5. Quantum Enabled Security (QES) for Optical Communications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled...

  6. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  7. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  8. Developing Secure Power Systems Professional Competence: Alignment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  9. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  10. Independent Activity Report, Nevada National Security Site -...

    Energy Savers [EERE]

    Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR NNSS-2012-12-03 This Independent Activity Report documents an...

  11. Front lighted optical tooling method and apparatus

    DOE Patents [OSTI]

    Stone, William J. (Kansas City, MO)

    1985-06-18T23:59:59.000Z

    An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument. A method of measuring a radius of curvature of an unknown surface includes positioning the spherometer on a surface between the surface and a depth measuring optical instrument. As the spherometer is frontally illuminated, the distance from the depth measuring instrument to the fiducial mark and the underlying surface are alternately measured and the difference in these measurements is used as the sagittal height to calculate a radius of curvature.

  12. PFP Emergency Lighting Study

    SciTech Connect (OSTI)

    BUSCH, M.S.

    2000-02-02T23:59:59.000Z

    NFPA 101, section 5-9 mandates that, where required by building classification, all designated emergency egress routes be provided with adequate emergency lighting in the event of a normal lighting outage. Emergency lighting is to be arranged so that egress routes are illuminated to an average of 1.0 footcandle with a minimum at any point of 0.1 footcandle, as measured at floor level. These levels are permitted to drop to 60% of their original value over the required 90 minute emergency lighting duration after a power outage. The Plutonium Finishing Plant (PFP) has two designations for battery powered egress lights ''Emergency Lights'' are those battery powered lights required by NFPA 101 to provide lighting along officially designated egress routes in those buildings meeting the correct occupancy requirements. Emergency Lights are maintained on a monthly basis by procedure ZSR-12N-001. ''Backup Lights'' are battery powered lights not required by NFPA, but installed in areas where additional light may be needed. The Backup Light locations were identified by PFP Safety and Engineering based on several factors. (1) General occupancy and type of work in the area. Areas occupied briefly during a shiftly surveillance do not require backup lighting while a room occupied fairly frequently or for significant lengths of time will need one or two Backup lights to provide general illumination of the egress points. (2) Complexity of the egress routes. Office spaces with a standard hallway/room configuration will not require Backup Lights while a large room with several subdivisions or irregularly placed rooms, doors, and equipment will require Backup Lights to make egress safer. (3) Reasonable balance between the safety benefits of additional lighting and the man-hours/exposure required for periodic light maintenance. In some plant areas such as building 236-Z, the additional maintenance time and risk of contamination do not warrant having Backup Lights installed in all rooms. Sufficient light for egress is provided by existing lights located in the hallways.

  13. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  15. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria); Institut fuer Quantenoptik und Quanteninformation der Oesterreichischen, Akademie der Wissenschaften, Innsbruck (Austria); Calsamiglia, J. [Institut fuer Theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)

    2005-04-01T23:59:59.000Z

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  16. McMASTER SECURITY SERVICES ANNUAL REPORT 2007

    E-Print Network [OSTI]

    Thompson, Michael

    McMASTER SECURITY SERVICES ANNUAL REPORT 2007 #12;#12;Table of Contents MCMASTER SECURITY SERVICES .................................................................................................................................6 MCMASTER SECURITY SERVICES ­ WHO WE .......................................................................................................................29 #12;#12;5 MCMASTER SECURITY SERVICES MISSION STATEMENT Developing a safe and secure environment

  17. Software Security Rules, SDLC Perspective

    E-Print Network [OSTI]

    Banerjee, C

    2009-01-01T23:59:59.000Z

    Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email and Egreetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of peoples trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, right from the beginning. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are el...

  18. Sandia National Laboratories: Solid-State Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Updated: May 23, 2013 Go To Top Exceptional service in the national interest EC About Energy and Climate (EC) Energy Security Climate Security Infrastructure Security Energy...

  19. Lighting and Daylight Harvesting

    E-Print Network [OSTI]

    Bos, J.

    2011-01-01T23:59:59.000Z

    exposing us to the latest products and technologies. Daylight Harvesting A system of controlling the direction and the quantity of light both natural and artificial within a given space. This implies: Control of fenestration in terms of size..., transmission and direction. Control of reflected light within a space. Control of electric light in terms of delivery and amount Daylight harvesting systems are typically designed to maintain a minimum recommended light level. This light level...

  20. EK101 Engineering Light Project: Evaluate Residential Lighting

    E-Print Network [OSTI]

    Bifano, Thomas

    EK101 Engineering Light Project: Evaluate Residential Lighting Compare technical and economic characteristics of three sources of residential light. Two teams of four complete the same project Engineering Light Project: Evaluate Residential Lighting Project Assignment: Evaluate current options

  1. WEP SecurityWEP Security David ArmstrongDavid Armstrong

    E-Print Network [OSTI]

    ""inin house.house."" 802.11802.11 nn 802.11a802.11a ­­ no securityno security nn 802.11b802.11b ­­ WEP

  2. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  3. The Secure Hash Payment System

    E-Print Network [OSTI]

    Thompson, Timothy J

    2001-01-01T23:59:59.000Z

    OF FIGURES FIGURE Page 1 SET overview 32 2 SET messages 34 3 SET and SSL overview 36 4 Overview of SHPS 48 5 An example E C M L document 56 6 An example E C C document 57 7 An example CurrencyUpdate document 65 8 An example PurchaseRequest document... information. Netscape's Secure Socket Layer (SSL) provides the secure link between the consumer and merchant. While this approach has been successful due to the availability of SSL in most web browsers, the approach does not provide the level of security...

  4. Entropic security in Quantum Cryptography

    E-Print Network [OSTI]

    Simon Pierre Desrosiers

    2007-11-16T23:59:59.000Z

    We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under reasonable conditions and yet be secure in an information theoretic setting. This cipher also totally closes the gap between the key requirement of quantum ciphers and classical ciphers.

  5. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group The principles · The eight principles are: 1. Economy of mechanism 2. FailIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group Objectives

  6. Decision Support for Choice of Security

    E-Print Network [OSTI]

    Langseth, Helge

    Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

  7. Security Event and Log Management Service

    E-Print Network [OSTI]

    Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management IBM Global Technology Services December 2007 #12;Executive Summary The economics of network security have changed. The high cost and complexity inherent in the use

  8. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act of 2002 3 Security Management and Assistance Group (SMA) 4 FISMA Implementation Project 4 Publications

  9. McMaster Security 2012 Annual Report

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services 2012 Annual Report #12;McMaster Security Services ­ Annual Report 2012 2 Mission Statement Developing a safe and secure environment in this academic institution within the McMaster community is assigned to the Security Services Department. Methods and approaches

  10. Server Security Policy 1.0 Purpose

    E-Print Network [OSTI]

    Demirel, Melik C.

    Server Security Policy COE­SSP­01 1.0 Purpose The purpose of this policy is to establish standards configurations must be in accordance with approved College guidelines to ensure a significant level of security Wrappers or other security mechanisms. · The most recent security patches must be installed on the system

  11. Feb 4, 2005 --Lecture 8 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    Feb 4, 2005 -- Lecture 8 22C:169 Computer Security Douglas W. Jones Department of Computer Science Program Security #12;Is this program secure? A simple question only if program has no input or output in program Failure Manifestation of fault in behavior Relative to spec assumed correct! #12;Security

  12. April 8, 2005 --Lecture 30 Computer Security

    E-Print Network [OSTI]

    Jones, Douglas W.

    April 8, 2005 -- Lecture 30 22C:169 Computer Security Douglas W. Jones Department of Computer Science Administrative Issues #12;Warning Security is a system property An emergent property of the whole of system Security rarely emerges by accident Adding a security module to a system rarely achieves much! #12

  13. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  14. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  15. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  16. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  17. Grid Security: Expecting the Mingchao Ma

    E-Print Network [OSTI]

    University College London

    of a communications line; Power failure; Internet connection failure; Mis-configuration; · Security incidents ­ SystemGrid Security: Expecting the Unexpected Mingchao Ma STFC ­ Rutherford Appleton Laboratory, UK #12;Slide 2 Overview · Security Service Challenges (SSC) Review · Grid Security Incident ­ What had happened

  18. EXTENDED DESCRIPTION TECHNIQUES FOR SECURITY ENGINEERING

    E-Print Network [OSTI]

    of security critical systems. Based on general security evaluation criteria, we show how to extend the system applications that communi- cate over open networks like the Internet--security is an extremely important issue this problem, on the one hand there are highly sophisticated col- lections of evaluation criteria that security

  19. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  20. Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?

    E-Print Network [OSTI]

    Qin, Xiao

    Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

  1. Utility Security & Resiliency: Working Together

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—discusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

  2. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  3. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  4. Meeting Federal Energy Security Requirements

    Broader source: Energy.gov [DOE]

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  5. Energy and Global Security - Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Helps Lead Charge to Revolutionize Energy Storage Gizmodo UK: Fast-Acting Nuclear Reactor Will Power through Piles of Plutonium Daily Herald: Fagel Book Named Security Book of...

  6. NSC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home content Social Media NSC NSC What does NNSA's new National Security Campus in Kansas City, MO look...

  7. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02T23:59:59.000Z

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  8. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05T23:59:59.000Z

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  9. Cognitive Security for Personal Devices

    E-Print Network [OSTI]

    Greenstadt, Rachel

    2008-03-17T23:59:59.000Z

    Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

  10. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30T23:59:59.000Z

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  11. Secure Biometric Recognition Abhishek Nagar

    E-Print Network [OSTI]

    Template Security 20 3.1 Biometric Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.6 Evaluation of Template Protection Techniques . . . . . . . . . . . . . . . . . 41 4 of the major threats hovering the wired society. According to Javelin Strategy and Research Survey, there were

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  13. Homeland Security Issues for Facilities

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01T23:59:59.000Z

    more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure...

  14. Securities trading of concepts (STOC)

    E-Print Network [OSTI]

    Dahan, Ely

    Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

  15. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M

  16. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28T23:59:59.000Z

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  17. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  18. Office of Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  19. Critical Infrastructure and Cyber Security

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01T23:59:59.000Z

    that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

  20. Reduced ultraviolet light induced degradation and enhanced light harvesting using YVO{sub 4}:Eu{sup 3+} down-shifting nano-phosphor layer in organometal halide perovskite solar cells

    SciTech Connect (OSTI)

    Chander, Nikhil; Chandrasekhar, P. S.; Thouti, Eshwar; Swami, Sanjay Kumar; Dutta, Viresh; Komarala, Vamsi K. [Photovoltaic Laboratory, Centre for Energy Studies, Indian Institute of Technology Delhi, New Delhi 110016 (India); Khan, A. F., E-mail: khanafk@gmail.com [Photovoltaic Laboratory, Centre for Energy Studies, Indian Institute of Technology Delhi, New Delhi 110016 (India); Department of Electronics and Information Technology, Ministry of Communications and Information Technology, Government of India, New Delhi 110003 (India)

    2014-07-21T23:59:59.000Z

    We report a simple method to mitigate ultra-violet (UV) degradation in TiO{sub 2} based perovskite solar cells (PSC) using a transparent luminescent down-shifting (DS) YVO{sub 4}:Eu{sup 3+} nano-phosphor layer. The PSC coated with DS phosphor showed an improvement in stability under prolonged illumination retaining more than 50% of its initial efficiency, whereas PSC without the phosphor layer degraded to ?35% of its initial value. The phosphor layer also provided ?8.5% enhancement in photocurrent due to DS of incident UV photons into additional red photons. YVO{sub 4}:Eu{sup 3+} layer thus served a bi-functional role in PSC by reducing photo-degradation as well as enhancing energy conversion efficiency.

  1. Deficiencies of Lighting Codes and Ordinances in Controlling Light Pollution from Parking Lot Lighting Installations

    E-Print Network [OSTI]

    Royal, Emily

    2012-05-31T23:59:59.000Z

    The purpose of this research was to identify the main causes of light pollution from parking lot electric lighting installations and highlight the deficiencies of lighting ordinances in preventing light pollution. Using an industry-accepted lighting...

  2. Gamma ray spectroscopy employing divalent europium-doped alkaline earth halides and digital readout for accurate histogramming

    DOE Patents [OSTI]

    Cherepy, Nerine Jane; Payne, Stephen Anthony; Drury, Owen B; Sturm, Benjamin W

    2014-11-11T23:59:59.000Z

    A scintillator radiation detector system according to one embodiment includes a scintillator; and a processing device for processing pulse traces corresponding to light pulses from the scintillator, wherein pulse digitization is used to improve energy resolution of the system. A scintillator radiation detector system according to another embodiment includes a processing device for fitting digitized scintillation waveforms to an algorithm based on identifying rise and decay times and performing a direct integration of fit parameters. A method according to yet another embodiment includes processing pulse traces corresponding to light pulses from a scintillator, wherein pulse digitization is used to improve energy resolution of the system. A method in a further embodiment includes fitting digitized scintillation waveforms to an algorithm based on identifying rise and decay times; and performing a direct integration of fit parameters. Additional systems and methods are also presented.

  3. Life cycle assessment of buildings technologies: High-efficiency commercial lighting and residential water heaters

    SciTech Connect (OSTI)

    Freeman, S.L.

    1997-01-01T23:59:59.000Z

    In this study the life cycle emissions and energy use are estimated for two types of energy technologies. The first technology evaluated is the sulfur lamp, a high-efficiency lighting system under development by the US Department of Energy (DOE) and Fusion Lighting, the inventor of the technology. The sulfur lamp is compared with conventional metal halide high-intensity discharge lighting systems. The second technology comparison is between standard-efficiency and high-efficiency gas and electric water heaters. In both cases the life cycle energy use and emissions are presented for the production of an equivalent level of service by each of the technologies. For both analyses, the energy use and emissions from the operation of the equipment are found to dominate the life cycle profile. The life cycle emissions for the water heating systems are much more complicated. The four systems compared include standard- and high-efficiency gas water heaters, standard electric resistance water heaters, and heat pump water heaters.

  4. OpenGL Lighting 13. OpenGL Lighting

    E-Print Network [OSTI]

    McDowell, Perry

    OpenGL Lighting 13. OpenGL Lighting · Overview of Lighting in OpenGL In order for lighting to have an effect in OpenGL, two things are required: A light An object to be lit Lights can be set to any color determine how they reflect the light which hits them. The color(s) of an object is determined

  5. Building boundary is necessary for the real estate industry, flood management, and homeland security applications.

    E-Print Network [OSTI]

    Shan, Jie

    Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

  6. Energy security and crude oil in Atlantic Canada Larry Hughes, PhD

    E-Print Network [OSTI]

    Hughes, Larry

    ) where upwards of 70% of the crude oil is imported to meet refining demand (Hughes, 2010). The problemEnergy security and crude oil in Atlantic Canada Larry Hughes, PhD Energy Research Group Department, Atlantic Canada relies heavily on light fuel oil for space heating Over 80% of the crude oil used

  7. Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

  8. Adaptive Street Lighting Controls

    Broader source: Energy.gov [DOE]

    This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components. In Part I, presenters Amy Olay of the City of...

  9. Sandia National Laboratories: Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lighting Solid-State Lighting Science EFRC On November 11, 2010, in Welcome History of Incandescence History of LEDs Grand Challenges Our EFRC SSLS-EFRC Contacts News Publications...

  10. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01T23:59:59.000Z

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  11. all-weather security surveillance: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  12. asia-pacific security studies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  13. Unconditionally secure bit commitment by causally independent encryptions

    E-Print Network [OSTI]

    Chi-Yee Cheung

    2014-04-28T23:59:59.000Z

    We propose a new classical bit commitment protocol using the relativistic constraint that signals cannot travel faster than the speed of light $c$. This protocol is unconditionally secure against both classical or quantum attacks. The sender (Alice) and the receiver (Bob) each controls two secure stations separated by a large distance $d$, and they communicate by exchanging classical information only. Alice commits by sending from her stations two causally independent encrypted messages to the neighboring Bob's stations, after that the protocol is out of her control and she plays no role in the unveiling phase. The commitment remains concealed for a period of $\\Delta t=d/2c$. This protocol requires only limited communication resources and is readily implementable with current technologies.

  14. Light emitting device comprising phosphorescent materials for white light generation

    DOE Patents [OSTI]

    Thompson, Mark E.; Dapkus, P. Daniel

    2014-07-22T23:59:59.000Z

    The present invention relates to phosphors for energy downconversion of high energy light to generate a broadband light spectrum, which emit light of different emission wavelengths.

  15. Advanced Demand Responsive Lighting

    E-Print Network [OSTI]

    Advanced Demand Responsive Lighting Host: Francis Rubinstein Demand Response Research Center demand responsive lighting systems ­ Importance of dimming ­ New wireless controls technologies · Advanced Demand Responsive Lighting (commenced March 2007) #12;Objectives · Provide up-to-date information

  16. Light Rail Transit Strengthening

    E-Print Network [OSTI]

    Minnesota, University of

    Light Rail Transit Improving mobility Easing congestion Strengthening our communities Central Corridor Communicating to the Public During Major Construction May 25, 2011 #12;2 Light Rail Transit;Light Rail Transit Central Corridor Route and Stations 3 · 18 new stations · 9.8 miles of new double

  17. Sandia Energy - The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Center for SCADA Security Assets Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure...

  18. NNSA Celebrates 10 Years of Cooperation with Russia in Securing...

    National Nuclear Security Administration (NNSA)

    Security Administration (NNSA) commemorated ten years of work securing nuclear and radiological material in Russia and the former Soviet Union by completing security...

  19. PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

  20. Information Aggregation, Currency Swaps, and the Design of Derivative Securities

    E-Print Network [OSTI]

    Chowdhry, Bhagwan; Grinblatt, Mark

    1997-01-01T23:59:59.000Z

    their disparate information and (ii) each security should befor these securities and the information it generates.all information relevant for pricing securities to all

  1. Information Security Policy Manual Latest Revision: May 16, 2012

    E-Print Network [OSTI]

    Alpay, S. Pamir

    1 Information Security Policy Manual Latest Revision: May 16, 2012 #12;2 Table of Contents Information Security Policy Manual...............................................................................................................................................17 Information Security Glossary

  2. assa security center: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

  3. Secretary Moniz Hosts Energy Security Symposium, Honors Dr. Daniel...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hosts Energy Security Symposium, Honors Dr. Daniel Yergin with First James R. Schlesinger Medal for Energy Security Secretary Moniz Hosts Energy Security Symposium, Honors Dr....

  4. 2014 Headquarters Facilities Master Security Plan - Chapter 11...

    Office of Environmental Management (EM)

    1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

  5. 2014 Headquarters Facilities Master Security Plan - Chapter 17...

    Office of Environmental Management (EM)

    7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

  6. DOE Undersecretary for Nuclear Security and NNSA Administrator...

    National Nuclear Security Administration (NNSA)

    Undersecretary for Nuclear Security and NNSA Administrator Frank Klotz visits Y-12 National Security Complex | National Nuclear Security Administration Facebook Twitter Youtube...

  7. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  8. Integrated safeguards and security management plan

    SciTech Connect (OSTI)

    Bowen, Sue, editor

    2001-04-16T23:59:59.000Z

    Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

  9. Status of the National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-03-31T23:59:59.000Z

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  10. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnderSecurity and

  11. Light extraction from organic light-emitting diodes for lighting applications by sand-blasting

    E-Print Network [OSTI]

    Light extraction from organic light-emitting diodes for lighting applications by sand@ust.hk Abstract: Light extraction from organic light-emitting diodes (OLEDs) by scattering the light is one of the effective methods for large-area lighting applications. In this paper, we present a very simple and cost

  12. Photonic crystal light source

    DOE Patents [OSTI]

    Fleming, James G. (Albuquerque, NM); Lin, Shawn-Yu (Albuquerque, NM); Bur, James A. (Corrales, NM)

    2004-07-27T23:59:59.000Z

    A light source is provided by a photonic crystal having an enhanced photonic density-of-states over a band of frequencies and wherein at least one of the dielectric materials of the photonic crystal has a complex dielectric constant, thereby producing enhanced light emission at the band of frequencies when the photonic crystal is heated. The dielectric material can be a metal, such as tungsten. The spectral properties of the light source can be easily tuned by modification of the photonic crystal structure and materials. The photonic crystal light source can be heated electrically or other heating means. The light source can further include additional photonic crystals that exhibit enhanced light emission at a different band of frequencies to provide for color mixing. The photonic crystal light source may have applications in optical telecommunications, information displays, energy conversion, sensors, and other optical applications.

  13. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  14. Tighter security for electronic information

    SciTech Connect (OSTI)

    Moore, T.

    1996-11-01T23:59:59.000Z

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  15. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  16. Security-by-design handbook.

    SciTech Connect (OSTI)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01T23:59:59.000Z

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  17. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01T23:59:59.000Z

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  18. Foundations and Light Compass Foundations and Light Compass

    E-Print Network [OSTI]

    Wong, Jennifer L.

    Foundations and Light Compass Case Study Foundations and Light Compass Case Study Jennifer L. WongQuantitative Sensor--centric Designcentric Design Light CompassLight Compass ­­ Models and Abstractions Contaminant Transport Marine Microorganisms Ecosystems, Biocomplexity What is a Light Compass?What is a Light

  19. Lighting and Surfaces 11.1 Introduction to Lighting

    E-Print Network [OSTI]

    Boyd, John P.

    Chapter 11 Lighting and Surfaces 11.1 Introduction to Lighting Three-dimensional surfaces can react to light, and how computer graphics simulates this. There are three species of light (or "illumination models"): 1. Intrinsic (self-emitting) 2. Ambient light (sometimes called "diffuse light") 3

  20. Mission | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining theSan Jose-San| National Nuclear Security

  1. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuring

  2. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANs usingSecuringMarch

  3. Security and Privacy Notices | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecuritySecurity

  4. Arnold Schwarzenegger LIGHTING RESEARCH PROGRAM

    E-Print Network [OSTI]

    Project Summaries ELEMENT 2: ADVANCE LIGHTING TECHNOLOGIES PROJECT 2.1 LIGHT EMITTING DIODE (LED light emitting diodes (LED) technology for general lighting applications by developing a task lamp

  5. Purdue Homeland Security J. Eric Dietz, PhD, PE

    E-Print Network [OSTI]

    Ginzel, Matthew

    · Establishing a Homeland Security career development pipeline · Developing business security processes ­ Class project developing principles for managing large event security applications ­ Lectures ­ Class project with Purdue Federal Credit Union and Verizon ­ Business Continuity and security · Homeland

  6. Electronic DOE Information Security System (eDISS) PIA, Office...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

  7. Secure Pairing of Constrained Wireless Devices: Challenges and Pitfalls

    E-Print Network [OSTI]

    Carver, Jeffrey C.

    and Privacy in Emerging Systems (SPIES) lab. He works in the broad areas of computer and network security.S. Program in Cyber-Security. Saxena is serving as an Associate Editor for flagship security journals, IEEE

  8. A Declarative Framework for Security: Secure Concurrent Constraint Programming

    E-Print Network [OSTI]

    Valencia, Frank D.

    Javeriana Cali {halopez,japerez,crueda}@cic.puj.edu.co 2 INRIA and LIX École Polytechnique catuscia in the analysis of security protocols and one promising approach is the development of formalisms that model and implementations for CCP have been developed: E.g., denotational models [SRP91], specification logics and proof

  9. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

  10. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

    1996-06-20T23:59:59.000Z

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  11. Systems thinking for safety and security

    E-Print Network [OSTI]

    Young, William Edward

    The fundamental challenge facing security professionals is preventing losses, be they operational, financial or mission losses. As a result, one could argue that security professionals share this challenge with safety ...

  12. Geopolitics and Energy Security in South America 

    E-Print Network [OSTI]

    Flaceliere, Aurore

    This dissertation looks at the energy security situation in South America and tries to evaluate why, even though the region possesses important resources, it finds itself today in a rather precarious situation regarding the future. Energy security...

  13. Improving tamper detection for hazardous waste security

    SciTech Connect (OSTI)

    Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

    2002-01-01T23:59:59.000Z

    After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

  14. Statistical analysis of correlated fossil fuel securities

    E-Print Network [OSTI]

    Li, Derek Z

    2011-01-01T23:59:59.000Z

    Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

  15. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  16. Privacy & Security Notice | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy...

  17. An Operations Research approach to aviation security

    E-Print Network [OSTI]

    Martonosi, Susan Elizabeth

    2005-01-01T23:59:59.000Z

    Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

  18. Safeguards and Security Program, acronyms and abbereviations...

    Office of Environmental Management (EM)

    Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

  19. Site Tour Security Plan.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

  20. Putting policy in drive : coordinating measures to reduce fuel use and greenhouse gas emissions from U.S. light-duty vehicles

    E-Print Network [OSTI]

    Evans, Christopher W. (Christopher William)

    2008-01-01T23:59:59.000Z

    The challenges of energy security and climate change have prompted efforts to reduce fuel use and greenhouse gas emissions in light-duty vehicles within the United States. Failures in the market for lower rates of fuel ...