Powered by Deep Web Technologies
Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Design and Fabrication of Security and Home Automation System  

Science Journals Connector (OSTI)

Home automation system was designed and fabricated for controlling of home appliances, gas detection and home security. The fabricated system could detect the ... the house or office and the operation of home app...

Eung Soo Kim; Min Sung Kim

2006-01-01T23:59:59.000Z

2

Embedded system: a solution for home security.  

E-Print Network (OSTI)

??The objective of this thesis is to present the reader with the latest advances in home automation technologies with an emphasis on security. The X10/INSTEON,… (more)

Hern, Roland Lee

2014-01-01T23:59:59.000Z

3

ISEE Smart Home (ISH): Smart video analysis for home security  

Science Journals Connector (OSTI)

Abstract This paper presents a system of smart home for home security. Many previous papers on smart home try to address this issue, but most of the published systems rely on various sensors. With the development of video technology, video based smart home becomes more attractive, but there are few literatures discussing a complete system including system architecture, feature extraction, event modeling, decision making and final information retrieval. Motivated by this challenge, we propose a novel systematical video analysis architecture, providing rich source of information about the home environment. The proposed ISEE Smart Home (ISH) is capable of analyzing various abnormal behaviors, providing realtime alarm generation, flexible video retrieval and video synopsis. The contributions can be summarized as follows: (1) we propose and build a complete smart home system based on the intelligent video analysis for home security. (2) We propose a novel foreground segmentation method based on the history pattern, which is very suitable for indoor scene analysis. (3) An exact cutting based Region of Interest (ROI) generation and scene structure modeling method is proposed for fast human detection. (4) A concurrence relation graph of visual words is developed for reliable behavior analysis. The experimental results indicate that the ISH can provide the reliable assistance for better life.

Junge Zhang; Yanhu Shan; Kaiqi Huang

2015-01-01T23:59:59.000Z

4

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

5

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

6

Global Home File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Home Global Home Filesystem Overview Global home directories (or "global homes") provide a convenient means for a user to have access to source files, input files, configuration files, etc., regardless of the platform the user is logged in to. Wherever possible, you should refer to your home directory using the environment variable $HOME. The absolute path to your home directory (e.g., /u4/elvis/) may change, but the value of $HOME will always be correct. For security reasons, you should never allow "world write" access to your $HOME directory or your $HOME/.ssh directory. NERSC scans for such security weakness, and, if detected, will change the permissions on your directories. Platforms Utilizing Global Home The Global Home file system is available on all NERSC systems except PDSF.

7

A study of an embedded community network system in home automation  

Science Journals Connector (OSTI)

This article proposes an embedded system of home automation in a community network The system includes a home security monitor and a home energy monitor. The home security monitor uses sensors and micro switches ...

Chun-Liang Chen

2010-12-01T23:59:59.000Z

8

PIA - Northeast Home Heating Oil Reserve System (Heating Oil...  

Office of Environmental Management (EM)

Home Heating Oil Reserve System (Heating Oil) More Documents & Publications PIA - WEB Physical Security Major Application PIA - GovTrip (DOE data) PIA - WEB Unclassified...

9

Endangered tortoises find new home at NNSS | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Endangered tortoises find new home at NNSS | National Nuclear Security Endangered tortoises find new home at NNSS | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Endangered tortoises find new home at NNSS Endangered tortoises find new home at NNSS Posted By Office of Public Affairs Nevada National Security Site (NNSS) has teamed up with the San Diego Zoo

10

The Office of Health, Safety and Security - Home  

NLE Websites -- All DOE Office Websites

Office of Health, Safety and Security Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab FUNCTIONS Right Tab Left Tab RESOURCES Right Tab Left Tab NEWSFEEDS Right Tab Left Tab VIDEOS Right Tab Left Tab EVENTS Welcome to the U.S. Department of Energy (DOE), Office of Health, Safety and Security (HSS) public website. The Office of Health, Safety and Security was created to bring the vital DOE corporate functions of health, safety, environment, and security together under one office. ...read more New to our website? Locating information within the HSS website can be accomplished by navigating through our Offices' functions or by selecting specific areas of interest. The HSS Program Offices, Functions, Document

11

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

12

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

13

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

14

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Measuring System | National Nuclear Security Administration Measuring System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Aerial Measuring System Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > Aerial Measuring System Aerial Measuring System AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne

15

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

16

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

17

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

18

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network (OSTI)

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

19

Threats to financial system security  

SciTech Connect

The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

McGovern, D.E.

1997-06-01T23:59:59.000Z

20

National Security System Manual  

Directives, Delegations, and Requirements

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Trailer homes in Oak Ridge | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Trailer homes in Oak Ridge Trailer homes in Oak Ridge An aerial of Oak Ridge showing the extensive use of trailer homes...

22

Early Oak Ridge Trailer Homes | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Early Oak Ridge Trailer ... Early Oak Ridge Trailer Homes A row of trailer homes used in early Oak Ridge...

23

Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security  

E-Print Network (OSTI)

}@uw.edu ABSTRACT Background. With a projected rise in the procurement of home automation systems, we experimentally-enabled home automation systems. Aim. This work seeks to investigate the feasibility of causing physical harm--such as through the explosion of CFLs--to home occupants through an exploited home automation system. Method. We

Kohno, Tadayoshi

24

ZigBee Smart Home Automation Systems  

Science Journals Connector (OSTI)

This chapter summarizes a completed UK government funded project, the indeedNET ZigBee home automation system, which heralds a milestone in the ... energy saving devices with the potential to help home owners and...

Shuang-Hua Yang

2014-01-01T23:59:59.000Z

25

Cyberspace security system  

SciTech Connect

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

26

DOE Zero Energy Ready Home Case Study, Clifton View Homes, Coupeville, WA, Systems Home  

Energy.gov (U.S. Department of Energy (DOE))

Case-study of a DOE Zero Energy Ready Home on Whidbey Island, WA, that scored HERS 45 without PV. This 2,908 ft2 custom/system home has a SIP roof and walls, R-20 rigid foam under slab, triple-pane windows, ground source heat pump for radiant floor heat, and a unique balanced ventilation system using separate exhaust fans to bring air into and out of home.

27

Prototype system brings advantages of wireless technology to secure  

National Nuclear Security Administration (NNSA)

Prototype system brings advantages of wireless technology to secure Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Prototype system brings advantages of wireless technology ... Prototype system brings advantages of wireless technology to secure environment

28

NNSA Policy System | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

29

Home Automation System; Automation i hemmet.  

E-Print Network (OSTI)

?? This project revolves around creating a home automation system prototype with the main focus being the ability to lock/unlock a door through the internet.… (more)

Ruwaida,, Bassam

2013-01-01T23:59:59.000Z

30

Senior Systems Engineer | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Senior Systems Engineer | National Nuclear Security Administration Senior Systems Engineer | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Regina Griego Senior Systems Engineer Regina Griego Regina Griego Role: Senior Systems Engineer Profile: Regina Griego has been elected a fellow of the International Council on

31

ETTP Security Access Control System (ESACS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

32

Safeguards and Security Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Safeguards and Security Systems SHARE Safeguards and Security Systems Safeguards training class. ORNL is a leader in providing technologies and services for the global safeguards...

33

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

intrusion detection and security management for a networked energy control systems architecture Integrated Security System More Documents & Publications Cybersecurity for Energy...

34

Systems for home automation are a necessary component for intelligent smart homes applications.  

E-Print Network (OSTI)

Abstract Systems for home automation are a necessary component for intelligent smart homes to provide semantically rich unification over a range of home- and web-based automation systems. 1. Introduction Whilst a number of automation systems for smart homes are available commercially, their use

Dobson, Simon

35

Webinar: ENERGY STAR Hot Water Systems for High Performance Homes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Webinar: ENERGY STAR Hot Water Systems for High Performance Homes Webinar: ENERGY STAR Hot Water Systems for High Performance Homes This presentation is from the Building America...

36

Quality Management Systems for Zero Energy Ready Home Webinar...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Quality Management Systems for Zero Energy Ready Home Webinar (Text Version) Quality Management Systems for Zero Energy Ready Home Webinar (Text Version) Below is the text version...

37

HPXML: A Standardized Home Performance Data Sharing System -...  

Energy Savers (EERE)

HPXML: A Standardized Home Performance Data Sharing System - Building America Top Innovation HPXML: A Standardized Home Performance Data Sharing System - Building America Top...

38

Recommended Security Controls for Federal Information Systems...  

NLE Websites -- All DOE Office Websites (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

39

Project Management and Systems Support | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

40

Small Business Sourcing System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sourcing System | National Nuclear Security Administration Sourcing System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Sourcing System Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox > Small Business Sourcing System Small Business Sourcing System

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

42

Combi Systems for Low Load homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

text styles text styles Combi Systems for Low Load Homes Center for Energy and Environment, NorthernSTAR, Ben Schoenbauer * Low load homes are more common than ever. * Typical space heating and DHW equipment have capacities larger than necessary * A single heating plant could provide high efficiency heat at lower costs, increased durability and improved combustion safety Context Technical Approach * A condensing water heater and hydronic air handler will used to provide space and water heating loads in almost 300 weatherized homes. * System specifications, sizing, and installation optimization guidelines were all developed. * Contractor capability was developed in MN market, but may not be developed in all local. 4 Recommended Guidance * Determine peak load on system: - Space heating design load (ie 40,000 Btu/hr)

43

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

44

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy Savers (EERE)

SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

45

Argonne's National Security Information Systems National  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

46

Crops reap benefits of Pantex irrigation system | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Crops reap benefits of Pantex irrigation system | National Nuclear Security Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Crops reap benefits of Pantex irrigation system Home > content > Crops reap benefits of Pantex irrigation system Crops reap benefits of Pantex irrigation system

47

Remote-Controlled Home Automation Systems with Different Network Technologies  

E-Print Network (OSTI)

Remote-Controlled Home Automation Systems with Different Network Technologies Armando Roy Delgado into the potential for remote controlled operation of home automation systems. It considers problems, 2002) which certainly requires a careful study before developing any suitable Home Automation System

Grout, Vic

48

Pantex Occupational Health System (OHS), National Nuclear Security...  

Energy Savers (EERE)

Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

49

Control Systems Security Standards: Accomplishments And Impacts |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

50

DOE Challenge Home Case Study, Clifton View Homes, Coupeville, WA, Systems Home  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Clifton View Clifton View Homes Coupeville, WA BUILDING TECHNOLOGIES OFFICE DOE Challenge Home builders are in the top 1% of builders in the country meeting the extraordinary levels of excellence and quality specifi ed by the U.S. Department of Energy. Every DOE Challenge Home starts with ENERGY STAR for Homes Version 3 for an energy-effi cient home built on a solid foundation of building science research. Then, even more advanced technologies are designed in for a home that goes above and beyond current code to give you the superior quality construction, HVAC, appliances, indoor air quality, safety, durability, comfort, and solar-ready components along with ultra-low or no utility bills. This provides homeowners with a quality home that will last for generations to come.

51

DOE Challenge Home Case Study, Weiss Building & Development, LLC., System Home, River Forest, IL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LLC LLC System Home River Forest, IL BUILDING TECHNOLOGIES OFFICE DOE Challenge Home builders are in the top 1% of builders in the country meeting the extraordinary levels of excellence and quality specifi ed by the U.S. Department of Energy. Every DOE Challenge Home starts with ENERGY STAR for Homes Version 3 for an energy-effi cient home built on a solid foundation of building science research. Then, even more advanced technologies are designed in for a home that goes above and beyond current code to give you the superior quality construction, HVAC, appliances, indoor air quality, safety, durability, comfort, and solar-ready components along with ultra-low or no utility bills. This provides homeowners with a quality home that will last for generations to come.

52

Wireless Short Range Communication Technologies for Home Automation.  

E-Print Network (OSTI)

?? A modern home contains varieties of electronic equipment and systems like: TV, Hi-fi equipment, central heating systems, fire alarm systems, security alarm systems, lighting… (more)

Oyekunle, Abiola Taiwo

2008-01-01T23:59:59.000Z

53

Energy Engineering and Systems Analysis - Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Engineering and Systems Analysis U.S. Department of Energy Energy Engineering and Systems Analysis U.S. Department of Energy Search Argonne ... Search Decision and Information Sciences Energy Systems FutureGrid Infrastructure Assurance Center Intelligence Analysis National Security Nuclear Engineering Transportation Research and Analysis Computing Center Transportation Technology R&D Center EESA Intranet Image of battery development team standing by an electric vehicle in Argonne's Ev-Smart Grid Interoperability Center Features eesa success stories ebr-2 Argonne's Major Nuclear Energy Milestones Argonne's Nuclear Energy Exhibit Argonne's Nuclear Energy Exhibit Argonne's Glassblowing Studio Glassblowing Studio Reactor Advanced Burner Test Reactor Preconceptual Design Argonne Experts Guide Argonne Experts Guide

54

Home Automation  

E-Print Network (OSTI)

In this paper I briefly discuss the importance of home automation system. Going in to the details I briefly present a real time designed and implemented software and hardware oriented house automation research project, capable of automating house's electricity and providing a security system to detect the presence of unexpected behavior.

Ahmed, Zeeshan

2010-01-01T23:59:59.000Z

55

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

56

Home | Buildings Technology & Urban Systems Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab Buildings & Urban Systems Buildings Lab Buildings & Urban Systems Buildings Technology & Urban Systems Department Search Search Home About Us Groups Tools & Guides Facilities Publications News Links Contact Us Staff The Building Technology and Urban Systems Department (BTUS) works closely with industry to develop technologies for buildings that increase energy efficiency, and improve the comfort, health, and safety of building occupants. Berkeley Lab Hosts 5 Emerging Leaders During TechWomen 2013 As part of TechWomen 2013, emerging leaders from around the world toured a number of scientific facilities in the Bay Area, including the Advanced Light Source at Berkeley Lab. Pho Read More The Retrocommissioning Sensor Suitcase Brings Energy Efficiency to Small Commercial Buildings The data module communicates wirelessly with the smart pad, which launches

57

SRS upgrades helium recovery system | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

upgrades helium recovery system | National Nuclear Security upgrades helium recovery system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS upgrades helium recovery system SRS upgrades helium recovery system Posted By Office of Public Affairs Savannah River Site (SRS) Tritium Programs recently completed a project to design, build and relocate a new system for separating and capturing

58

LEED for Homes Rating System affordablemarket rate multi-family  

E-Print Network (OSTI)

LEED for Homes Rating System affordablemarket rate multi-family #12;The top 25% of new homes based% REGULATIONS lawbreakers DEGREE OF GREEN MARKET SHIFT typical building practices market leaders innovators the negative impact of buildings on their occupants and on the environment. LEED for Homes categories

Zaferatos, Nicholas C.

59

A Distributed Honeypot System for Grid Security  

Science Journals Connector (OSTI)

In this paper, we propose a distributed honeypot model for grid computing system security. Based on the IDS Snort and the...

Geng Yang; Chunming Rong; Yunping Dai

2004-01-01T23:59:59.000Z

60

Security services architecture for Secure Mobile Grid Systems  

Science Journals Connector (OSTI)

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.

David G. Rosado; Eduardo Fernández-Medina; Javier López

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Forced Air Systems in High Performance Homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FORCED AIR SYSTEMS IN FORCED AIR SYSTEMS IN HIGH PERFORMANCE HOMES Iain Walker (LBNL) Building America Meeting 2013 What are the issues? 1. Sizing  When is too small too small? 2. Distribution  Can we get good mixing at low flow? 3. Performance  Humidity Control  Part load efficiency  Blowers & thermal losses Sizing  Part-load - not an issue with modern equipment  Careful about predicted loads - a small error becomes a big problem for tightly sized systems  Too Low Capacity = not robust  Extreme vs. design days  Change in occupancy  Party mode  Recovery from setback Sizing  Conventional wisdom - a good envelope = easy to predict and not sensitive to indoor conditions  But..... Heating and cooling become discretionary - large variability depending on occupants

62

Home Energy Systems Inc | Open Energy Information  

Open Energy Info (EERE)

Systems Inc Systems Inc Jump to: navigation, search Name Home Energy Systems Inc Address 6996 Convoy Ct. Place San Diego, California Zip 92111 Sector Solar Product Solar PV installer Website http://www.homeenergysystemsin Coordinates 32.8346671°, -117.1645956° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.8346671,"lon":-117.1645956,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

63

Home Networking Xinhua Feng, xinhua@cse.ohio-state.edu  

E-Print Network (OSTI)

LAN 3.2 Phoneline 3.3 Powerline 3.3.1 X10 Home Automation 3.3.2 Intellon CEBus 3.3.3 Echelon LONWorks and dryers, heating and air conditioning thermostats, home security systems, and home automation controls. Home automation and security functions can be implemented by linking consumer electronics, appliances

Jain, Raj

64

Measure Guideline: Selecting Ventilation Systems for Existing Homes  

SciTech Connect

This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

Aldrich, R.

2014-02-01T23:59:59.000Z

65

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network (OSTI)

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

66

Webinar: ENERGY STAR Hot Water Systems for High Performance Homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Star Hot Water Systems for High Performance Homes Star Hot Water Systems for High Performance Homes 1 | Building America Program www.buildingamerica.gov Buildings Technologies Program Date: September 30, 2011 ENERGY STAR ® Hot Water Systems for High Performance Homes Welcome to the Webinar! We will start at 11:00 AM Eastern. There is no call in number. The audio will be sent through your computer speakers. All questions will be submitted via typing. Video of presenters Energy Star Hot Water Systems for High Performance Homes 2 | Building America Program www.buildingamerica.gov Energy Star Hot Water Systems for High Performance Homes 3 | Building America Program www.buildingamerica.gov Building America Program: Introduction Building Technologies Program Energy Star Hot Water Systems for High Performance Homes

67

ORO Office Safeguards and Security Clearance Tracking System...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System...

68

DOE and Industry Showcase New Control Systems Security Technologies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Development Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at...

69

Planning for Home Renewable Energy Systems | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems Planning for Home Renewable Energy Systems November 11, 2013 - 8:49pm Addthis Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography. Planning for a home renewable energy system is a process that includes analyzing your existing electricity use, looking at local codes and requirements, deciding if you want to operate your system on or off of the electric grid, and understanding technology options you have for your site. | Photo by Francis Fine Art Photography.

70

Research on Security Architecture and Protocols of Grid Computing System  

Science Journals Connector (OSTI)

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid

Xiangming Fang; Shoubao Yang; Leitao Guo; Lei Zhang

2004-01-01T23:59:59.000Z

71

Classified Automated Information System Security Program  

Directives, Delegations, and Requirements

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

72

Common Cyber Security Vulnerabilities Observed in Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

73

National SCADA Test Bed - Enhancing control systems security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

74

Security Analysis and Project Management Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

75

Recommended Practice for Securing Control System Modems  

SciTech Connect

This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

76

Secure videoconferencing equipment switching system and method  

DOE Patents (OSTI)

Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

2013-04-30T23:59:59.000Z

77

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

78

DOE Zero Energy Ready Home Case Study, Dwell Development, Seattle, WA, Systems Home  

Energy.gov (U.S. Department of Energy (DOE))

Case study of a DOE Zero Energy Ready Home in Seattle, WA, that scored HERS 34 without PV. This 2,000 ft2 system home has R-45 double-stud walls, an unvented flat roof with 2 inches of spray foam plus 18 inches blown cellulose, R-42 XPS under slab, triple-pane windows, and a ductless mini-split heat pump.

79

Home Energy Management Systems and Reduced Consumption  

Energy.gov (U.S. Department of Energy (DOE))

This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question "What emerging innovations are the key to future homes?"

80

Meeting Minutes from Automated Home Energy Management System Expert Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Energy Management System Expert Meeting Home Energy Management System Expert Meeting October 1-2, 2009 AGENDA - Day 1 8:30 - 8:45 Welcome and Debriefing of Building America and Home Energy Management Research- Lew Pratsch, DOE 8:45 - 9:15 Utilities Trends- Smart Grid Projects and Integration With Home Controls - Mike Keesee, SMUD 9:15 - 9:45 Thoughts on Controls System Performance Requirements - Rich Brown, LBL 9:45 - 10:15 Efficiency Trends in Consumer Electronics - Kurtis McKenney, TIAX 10:15 - 10:30 Session Break 10:30 - 11:00 Cloud Computing (Web Data Computing, Data Storage) Trends - Troy Batterberry, Microsoft 11:00- 11:30 Cloud Computing (Web Data Computing, Data Storage) Trends - Tom Sly via Net Conference 11:30 - 12:00 Smart Appliance Trends / Home Area Network Trends - David Najewicz, GE

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A robust automated system elucidates mouse home cage behavioral structure  

E-Print Network (OSTI)

A robust automated system elucidates mouse home cage behavioral structure Evan H. Gouldinga,1 , A of behavior exhibited by mice in their home cages reflect the function and interaction of numerous behavioral of organization across diverse behaviors has been difficult to achieve and automate. Here, we describe

Jiggins, Francis

82

Installing and Maintaining a Home Solar Electric System | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System July 2, 2012 - 8:21pm Addthis When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. How does it work? Making sure your home solar electric or PV system is sized, sited, and installed correctly is essential for maximizing its energy performance. As with any mechanical or electrical appliance, PV systems require routine, periodic maintenance.

83

Installing and Maintaining a Home Solar Electric System | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System Installing and Maintaining a Home Solar Electric System July 2, 2012 - 8:21pm Addthis When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. When choosing a contractor, ask about their work record, experience, and licenses, and get more than one bid for the installation of your PV system. | Photo courtesy of Dennis Schroeder, NREL. How does it work? Making sure your home solar electric or PV system is sized, sited, and installed correctly is essential for maximizing its energy performance. As with any mechanical or electrical appliance, PV systems require routine, periodic maintenance.

84

System security Dr Len Hamey  

E-Print Network (OSTI)

threat, mitigates risk) The Attack Of The Killer Hack: Are You A Target For Hackers? 2004 Australian and behaviour ­ 65% Keeping up-to-date with latest threats ­ 61% Largest Factors Contributing To Hacks and procedures The Attack Of The Killer Hack Are You A Target For Hackers? Security Timeline #12;3 The Anatomy

Hamey, Len

85

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

Residential Photovoltaic Energy Systems in California: Themarginal impacts of photovoltaic (PV) energy systems on home

Hoen, Ben

2014-01-01T23:59:59.000Z

86

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

Residential Photovoltaic Energy Systems in California: Themarginal impacts of photovoltaic (PV) energy systems on home

Hoen, Ben

2013-01-01T23:59:59.000Z

87

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

88

An ontology-based approach to information systems security management  

Science Journals Connector (OSTI)

Complexity of modern information systems (IS), impose novel security requirements. On the other hand, the ontology paradigm aims to support knowledge sharing and reuse in an explicit and mutually agreed manner. Therefore, in this paper we set the foundations ... Keywords: IS security, security management, security ontology, security policy

Bill Tsoumas; Stelios Dritsas; Dimitris Gritzalis

2005-09-01T23:59:59.000Z

89

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Sign In Honeywell Aero KCP NNSA NATIONAL SECURITY CAMPUS IN THE NEWS IN THE NEWS NSC reaches safety milestone with on-time, on-budget moveLEARN MORE LEARN MORE HEALTH, SAFETY &...

90

A Data Grid Security System Based on Shared Context  

Science Journals Connector (OSTI)

Data grid system supports uniform and secure access of ... administrative domains, each with its own local security policy. The security challenge has been a focus in a data grid environment. This paper mainly pr...

Nong Xiao; Xiaonian Wu; Wei Fu; Xiangli Qu

2004-01-01T23:59:59.000Z

91

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

92

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

93

Security Controls for Unclassified Information Systems Manual  

Directives, Delegations, and Requirements

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

94

A System for Controlling, Monitoring and Programming the Home.  

E-Print Network (OSTI)

??As technology becomes ever more pervasive, the challenges of home automation are increasingly apparent. Seamless home control, home monitoring and home programming by the end… (more)

Maternaghan, Claire

2012-01-01T23:59:59.000Z

95

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

96

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Oak Ridge Oak Ridge The ORO is a diverse office supporting key missions in Science and Technology. To a lesser degree, other DOE missions are also supported in the areas of Environmental Management, Science Education, Nuclear Fuel Supply, National Security, Technology Transfer, and Economic Development. The ORO also manages the Financial Service Center that supports other DOE sites/locations. ORO helps to ensure mission success by providing support in the areas of acquisition and financial services, quality assurance, environmental compliance, nuclear safety, operations, maintenance, work planning and control, safety and health, human capital, real property and infrastructure, information management, safeguards and security, emergency management, public affairs, etc.

97

Northeast Home Heating Oil Reserve - Online Bidding System | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Petroleum Reserves » Heating Oil Reserve » Northeast Services » Petroleum Reserves » Heating Oil Reserve » Northeast Home Heating Oil Reserve - Online Bidding System Northeast Home Heating Oil Reserve - Online Bidding System The U.S. Department of Energy has developed an on-line bidding system - an anonymous auction program - for the sale of product from the one million barrel Northeast Home Heating Oil Reserve. We invite prospective bidders and other interested parties to try out this system and give us your views. You must register to use the system to practice or to participate in an actual emergency sale. Registration assures that you will receive e-mail alerts of sales or other pertinent news. You will also have the opportunity to establish a user ID and password to submit bids. If you establish a user ID, you will receive a temporary password by

98

Processes in Securing Open Architecture Software Systems  

E-Print Network (OSTI)

, and development practices play in facilitating or constrain- ing these processes through the case study. Our/variants. We employ a case study focusing on an OA software system whose security must be continually sustained versus descriptive practice of these processes and tool usage in studies of conventional and open source

Scacchi, Walt

99

Control Systems Security Standards: Accomplishments & Impacts  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

019 019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

100

Security Metricsfor Process Control Systems  

Energy.gov (U.S. Department of Energy (DOE))

This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

102

Securing Electrical Power System Operation  

Science Journals Connector (OSTI)

Automation in power systems has a very long tradition. Just recall the flyball governor in a steam engine and it becomes clear that power people have been using control principles and instruments for more th...

Petr Horacek PhD

2009-01-01T23:59:59.000Z

103

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network (OSTI)

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

104

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Cleanup Project Cleanup Project Search Login Home News News Inside the ICP articles About Us About Us Our Mission Facility Factsheets History of the Site Safety Working with CWI/Property Sales Working with CWI Subcontracting & Small Business Academic Internship Program Property Sales Outreach Community Outreach Stakeholders Education and Research Transfer Program AR-IR Administration Contact Us Industry leader in safe performance CWI's worker-owned safety culture has been the cornerstone for delivering work at the Idaho Cleanup Project. Since contract inception in May 2005, the CWI team has reduced recordable injuries by more than 70 percent. Video Feature: Waste Management Treatment of sodium-contaminated waste using a distillation process (9:47) Terms Of Use Privacy Statement If you have a disability and need an

105

Information System Security Manager (ISSM) | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ISSM Core Competency Training Worksheet More Documents & Publications Information System Security Officer (ISSO) Cybersecurity Program Manager (CSPM) Authorizing Official (AO)...

106

Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Site A and Plot M Site A and Plot M The Burial Site of the World's First Self-Sustaining Nuclear Reactor > Content on this page requires a newer version of Adobe Flash Player. Get Adobe Flash player July 31, 1942 The Army Corp of Engineers leases 1,025 acres of the Cook County Forest Preserve to build a research facility. November 1942 Under the direction of Enrico Fermi, a group of scientists at the University of Chicago begin building Chicago Pile-1 (CP-1). Security and secracy were essential. December 2, 1942 Enrico Fermi's team creates the world's first self-sustaining nuclear chain reaction using the CP-1 reactor under Stagg Field at the University of Chicago. CP-1 1943 The experiments under Stagg Field shut down, and the scientists move to a 19 acre section of the leased forest preserve, known as Site A. CP-1 is

107

Classified Information Systems Security Manual  

Directives, Delegations, and Requirements

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

108

Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  

E-Print Network (OSTI)

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.

Hilker, Michael

2008-01-01T23:59:59.000Z

109

Computer aided home energy management system.  

E-Print Network (OSTI)

??As the electricity demand approaches generation capacity, the operating reserve capacity of the power system shrinks, causing an increased risk of outages. Demand Side Management… (more)

Moholkar, Asawari A.

2005-01-01T23:59:59.000Z

110

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network (OSTI)

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

111

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

112

Power System Security in Market Clearing and Dispatch Mechanisms  

E-Print Network (OSTI)

costs while maintaining grid security; however, the dominant concern was system reliability, while costs1 Power System Security in Market Clearing and Dispatch Mechanisms Claudio A. Ca~nizares, Senior typical market clearing and dispatch mechanisms based on security- constrained (SC) optimal power flow

Cañizares, Claudio A.

113

Fermilab | FRA Contractor Assurance System (CAS) | Home  

NLE Websites -- All DOE Office Websites (Extended Search)

FRA Contractor Assurance System (CAS) FRA Contractor Assurance System (CAS) photo The FRA CAS is governed by Section H.13 of the FNAL prime contract, executed by the FRA Board of Directors and implemented throughout the FNAL organization. This system provides reasonable assurance that the objectives of the contractor management systems below are being accomplished in accordance with the requirements of the contract. The Fermilab Assurance Council (AC) is a key element of the CAS. The members of the AC are Management System owners and/or major process owners. A major function of the AC is to identify and track issues that arise though an awareness of changes in the laboratory's operating environment, applicable laws and regulations, self-assessments and the various review processes of the laboratory. The AC executes this function through the FRA

114

Security Modeling of Grid Systems Using Petri Nets  

Science Journals Connector (OSTI)

The paper reviews the security problem with computing and information resources in Grid systems. It discusses security relative characteristics of Grid architecture and provides a common threat model of Grid. It ...

Peter D. Zegzhda; Dmitry P. Zegzhda; Maxim O. Kalinin…

2012-01-01T23:59:59.000Z

115

Security Requirements Model for Grid Data Management Systems  

Science Journals Connector (OSTI)

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their ...

Syed Naqvi; Philippe Massonet; Alvaro Arenas

2006-01-01T23:59:59.000Z

116

Recommended Practice for Securing Control System Modems | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

117

ACCEPTANCE REQUIREMENTS AND HOME ENERGY RATING SYSTEMS  

E-Print Network (OSTI)

TESTING REGULATIONS CALIFORNIA ENERGY COMMISSION for the 2005 BUILDING ENERGY EFFICIENCY STANDARDS FOR NONRESIDENTIAL HGH- RISE RESIDENTIAL and HOTELS/MOTELS BUILDINGS STANDARDS/REGULATIONS July 2005 Effective ............................................................ NJ-3 NJ.4 Packaged HVAC Systems

118

Evaluating Ventilation Systems for Existing Homes  

SciTech Connect

During the course of this project, an affordable and high performance ductwork system to directly address the problems of thermal losses, poor efficiency, and air leakage was designed. To save space and enable direct connections between different floors of the building, the ductwork system was designed in such a way that it occupied interior or exterior frame wall cavities. The ductwork system satisfied building regulations for structural support when bridging multiple floors, the spread of fire and smoke, and insulation to reduce the heat flow into or out of the building. Retrofits of urban residential buildings will be the main focus for the application of this ductwork system. Highly reflective foils and insulating materials were used to aid in the increase of the overall R-value of the ductwork itself and the wall assembly. It is expected that the proposed system will increase the efficiency of the HVAC system and the thermal resistance of the building envelope. The performance of the proposed ductwork design was numerically evaluated in a number of different ways. Our results indicate that the duct method is a very cost attractive alternative to the conventional method.

Aldrich, R.; Arena, L.

2013-02-01T23:59:59.000Z

119

Control Systems Cyber Security: Defense in Depth Strategies ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

120

2009 NMMSS Users Training Meeting | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

NNSA Blog Home About Us Our Programs Defense Nuclear Security Nuclear Materials Management & Safeguards System Training Annual Users Training Meeting Archives 2009...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

122

Compact Neutron Generators for Medical Home Land Security and Planetary Exploration  

E-Print Network (OSTI)

due to limited neutron generator designs, neutron output orCOMPACT NEUTRON GENERATORS FOR MEDICAL, HOME LAND SECURITYand T (0 – 9 MeV) neutron generators -T for wide range of

Reijonen, J.

2005-01-01T23:59:59.000Z

123

Uni ed Support for Heterogeneous Security Policies in Distributed Systems  

E-Print Network (OSTI)

Uni ed Support for Heterogeneous Security Policies in Distributed Systems Naftaly H. Minsky in this paper a security mechanism that can support e ciently, and in a uni ed manner, a wide range of security policies are de ned formallyandexplicitly,and are enforced bya uni ed mechanism. Each policy under

Minsky, Naftaly

124

Quality Management Systems for Zero Energy Ready Home Webinar (Text Version)  

Energy.gov (U.S. Department of Energy (DOE))

Below is the text version of the webinar, Quality Management Systems for Zero Energy Ready Home, presented in October 2014.

125

Secure Mobile Data Collection Systems for Low-Budget Settings  

Science Journals Connector (OSTI)

Lack of infrastructures in health care and transportation, combined with the demand for low cost health services and shortage of medical professionals, are some of the known causes for loss of life in low income countries. Mobile Health (a.k.a. mHealth) ... Keywords: mHealth, Mobile Data Collection Systems, Mobile Security, J2ME, HTTPS, secure communication protocols, secure mobile data storage, secure mobile data transmission

F. Mancini; S. Gejibo; K. A. Mughal; R. A. B. Valvik; J. Klungsoyr

2012-08-01T23:59:59.000Z

126

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

127

ORO Office Safeguards and Security Clearance Tracking System and Visitor  

NLE Websites -- All DOE Office Websites (Extended Search)

Office Safeguards and Security Clearance Tracking System and Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office iManage Strategic Integrated Procurement Enterprise System (STRIPES) PIA, Office of Procurement and Assistance Management

128

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

129

Proposed platform for improving grid security by trust management system  

E-Print Network (OSTI)

With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

Siadat, Safieh; Mohsenzadeh, Mehran

2009-01-01T23:59:59.000Z

130

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

E-Print Network (OSTI)

Effects of Residential Photovoltaic Energy Systems on HomeEffects of Residential Photovoltaic Energy Systems on Homewith existing photovoltaic (PV) energy systems have sold in

Hoen, Ben

2011-01-01T23:59:59.000Z

131

List of Major Information Systems,National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

132

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

133

System Effects of High Efficiency Filters in Homes  

NLE Websites -- All DOE Office Websites (Extended Search)

System Effects of High Efficiency Filters in Homes System Effects of High Efficiency Filters in Homes Title System Effects of High Efficiency Filters in Homes Publication Type Conference Paper LBNL Report Number LBNL-6144E Year of Publication 2013 Authors Walker, Iain S., Darryl J. Dickerhoff, David Faulkner, and William J. N. Turner Conference Name ASHRAE Annual Conference Date Published 03/2013 Abstract Occupant concern about indoor air quality (IAQ) issues has led to the increased use of more effective air filters in residential heating and cooling systems. A drawback of improved filtration is that better filters tend to have more flow resistance. This can lead to lower system airflows that reduce heat exchanger efficiency, increase duct pressure that leads to increased air leakage for ducts and, in some case s, increased blower power consumption. There is currently little knowledge on the magnitude of these effects. In this study, the performance of ten central forced air systems was monitored for a year. The systems used either a Permanent Split Capacitor (PSC) or a Brushless Permanent Magnet (BPM) blower. Each system was operated with a range of filter efficiencies ranging from MERV 6 (the lowest currently permitted in ASHRAE Standard 62.2) up to MERV 16. Measurements were recorded every ten seconds for blower power, filter pressure drop, supply and return plenum pressures together with plenum and indoor temperatures. These detailed continuous measurements allowed observation of filter loading effects as well as the initial change in system performance when filters were swapped. The results of the field measurements were used in simulations to examine more general system performance effects for a wider range of climates. The field tests showed that system static pressures were highly influenced by filter selection, filter loading rates varied more from house to house than by MERV rating and overall were quite low in many of the homes. PSC motors showed reduced power and airflow as the filters loaded, but BPM motors attempted to maintain a constant airflow and increased their power to do so. The combined field test and simulation results from this study indicate that for MERV 10-13 filters the effects on energy use are small (5%) and usability. In systems using low MERV filters that are already close to blower performance limits the addition of a MERV 16 filter pushed the blowers to their performance limits.

134

Hardware Security for Device Authentication in the Smart Grid  

Science Journals Connector (OSTI)

Secure communication between devices is a key aspect of smart grid security. In the future smart home...environment, various smart devices, appliances and energy management systems will communicate with each othe...

Andrew J. Paverd; Andrew P. Martin

2013-01-01T23:59:59.000Z

135

A Summary of Control System Security Standards Activities in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy...

136

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network (OSTI)

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

137

Security plan for the Automated Transportation Management System  

SciTech Connect

The Automated Transportation Management System (ATMS) is an unclassified non-sensitive system consisting of hardware and software designed to facilitate the shipment of goods for the US Department of Energy (DOE). The system is secured against waste, fraud, abuse, misuse, and programming errors through a series of security measures that are discussed in detail in this document.

Not Available

1994-04-01T23:59:59.000Z

138

Techniques for Securing Substation Automation Systems David Guidry1  

E-Print Network (OSTI)

Techniques for Securing Substation Automation Systems David Guidry1 , Mike Burmester1 , Xiuwen Liu1 propose techniques for resilient substation automation of power utility systems with security based-90-5 compliant substation automation systems that are resilient. We demonstrate the feasibility of our approach

Burmester, Mike

139

Energy Saving System for Home Energy Measurement and Efficient Power Control  

Science Journals Connector (OSTI)

Energy Saving System (ESS) is designed and implemented for real-time home energy measurement and the efficient power control at homes or buildings. For energy saving functions and the future extension to the...

Kwang-Soon Choi; Young-Choong Park; Yang-Keun Ahn…

2012-01-01T23:59:59.000Z

140

DOE Challenge Home Case Study, Dwell Development, Seattle, WA, Systems Home  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Dwell Dwell Development Seattle, WA BUILDING TECHNOLOGIES OFFICE DOE Challenge Home builders are in the top 1% of builders in the country meeting the extraordinary levels of excellence and quality specifi ed by the U.S. Department of Energy. Every DOE Challenge Home starts with ENERGY STAR for Homes Version 3 for an energy-effi cient home built on a solid foundation of building science research. Then, even more advanced technologies are designed in for a home that goes above and beyond current code to give you the superior quality construction, HVAC, appliances, indoor air quality, safety, durability, comfort, and solar-ready components along with ultra-low or no utility bills. This provides homeowners with a quality home that will last for generations to come.

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Detecting Anomalous Sensor Events in Smart Home Data for Enhancing the Living Experience  

E-Print Network (OSTI)

and adaptive behavior to home automation systems. This additional capability gives the user of smart home newDetecting Anomalous Sensor Events in Smart Home Data for Enhancing the Living Experience University, Pullman, WA 99164-2752 cook@eecs.wsu.edu Abstract The need to have a secure lifestyle at home

Cook, Diane J.

142

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

143

A system for collecting activity annotations for home energy management  

Science Journals Connector (OSTI)

Abstract Home energy management is becoming increasingly important and, though there are a plethora of tools for accessing energy consumption data, few provide concrete insights that can directly help users manage demand. Mechanisms that enable a user to draw connections between activities and energy consumption by attaching contextual labels to energy events are a promising step; however solutions for collecting annotations from users can be error prone or intrusive. This work presents a system for collecting in situ annotations using a smartphone application coupled with an off-the-shelf home energy measurement infrastructure. We use a novel power profiling approach to identify important energy consumption events and solicit contextual annotations from the user via a push notification sent to a smartphone. Using a five-week study performed in five homes, we show that our power profiling approach can identify a significant percentage of important energy consumption events using a very small number of monitored devices. We were able to collect an average of over 2 annotations per day and while users provided a wide range of annotations, the motivation to provide annotations varied across subjects.

Sami Rollins; Nilanjan Banerjee; Lazeeb Choudhury; David Lachut

2014-01-01T23:59:59.000Z

144

Building America Top Innovations 2013 Profile Â… HPXML: A Standardized Home Performance Data Sharing System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

home performance program tracking home performance program tracking systems and energy upgrade analysis software. Many software platforms are available for recording the results of home energy audits for energy-efficiency upgrades and for analyzing home energy performance. Because states and utilities have adopted different tools for compiling and analyzing the data, home performance companies that participate in multiple utility programs or operate over multiple regions need proficiency in each of the reporting platforms used. The necessity of being fluent in multiple programs and of providing results in numerous platforms dramatically increases the home performance companies' information technology infrastructure and training costs. The National Renewable Energy Laboratory (NREL) has supported the

145

DOE and Industry Showcase New Control Systems Security Technologies at  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

146

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network (OSTI)

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

147

Applications for cyber security - System and application monitoring  

SciTech Connect

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

148

Research challenges for the security of control systems  

Science Journals Connector (OSTI)

In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirements and problems for the security of control systems? We also propose ...

Alvaro A. Cárdenas; Saurabh Amin; Shankar Sastry

2008-07-01T23:59:59.000Z

149

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

150

Secure control systems with application to cyber-physical systems  

SciTech Connect

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

151

Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing the means for the administration of certificates. This paper describes the interface between security enhanced application and the CMS. The interface layer with which the security applications are extended is named CMS Client. The CMS Client comprises a set of functions that enable the certification of users of security applications, retrieval of certificates and verification of retrieved certificates. The paper gives a short description of the CMS system and a detailed description of the CMS Client functions. Furthermore it describes how to extend the existing or create new security applications based on the CMS system.

Nada Kapidzic

1998-01-01T23:59:59.000Z

152

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations  

Science Journals Connector (OSTI)

Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return ... Keywords: Offshore, Process Control, Safety Instrumented Systems, Secure remote access

Martin Gilje Jaatun; Tor Olav Grøtan; Maria B. Line

2008-06-01T23:59:59.000Z

153

Enhancing the OS against Security Threats in System Administration  

Science Journals Connector (OSTI)

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is gra...

Nuno Santos; Rodrigo Rodrigues; Bryan Ford

2012-01-01T23:59:59.000Z

154

Enhancing the OS against security threats in system administration  

Science Journals Connector (OSTI)

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is granted superuser privileges that allow him ...

Nuno Santos; Rodrigo Rodrigues; Bryan Ford

2012-12-01T23:59:59.000Z

155

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network (OSTI)

with small water systems to develop volun- tary assessments of the homeland security threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA...

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

156

HOME INSECURITY: NO ALARMS, FALSE ALARMS, AND SIGINT  

SciTech Connect

The market share of home security systems has substantially increased as vendors incorporate more desirable features: intrusion detection, automation, wireless, and LCD touch panel controls. Wireless connectivity allows vendors to manufacture cheaper, more featureful products that require little to no home modification to install. Consumer win, since adding devices is easier. The result: an ostensibly more secure, convenient, and connected home for a larger number of citizens. Sadly, this hypothesis is flawed; the idea of covering a home with more security sensors does not translate into a more secure home. Additionally, the number of homes using these vulnerable systems is large, and the growth rate is increasing producing a even larger problem. In this talk, I will demonstrate a generalized approach for compromising three systems: ADT, the largest home security dealer in North America; Honeywell, one of the largest manufacturers of security devices; and Vivint, a top 5 security dealer. We will suppress alarms, create false alarms, and collect artifacts that facilitate tracking the movements of individuals in their homes.

Lamb, Logan M [ORNL

2014-01-01T23:59:59.000Z

157

Building America Case Study: Selecting Ventilation Systems for Existing Homes (Fact Sheet)  

SciTech Connect

This document addresses adding -or improving - mechanical ventilation systems to existing homes. The purpose of ventilation is to remove contaminants from homes, and this report discusses where, when, and how much ventilation is appropriate in a home, including some discussion of relevant codes and standards. Advantages, disadvantages, and approximate costs of various system types are presented along with general guidelines for implementing the systems in homes. CARB intends for this document to be useful to decision makers and contractors implementing ventilation systems in homes. Choosing the "best" system is not always straightforward; selecting a system involves balancing performance, efficiency, cost, required maintenance, and several other factors. It is the intent of this document to assist contractors in making more informed decisions when selecting systems. Ventilation is an integral part of a high-performance home. With more air-sealed envelopes, a mechanical means of removing contaminants is critical for indoor environmental quality and building durability.

Not Available

2014-12-01T23:59:59.000Z

158

Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems  

Science Journals Connector (OSTI)

The specification of security requirements for systems of systems is often an activity that is forced upon non-security experts and performed under time pressure. This paper describes how we have addressed this p...

Albin Zuccato; Nils Daniels; Cheevarat Jampathom…

2010-01-01T23:59:59.000Z

159

Secure data storage for mobile data collection systems  

Science Journals Connector (OSTI)

Wireless network infrastructures, notably cellular networks, are becoming a vital element for exchanging electronic data in low income countries. Several key sectors are already leveraging on cellular networks: mobile financial transactions have already ... Keywords: Delphi theory, J2ME, OWASP, RMS, mhealth, mobile data collection systems, mobile security, secure mobile data storage

Samson Gejibo; Federico Mancini; Khalid A. Mughal; Remi A. B. Valvik; Jørn Klungsøyr

2012-10-01T23:59:59.000Z

160

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network (OSTI)

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

An assessment of unforeseen losses resulting from inappropriate use of solar home systems in South Africa  

Science Journals Connector (OSTI)

Abstract One of the challenges to the sustainability of the Solar Home System (SHS) electrification program in South Africa is equipment theft. In response to this, communities susceptible to solar panel theft resort to mounting their panels flat on the ground so they can be looked after during the day and taken indoors at night for safe keeping. Other households use their security lights to illuminate their environment and provide security for pole and roof mounted solar panels at night. These actions have consequential effects on the performance of the SHS. Several studies have detected resentment from households regarding the low power quality from these systems. Most scientific contributions on the issue of low power from SHS have focused on the challenges based on the technical designs of the systems. The power losses due to the usage pattern of the system has not received much attention. This study therefore reports on the technical losses as a result of the deviation from the designed and installed specification of the system by the users in order to protect their systems. It also investigates the linkage between the technical and economic losses which affects the sustainability of SHS program. A case study was performed in Thlatlaganya village within Limpopo province in South Africa. Technical analysis using PVSYST solar software revealed that the energy output and performance of the battery is compromised as a result of these practices. Economic analysis indicates that the battery life and the economics of owning and operating SHS are affected negatively. The study recommends solutions to mitigate these losses, and proposes a cost effective way of optimizing the operation of SHS using a Bench-Rack system for mounting solar panels.

Chukwuma Leonard Azimoh; Fredrik Wallin; Patrik Klintenberg; Björn Karlsson

2014-01-01T23:59:59.000Z

162

Interpreting Deep Structures of Information Systems Security  

Science Journals Connector (OSTI)

......network, infrastructure and regulatory) of the organization...adopting stringent regulatory review of the security policies...present ways to deal with regulatory actions such as developing contingency plans (disaster recovery in......

Manoj Thomas; Gurpreet Dhillon

2012-10-01T23:59:59.000Z

163

SP 800-128. Guide for Security-Focused Configuration Management of Information Systems  

Science Journals Connector (OSTI)

The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ... Keywords: Configuration management, SecCM, control, information systems, monitoring, risk management framework, security content automation protocol (SCAP), security program, security-focused continuous monitoring

L. Arnold Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

2011-08-01T23:59:59.000Z

164

Building America System Research Plan for Reduction of Miscellaneous Electrical Loads in Zero Energy Homes  

SciTech Connect

This research plan describes the overall scope of system research that is needed to reduce miscellaneous electrical loads (MEL) in future net zero energy homes.

Barley, C. D.; Haley, C.; Anderson, R.; Pratsch, L.

2008-11-01T23:59:59.000Z

165

HPXML: A Standardized Home Performance Data Sharing System- Building America Top Innovation  

Energy.gov (U.S. Department of Energy (DOE))

NREL’s Standard for Home Performance-Related Data Transfer (known as HPXML) facilitates smooth communication between program tracking systems and energy upgrade analysis software.

166

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

167

AMI System Security Requirements - v1_01-1 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

168

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

169

Security Assessment of Communication Networks for Integrated Substation Automation Systems  

Science Journals Connector (OSTI)

To assess the security of communication networks for integrated substation automation systems, a systematic approach based on ... to communication networks between the control center and substations through the a...

Huisheng Gao; Xuejiao Dai

2011-01-01T23:59:59.000Z

170

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

by this browser. Download video Captions: On Time: 4:03 min Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry...

171

Security Requirements for Classified Automatic Data Processing Systems  

Directives, Delegations, and Requirements

To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

1985-07-10T23:59:59.000Z

172

Roadmap to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

173

Could Your Home Benefit from a Small Wind Electric System? | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Could Your Home Benefit from a Small Wind Electric System? Could Your Home Benefit from a Small Wind Electric System? Could Your Home Benefit from a Small Wind Electric System? August 8, 2013 - 2:31pm Addthis A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 A small wind electric system can be a clean, affordable way to power your home. | Photo courtesy of Thomas Fleckenstein, NREL 26476 Erik Hyrkas Erik Hyrkas Media Relations Specialist, Office of Energy Efficiency & Renewable Energy How can I participate? Check out these resources to figure out whether a small wind electric system is the right choice for you. Small residential wind turbines have been around for decades, and in recent years they have become a more affordable option due to tax credits and

174

Building America Top Innovations 2013 Profile Â… HPXML: A Standardized Home Performance Data Sharing System  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

program tracking systems and program tracking systems and energy upgrade analysis software. Many software platforms are available for recording the results of home energy audits for energy-efficiency upgrades and for analyzing home energy performance. Because states and utilities have adopted different tools for compiling and analyzing the data, home performance companies that participate in multiple utility programs or operate over multiple regions need proficiency in each of the reporting platforms used. The necessity of being fluent in multiple programs and of providing results in numerous platforms dramatically increases the home performance companies' information technology infrastructure and training costs. The National Renewable Energy Laboratory (NREL) has supported the

175

Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch  

E-Print Network (OSTI)

Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch...

Ilic, Marija; Hsieh, Eric; Remanan, Prasad

2004-06-16T23:59:59.000Z

176

GAO Challenges and Efforts to Secure Control Systems (March 2004) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines. In October 1997, the President's Commission on Critical Infrastructure Protection emphasized the increasing vulnerability of control systems to cyber attacks. The House Committee on Government Reform and its Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census asked GAO to report on potential cyber vulnerabilities, focusing on (1) significant cybersecurity risks associated with control systems (2) potential and reported cyber attacks

177

DOE Zero Energy Ready Home Case Study, Weiss Building & Development, LLC., System Home, River Forest, IL  

Energy.gov (U.S. Department of Energy (DOE))

Case study of a DOE Zero Energy Ready Home in River Forest, IL that scored HERS 17 without PV. This 4,763 ft2 custom passive house has R-54 ICF walls, a vented attic with R-100 blown fiberglass, plus R-40 rigid EPS under the slab, triple-pane windows, two ductless mini-split heat pumps, and redundant air sealing and flashing details.

178

Surreptitious security violation in the MVS operating system  

Science Journals Connector (OSTI)

Even in the well-protected IBM MVS operating system users can force breaches in the standard protection mechanisms and obtain control over the entire installation regardless of RACF or TOP SECRET protection software. This paper encourages computing center management to appoint security officers to prevent and detect security violations. The need for these officers will be demonstrated as a consequence of the violations shown.

Ronal Paans; Guus Bonnes

1983-01-01T23:59:59.000Z

179

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

SciTech Connect

An increasing number of homes in the U.S. have sold with photovoltaic (PV) energy systems installed at the time of sale, yet relatively little research exists that estimates the marginal impacts of those PV systems on home sale prices. A clearer understanding of these possible impacts might influence the decisions of homeowners considering the installation of a PV system, homebuyers considering the purchase of a home with PV already installed, and new home builders considering including PV as an optional or standard product on their homes. This research analyzes a large dataset of California homes that sold from 2000 through mid-2009 with PV installed. It finds strong evidence that homes with PV systems sold for a premium over comparable homes without PV systems during this time frame. Estimates for this premium expressed in dollars per watt of installed PV range, on average, from roughly $4 to $5.5/watt across a large number of hedonic and repeat sales model specifications and robustness tests. When expressed as a ratio of the sales price premium of PV to estimated annual energy cost savings associated with PV, an average ratio of 14:1 to 19:1 can be calculated; these results are consistent with those of the more-extensive existing literature on the impact of energy efficiency on sales prices. When the data are split among new and existing homes, however, PV system premiums are markedly affected. New homes with PV show premiums of $2.3-2.6/watt, while existing homes with PV show premiums of more than $6/watt. Reasons for this discrepancy are suggested, yet further research is warranted. A number of other areas where future research would be useful are also highlighted.

Hoen, Ben; Cappers, Peter; Wiser, Ryan; Thayer, Mark

2011-04-19T23:59:59.000Z

180

Manual of Security Requirements for the Classified Automated Information System Security Program  

Directives, Delegations, and Requirements

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

182

Implementing Multi-Vendor Home Network System with Vendor-Neutral Services and Dynamic Service Binding  

Science Journals Connector (OSTI)

The home network system (HNS) consists of networked household appliances, intended to provide value-added services. The conventional HNS has been built on the single-vendor system, which severely limits potential of the HNS. To overcome the problem, ...

Masahide Nakamura; Yusuke Fukuoka; Hiroshi Igaki; Ken-ichi Matsumoto

2008-07-01T23:59:59.000Z

183

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

184

Measurement-Based Evaluation of Installed Filtration System Performance in Single-Family Homes  

SciTech Connect

This guide discusses important study design issues to consider when conducting an on-site evaluation of filtration system performance. The two most important dichotomies to consider in developing a study protocol are (1) whether systems are being evaluated in occupied or unoccupied homes and (2) whether different systems are being compared in the same homes or if the comparison is between systems installed in different homes. This document provides perspective and recommendations about a suite of implementation issues including the choice of particle measurement devices, selection of sampling locations, ways to control and/or monitor factors and processes that can impact particle concentrations, and data analysis approaches.

Chan, Wanyu Rengie; Singer, Brett C.

2014-04-03T23:59:59.000Z

185

Pressurized security barrier and alarm system  

DOE Patents (OSTI)

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

Carver, D.W.

1995-04-11T23:59:59.000Z

186

Investigating alternative concepts of operations for a maritime security system of systems  

E-Print Network (OSTI)

For complex systems of systems, such as those required to perform maritime security, system architects have numerous choices they may select from, both in the components and in the way the system operates. Component choices, ...

Mekdeci, Brian Anthony

187

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

188

Improving Security in the ATLAS PanDA System  

E-Print Network (OSTI)

The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

2011-01-01T23:59:59.000Z

189

Certification and Accreditation Process for Information Systems Including National Security Systems  

Directives, Delegations, and Requirements

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

190

Control Systems Security News Archive | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

News Archive News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award October 2009 - DOE NSTB researchers demonstrated R&D successes to asset owners at EnergySec Conference September 2009 - ISA approves standard for wireless automation in process control applications Sept. 2009 - Government and Industry a Force for Collaboration at the

191

July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 17 ESTAP Webinar: Resilient Solar-Storage Systems for Homes and Commercial Facilities July 12, 2013 - 10:40am Addthis On Wednesday, July 17 from 2 - 3 p.m. ET, Clean Energy States Alliance will host a webinar on resilient solar-storage systems for homes and commercial facilities. The webinar will be introduced by Dr. Imre Gyuk, Energy Storage Program Manager in the Office of Electricity Delivery and Energy Reliability. This webinar will include basic information on battery-backed PV systems that can continue to operate in islanded mode when the grid is down, supporting critical loads. Speaker Michael Kleinberg of DNV KEMA will discuss existing solutions and opportunities for solar PV systems with

192

HOME OF THE FUTURE : SYSTEM OF THE FUTUREHOME OF THE FUTURE : SYSTEM OF THE FUTURE BRUCE BEIHOFF, WHIRLPOOL CORPORATION  

E-Print Network (OSTI)

...A Whirlpool Smart Grid Example... 21 Oct 2010 Rev 2 10MIT SDM 2010 Home/System of Future Whirlpool Benefits ... 21 Oct 2010 Rev 2 11MIT SDM 2010 Home/System of Future Whirlpool #12;OTHE PROBLEM o Process Process Target Product Controller Actuator Observer / Estimator Operator Functions Example

de Weck, Olivier L.

193

Roadmap to Secure Control Systems in the Energy: Executive Summary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Foreword Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctive feature of this collaborative effort is the active involvement and leadership of energy asset owners and operators in developing the Roadmap content and priorities. The Roadmap synthesizes

194

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network (OSTI)

novel aspects of networked systems that include integrating dis- tributed computing systems with monitoring and controlling entities in the physical environment. For example, in real-time control systems stations. Other examples include smart grid systems and supervisory control and data acquisition (SCADA

Burmester, Mike

195

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

196

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

197

Effects of Medicare payment reform: Evidence from the home health interim and prospective payment systems  

Science Journals Connector (OSTI)

Abstract Medicare continues to implement payment reforms that shift reimbursement from fee-for-service toward episode-based payment, affecting average and marginal payment. We contrast the effects of two reforms for home health agencies. The home health interim payment system in 1997 lowered both types of payment; our conceptual model predicts a decline in the likelihood of use and costs, both of which we find. The home health prospective payment system in 2000 raised average but lowered marginal payment with theoretically ambiguous effects; we find a modest increase in use and costs. We find little substantive effect of either policy on readmissions or mortality.

Peter J. Huckfeldt; Neeraj Sood; José J. Escarce; David C. Grabowski; Joseph P. Newhouse

2014-01-01T23:59:59.000Z

198

Networking technology adoption : system dynamics modeling of fiber-to-the-home  

E-Print Network (OSTI)

A system dynamics model is developed and run to study the adoption of fiber-to-the-home as a residential broadband technology. Communities that currently do not have broadband in the United States are modeled. This case ...

Kelic, Andjelka, 1972-

2005-01-01T23:59:59.000Z

199

Measurement-Based Evaluation of Installed Filtration System Performance in Single-Family Homes  

E-Print Network (OSTI)

Systems LBNL-XXXX 8. Literature Cited AHAM (2006).ANSI/AHAM Standard AC-1-2006 Method for Measuring theHome Appliance Manufactures (AHAM), using Clean Air Delivery

Chan, Wanyu Rengie

2014-01-01T23:59:59.000Z

200

Building America Expert Meeting: Minutes from Automated Home Energy Management System  

Energy.gov (U.S. Department of Energy (DOE))

These meeting minutes are from the U.S. Department of Energy Building America program expert meeting titled "Automated Home Energy Management System," held on October 1-2, 2010 in Denver, Colorado.

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Critical issues in process control system security : DHS spares project.  

SciTech Connect

The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

2010-10-01T23:59:59.000Z

202

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

203

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

infrastructure systems in the analysis of safety and stability - a significant contribution to the theory of hybrid

Amin, Saurabh

2011-01-01T23:59:59.000Z

204

SunShot Installs Solar Energy System on Local Habitat for Humanity Home  

Office of Energy Efficiency and Renewable Energy (EERE)

Working with GRID Alternatives, the nation's largest solar non-profit, DOE's SunShot Initiative team enjoyed a day in the sun on a rooftop in Washington, D.C., where we volunteered to install a solar energy system on a Habitat for Humanity home. GRID installed solar electric systems on 10 affordable homes developed by Habitat for Humanity in the Ivy City neighborhood in Northeast D.C.

205

Securely Sealing Multi-FPGA Systems Tim Guneysu1  

E-Print Network (OSTI)

G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany 2 University of Michigan, 2260-growing supply chains that disentangle chip designers and manufacturers from OEMs. Our work shows how automatically enforces the system configuration detected upon power-up and bans further mod- ifications. 1

Markov, Igor

206

The Freight Shuttle System: Automated-Secure Trade  

E-Print Network (OSTI)

the same volume) #12;HDD Truck vs. FSS (CO2 required to service the same volume) #12;Next Steps · Finalize footprint guide way ­ To be built within existing highway ROW The Freight Shuttle System 24/7 operations transportation #12;#12;#12;#12;Port of Entry Security #12;Ciudad Juarez El Paso Scan-in-motion Scan

207

Auction Market System in Electronic Security Trading Platform  

E-Print Network (OSTI)

in electronic trading platforms, although they implement the same fundamental principle of maximum tradingAuction Market System in Electronic Security Trading Platform Li Xihao Bielefeld Graduate School of Economics and Management Discussion Paper: May 11, 2010 Abstract Under the background of the electronic

Tesfatsion, Leigh

208

Ensuring system security through formal software evaluation  

SciTech Connect

With the increasing use of computer systems and networks to process safeguards information in nuclear facilities, the issue of system and data integrity is receiving worldwide attention. Among the many considerations are validation that the software performs as intended and that the information is adequately protected. Such validations are often requested of the Safeguards Systems Group of the Los Alamos National Laboratory. This paper describes our methodology for performing these software evaluations.

Howell, J A; Fuyat, C [Los Alamos National Lab., NM (United States)] [Los Alamos National Lab., NM (United States); Elvy, M [Marble Associates, Boston, MA (United States)] [Marble Associates, Boston, MA (United States)

1992-01-01T23:59:59.000Z

209

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

210

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

211

Asbestos : operating system security for mobile devices  

E-Print Network (OSTI)

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

212

Safety and Security Enforcement Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

213

Feng Wang and Kenneth J. Turner. Policy Conflicts in Home Care Systems, in Lydie du Bousquet and Jean-Luc Richier (eds.), Proc. 9th Int. Conf.  

E-Print Network (OSTI)

monitoring and home automation are currently very limited. The major issues in home care delivery to support a variety of home automation and home care services [3]. Considerable research remains to realiseFeng Wang and Kenneth J. Turner. Policy Conflicts in Home Care Systems, in Lydie du Bousquet

Turner, Ken

214

Feng Wang and Kenneth J. Turner. Policy Conflicts in Home Care Systems. In Lydie du Bousquet and Jean-Luc Richier (eds.), Proc. 9th. Int. Conf. on  

E-Print Network (OSTI)

monitoring and home automation are currently very limited. The major issues in home care delivery to support a variety of home automation and home care services [3]. Considerable research remains to realiseFeng Wang and Kenneth J. Turner. Policy Conflicts in Home Care Systems. In Lydie du Bousquet

Turner, Ken

215

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

216

Insights into the design, use and implementation of home energy management systems  

Science Journals Connector (OSTI)

Between 2008 and 2011, three different home energy management systems (HEMS) that give feedback on energy consumption were implemented in households in the Netherlands. Home energy management systems are defined as intermediary devices that can visualise, monitor and/or manage domestic gas and/or electricity consumption. Through a series of questionnaires, interviews, focus groups and usability tests, a wide range of knowledge was gathered on factors influencing the effectiveness of the three systems. The resulting insights were structured with the help of a conceptual model, which outlines the various interactions between users, energy monitors, and their social and physical environments. The insights provide a broad spectrum of factors to be considered for the successful design and implementation of home energy management systems. This paper aims to provoke an open discussion to ascertain the value of the different factors and further the development of effective and useful HEMS.

S.S. Van Dam; C.A. Bakker; J.D.M. Van Hal

2012-01-01T23:59:59.000Z

217

System Effects of High Efficiency Filters in Homes  

E-Print Network (OSTI)

FIELD TESTING OF FILTER IMPACTS ON HVAC SYSTEM PERFORMANCEof Filters in Residential and Light-Commercial HVAC systems.HVAC system performance changes with different MERV filters

Walker, Iain S.

2014-01-01T23:59:59.000Z

218

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

219

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access  

E-Print Network (OSTI)

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access Marko University of Technology March 17, 2004 Keywords: Grid security, virtual organizations, Grid use case. This paper describes the European Data Grid's (EDG's) java security system and Spitfire database access

Haak, Hein

220

Technical and Human Issues in Computer-Based Systems Security Budi Arief and Denis Besnard  

E-Print Network (OSTI)

of hacking methods in technical terms; Section 3 outlines different players involved in computer security to make computer systems more secure. 2. TECHNICAL SIDE OF HACKING Hacking is usually a technical activity

Newcastle upon Tyne, University of

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Enhancing the Hierarchical Clustering Mechanism of Storing Resources’ Security Policies in a Grid Authorization System  

Science Journals Connector (OSTI)

Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources, which reduces ... scalability and leads to huge repetitions in checking security r...

Mustafa Kaiiali; Rajeev Wankar; C. R. Rao…

2010-01-01T23:59:59.000Z

222

National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)  

Energy.gov (U.S. Department of Energy (DOE))

Improving the security of energy control systems has become a national priority. Since the mid-1990’s, security experts have become increasingly concerned about the threat of malicious cyber...

223

Roadmap to Secure Control Systems in the Energy Sector- January 2006  

Energy.gov (U.S. Department of Energy (DOE))

This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

224

Multi-objective Optimization for Pricing System Security in Electricity Markets  

E-Print Network (OSTI)

or hybrid markets, how to properly include system security is still an open question. This paper mainly focuses on hybrid markets and on the inclusion of proper security constraints through the use of a multi

Cañizares, Claudio A.

225

Field Measurements of Heating System Efficiency in Nine Electrically-Heated Manufactured Homes.  

SciTech Connect

This report presents the results of field measurements of heating efficiency performed on nine manufactured homes sited in the Pacific Northwest. The testing procedure collects real-time data on heating system energy use and heating zone temperatures, allowing direct calculation of heating system efficiency.

Davis, Bob; Siegel, J.; Palmiter, L.; Baylon, D.

1996-07-01T23:59:59.000Z

226

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction: Downloading and copyright Dear UCI Students: The Internet is an essential tool for both academic and everyday

Brody, James P.

227

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction is an essential tool for both academic and everyday pursuits expanding and enriching our lives. Along

Brody, James P.

228

The Center for Control, Dynamical Systems, and Computation University of California at Santa Barbara  

E-Print Network (OSTI)

inventory monitoring and control, home and building automation, power systems, security systems, precision monitoring, industrial automation, office and building automation, Supervisory Control and Data Acquisition

Akhmedov, Azer

229

Control Systems Security Publications Library | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Publications Library Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL PUBLICATIONS SANDIA NATIONAL LABORATORIES REPORTS FOR NSTB PACIFIC NORTHWEST NATIONAL LABORATORY REPORTS FOR NSTB IDAHO NATIONAL LABORATORY REPORTS FOR NSTB FEDERAL GUIDANCE AND POLICY DOCUMENTS VULNERABILITY REPORTS INL Common Vulnerabilities Report - 2008 NERC Top 10 Vulnerabilities of Control Systems and Their Associated

230

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

of the overall population of home sales, which would havea higher proportion of existing homes, nor of thepopulation of PV homes, which are heavily weighted toward

Hoen, Ben

2014-01-01T23:59:59.000Z

231

Initial CTBT international monitoring system security findings and recommendations  

SciTech Connect

An initial security evaluation of the proposed International Monitoring System (IMS) suggests safeguards at various points in the IMS to provide reliable information to the user community. Modeling the IMS as a network of information processing nodes provides a suitable architecture for assessing data surety needs of the system. The recommendations in this paper include the use of public-key authentication for data from monitoring stations and for commands issued to monitoring stations. Other monitoring station safeguards include tamper protection of sensor subsystems, preservation of data (i.e. short-term archival), and limiting the station`s network services. The recommendations for NDCs focus on the need to provide a backup to the IDC for data archival and data routing. Safeguards suggested for the IDC center on issues of reliability. The production of event bulletins should employ {open_quotes}two-man{close_quotes} procedures. As long as the data maintains its integrity, event bulletins can be produced by NDCs as well. The effective use of data authentication requires a sound key management system. Key management systems must be developed for the authentication of data, commands, and event bulletins if necessary. It is recommended that the trust placed in key management be distributed among multiple parties. The recommendations found in this paper offer safeguards for identified vulnerabilities in the IMS with regard to data surety. However, several outstanding security issues still exist. These issues include the need to formalize and obtain a consensus on a threat model and a trust model for the IMS. The final outstanding security issue that requires in-depth analysis concerns the IDC as a potential single point of failure in the current IMS design.

Craft, R.L.; Draelos, T.J.

1996-08-01T23:59:59.000Z

232

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network (OSTI)

& Accreditation ? Certification Accreditation Information + Evidence Risk Thresholds 1. Security Plan 2. C Output of C&A Process Security Plan Risk Assessments Contingency Plans Incident Response Plans Security Does the potential risk to the agency operations, assets or individuals described in the Security Plan

Madisetti, Vijay K.

233

Ultra-Efficient Home Design | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ultra-Efficient Home Design Ultra-Efficient Home Design Ultra-Efficient Home Design April 26, 2012 - 9:52am Addthis All Kaupuni Village homes in Oahu, Hawaii, incorporate energy efficiency and renewable energy technologies to produce as much energy as they consume. Credit: Kenneth Kelly, NREL. All Kaupuni Village homes in Oahu, Hawaii, incorporate energy efficiency and renewable energy technologies to produce as much energy as they consume. Credit: Kenneth Kelly, NREL. What does this mean for me? Lower energy bills and improved comfort Energy reliability and security Environmental sustainability How does it work? Ultra-efficient home design reduces home energy use and meets all or part of the reduced energy requirements with on-site renewable energy systems, such as solar water heating and solar electricity.

234

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

235

Home Energy Score API User: CakeSystems  

Energy.gov (U.S. Department of Energy (DOE))

CakeSystems is a platform that helps efficiency programs, professionals, and homeowners implement scoring tools to help move the market forward. CakeSystems uses a flexible data collection platform...

236

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

237

Study on security based on PKI for e-commerce of statistics information system  

Science Journals Connector (OSTI)

In this paper, issues about the trend of statistics information merchandizing, and the present situation of statistics information network and statistics information system security, are analyzed. Security construction scheme is put forward, which is ... Keywords: PKI, e-commerce, security, statistics information

Min Liu; Shudong Sun; Miaotiao Xing

2005-08-01T23:59:59.000Z

238

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

239

National SCADA Test Bed Enhancing control systems security in the energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

240

BETTER DUCT SYSTEMS FOR HOME HEATING AND COOLING.  

SciTech Connect

This is a series of six guides intended to provide a working knowledge of residential heating and cooling duct systems, an understanding of the major issues concerning efficiency, comfort, health, and safety, and practical tips on installation and repair of duct systems. These guides are intended for use by contractors, system designers, advanced technicians, and other HVAC professionals. The first two guides are also intended to be accessible to the general reader.

ANDREWS,J.

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

DOE Zero Energy Ready Home Case Study, Clifton View Homes, Coupeville...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Study, Clifton View Homes, Coupeville, WA, Systems Home DOE Zero Energy Ready Home Case Study, Clifton View Homes, Coupeville, WA, Systems Home Case-study of a DOE Zero Energy...

242

Implementing and Evaluating a Wireless Body Sensor System for Automated Physiological Data Acquisition at Home  

E-Print Network (OSTI)

Advances in embedded devices and wireless sensor networks have resulted in new and inexpensive health care solutions. This paper describes the implementation and the evaluation of a wireless body sensor system that monitors human physiological data at home. Specifically, a waist-mounted triaxial accelerometer unit is used to record human movements. Sampled data are transmitted using an IEEE 802.15.4 wireless transceiver to a data logger unit. The wearable sensor unit is light, small, and consumes low energy, which allows for inexpensive and unobtrusive monitoring during normal daily activities at home. The acceleration measurement tests show that it is possible to classify different human motion through the acceleration reading. The 802.15.4 wireless signal quality is also tested in typical home scenarios. Measurement results show that even with interference from nearby IEEE 802.11 signals and microwave ovens, the data delivery performance is satisfactory and can be improved by selecting an appropriate channe...

Chen, Chao; 10.5121/ijcsit.2010.2303

2010-01-01T23:59:59.000Z

243

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

244

A Summary of Control System Security Standards Activities in the Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

245

Nuclear Forensics | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Initiatives Cyber Security Nuclear Forensics Bioinformatics National Security Home | Science & Discovery | National Security | Initiatives | Nuclear Forensics SHARE Nuclear Forensics image Tools, techniques, and expertise in nuclear fuel cycle research gained over seven decades help ORNL scientists control and track nuclear bomb-grade materials to be sure they don't fall into the wrong hands. Among the leading-edge technologies used by researchers are high-resolution techniques that allow analysis of radiation detector data in stunning detail. Researchers are also developing aerosol sampling systems to collect airborne particulates and instantly send an alert if radiation is detected. For more information, please contact: nuclearforensicsinitiative

246

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

247

Cost/benefit analysis for video security systems  

SciTech Connect

Dr. Don Hush and Scott Chapman, in conjunction with the Electrical and Computer Engineering Department of the University of New Mexico (UNM), have been contracted by Los Alamos National Laboratories to perform research in the area of high security video analysis. The first phase of this research, presented in this report, is a cost/benefit analysis of various approaches to the problem in question. This discussion begins with a description of three architectures that have been used as solutions to the problem of high security surveillance. An overview of the relative merits and weaknesses of each of the proposed systems is included. These descriptions are followed directly by a discussion of the criteria chosen in evaluating the systems and the techniques used to perform the comparisons. The results are then given in graphical and tabular form, and their implications discussed. The project to this point has involved assessing hardware and software issues in image acquisition, processing and change detection. Future work is to leave these questions behind to consider the issues of change analysis - particularly the detection of human motion - and alarm decision criteria. The criteria for analysis in this report include: cost; speed; tradeoff issues in moving primative operations from software to hardware; real time operation considerations; change image resolution; and computational requirements.

NONE

1997-01-01T23:59:59.000Z

248

Webinar: ENERGY STAR Hot Water Systems for High Performance Homes  

Energy.gov (U.S. Department of Energy (DOE))

This presentation is from the Building America research team BA-PIRC webinar on September 30, 2011 providing informationprovide information about how to achieve energy savings from solar water heating, electric dedicated heat pump water heating, and gas tankless systems.

249

HOME ENERGY RATING SYSTEMS (HERS) FIELD VERIFICATION AND  

E-Print Network (OSTI)

................................................................................................................................ RC-2 Appendix RD ­ Procedures for Determining Refrigerant Charge for Split System Space Cooling ................................................................................................................... RD-1 RD.2 Standard Charge Measurement Procedure .............................................................................. RD-1 RD.3 Alternate Charge Measurement Procedure

250

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

251

Thermo-economic assessment of end user value in home and community scale renewable energy systems  

Science Journals Connector (OSTI)

This study employs thermo-economic analysis to establish a homeowner-centric valuation of renewable energy technologies. The evaluation methodology is illustrated using several classes of renewable energy technology including ground-source heat pumps wind turbines photovoltaic panels and solar thermal water heaters. Energy systems employing each of these technologies are examined when servicing the typical domestic energy loads of a single-detached home. Through the analysis it is learned that single-home photovoltaic systems produce energy at an annual cost approximately four times that of grid electricity while wind energy systems deliver this energy at approximately twice the cost of grid electricity. Further single-detached homeowners currently heating with fuel oil and/or grid electricity may expect to save between $1000 and $1800 per year when switching to a ground-source heat pump system; whereas those considering the implementation of a solar thermal water heater can expect to spend an additional $245 per year for hot water. Investigation of larger scale renewable systems examined the performance of wind turbines and ground-source heat pumps when serving groups of single-detached homes; wind turbines were found to exhibit significant economies of scale.

David Oliver; Dominic Groulx

2012-01-01T23:59:59.000Z

252

first responders | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Blog Home first responders first responders Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

253

render safe | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

at NNSA Blog Home render safe render safe Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

254

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

255

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53 53 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman August 2013 PNNL- 22653 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members August 2013 Prepared by: Pacific Northwest National Laboratory and

256

Activities to Secure Control Systems in the Energy Sector  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

257

Home Network Technologies and Automating Demand Response  

E-Print Network (OSTI)

potential role of home automation networks in implementinghow existing and future home automation systems may providehome networks" and "home automation" are frequently used

McParland, Charles

2010-01-01T23:59:59.000Z

258

Selective Versioning in a Secure Disk System Appears in the Proceedings of the 17th USENIX Security Symposium  

E-Print Network (OSTI)

Symposium Swaminathan Sundararaman Stony Brook University Gopalan Sivathanu Stony Brook University Erez are minimal. 1 Introduction Protecting disk data against malicious damage is one of the key requirements in computer systems security. Stored data is one the most valuable assets for most or- ganizations and damage

Zadok, Erez

259

Selective Versioning in a Secure Disk System Appears in the Proceedings of the 17th USENIX Security Symposium  

E-Print Network (OSTI)

Symposium Swaminathan Sundararaman Stony Brook University Gopalan Sivathanu Stony Brook University Erez are minimal. 1 Introduction Protecting disk data against malicious damage is one of the key requirements in computer systems security. Stored data is one the most valuable assets for most or­ ganizations and damage

Zadok, Erez

260

Measurement-Based Evaluation of Installed Filtration System Performance in Single-Family Homes  

E-Print Network (OSTI)

factors in single-family homes in the U.S." Building andbenefits from filtration in homes and commercial buildings (are being installed in U.S. homes. However, particle removal

Chan, Wanyu Rengie

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Securing Offshore Infrastructures Through a Global Alert and Graded Response System  

E-Print Network (OSTI)

1 « SARGOS » Securing Offshore Infrastructures Through a Global Alert and Graded Response System and graded response system to answer the recent but strong need for securing critical civilian offshore of their 2009 global safety program (CSOSG). 1. Introduction Offshore oil installations are critical energy

Paris-Sud XI, Université de

262

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

263

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

264

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

265

SRS upgrades helium recovery system | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

detectors employed by the United States Department of Homeland Security to detect neutron activity from nuclear material. Savannah River Nuclear Solutions, LLC, the management...

266

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network (OSTI)

implications and investment strategies Adib Kanafani &research explores agency investment behavior in multi-agencysystems develops guidelines for investments in security. The

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

267

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

268

Solar Home Systems Performance in Rural Area in Aceh Case Study: Deah Mamplam Village, Aceh Besar  

Science Journals Connector (OSTI)

Abstract Evaluations of implemented Solar Home Systems (SHSs) almost never been carried out in Aceh. Most of SHS projects have been claimed to be failed despite there are no data explaining the failure. A study was performed to identify condition and performance of \\{SHSspost\\} installation in Deah Mamplam village, Aceh. After 6 years installation almost three-fourths of the systems are in good physical and operational condition although most are in temporary inoperative. The research demonstrated that the absence of program dissemination and user training prior to delivery and installation has contributed to the low awareness and knowledge of the system.

Hilda Mufiaty

2014-01-01T23:59:59.000Z

269

DOE CHALLENGE HOME and PHIUS PARTNER TO MAKE IT EASIER TO REACH  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CHALLENGE HOME CHALLENGE HOME and PHIUS PARTNER TO MAKE IT EASIER TO REACH NEW LEVELS OF ZERO NET-ENERGY READY This partnership between DOE and PHIUS enhances coordination between voluntary peak performance new home label programs to expedite market transformation to net-zero ready homes that are so energy efficient that small renewable energy systems can offset most or all annual energy consumption. Net-zero ready homes can help address climate change, economic, and energy security issues. By working together, we create a continuous path to net-zero ready performance with minimal confusion to the housing industry. This is a voluntary home label program recognizing homes that comply with PHIUS+ standards. Key requirements beyond DOE's Challenge Home specifications include:

270

Modular design and implementation of a low cost home automation system using web-services.  

E-Print Network (OSTI)

??The idea of home automation has existed and worked on by several researchers. The idea of controlling devices, around a home, in way to provide… (more)

Gomasa, Sunny Peter

2011-01-01T23:59:59.000Z

271

Home Energy Score Sample Report  

Energy.gov (U.S. Department of Energy (DOE))

The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home’s structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems. Recommendations show how to improve the energy efficiency of the home to achieve a higher score and save money.

272

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction Help Desk ­ (949) 824-2222 or oit@uci.edu http@uci.edu> Subject: Downloading and copyright Dear UCI Students: The Internet is an essential tool for both academic

Brody, James P.

273

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction: The Internet has become an essential tool for both academic and everyday pursuits, offering capabilities Resources http://eee.uci.edu/help/student/copyright/ [3] UCI Residential Network Services Computer Use

Brody, James P.

274

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction 28, 2009 Site Feedback Office of Information Technology Contact the OIT Help Desk ­ (949) - Downloading & Copyright Memo to Students Dear UCI Students: The Internet is an essential tool for both

Brody, James P.

275

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction Feedback Office of Information Technology Contact the OIT Help Desk ­ (949) 824-2222 or oit is a very powerful tool, providing many capabilities and opportunities, both in academic and everyday

Brody, James P.

276

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction: October 28, 2009 Site Feedback Office of Information Technology Contact the OIT Help Desk Subject: Downloading and copyright Dear UCI Students: The Internet is an essential tool for both academic

Brody, James P.

277

Home Heating | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Home Heating Everything you need to know about home heating, including how heating systems work, the different types on the market and proper maintenance. Read more Thermostats...

278

Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy: Executive Summary Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy: Executive Summary

279

Roadmap to Secure Control Systems in the Energy Sector - 2006 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 2006 - 2006 Roadmap to Secure Control Systems in the Energy Sector - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications

280

Special feature: Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing ...

Nada Kapidzic

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security  

E-Print Network (OSTI)

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security in a power market. The paper addresses two types of uncertainties: 1) struc- tural (e.g., branch outages minimal corrections in existing contractual transactions that ensure security. Given our interest in real

Stankoviæ, Aleksandar

282

Home Energy Saver for Consumers  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Energy Saver for Consumers Home Energy Saver for Consumers The Home Energy Saver(tm) (HES) empowers homeowners and renters to save money, live better, and help the earth by reducing energy use in their homes. HES recommends energy-saving upgrades that are appropriate to the home and make sense for the home's climate and local energy prices. The money invested in these upgrades commonly earns "interest" in the form of energy bill savings, at an annual rate of 20% or more. Depending on the type of improvement made, the home can achieve better comfort (warmer in winter, cooler in summer), fewer drafts, lower maintenance costs, and improved security and fire safety-all of which improve life and increase the home's value. HES computes a home's energy use on-line in a matter of seconds based on

283

Security and Privacy in Smart Grid Demand Response Systems  

Science Journals Connector (OSTI)

Various research efforts have focussed on the security and privacy concerns arising from the introduction of smart energy meters. However, in addition to smart metering, the ultimate vision of the smart grid incl...

Andrew Paverd; Andrew Martin; Ian Brown

2014-01-01T23:59:59.000Z

284

An Analysis of Security Services in Grid Storage Systems  

Science Journals Connector (OSTI)

With the wide-spread deployment of Data Grids, storage services are becoming a critical aspect of the Grid infrastructure. Due to the sensitive and critical nature of the data being stored, security issues relate...

Jesus Luna; Michail D. Flouris; Manolis Marazakis…

2008-01-01T23:59:59.000Z

285

Water and Energy Savings using Demand Hot Water Recirculating Systems in Residential Homes: A Case Study of Five Homes in Palo Alto, California  

SciTech Connect

This report summarizes a preliminary study aimed at estimating the potential of saving potable water, (and the electrical energy used to heat it), that is presently lost directly to the drain while occupants wait for hot water to arrive at the faucet (point of use). Data were collected from five single-family homes in Palo Alto, California. Despite the small sample size in this study, the results make a compelling case for retrofitting homes with hot water recirculation systems to eliminate unnecessary wastage of water at the point of use. Technical as well as behavioral and attitudinal changes towards water conservation are necessary for a fulfilling and successful conservation effort. This report focuses on the technical issues, but behavioral issues are also noted, which may be factored into future studies involving local and state governments and utility companies.

Ally, M.R.

2002-11-14T23:59:59.000Z

286

Energy-efficient mortgages and home energy rating systems: A report on the nation`s progress  

SciTech Connect

This report summarizes progress throughout the nation in establishing voluntary programs linking home energy rating systems (HERS) and energy-efficient mortgages (EEMs). These programs use methods for rating the energy efficiency of new and existing homes and predicting energy cost savings so lenders can factor in energy cost savings when underwriting mortgages. The programs also encourage lenders to finance cost-effective energy-efficiency improvements to existing homes with low-interest mortgages or other instruments. The money saved on utility bills over the long term can more than offset the cost of such energy-efficiency improvements. The National Collaborative on HERS and EEMs recommended that this report be prepared.

Farhar, B.C.; Eckert, J.

1993-09-01T23:59:59.000Z

287

Cyber Security Requirements for Wireless Devices and Information Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

288

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Markets and Policy Group * Energy Analysis Department Energy Markets and Policy Group * Energy Analysis Department An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California Ben Hoen, Peter Cappers, Mark Thayer, Ryan Wiser Lawrence Berkeley National Laboratory LBNL Webinar June 9 th , 2011 This work was supported by the Office of Energy Efficiency and Renewable Energy (Solar Energy Technologies Program) of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231, by the National Renewable Energy Laboratory under Contract No. DEK-8883050, and by the Clean Energy States Alliance.

289

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

290

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41 41 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman July 2013 PNNL- 22641 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members July, 2013 Prepared by: Pacific Northwest National Laboratory and NBISE Secure Power Systems Professional Project Team This document is a summarization of the report, Developing Secure Power Systems

291

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network (OSTI)

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

292

Transmission pricing of distributed multilateral energy transactions to ensure system security and guide economic dispatch  

E-Print Network (OSTI)

In this paper we provide a simulations-based demonstration of a hybrid electricity market that combines the distributed competitive advantages of decentralized markets with the system security guarantees of centralized ...

Ilic, Marija D.

2002-01-01T23:59:59.000Z

293

A Security-enabled Grid System for MINDS Distributed Data Mining  

Science Journals Connector (OSTI)

Interest has been increasing in mining information from a huge amount of data for various purposes such as business processes, scientific discoveries, and security. MINDS (Minnesota INtrusion Detection System) is...

Seonho Kim; Jinoh Kim; Jon B. Weissman

2014-09-01T23:59:59.000Z

294

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs—Summary Report  

SciTech Connect

This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

2013-07-01T23:59:59.000Z

295

ADVANTAGES OF HIGH-SPEED PLASTIC OPTICAL FIBERS FOR HOME NETWORKING SYSTEMS  

Science Journals Connector (OSTI)

Abstract (40-Word Limit): With the recent rapid increase of the demands for higher quality of applications in home PCs, high-definition 3D TVs, tablet devices, and intelligent home...

Koike, Yashiro

296

SP 800-37 Rev. 1. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach  

Science Journals Connector (OSTI)

The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security ... Keywords: FISMA, Risk management framework, categorize, common controls, continuous monitoring, information systems, roles and responsibilities, security authorization, security controls

Joint Task Force Transformation Initiative

2010-02-01T23:59:59.000Z

297

LED bulbs technical specification and testing procedure for solar home systems  

Science Journals Connector (OSTI)

Abstract The definition of technical specifications and the corresponding laboratory procedures are necessary steps in order to assure the quality of the devices prior to be installed in Solar Home Systems (SHS). To clarify and unify criteria a European project supported the development of the Universal Technical Standard for Solar Home Systems (UTSfSHS). Its principles were to generate simple and affordable technical requirements to be optimized in order to facilitate the implementation of tests with basic and simple laboratory tools even on the same SHS electrification program countries. These requirements cover the main aspects of this type of installations and its lighting chapter was developed based on the most used technology at that time: fluorescent tubes and CFLs. However, with the consolidation of the new LED solid state lighting devices, particular attention is being given to this matter and new procedures are required. In this work we develop a complete set of technical specifications and test procedures that have been designed within the frame of the UTSfSHS, based on an intense review of the scientific and technical publications related to LED lighting and their practical application. They apply to lamp reliability, performance and safety under normal, extreme and abnormal operating conditions as a simple but complete quality meter tool for any LED bulb. These tests have been applied to a group of 14 low-cost direct current LED bulbs and the accomplishment of the proposed requirements is analyzed.

Alfonso Gago Calderón; Luis Narvarte Fernández; Luis Miguel Carrasco Moreno; Javier Serón Barba

2015-01-01T23:59:59.000Z

298

Security Sciences Field Lab (SSFL) | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Science Nuclear Science Research Areas Research Highlights Facilities and Capabilities Educational Outreach Publications and Reports News and Awards Nuclear Science Home | Science & Discovery | Nuclear Science | Facilities and Capabilities SHARE Security Sciences Field Laboratory May 30, 2013 The Security Sciences Field Laboratory (SSFL) is designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including: sensors; cameras; alarm communication and display; power generation; access control; unattended stand-alone, remote communication; unmanned aerial and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain such as open grassy fields, hilly wooded areas, sand

299

Emergency Information | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information | National Nuclear Security Administration Information | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Emergency Information Home > Field Offices > Welcome to the Sandia Field Office > Emergency Information Emergency Information The Sandia Field Office (SFO) Emergency Management System is designed to

300

Change Request Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Change Request Forms | National Nuclear Security Administration Change Request Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Change Request Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Change Request Forms Change Request Forms

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

NMMSS Reports | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reports | National Nuclear Security Administration Reports | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Reports Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > NMMSS Reports NMMSS Reports U.S. Department of Energy / U.S. Nuclear Regulatory Commission

302

SAMS Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

SAMS Overview | National Nuclear Security Administration SAMS Overview | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog SAMS Overview Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > SAMS Overview SAMS Overview U.S. Department of Energy / U.S. Nuclear Regulatory Commission

303

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Action Codes Table | National Nuclear Security Administration Action Codes Table | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Action Codes Table Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Action Codes Table

304

Risk assessment of climate systems for national security.  

SciTech Connect

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

305

A demand side management strategy based on forecasting of residential renewable sources: A smart home system in Turkey  

Science Journals Connector (OSTI)

Abstract The existing electricity systems have been substantially designed to allow only centralized power generation and unidirectional power flow. Therefore, the objective of improving the conventional power systems with the capabilities of decentralized generation and advanced control has conflicted with the present power system infrastructure and thus a profound change has necessitated in the current power grids. To that end, the concept of smart grid has been introduced at the last decades in order to accomplish the modernization of the power grid while incorporating various capabilities such as advanced metering, monitoring and self-healing to the systems. Among the various advanced components in smart grid structure, “smart home” is of vital importance due to its handling difficulties caused by the stochastic behaviors of inhabitants. However, limited studies concerning the implementation of smart homes have so far been reported in the literature. Motivated by this need, this paper investigates an experimental smart home with various renewable energy sources and storage systems in terms of several aspects such as in-home energy management, appliances control and power flow. Furthermore, the study represents one of the very first attempts to evaluate the contribution of power forecasting of renewable energy sources on the performance of smart home concepts.

A. Tascikaraoglu; A.R. Boynuegri; M. Uzunoglu

2014-01-01T23:59:59.000Z

306

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar, Anupam Datta  

E-Print Network (OSTI)

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar in system modeling and analysis. Despite substantial progress, the goal of proving deep properties of system abstraction: modeling and analysis of system designs at a high­level where in­depth analysis can identify

Garlan, David

307

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

308

An intelligent visual hand motion tracking system for home-based rehabilitation  

Science Journals Connector (OSTI)

Human motion tracking is the key technology for intelligent rehabilitation systems in which the movement of disabled people can be localised and learned and any undesired motion behaviour can be corrected to reach an expectation. This paper introduces a real-time tracking system of human hand motion, specifically used for home based rehabilitation. A hybrid tracking algorithm based on an improved Camshift and a Kalman filter is proposed. In the tracking process, Camshift converts the raw image to a flesh colour probability distribution image via a colour probability table. Considering the hand motion and flesh colour probability distribution, the size and location of a search window are initialised by using the object histogram model. Computed information is used to adjust current search window's size and location, then the location of the hand are found. Experimental results show that this algorithm is fast, accurate, and robust. It can not only deal with the skin colour interference problems, but also handle complex background.

Yi Zhang; Yuan Luo; Ling Li

2010-01-01T23:59:59.000Z

309

Office of Headquarters Personnel Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

310

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

311

PNNL Laboratory Research Homes Pacific Northwest National Laboratory's Lab Homes  

E-Print Network (OSTI)

-efficient homes. The homes will be fully instrumented with controllable circuits, dual heating systems,500 square-foot Lab Homes for experiments focused on reducing energy use and peak demand on the electric grid in homes throughout the U.S." ­ Steve Shankle Director PNNL Electricity Infrastructure and Buildings

312

E-Print Network 3.0 - affecting home blood Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

FORM Summary: Security Expected Year of Graduation Home Address City State Zip Code Cell Phone ParentGuardian Name... Occupation Business Phone Home Phone Cell Phone Parent...

313

Home Automation Using Elvin.  

E-Print Network (OSTI)

?? Home automation systems of today tend to be external solutions to an existing product that enable rather complex and expensive communications equipment to be… (more)

Malm, Anders

2005-01-01T23:59:59.000Z

314

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar, Anupam Datta  

E-Print Network (OSTI)

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar and analysis. Despite substantial progress, the goal of proving deep properties of system implementations: modeling and analysis of system designs at a high-level where in-depth analysis can identify flawed de

Garlan, David

315

The potential of intelligent vehicle highway systems for enhanced traveler security  

SciTech Connect

The Intelligent Vehicle Highway System (IVHS) program that was mandated by the Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA) presents a number of opportunities and challenges. While the program primarily is intended to address the problem of traffic congestion, the technologies it will require could also be used to enhance the safety and security of the traveling public. Public transit systems offer the most likely near-term opportunities both for IVHS-type technologies, and for new security measures to be applied. This paper will address some of the possible security functions that could be applied to transit systems by utilizing the availability of Automatic Vehicle Location systems (AVL), broadband digital communication systems, and other IVHS functions.

Caskey, D.L.

1992-12-31T23:59:59.000Z

316

An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California  

NLE Websites -- All DOE Office Websites (Extended Search)

4476E 4476E An Analysis of the Effects of Residential Photovoltaic Energy Systems on Home Sales Prices in California Ben Hoen, Ryan Wiser, Peter Cappers and Mark Thayer Environmental Energy Technologies Division April 2011 Download from http://eetd.lbl.gov/ea/emp/reports/lbnl-4476e.pdf This work was supported by the Office of Energy Efficiency and Renewable Energy (Solar Energy Technologies Program) of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231, by the National Renewable Energy Laboratory under Contract No. DEK-8883050, and by the Clean Energy States Alliance. ERNEST ORLANDO LAWRENCE BERKELEY NATIONAL LABORATORY Disclaimer This document was prepared as an account of work sponsored by the United States Government.

317

Concepts and applications of wireless security systems for tactical, portable, and fixed sites  

SciTech Connect

Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development.

Harrington, J.J.

1997-06-01T23:59:59.000Z

318

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

319

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

320

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction is a very powerful tool, providing many new opportunities and capabilities, both in academic and everyday://www.humanities.uci.edu/humanitech/copyright/copyright.html Updated: December 10, 2010 Site Feedback Office of Information Technology Contact the OIT Help

Brody, James P.

322

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction the OIT Help Desk ­ (949) 824-2222 or oit@uci.edu http://www.oit.uci.edu/policy/studentletter-oct03 is a very powerful tool, providing many new opportunities and capabilities, both in academic and everyday

Brody, James P.

323

Home Help Desk Administrative Systems Services & Support Instruction & Research Network Telephone About OIT Wednesday December 18th, 2013  

E-Print Network (OSTI)

Home Help Desk Administrative Systems Services & Support Instruction Feedback Office of Information Technology Contact the OIT Help Desk ­ (949) 824-2222 or oit@uci.edu> Subject: Downloading and copyright Dear UCI Students: The Internet is an essential tool for both academic

Brody, James P.

324

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

325

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

326

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications  

E-Print Network (OSTI)

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications Andrew Colarik, patches and updates are issued periodically to extend the functional life cycle of software products industry has responded with update and patch management systems. Because of the proprietary nature

Thomborson, Clark

327

A Coal Mine Security Monitoring System Based on Multiplexed Fibre Bragg Grating Sensors and Coherence-Multiplexing Technique  

Science Journals Connector (OSTI)

Abstract: An FBG sensing system for coal mine security monitoring is proposed in this paper. It works over a Spatial-division-multiplexing/coherence-multiplexing network to realize...

Xia, Tianhao; Zhou, Bin; Liu, Weisheng; Guan, Zuguang

328

Duke, R. D. and Kammen, D. M. (2003) "Energy for Development: Solar Home Systems in Africa and Global Carbon Emissions", Climate Change for Africa: Science,  

E-Print Network (OSTI)

Duke, R. D. and Kammen, D. M. (2003) "Energy for Development: Solar Home Systems in Africa and Global Carbon Emissions", Climate Change for Africa: Science, Technology, Policy and Capacity Building: Solar Home Systems in Africa and Global Carbon Emissions Richard D. Duke* and Daniel M. Kammen

Kammen, Daniel M.

329

On The Design and Implementation of a Home Energy Management System  

E-Print Network (OSTI)

, Canada email:rboutaba@cs.uwaterloo.ca Abstract--To reduce energy consumption and wastage, effective peak demand. In the effort to reduce energy consumption and wastage, effective home energy management is imple- mented) and their home-wide energy consumption. There is no standard protocol or data format

Boutaba, Raouf

330

Use of Multi-attribute Utility Functions in Evaluating Security Systems  

SciTech Connect

In analyzing security systems, we are concerned with protecting a building or facility from an attack by an adversary. Typically, we address the possibility that an adversary could enter a building and cause damage resulting in an immediate loss of life, or at least substantial disruption in the operations of the facility. In response to this setting, we implement security systems including devices, procedures, and facility upgrades designed to (a) prevent the adversary from entering, (b) detect and neutralize him if he does enter, and (c) harden the facility to minimize damage if an attack is carried out successfully. Although we have cast this in terms of physical protection of a building, the same general approach can be applied to non-physical attacks such as cyber attacks on a computer system. A rigorous analytic process is valuable for quantitatively evaluating an existing system, identifying its weaknesses, and proposing useful upgrades. As such, in this paper we describe an approach to assess the degree of overall protection provided by security measures. Our approach evaluates the effectiveness of the individual components of the system, describes how the components work together, and finally assesses the degree of overall protection achieved. This model can then be used to quantify the amount of protection provided by existing security measures, as well as to address proposed upgrades to the system and help identify a robust and cost effective set of improvements. Within the model, we use multiattribute utility functions to perform the overall evaluations of the system.

Meyers, C; Lamont, A; Sicherman, A

2008-06-13T23:59:59.000Z

331

Exploring California PV Home Premiums  

E-Print Network (OSTI)

2013) Residential Photovoltaic Energy Systems in California:of the Effects of Photovoltaic Energy Systems on ResidentialEffects of Residential Photovoltaic Energy Systems on Home

Hoen, Ben

2014-01-01T23:59:59.000Z

332

Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security  

E-Print Network (OSTI)

Approved for public release; distribution is unlimited. Lexington Massachusetts This page intentionally left blank. EXECUTIVE SUMMARY Concern about energy security on domestic Department of Defense installations has led to the possibility of using natural gas-fired electricity generators to provide power in the event of electric grid failures. As natural gas is an increasingly base-load fuel for electricity generation in the United States, the electricity generation system has become increasingly dependent on the operation of the natural gas system. However, as the natural gas system is also partly dependent on electricity for its ability to deliver natural gas from the well-head to the consumer, the question arises of whether, in the event of an electric grid failure, the natural gas would continue to flow. As the natural gas transmission system largely uses natural gas from the pipelines as a source of power, once the gas has been extracted from the ground, the system is less dependent on the electric grid. However, some of the drilling rigs, processing units, and pipeline compressors do depend on electric power, making the vulnerability to the system to a disruption in the national electricity supply network vary depending on the cause, breadth, and geographic location of the disruption. This is due to the large numbers of players in the natural gas production and

N. Judson; N. Judson

2013-01-01T23:59:59.000Z

333

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

334

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

335

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

336

S-Security Protective Force and Systems Services for the Nevada Site  

NLE Websites -- All DOE Office Websites (Extended Search)

S-Security Protective Force and Systems Services for the Nevada Site S-Security Protective Force and Systems Services for the Nevada Site Office Solicitation Number: DE-SOL-0002014 Agency: Department of Energy Office: Federal Locations Location: All DOE Federal Contracting Offices Notice Type: Modification/Amendment Original Posted Date: June 22, 2010 Posted Date: June 13, 2011 Response Date: Jul 13, 2011 5:00 pm Mountain Original Response Date: July 7, 2010 Archiving Policy: Manual Archive Original Archive Date: August 6, 2010 Archive Date: - Original Set Aside: N/A Set Aside: N/A Classification Code: S -- Utilities and housekeeping services NAICS Code: 561 -- Administrative and Support Services/561612 -- Security Guards and Patrol Services Solicitation Number: DE-SOL-0002014 Notice Type:

337

DOE/CX-00007 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07 07 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM (PROJECT S-221) HANFORD SITE, RICHLAND, WASHINGTON PROPOSED ACTION The U.S. Department of Energy (DOE) proposes to install six wooden utility poles to support the safeguards and security enhanced assessment system. LOCATION OF ACTION The locations of the proposed action are generally within and around 200 East Area of the Hanford Site. The specific locations cannot be disclosed due to their safeguards and security related nature, and the locations have been designated Official Use Only. It is the policy of the DOE to make records available to the public to the greatest extent possible, in keeping with the spirit of the Freedom of Information Act (FOIA), while at the same time

338

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

339

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

340

Information System Security Officer (ISSO) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

system. ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR)...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A User-Oriented and Context-Aware Service Orchestration Framework for Dynamic Home Automation Systems  

Science Journals Connector (OSTI)

The home environment has become increasingly sophisticated. Sensors and...programmed...so that it can intelligently adapt to user needs. Unfortunately it has not become any easier for the user to manage all these...

Thomas Coopman; Wouter Theetaert…

2010-01-01T23:59:59.000Z

342

Home News Products Blogs Buyers Guide Whitepapers Job Search Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health Care Retail RSS | Login | Register  

E-Print Network (OSTI)

search for and then compromise vulnerable websites, hundreds of thousands of pages ­ almost all of themSEARCH Home News Products Blogs Buyers Guide Whitepapers Job Search Events Subscribe Issue Archive FONT SIZE: A | A | A Protecting users from internet-borne threats falls on trusted websites, says

Gupta, Minaxi

343

Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register  

E-Print Network (OSTI)

SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

Gupta, Minaxi

344

SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)  

Science Journals Connector (OSTI)

The purpose of this document is to provide guidance for securing industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other systems performing control functions. ... Keywords: Cyber-physcial systems, ICS, Industrial Control Systems, SCADA, Supervisory Control and Data Acquisition, security controls, threats, vulnerabilities

Keith A. Stouffer; Joseph A. Falco; Karen A. Scarfone

2011-06-01T23:59:59.000Z

345

CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations  

E-Print Network (OSTI)

permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

Locasto, Michael E.

346

Combining Provenance and Security Policies in a Web-based Document Management System  

E-Print Network (OSTI)

Combining Provenance and Security Policies in a Web-based Document Management System Brian J policies with provenance tracking. For instance, an on- line stock trading website might restrict access. Similarly, the application might need to track the provenance of transaction infor- mation to support

Hicks, Michael

347

Secure Systems Editor: S.W. Smith, sws@cs.dartmouth.edu  

E-Print Network (OSTI)

Secure Systems Editor: S.W. Smith, sws@cs.dartmouth.edu side of the picture--the computers which we train students, young and old, to be effective cyber-citizens; and the media coverage or produce more effective tailors. S.W. SMITH Dartmouth College T oalargeextent,computingsystemsareu

Smith, Sean W.

348

Challenge Home  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Challenge Home DOE Challenge Home Sam Rashkin Building Technologies Office samuel.rashkin@ee.doe.gov/202-2897-1994 April 3, 2013 DOE Challenge Home: Leveraging Our Nation's Investment in High-Performance Home Innovations 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: The U.S. Housing industry is extremely slow to adopt proven innovations from DOE's Building America program that provide compelling benefits to

349

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

350

Security in Information Systems: New Challenges and Opportunities  

E-Print Network (OSTI)

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

351

Design for a Decentralized Security System for Network Attached Storage  

E-Print Network (OSTI)

Storage Systems, held jointly with the 17th IEEE Symposium on Mass Storage Systems, College Park, MD reliability, since one drive having a catastrophic failure such as catching on fire will not damage the other. This mechanism ensures that any files on the file server are protected from reading or from undetected

Miller, Ethan L.

352

Action Codes Table | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sheets Newsletters Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Programs Defense Nuclear Security ...

353

High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems; Volume 6 Building America Best Practices Series  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by by Pacific Northwest National Laboratory & Oak Ridge National Laboratory June 4, 2007 June 2007 * NREL/TP-550-41085 PNNL-16362 High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems Building America Best Practices Series Volume 6 High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems Building America Best Practices Series Prepared by Pacific Northwest National Laboratory, a DOE national laboratory Michael C. Baechler Theresa Gilbride, Kathi Ruiz, Heidi Steward and Oak Ridge National Laboratory, a DOE national laboratory Pat M. Love June 4, 2007 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty,

354

Hydrogen by Wire - Home Fueling System - DOE Hydrogen and Fuel Cells Program FY 2012 Annual Progress Report  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 DOE Hydrogen and Fuel Cells Program FY 2012 Annual Progress Report Luke T. Dalton Proton Energy Systems 10 Technology Drive Wallingford, CT 06492 Phone: (203) 678-2128 Email: ldalton@protonenergy.com DOE Manager HQ: Eric L. Miller Phone: (202) 287-5829 Email: Eric.Miller@hq.doe.gov Contract Number: DE-SC0001149 Project Start Date: August 15, 2010 Project End Date: August 14, 2012 Fiscal Year (FY) 2012 Objectives Develop enabling technologies for 350-bar hydrogen * home fueling Design key electrolysis cell stack and system components * Fabricate, inspect and assemble prototype components * Demonstrate prototype 350-bar hydrogen generation * Demonstrate prototype 350-bar home fueling technologies * Technical Barriers This project addresses the following technical barriers

355

The Center for Information Systems Security Studies and  

E-Print Network (OSTI)

composition; functional mechanisms; & lifecycle assurance techniques. CS3695 Network Vulnerability Assessment assessment & vulnerability tools; (5) describe the motivations & different types of hackers. CS4652 Applied, describe the inherent trust problems relating to the composition of systems and components, & perform

356

GS3: a Grid Storage System with Security Features  

Science Journals Connector (OSTI)

Technological trend and the advent of worldwide networks, such as the Internet, made computing systems more and more powerful, increasing both processing and storage capabilities. In Grid computing infrastructure...

Vincenzo D. Cunsolo; Salvatore Distefano; Antonio Puliafito…

2010-09-01T23:59:59.000Z

357

Interdependent infrastructures and multi-mode attacks and failures: improving the security of urban water systems and fire response  

E-Print Network (OSTI)

This dissertation examines the interdependence between urban water distribution systems and urban fire response. The focus on interdependent critical infrastructures is driven by concern for security of water systems and the effects on related...

Bristow, Elizabeth Catherine

2009-05-15T23:59:59.000Z

358

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

ITD Home Cyber Security Links Cyber Security Home Network Access Antivirus Measures SSH Gateways Remote Access Computer Security Incidents Cyber Security Homepage Report a Security Incident Hotline: 631.344.8484 Email: security@bnl.gov Cyber Security Note: The links below supplement the Cyber Security, Unclassified SBMS subject area. Network Access Cyber Security image Network Access Registration - New connections to BNL's internal network must complete the registration process described in this link. Machines that are not registered will be denied access to the Laboratory's network. Proxy Configuration Virtual Private Network (VPN) RSA SecurID User Guide Desktop Security Locking Your Computer Disable Automatic Login (Mac OS X) Virus Protection Secure Shell (SSH) Resources

359

Security Control Assessor | Department of Energy  

Energy Savers (EERE)

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

360

2010 NMMSS Users Training Meeting | National Nuclear Security  

National Nuclear Security Administration (NNSA)

NMMSS Users Training Meeting | National Nuclear Security NMMSS Users Training Meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog 2010 NMMSS Users Training Meeting Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training > Annual Users Training Meeting Archives > 2010 NMMSS Users Training Meeting

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

NMMSS Information, Reports & Forms | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Information, Reports & Forms | National Nuclear Security Information, Reports & Forms | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS Information, Reports & Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms NMMSS Information, Reports & Forms

362

Users Frequently Asked Questions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Users Frequently Asked Questions | National Nuclear Security Administration Users Frequently Asked Questions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Users Frequently Asked Questions Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > Users Frequently Asked Questions

363

Home Energy Saver  

NLE Websites -- All DOE Office Websites (Extended Search)

No-Regrets Remodeling No-Regrets Remodeling Excerpts from No-Regrets Remodeling by the people at Home Energy magazine. Note: This book was published in 1997. While most of the information is timeless, some items may be out-dated. Your Kitchen Cooking Appliances Electric or Gas Kitchen Ranges? Refrigerators Your Home Office Home Office Equipment Power Ratings of Office Equipment Your Heating Heating: General Home Performance Contractors Oil System Upgrades Combined (Indirect) Hot Water & Heating Systems Combined (Integrated) Space & Water Heating The Thermostat is in Control Time for an Energy Switch? Your Cooling Tips for Buying a New Air Conditioner Cool Roofs for Hot Climates Evaporative Cooler Tips Ventilation, Ducts, Moisture, and Air Leakage Common Air Leakage Sites in the Home

364

Design and Development of an Intelligent Energy Controller for Home Energy Saving in Heating/Cooling System .  

E-Print Network (OSTI)

??Energy is consumed every day at home as we perform simple tasks, such as watching television, washing dishes and heating/cooling home spaces during season of… (more)

Abaalkhail, Rana

2012-01-01T23:59:59.000Z

365

Export.gov - Algeria Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Algeria Algeria Local Time: Print | E-mail Page Algeria Algeria Home Doing Business in Algeria Services for U.S. Companies Contact Us Our Worldwide Network About Us Press Room Other Worldwide Markets Welcome to Algeria Algeria is an interesting and active market for U.S. exporters and investors, particularly in the oil and gas sector. Slow economic reforms and an antiquated banking system have left other sectors underdeveloped, even as the country's political situation remains stable and its security situation has improved in comparison to the first half of the decade. Algerians have increasingly greater access to credit, fueling demand for consumer goods such as automobiles. However, new government tax policies are beginning to restrict such import-driven sectors. The country's

366

Unmanned Systems: an Emerging Threat to Waterside Security  

E-Print Network (OSTI)

Domain Awareness (MDA) for ports, harbors, and protection of cruise ship and military marine assets has Autonomous Systems Laboratory Virginia Institute of Marine Science Gloucester Point, Virginia, 23062, USA mrp capability at this time. Detection of bad robots and strategies for reducing the success of an attack

Graves, John E.

367

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

368

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

369

A Privacy Framework for Mobile Health and Home-Care Systems  

E-Print Network (OSTI)

Keywords privacy framework, medicine, electronic health record, home healthcare, mobile healthcare, mhealth specifically examine the role of mobile computing and communications technologies. Such mHealth technology [25 patients to spend more time out of the hospital. Furthermore, the UN Foundation has recently formed the mHealth

Kotz, David

370

Home Network Operating System Lucent TechnologiesLucent TechnologiesLucent TechnologiesLucent Technologies  

E-Print Network (OSTI)

, beneficially integrate control over home appliances and also allow consumers to exploit competing access Standards Subcommittee TR41.5 in their work program. This document is submitted for discussion and working sources, and they must also insulate consumers from discontinuously complex appliance and user interfaces

Janow, Rich

371

Distant Speech Recognition for Home Automation: Preliminary Experimental Results in a Smart Home  

E-Print Network (OSTI)

Distant Speech Recognition for Home Automation: Preliminary Experimental Results in a Smart Home a new home automation system based on voice command. The study focused on two tasks: distant speech; triggered language models; home automation; smart home I. INTRODUCTION The evolution of ICT led

Paris-Sud XI, Université de

372

HomeCooling101  

Energy Savers (EERE)

openings to prevent warm air from leaking into your home. Insulate and seal ducts -- air loss through ducts accounts for about 30 percent of a cooling system's energy consumption....

373

Home Energy Solutions for Existing Homes | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Energy Solutions for Existing Homes Home Energy Solutions for Existing Homes Home Energy Solutions for Existing Homes < Back Eligibility Residential Savings Category Heating & Cooling Commercial Heating & Cooling Heating Home Weatherization Commercial Weatherization Sealing Your Home Ventilation Manufacturing Heat Pumps Appliances & Electronics Water Heating Windows, Doors, & Skylights Program Info Funding Source Public Benefits Fund State Oregon Program Type State Rebate Program Rebate Amount Air Sealing: $150 Duct Insulation: 50% of cost up to $100 Gas Boiler: $200 Direct Vent Gas Fireplace: $200-$250 Direct Vent Gas Unit Heater: $100 Heat Pumps: $250 - $450, depending on efficiency and previous heating system Heat Pump Test: $150 Heat Pump Advanced Controls: $250 Ductless Heat Pump: $800

374

Security and stability control system for offshore platforms power grid  

Science Journals Connector (OSTI)

The key technology for offshore platform power grid interlinked-Energy Management System (EMS) is studied in this article. The perfect EMS control solutions are formulated and carried on by the studies of the control strategies of frequency control, voltage control, precedence load shedding, high frequency trip generator, communication failure, and so on according to the power flow and fault simulation calculations against all kinds of working modes of the grid. The power supply effects before and after using the power grid interlink and EMS control are contrasted. Their application has improved the power supply reliability, boosted up the ability against impacts, decreased the spare capability of generators, reduced the maintenance work, and saved the investment.

Zhang Jifen; Hu Peng; Liu Jun

2009-01-01T23:59:59.000Z

375

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

376

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

377

Evaluation of a Real-Time Voice Order Recognition System from Multiple Audio Channels in a Home  

E-Print Network (OSTI)

, Home Automation, AAL 1. Introduction The development of smart homes and intelligent companions is seen and sound source identification to improve the robustness of voice-based home automation control and according to the context (activity and local- isation of the user in the flat), an home automation command

Paris-Sud XI, Université de

378

Routing Approach in IPv6 Ubiquitous Internet-Based Home Automation Network  

Science Journals Connector (OSTI)

Internet-based home automation system allows home owners to monitor and control connected devices in the home using any Internet enabled device. The home’s low power and low data rate, ... needs are catered for u...

Ardiansyah Musa Efendi; Oh Seung Kyo…

2013-01-01T23:59:59.000Z

379

Off-grid electrification with solar home systems: The experience of a fee-for-service concession in South Africa  

Science Journals Connector (OSTI)

In rural areas of developing countries, electrification projects with photovoltaic systems were conceived as pilot projects with the implementation of a limited number of systems. After considerable financial support from international donors, photovoltaic systems were often quickly abandoned few years after their installation. Using micro-credit institutions in the energy sector or implementing small utilities with a fee-for-service model is now considered as two desirable options to create a dynamic self-sustained market for solar home systems. South Africa launched in 1999 an ambitious off-grid solar electrification programme with fee-for-service concessions. Operating as small-scale utilities, fee-for-service concessions have facilitated the implementation on a large scale of solar home systems and solved the issue of high up-front cost and of long-term maintenance. This paper focuses on operational and design issues linked to the implementation of fee-for-service concessions. Even in a challenging institutional context, some South African operators seem almost able to reach their break-even point. The case of one concessionaire is detailed and serves as a basis for a discussion on the benefits and difficulties linked to the fee-for-service model and on the potential for replication.

Xavier Lemaire

2011-01-01T23:59:59.000Z

380

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

382

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

383

Roadmap to Secure Control Systems in the Energy Sector 2006- Presentation to the 2008 ieRoadmap Workshop  

Energy.gov (U.S. Department of Energy (DOE))

Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008.  

384

Tag: GTRI | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

385

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network (OSTI)

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

386

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Directives, Delegations, and Requirements

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

387

Building America Technology Solutions for New and Existing Homes...  

Energy Savers (EERE)

Existing Homes:Hydronic Systems Designing for Setback Operations Building America Technology Solutions for New and Existing Homes:Hydronic Systems Designing for Setback Operations...

388

Quantum Enabled Security (QES) for Optical Communications  

NLE Websites -- All DOE Office Websites (Extended Search)

Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Quantum Enabled Security (QES) for Optical Communications Los Alamos National Laboratory has developed Quantum Enabled Security (QES), a revolutionary new cybersecurity capability using quantum (single-photon) communications integrated with optical communications to provide a strong, innate, security foundation at the photonic layer for optical fiber networks. July 10, 2013 Quantum Enabled Security (QES) for Optical Communications Available for thumbnail of Feynman Center (505) 665-9090 Email Quantum Enabled Security (QES) for Optical Communications Applications: Secure communication over optical or free space networks Financial networks Transparent access networks: fiber to the home (FTTH); fiber to the

389

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

390

Use of active solar heating and domestic hot water (DHW) systems in single family homes: technical findings and lessons learned from the HUD solar demonstration program  

SciTech Connect

This report describes the technical experiences with active solar space and domestic water heating systems installed in single family homes. It is intended to assist members of the home building and solar industries to provide their customers with satisfactory products and installations and to avoid some of the problems caused by improper equipment, system design, and installation. Two chapters focus on liquid and air systems. Problems are discussed by subsystem: collectors, transport, storage, distribution, and control. Industry responsibility, including cooperation during the construction phase and responsiveness during the occupancy phase, are considered. The conclusion notes that system efficiency, which now runs in the 10 to 30 - percent range, can be greatly improved if the solar and home building industries make greater efforts to properly insulate pipes, ducts, and storage; assure system operation at the proper time; and minimize leaks through valves or dampers. Additional suggestions are given. Graphs, photographs, footnotes, a glossary, and selected bibliographies are provided.

Freeborne, W.; Mara, G.

1982-12-01T23:59:59.000Z

391

A Secure Web Service-based Platform for Wireless Sensor Network Management and  

E-Print Network (OSTI)

military applications to civilian ones, for security, home automation and health care... Up to now, most tracking and surveillance to civilian applications in home automation (smart home), agriculture, intrusion

Paris-Sud XI, Université de

392

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

393

NMMSS II Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

II Training | National Nuclear Security Administration II Training | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NMMSS II Training Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training > NMMSS II Training NMMSS II Training U.S. Department of Energy / U.S. Nuclear Regulatory Commission

394

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

395

Building America Technology Solutions for New and Existing Homes: Raised Ceiling Interior Duct System, New Smyrna, Florida (Fact Sheet)  

Energy.gov (U.S. Department of Energy (DOE))

This project describes a Habitat for Humanity builder’s efforts to construct a home to new DOE Zero Energy Ready Home standards, and use a fur-up or raised ceiling chase.

396

Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement  

SciTech Connect

Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

Chung, W. S.; Yun, S. W.; Lee, D. S. [Korea Atomic Energy Research Inst., Dukjin-dong 150, Yusung-gu, Daejon, R.O., 305-353 (Korea, Republic of); Go, D. Y. [Kyung Hee Univ., Kyung Hee daero 26, Dongdaemoon-gu, Seoul, R.O., 130-701 (Korea, Republic of)

2012-07-01T23:59:59.000Z

397

Wind energy and system security – the grid connection moratorium in Ireland  

Science Journals Connector (OSTI)

This examines the interaction between technical challenges and policy choices that are made regarding wind power, and uses the grid connection moratorium in Ireland as a case study. While total installed wind capacity in Ireland is low compared with Germany, Spain and Denmark, wind power penetration is higher in the Irish system than in either the British, UCTE or NORDEL systems. In December 2003 the system operators expressed concerns about high wind power penetration, in particular the challenges of maintaining power system stability, security and reliability, resulting in a moratorium on new grid connection agreements. Significant progress has since been made in grid codes and dynamic models for wind turbines. In March 2006, there remain almost 3000 MW of proposed wind capacity awaiting a grid connection agreement. This paper investigates the technical issues underpinning this moratorium, monitors progress made since its introduction and suggests alternative technical solutions to the moratorium.

B.P. O Gallachoir; P. Gardner; H. Snodin; E.J. McKeogh

2007-01-01T23:59:59.000Z

398

Nursing Homes  

Science Journals Connector (OSTI)

Nursing homes are residential health care facilities that provide care for people recovering from an acute illness or suffering from a  chronic disease , and who require skilled nursing care and 24-hour superv...

2008-01-01T23:59:59.000Z

399

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Sánchez; Eduardo Fernández-Medina

2010-06-01T23:59:59.000Z

400

Medical and Home automation Sensor Networks for Senior Citizens Telehomecare  

E-Print Network (OSTI)

Medical and Home automation Sensor Networks for Senior Citizens Telehomecare Shahram Nourizadeh1, 2 Healthcare, Smart Home, Distributed health record, Actimetry, Fuzzy logic, Home automation I. INTRODUCTION.Deroussent}@medetic.com Abstract- This paper presents a home Tele-healthcare system for the senior citizens. The system uses home

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Home Energy Saver  

NLE Websites -- All DOE Office Websites (Extended Search)

Choosing a Good Contractor Choosing a Good Contractor If your project goes much beyond replacing lights and a few appliances, you would probably benefit from using a home performance contractor. The book No-Regrets Remodeling provides a good definition if this emerging specialty: Because the whole-house, or systems, approach to homes is a fairly new concept, not everyone in the building trades is familiar with it. And it goes against traditional building practice, which is based on specialty trades. You probably already know how that goes: a different contractor for every task. And none of them has any idea what the other is doing. This is changing with the emergence of the home performance contractor, a person trained and equipped to test homes to see where problems exist. These

402

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

403

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

404

Security and Privacy Notices | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

405

GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Congressional Requesters Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters Control systems-computer-based systems that monitor and control sensitive processes and physical functions-perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of

406

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

407

DOE Challenge Home Case Study, e2Homes, Winterpark, FL, Custom Homes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

fi fi rst certifi ed DOE Challenge Home in the United States-the Wilson Residence in Winter Park, Florida-produces more energy than it uses with construction costs one-third less than originally proposed. Completed in May 2012, this 4,305-ft 2 custom home (with four bedrooms and baths) screams "BIG" until you hear the "small footprint" in the energy- and water-effi ciency details. Without solar power, the home scores a HERS 57, which is well below the HERS 100 for a standard home built to code. With its photovoltaic system, the home produces better than zero net-energy performance, with a score of HERS -7. This translates into no electric utility bills and even $123 annually in the homeowner's pocket from the utility. When the homeowner, Mr. Wilson, hired e2 Homes to build his dream home, he

408

Energy-Efficient Home Design | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Design Home Design Energy-Efficient Home Design April 13, 2012 - 11:39am Addthis The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems. Recommendations show how to improve the energy efficiency of the home to achieve a higher score and save money. The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems.

409

Energy-Efficient Home Design | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Home Design Home Design Energy-Efficient Home Design April 13, 2012 - 11:39am Addthis The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems. Recommendations show how to improve the energy efficiency of the home to achieve a higher score and save money. The Home Energy Score is a national rating system developed by the U.S. Department of Energy. The Score reflects the energy efficiency of a home based on the home's structure and heating, cooling, and hot water systems. The Home Facts provide details about the current structure and systems.

410

Snails home  

Science Journals Connector (OSTI)

Many gardeners and horticulturalists seek non-chemical methods to control populations of snails. It has frequently been reported that snails that are marked and removed from a garden are later found in the garden again. This phenomenon is often cited as evidence for a homing instinct. We report a systematic study of the snail population in a small suburban garden, in which large numbers of snails were marked and removed over a period of about 6 months. While many returned, inferring a homing instinct from this evidence requires statistical modelling. Monte Carlo techniques demonstrate that movements of snails are better explained by drift under the influence of a homing instinct than by random diffusion. Maximum likelihood techniques infer the existence of two groups of snails in the garden: members of a larger population that show little affinity to the garden itself, and core members of a local garden population that regularly return to their home if removed. The data are strongly suggestive of a homing instinct, but also reveal that snail-throwing can work as a pest management strategy.

D J Dunstan; D J Hodgson

2014-01-01T23:59:59.000Z

411

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

412

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on ¯rewalls for their security, but the ¯rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

413

Building Security System Based on Grid Computing To Convert and Store Media Files  

Science Journals Connector (OSTI)

In the recent years, Grid Computing (GC) has made big steps ... This paper introduces an approach to integrate the security mechanisms, Grid Security Infrastructure (GSI) of the open source...

Hieu Nguyen Trung; Duy Nguyen; Tan Dang Cao

2010-01-01T23:59:59.000Z

414

SoPC based Smart Home Embedded Computer Capable of Caring for the Home Occupants  

E-Print Network (OSTI)

to safe and environmental friendly living spaces. One aspect of home automation is the direct controlSoPC based Smart Home Embedded Computer Capable of Caring for the Home Occupants G. N. Khan and J. Toronto, Ontario Canada M5B 2K3 Abstract--We present a Smart-Home Embedded Computer (SHEC) system

Khan, Gul N.

415

Nature of Transactions (TI) Code | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Sheets Newsletters Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home About Us Our Programs Defense Nuclear Security ...

416

Modeling Ozone Levels in and around Southern California Homes  

Science Journals Connector (OSTI)

These data suggest that ambient O3 measured at regional stations, coupled with information about how homes are operated, predict in-home O3 levels moderately well and are potentially useful for future exposure assessment purposes. ... Siting criteria for samplers outside the homes included placement of the samplers on the rear patio or porch (for security reasons, in addition to access to electricity), sampling from at least 1 m above the floor surface, and avoidance of tree canopies, roof overhangs, or home air vents. ... The collection of home characterization data, operating parameters, and concurrent O3 monitoring in 126 homes across seasons makes this data set valuable. ...

Edward L. Avol; William C. Navidi; Steven D. Colome

1998-01-16T23:59:59.000Z

417

Ota City : characterizing output variability from 553 homes with residential PV systems on a distribution feeder.  

SciTech Connect

This report describes in-depth analysis of photovoltaic (PV) output variability in a high-penetration residential PV installation in the Pal Town neighborhood of Ota City, Japan. Pal Town is a unique test bed of high-penetration PV deployment. A total of 553 homes (approximately 80% of the neighborhood) have grid-connected PV totaling over 2 MW, and all are on a common distribution line. Power output at each house and irradiance at several locations were measured once per second in 2006 and 2007. Analysis of the Ota City data allowed for detailed characterization of distributed PV output variability and a better understanding of how variability scales spatially and temporally. For a highly variable test day, extreme power ramp rates (defined as the 99th percentile) were found to initially decrease with an increase in the number of houses at all timescales, but the reduction became negligible after a certain number of houses. Wavelet analysis resolved the variability reduction due to geographic diversity at various timescales, and the effect of geographic smoothing was found to be much more significant at shorter timescales.

Stein, Joshua S.; Miyamoto, Yusuke (Kandenko, Ibaraki, Japan); Nakashima, Eichi (Kandenko, Ibaraki, Japan); Lave, Matthew

2011-11-01T23:59:59.000Z

418

Building America Whole-House Solutions for New Homes: Winchester Homes and Camberly Homes- Silver Spring, Maryland (Fact Sheet)  

Energy.gov (U.S. Department of Energy (DOE))

The Partnership for Home Innovation team worked with the builder to develop a new set of high performance home designs—including advanced wall and HVAC systems—that could be applicable on a...

419

Building America Whole-House Solutions for Existing Homes: Inverted...  

Energy Savers (EERE)

Solutions for Existing Homes: Inverted Attic Bulkhead for HVAC Ductwork This occupied test home received a modified truss system to accommodate ductwork within an inverted...

420

Building America Technology Solutions for New and Existing Homes...  

Office of Environmental Management (EM)

groups of houses: homes with a supplemental dehumidifier installed in addition to HVAC system, and homes without any supplemental dehumidification. Evaluation of the...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Zero Net Energy Homes Production Builder Business Case: California...  

Energy Savers (EERE)

Solutions for New Homes: Grupe, Rocklin, California High-Performance Home Technologies: Solar Thermal & Photovoltaic Systems; Volume 6 Building America Best Practices Series Vol....

422

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

423

Folding@HomeFolding@Home Vijay Pande  

E-Print Network (OSTI)

Folding@HomeFolding@Home Vijay Pande #12;http://folding.stanford.edu © Vijay S. Pande 1999,000,000 PCs on the internet Folding@Home People donate their idle computer time They visit our website://folding.stanford.edu © Vijay S. Pande 1999-2003 Folding@HomeFolding@Home:: VeryVery powerful & cost effectivepowerful & cost

Dally, William J.

424

Argonne Chemical Sciences & Engineering - National Security - Nanoscale  

NLE Websites -- All DOE Office Websites (Extended Search)

Nanoscale Engineering Nanoscale Engineering * Members * Contact * Publications * Overview * Nanospheres * Gel for Radioactive Decontamination * Advanced Radionuclide Sensor * Removal/Decontamination of Metal Substrates * Advanced Water Purification National Security Home National Security - Nanoscale Engineering Nanoscale Engineering Physical chemist Carol Mertz mixes a polyethylene glycol (PEG) coating for synthesized polymer nanospheres as polymer chemist Martha Finck examines a different PEG formulation. The coated nanospheres can be injected into humans following exposure to chemical, biological, or radiological toxins. The nanospheres selectively pick up these toxins and then are drawn out through a magnetic filtration system outside the body. Researchers in Nanoscale Engineering seek to bridge the gap between

425

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

426

Passive solar homes. [Glossary  

SciTech Connect

The concept of passive solar energy is described; the various functions which passive solar systems must perform are explained; and the various types of passive systems found in the Cycle 5 projects are discussed. Each of 91 solar home designs are discussed and some of the key points raised in the discussion of passive solar concepts are indicated in these descriptions and on the illustrations. Additional detail on issues of climate requirements and site design concerns, examples of building construction details showing good practice, and suggestions on how to market solar homes are included. The appendices address more technical aspects of the design and evaluation of passive solar homes, and provide information on other resources available to those involved in passive solar housing. (MHR)

McPhillips, M.; Powell, P.C. (eds.)

1982-01-01T23:59:59.000Z

427

New Homes Incentive Program  

Energy.gov (U.S. Department of Energy (DOE))

Energy Trust's New Homes Program offers builders cash incentives for energy efficient measures included in new homes, where the measures exceed the building code. Lighting upgrades, whole home...

428

Homes Success Stories  

Energy Savers (EERE)

1 Homes Success Stories en Zero Energy Ready Home Program: Race to Zero Student Design Competition http:energy.goveeresuccess-storiesarticleszero-energy-ready-home-program-ra...

429

Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.  

SciTech Connect

Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

2005-12-01T23:59:59.000Z

430

U.S. Patent Pending, Cyberspace Security System for Complex Systems, U.S. Patent Application No.: 14/134,949  

SciTech Connect

A computer implemented method monetizes the security of a cyber-system in terms of losses each stakeholder may expect to lose if a security break down occurs. A non-transitory media stores instructions for generating a stake structure that includes costs that each stakeholder of a system would lose if the system failed to meet security requirements and generating a requirement structure that includes probabilities of failing requirements when computer components fails. The system generates a vulnerability model that includes probabilities of a component failing given threats materializing and generates a perpetrator model that includes probabilities of threats materializing. The system generates a dot product of the stakes structure, the requirement structure, the vulnerability model and the perpetrator model. The system can further be used to compare, contrast and evaluate alternative courses of actions best suited for the stakeholders and their requirements.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

431

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

432

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

433

A Middleware Framework for the Adaptive Home  

E-Print Network (OSTI)

-aware middleware services [1], for example for home multimedia systems using home network middleware architectures criteria for a testbed for rapid prototyping. Section 4 characterizes the EMISS architecture as an instance in intelligent envir

Dommel, Hans-Peter

434

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

435

Reactor and Nuclear Systems Division (RNSD)  

NLE Websites -- All DOE Office Websites (Extended Search)

RNSD Home RNSD Home Research Groups Advanced Reactor Systems & Safety Nuclear Data & Criticality Safety Nuclear Security Modeling Radiation Safety Information Computational Center Radiation Transport Reactor Physics Thermal Hydraulics & Irradiation Engineering Used Fuel Systems Staff Details (CV/Bios) Publications Org Chart Contact Us ORNL Staff Only Research Groups Advanced Reactor Systems & Safety Nuclear Data & Criticality Safety Nuclear Security Modeling Radiation Safety Information Computational Center Radiation Transport Reactor Physics Thermal Hydraulics & Irradiation Engineering Used Fuel Systems Reactor and Nuclear Systems Division News Highlights U.S. Rep. Fleischmann touts ORNL as national energy treasure Martin Peng wins Fusion Power Associates Leadership Award

436

Designing Homes for Function and Safety  

E-Print Network (OSTI)

Designing Homes for Function and Safety Janie Harris Extension Specialist, Housing and Environment The Texas A&M University System The traditional home is designed for an able-bodied, nonelderly adult. Since that description fits less than 15...Designing Homes for Function and Safety Janie Harris Extension Specialist, Housing and Environment The Texas A&M University System The traditional home is designed for an able-bodied, nonelderly adult. Since that description fits less than 15...

Harris, Janie

2002-01-31T23:59:59.000Z

437

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

438

Interactive Montages of Sprites for Indexing and Summarizing Security Video  

E-Print Network (OSTI)

facilities (e.g. a nuclear power plant) or exterior home security video from a residential neighborhood. WeInteractive Montages of Sprites for Indexing and Summarizing Security Video Chris Pal University for indexing and visualizing video in the context of security applications. We wish to index security video

Pal, Chris

439

Energy Saver 101: Home Heating | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Energy Saver 101: Home Heating Energy Saver 101: Home Heating Space heating is likely the largest energy expense in your home, accounting for about 45 percent of the average American family's energy bills. That means making smart decisions about your home's heating system can have a big impact on your energy bills. Our Energy Saver 101 infographic lays out everything you need to know about home heating -- from how heating systems work and the different types on the market to what to look for when replacing your system and proper maintenance. Download individual sections of the infographic or a high resolution version now. homeHeating.pdf homeHeating_slide-01.png homeHeating_slide-02.png homeHeating_slide-03.png homeHeating_slide-04.png homeHeating_slide-05.png

440

Energy Saver 101: Home Heating | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Saver 101: Home Heating Energy Saver 101: Home Heating Energy Saver 101: Home Heating Space heating is likely the largest energy expense in your home, accounting for about 45 percent of the average American family's energy bills. That means making smart decisions about your home's heating system can have a big impact on your energy bills. Our Energy Saver 101 infographic lays out everything you need to know about home heating -- from how heating systems work and the different types on the market to what to look for when replacing your system and proper maintenance. Download individual sections of the infographic or a high resolution version now. homeHeating.pdf homeHeating_slide-01.png homeHeating_slide-02.png homeHeating_slide-03.png homeHeating_slide-04.png homeHeating_slide-05.png

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

What People Do with Consumption Feedback: A Long-Term Living Lab Study of a Home Energy Management System  

Science Journals Connector (OSTI)

......usage at home. The need...of their energy use from...estimated their consumption based on...the HEMS on average every 5...domestic energy consumption provided...we see an average electricity...with the consumption in the year...domestic energy consumption...monitoring in the home, but also......

Tobias Schwartz; Gunnar Stevens; Timo Jakobi; Sebastian Denef; Leonardo Ramirez; Volker Wulf; Dave Randall

2014-04-01T23:59:59.000Z

442

EPICS - Experimental Physics and Industrial Control System  

NLE Websites -- All DOE Office Websites (Extended Search)

Security/Privacy Notice Security/Privacy Notice EPICS Home g+ EPICS Page on Google+ g+ Communities EPICS Users on Google+ Argonne National Laboratory Experimental Physics and Industrial Control System Home News About Base Modules Extensions Distributions Download EPICSv4 IRMIS Talk Bugs Documents Links Licensing Format page for printing Google Search Tech-talk EPICS Home Page EPICS is a set of Open Source software tools, libraries and applications developed collaboratively and used worldwide to create distributed soft real-time control systems for scientific instruments such as a particle accelerators, telescopes and other large scientific experiments. Sitemap Home: EPICS Home at APS News: Recent news Meetings: Collaboration meeting details Codeathons: Codeathon developer meetings About: What is EPICS anyway?

443

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

444

Geothermal: Home Page  

Office of Scientific and Technical Information (OSTI)

Home Page Home Page Geothermal Technologies Legacy Collection Help/FAQ | Site Map | Contact Us Home/Basic Search About Publications Advanced Search New Hot Docs News Related Links Search for: (Place phrase in "double quotes") Sort By: Relevance Publication Date System Entry Date Document Type Title Research Org Sponsoring Org OSTI Identifier Report Number DOE Contract Number Ascending Descending Search Quickly and easily search geothermal technical and programmatic reports dating from the 1970's to present day. These "legacy" reports are among the most valuable sources of DOE-sponsored information in the field of geothermal energy technology. See "About" for more information. The Geothermal Technologies Legacy Collection is sponsored by the Geothermal Technologies Program, DOE Energy Efficiency and Renewable Energy

445

Home Energy Saver  

NLE Websites -- All DOE Office Websites (Extended Search)

Tools of the Trade Tools of the Trade Clockwise: IR thermograph, IR camera, Air flow measurement, Blower door, Combustion test for water heater A hammer and a saw used to be the key tools for home contractors. Today, the best-in-breed also use high-tech equipment while performing a professional energy audit or verifying that construction has been done correctly. Infrared cameras can "see" heat loss and find hidden energy savings opportunities. PFT tests or blower door tests measure a homes air leakage and tell you when sealing has been successful. Combustion monitoring equipment and indoor-air pollution detectors ensure that a heating system is not only efficient but also not dumping dangerous pollutants into the home. All of these practices should be conducted with a

446

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

447

Speeches | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

448

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

449

BCP Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Boulder Canyon Project Information Module Boulder Canyon Project Information Module HOME MODULE OVERVIEW LEGISLATION TIMELINE TIMELINE SUMMARY CASE LAW PROJECT HISTORY MISC. DOCUMENTS RELATED LINKS Home Page Image Welcome Hoover Dam is the highest and third largest concrete dam in the United States. The dam, power plant, and high-voltage switchyards are located in the Black Canyon of the Colorado River on the Arizona-Nevada state line. Lake Mead, the reservoir behind the dam, will hold the average two-year flow of the Colorado River. Hoover Dam´s authorized purposes are: first, river regulation, improvement of navigation, and flood control; second, delivery of stored water for irrigation and other domestic uses; and third, power generation. This Page was last modified on : 05-12-2009

450

Homes Blog  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

homes-blog Office of Energy Efficiency & Renewable homes-blog Office of Energy Efficiency & Renewable Energy Forrestal Building 1000 Independence Avenue, SW Washington, DC 20585 en Mississippi Adopts New Rules to Save Energy, Money http://energy.gov/eere/articles/mississippi-adopts-new-rules-save-energy-money-0 Mississippi Adopts New Rules to Save Energy, Money

451

Security as a New Dimension in Embedded System Design Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi  

E-Print Network (OSTI)

-end network equipment such as routers, gateways, firewalls, storage and web servers. Technologi- cal advances-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing

Lee, Ruby B.

452

A Review of the Security of Insulin Pump Infusion Systems Nathanael Paul, Ph.D. Tadayoshi Kohno, Ph.D. David C. Klonoff, M.D., FACP  

E-Print Network (OSTI)

A Review of the Security of Insulin Pump Infusion Systems Nathanael Paul, Ph.D. Tadayoshi Kohno, Ph is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we safety and information security. From 2005 to 2009, there were 56,000 adverse events in infusion pump

Matsuoka, Yoky

453

A bushfire monitoring and detection system for smart homes using ZigBee technology  

Science Journals Connector (OSTI)

This paper describes the part of a smart monitoring system that uses ZigBee modules to communicate sensory information in case of a fire or bushfire. The proposed system is composed of two parts: A number of remote boards that collect temperature and humidity; and a host board that contains the same type of sensors as the remote board, in addition to wind speed and wind directions sensors. The proposed system can be used for monitoring and detection of both bushfire and fire in and around a house. The host board position and sensory information collected from the remote boards are combined, stored and processed by a microcontroller. The host board performs further processing on the collected sensory information and communicates it to a control room wirelessly using a long range wireless communication such as wireless local area network (WLAN) or general packet radio service (GPRS). The system components and performance are also described.

Ying Sun; Quan Yuan; Said Al-Sarawi

2010-01-01T23:59:59.000Z

454

Building America Technology Solutions for New and Existing Homes:Hydronic Systems Designing for Setback Operations  

Energy.gov (U.S. Department of Energy (DOE))

This guide, developed by Consortium for Advanced Residential Buildings, provides step-by-step instructions for heating contractors and hydronic designers for selecting the proper control settings to maximize system performance and improve response time when using a thermostat setback.

455

NREL: Learning - Photovoltaics for Homes  

NLE Websites -- All DOE Office Websites (Extended Search)

Homes Homes Photo of solar panels on the roof of a traditional looking home in Colorado. Photovoltaic solar panels installed on the roof of a home in Boulder, Colorado. The following resources will help you install a photovoltaic (PV) system on your home. If you are unfamiliar with PV systems, see the introduction to PV. Resources American Solar Energy Society Provides consumers with information about solar energy and resources. Database of State Incentives for Renewables and Efficiency Provides information on state, local, utility, and selected federal incentives that promote renewable energy. Florida Solar Energy Center Provides basic information on photovoltaics for consumers. Own Your Power! A Consumer Guide to Solar Electricity The U.S. Department of Energy (DOE) answers consumer questions about PV and

456

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

457

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market  

E-Print Network (OSTI)

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market Clearing Model F. Milano, Member, IEEE, C. A. Ca~nizares, Senior Member, IEEE, and A. J constraints that properly include voltage stability limits in the operation of competitive electricity markets

Cañizares, Claudio A.

458

VLSI ARCHITECTURE OF AN INVISIBLE WATERMARKING UNIT FOR A BIOMETRIC-BASED SECURITY SYSTEM IN A DIGITAL CAMERA  

E-Print Network (OSTI)

VLSI ARCHITECTURE OF AN INVISIBLE WATERMARKING UNIT FOR A BIOMETRIC-BASED SECURITY SYSTEM is performed using an invisible watermarking algorithm that allows for verification of the image as well implementing the invisible watermarking algorithm towards the development of the camera. I. INTRODUCTION

Mohanty, Saraju P.

459

Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform Techniques  

Science Journals Connector (OSTI)

We propose a novel method to simultaneously improve the physical layer security and the transmission performance of the orthogonal frequency division multiplexing (OFDM) passive...

Deng, Lei; Cheng, Mengfan; Wang, Xiaolong; Li, Hao; Tang, Ming; Fu, Songnian; Shum, Ping; Liu, Deming

2014-01-01T23:59:59.000Z

460

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network (OSTI)

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

home from home Murray Edwards Accommodation Guide 2012-13  

E-Print Network (OSTI)

home from home Murray Edwards Accommodation Guide 2012-13 #12;2 home from home home from home.......................................................................... 17 #12;Murray Edwards Accommodation Guide 2012-13 3 home from home Introduction Dear Students, Murray Edwards has produced the `Home from Home', the Accommodation Guide to provide full information

Goldschmidt, Christina

462

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology

463

Residential Photovoltaic Energy Systems in California: The Effect on Home Sales Prices  

E-Print Network (OSTI)

Commission (CPUC) "CPUC California Solar Initiative: 2009California has been and continues to be the country’s largest market for photovoltaic solar (solar PV is expanding rapidly in the U.S. Almost 100,000 PV systems have been installed in California

Hoen, Ben

2013-01-01T23:59:59.000Z

464

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

465

December 2009 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Our Jobs Working at NNSA Blog Home December 2009 December 2009 Dec 7, 2009 Record-Setting Year for Nuclear Weapon Dismantlement Achieved at the Y-12 National Security Complex...

466

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

467

Interoperable and Secure Communication for Cyber Physical Systems in the Energy Grid  

E-Print Network (OSTI)

Power generation [KW] on a solar panel in summer andpole, a desk lamp, or a solar panel at home. Challenge:Electric Vehicle (EV) and solar panel to smart light and

Lee, Eun Kyu

2014-01-01T23:59:59.000Z

468

Home Design & Remodeling | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Design & Remodeling Design & Remodeling Home Design & Remodeling Ultra-Efficient Home Design An ultra-efficient home can be designed and built to produce as much energy as it uses -- or even more! Read more Passive Solar Home Design Passive solar design takes advantage of a building's site, climate, and materials to minimize energy use. Read more Whole-House Systems Approach A whole-house systems approach considers the house as an energy system with interdependent parts, each of which affects the performance of the entire system. This approach helps homeowners, architects, and builders develop successful strategies for optimizing home energy efficiency. Read more Investing in your home's energy efficiency when designing a new home or remodeling an existing one can help you save energy and money in the long

469

Passive Solar Home Design | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Passive Solar Home Design Passive Solar Home Design Passive Solar Home Design June 24, 2013 - 7:18pm Addthis This North Carolina home gets most of its space heating from the passive solar design, but the solar thermal system (top of roof) supplies both domestic hot water and a secondary radiant floor heating system. | Photo courtesy of Jim Schmid Photography. This North Carolina home gets most of its space heating from the passive solar design, but the solar thermal system (top of roof) supplies both domestic hot water and a secondary radiant floor heating system. | Photo courtesy of Jim Schmid Photography. What does this mean for me? A passive solar home means a comfortable home that gets at least part of its heating, cooling, and lighting energy from the sun. How does it work?

470

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

471

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

472

What People Do with Consumption Feedback: A Long-Term Living Lab Study of a Home Energy Management System  

Science Journals Connector (OSTI)

......Rossello-Busquet and Soler, 2012). In future, by combining concepts from consumption feedback, home automation and demand response research (LaMarche et al., 2011), HEMSs are expected to become two-way solutions allowing for both: monitoring......

Tobias Schwartz; Gunnar Stevens; Timo Jakobi; Sebastian Denef; Leonardo Ramirez; Volker Wulf; Dave Randall

2014-04-01T23:59:59.000Z

473

DOE Zero Energy Ready Home Case Study, Garbett Homes, Herriman...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Garbett Homes, Herriman, UT, Production Home DOE Zero Energy Ready Home Case Study, Garbett Homes, Herriman, UT, Production Home Case study of a DOE Zero Energy Ready Home in...

474

Home's Douglas  

E-Print Network (OSTI)

BULLETIN OF THE UNIVERSITY OF KANSAS HUMANISTIC STUDIES Vol. Ill November 1, 1924 No. 3 Home's Douglas Edited With Introduction and Notes BY HUBERT J. TUNNEY, A. B., A. M. Instructor in English University of Notre Dame LAWRENCE, NOVEMBER... of Carron"; "the stormy north"; "some nameless stream's untrodden banks"; "wings of down"; and "red came the river down." There are few extended nature passages in the play. Corn- pan- II. 189-195; III, 80-97; V, 1-12; and V, 79-83. The refer ences...

Home, John

1924-11-01T23:59:59.000Z

475

Building America Efficient Solutions for New Homes Case Study: Ravenwood Homes and Energy Smart Home Plans, Inc., Cape Coral, Florida  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ravenwood Homes achieved a HERS score of 15 on its high- Ravenwood Homes achieved a HERS score of 15 on its high- performance home with design assistance from a Building America research team including Pacific Northwest National Laboratory, Energy Smart Home Plans, LLC, and Florida HERO. The home which is located in southwestern Florida, was completed in 2011 and includes a 6 KW rooftop photovoltaic system; without the PV, the home achieves a HERS rating of 65. Ceilings that provide a continuous air barrier can be a key energy-saving feature of a home. In this home the builder installed the ceiling drywall as one continuous layer then installed duct chases in dropped ceilings beneath this drywall so that ducts were installed in conditioned space with an unbroken air barrier above. Interior walls were also attached to

476

Using Show Homes (and Sponsorships) to Persuade Commissioning Relevancy and Factory Crafted High Performance Modular Homes  

E-Print Network (OSTI)

products and the show home builders. At this past year's IBS show in February, Palm Harbor Homes build the GenX home that included an installed and operational 4.08kWp photovoltaic system with inverter and back up battery management system, a solar hot...

Thomas-Rees, S.; Chasar, D.; Beal, D.; Chandra, S.

2007-01-01T23:59:59.000Z

477

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

478

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

479

Building America Whole-House Solutions for New Homes: Quadrant Homes, Kent, Washington  

Energy.gov (U.S. Department of Energy (DOE))

Case study of Quadrant Homes, who worked with Building America partner WSU Energy Extension to design HERS-65 homes with ducts in conditioned space; 2x6 factory-built walls; and systems-engineered streamlined construction.

480

Building America DOE Challenge Home Case Study: e2 Homes - Winter...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

than it uses with construction costs one-third less than originally proposed. Without solar power, the home scores a HERS 57; with its photovoltaic system, the home produces...

Note: This page contains sample records for the topic "home security systems" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada  

SciTech Connect

This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: · CAS 02-26-11, Lead Shot · CAS 02-44-02, Paint Spills and French Drain · CAS 02-59-01, Septic System · CAS 02-60-01, Concrete Drain · CAS 02-60-02, French Drain · CAS 02-60-03, Steam Cleaning Drain · CAS 02-60-04, French Drain · CAS 02-60-05, French Drain · CAS 02-60-06, French Drain · CAS 02-60-07, French Drain · CAS 23-60-01, Mud Trap Drain and Outfall · CAS 23-99-06, Grease Trap · CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: · A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 · The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

NSTec Environmental Restoration

2012-08-15T23:59:59.000Z

482

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

483

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

484

Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites

About About Careers Community Employees & Retirees Library Suppliers Contact Us Y-12 Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | B&W Y-12 donates $75,000 to Emory Valley Center Facebook Twitter YouTube Flickr RSS Feature Stories Expertise Our NRFTC trainers have many years of operational experience at Y-12 as well as on numerous international missions. Nuclear Detection and Forensics A strong technical nuclear detection and forensics capability is important to the nation's security. "Cook"ing at Y-12 for 70 years We have an enduring mission. Y-12 plays a key role in it. And a nuclear deterrent remains the ultimate insurance policy for America. Young Innovators' Society Awesome Eyeballs visit Y-12

485

DOE Zero Energy Ready Home Case Study: Southern Homes, Russellville...  

Energy Savers (EERE)

Southern Homes, Russellville, AL DOE Zero Energy Ready Home Case Study: Southern Homes, Russellville, AL Case study of the first manufactured home built to the DOE Zero Energy...

486

DOE Zero Energy Ready Home Case Study: Southern Energy Homes...  

Office of Environmental Management (EM)

Southern Energy Homes, Russellville, AL DOE Zero Energy Ready Home Case Study: Southern Energy Homes, Russellville, AL Case study of the first manufactured home built to the DOE...

487

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

488

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

489

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris W. Johnson (1), A. Atencia Yepez (2)  

E-Print Network (OSTI)

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris of attack scenarios can be used to assess the resilience of safety cases to the impact of external security accident advocated the development of safety argumentation across the oil and gas industry (US Presidential

Johnson, Chris

490

770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure  

E-Print Network (OSTI)

Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

Tolbert, Leon M.

491

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

492

Home Energy Saver  

NLE Websites -- All DOE Office Websites (Extended Search)

Work-Arounds Work-Arounds While the Home Energy Saver is the most comprehensive home energy model available on the web, there are inevitably specific systems or features that we have not yet explicitly incorporated. In some cases, there are reasonable work-arounds that the user can use to approximate the energy use of such features or systems. For example: Evaporative Cooling: HES Does not model Evaporative coolers. However, you can specify an appropriately high SEER (e.g. 22) in the air conditioning description to approximate the relatively low energy use of evaporative coolers. Note that this method will not yield any information about the water consumption by evaporative coolers, which also has a cost and other implications. Extended Vacations: HES does not explicitly allow you to specify

493

2008 NMMSS Users Training Meeting | National Nuclear Security  

National Nuclear Security Administration (NNSA)

8 NMMSS Users Training Meeting | National Nuclear Security 8 NMMSS Users Training Meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog 2008 NMMSS Users Training Meeting Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training > Annual Users Training Meeting Archives > 2008 NMMSS Users Training Meeting

494

2006 NMMSS Users Training Meeting | National Nuclear Security  

National Nuclear Security Administration (NNSA)

6 NMMSS Users Training Meeting | National Nuclear Security 6 NMMSS Users Training Meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog 2006 NMMSS Users Training Meeting Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training > Annual Users Training Meeting Archives > 2006 NMMSS Users Training Meeting

495

2007 NMMSS Users Training Meeting | National Nuclear Security  

National Nuclear Security Administration (NNSA)

7 NMMSS Users Training Meeting | National Nuclear Security 7 NMMSS Users Training Meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog 2007 NMMSS Users Training Meeting Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training > Annual Users Training Meeting Archives > 2007 NMMSS Users Training Meeting

496

2005 NMMSS Users Training Meeting | National Nuclear Security  

National Nuclear Security Administration (NNSA)

5 NMMSS Users Training Meeting | National Nuclear Security 5 NMMSS Users Training Meeting | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog 2005 NMMSS Users Training Meeting Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > Training > Annual Users Training Meeting Archives > 2005 NMMSS Users Training Meeting

497

What Are the Other Uses of NMMSS? | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Are the Other Uses of NMMSS? | National Nuclear Security Are the Other Uses of NMMSS? | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog What Are the Other Uses of NMMSS? Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > What Are the Other Uses of NMMSS?

498

Nature of Transactions (TI) Code | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nature of Transactions (TI) Code | National Nuclear Security Administration Nature of Transactions (TI) Code | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nature of Transactions (TI) Code Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Code Tables > Nature of Transactions (TI) Code

499

What is the History of the NMMSS? | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History of the NMMSS? | National Nuclear Security History of the NMMSS? | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog What is the History of the NMMSS? Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > NMMSS Information, Reports & Forms > Frequently Asked Questions > What is the History of the NMMSS?

500

At Home  

NLE Websites -- All DOE Office Websites (Extended Search)

21, 1997 21, 1997 Number 6 A profile of the Fermilab user community At Home and Loved by Judy Jackson, Fermilab Office of Public Affairs They come from Texas and from Turkey; from Colombia the country and Columbia the university; from as nearby as Elmhurst, Illinois and as far away as Beijing, China; from Oxford, England to Oxford, Mississippi; from university groups as large as 50 and as small as one. Figures recently released by the Laboratory's Office of Program Planning show Fermilab's users as a diverse and growing community of physicists and students engaged in a range of experiments aimed at discovering the fundamental nature of matter at the frontiers of particle physics research. What is a user? It seems obvious, but defining a labora- tory user is harder than it looks. Different