Powered by Deep Web Technologies
Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Usage Codes Observer code Vessel code Trip ID  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Sonar Observer code Vessel code Trip ID Additional Information KHz: RPM / Other _______________Global Registry ID:MMSI No. Permit expiration (dd-mm- yy): Y / N Present? Usage contact Diver / dive equipment Usage Manufacturer Hull mounted / towed Catch Y / N Other: Y / N Y / NOther

2

11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

1 PAGE 1 OF2 AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT PAGES 2. AMENDMENT/MODIFICATION NO. I 3. EFFECTIVE DATE M191 See Block 16C 4. REQUISITION/PURCHASE I 5. PROJECT NO. (If applicable) REQ. NO. 6.ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 87185-5400 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY CODE SA. AMENDMENT OF SOLICITATION NO.

3

II.CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

1 1 II.CONTRACT ID CODE ~AGE 1 of AMENDMENT OF SOLICITATIONIMODIFICATION OF CONTRACT PAGES AC 5. PROJECT NO. (If applicable) 3. EFFECTNE DATE 2. AMENDMENTfMODIFICA TION NO. 4. REQUISITIONIPURCHASE REQ. NO. See Block 16c. NOPR 7. ADMINISTERED BY (If other than Item 6) CODE 05008 6. ISSUED BY CODE 05008 U.S. Department of Energy National Nuclear Security Administration U.S. Department of Energy National Nuclear Security Administration P.O. Box 2050 Oak Ridge, TN 37831 P.O. Box 2050 Oak Ridge, TN 37831 9A. AMENDMENT OF SOLICITATION NO. 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Y-12, LLC P.O. Box 2009 MS 8014 9B. DATED (SEE ITEM 11) Oak Ridge, TN 37831-8014 lOA. MODIFICATION OF CONTRACT/ORDER NO.

4

Usage Codes Observer code Vessel code Trip ID  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Observer code Vessel code Trip ID Permit holder name/address Permit / N MMSI No. Y / N Present? Usage Water capacity (m3): Fuel capacity: m3 / tonnes Other: Other: Kw all that apply & note types of materials for each) Capacity: Usage Incinerator: Net mensuration Y / N

5

11. CONTRACT ID CODE IPAG~ OF PAGES  

E-Print Network (OSTI)

11. CONTRACT ID CODE IPAG~ OF PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT I 2 2. MODIFICATION OF CONTRACT/ ORDER NO. DUNS # 032987476 DE-AC05-76RL01830l8l 10B. DATED (SEE ITEM 13) CODE ONLY TO MODIFICATIONS OF CONTRACTS/ORDERS. IT MODIFIES THE CONTRACT/ORDER NO. AS SET FORTH IN ITEM 14

6

, 1. CONTRACT ID CODE IPAG~ O F PAGES  

E-Print Network (OSTI)

·' , 1. CONTRACT ID CODE IPAG~ O F PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT I 2 2. MODIFICATION OF CONTRACT/ ORDER NO. DUNS# 032987476 l8l DE-AC05-76RL01830 10B. DATED (SEE ITEM 13) CODE ONLY TO MODIFICATIONS OF CONTRACTS/ORDERS, IT MODIFIES THE CONTRACT/ORDER NO. AS SET FORTH IN ITEM 14

7

1. CONTRACT ID CODE PAGE OF PAGES  

NLE Websites -- All DOE Office Websites (Extended Search)

BY GIf aher than Item 6)1 CODE U.S. Department of Energy Office of River Protection P. 0. Box 450, MS 1-6-60 Richland, WA 99352 8 NAvM AND ADDRESS OF CONTRACTOR (No.,...

8

AMENDMENT OF SOLICITATIONIMODIFICATION OF CONTRACT I '. CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

SOLICITATIONIMODIFICATION OF CONTRACT I '. SOLICITATIONIMODIFICATION OF CONTRACT I '. CONTRACT ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, VA 24506 PAGE I OF 12 PAGES Albuquerque, NM 871 85-5400 I Amarillo, TX 79120 I I 90. DATED (SEE ITEM 1 1 ) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) I 10A. MODIFICATION OF CONTRACTIORDER NO. 2. AMENDMENT/MODIFICATION NO. MI67 9A. AMENDMENT OF SOLICITATION NO. I 1 DE-AC04-00AL66620 100. DATED (SEE ITEM 13) 3. EFFECTIVE DATE See Block 16C Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the

9

AMENDMENT OF SOLICITATIONIMODIFICATION OF CONTRACT I '. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

I '. I '. CONTRACT ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, VA 24506 PAGE I OF 12 PAGES Albuquerque, NM 871 85-5400 I Amarillo, TX 79120 I I 90. DATED (SEE ITEM 1 1 ) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) I 10A. MODIFICATION OF CONTRACTIORDER NO. 2. AMENDMENT/MODIFICATION NO. MI67 9A. AMENDMENT OF SOLICITATION NO. I 1 DE-AC04-00AL66620 100. DATED (SEE ITEM 13) 3. EFFECTIVE DATE See Block 16C Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

10

1. CONTRACT ID CODE PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT  

E-Print Network (OSTI)

3 1. CONTRACT ID CODE PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 2. MODIFICATION OF CONTRACT! ORDeR NO. DE-AC05-76RL01830 .. DUNS # 032987476 ~ 10B. DATED (SEE ITEM 13) CODE ONLY TO MODIFICATIONS OF CONTRACTS/ORDERS, IT MODIFIES THE CONTRACT/ORDER NO. AS SET FORTH IN ITEM 14

11

1. CONTRACT ID CODE PAGE OF PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 28  

E-Print Network (OSTI)

1. CONTRACT ID CODE PAGE OF PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 28 2. MODIFICATION OF CONTRACT/ ORDER NO. DUNS # 032987476 s DE-AC05-76RL01830 10B. DATED (SEE ITEM 13} CODE FACILITY ONLY TO MODIFICATIONS OF COF^TTRACTS/ORDERS, IT MODIFIES THE CONTRACT/ORDER NO. AS SET FORTH IN ITEM 14

12

\\1. CONTRACT ID CODE OF PAGES-I PAGE AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT  

E-Print Network (OSTI)

\\1. CONTRACT ID CODE OF PAGES-I PAGE AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1 I 3 3. MODIFICATION OF CONTRACT/ ORDER NO. DE-AC05-76RLO1830 DUNS # 032987476 ~ 108. DATED (SEE /TEM 13) CODE FACILITY ONLY TO MODIFICATIONS OF CONTRACTS/ORDERS, IT MODIFIES THE CONTRACT/ORDER NO. AS SET FORTH IN ITEM 14

13

11. CONTRACT ID CODE PAGE OF PAGES I AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT  

National Nuclear Security Administration (NNSA)

11. CONTRACT ID CODE 11. CONTRACT ID CODE PAGE OF PAGES I AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1 I 2. AMENDMENTIMODIFICATION NO. 258 6. ISSUED BY CODE 3. EFFECTIVE DATE See Block 16C 05008 4. REQUISITION/PURCHASE REQ. NO. 7. ADMINISTERED BY (If other than Item 6) 15. PROJECT NO. (If applicable) CODE 1 0 5 0 0 8 NNSA/Oakridge Site Office NNSA/Oakridge Site Office U.S. Department of Energy U. S. Department of Energy NNSA/Y-12 Site Office NNSA/Y-12 Site Office P.O. Box 2050 P.O. Box 2050 Building 9704-2 Building 9704-2 Oak Ridge TN 37831 Oak Ridge TN 37831 8. NAME AND ADDRESS OF CONTRACTOR (No., str**t, county, SIal. and ZIP Code) ABCOCK & WILCOX TECHNICAL SERVICES Y-12, ttn: WILLIE J. WILSON o BOX 2009 02 SCARBORO RD. , Nl.149/MS 8004 AK RIDGE TN 378318004

14

\\1. CONTRACT ID CODE I PAGE OF PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT  

E-Print Network (OSTI)

\\1. CONTRACT ID CODE I PAGE OF PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1 1 1 2 ONLY TO MODIFICATIONS OF CONTRACTS/ORDERS, IT MODIFIES THE CONTRACT/ORDER NO. AS SET FORTH IN ITEM 14 IN ITEM 14 ARE MADE IN THE CONTRACT ORDER NO. IN ITEM 10A. D B. THE ABOVE NUMBERED CONTRACTIORDER

15

11. CONTRACT ID CODE IPAGE1 OFI AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 2  

E-Print Network (OSTI)

11. CONTRACT ID CODE IPAGE1 OFI PAGES AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 2 2 County, WA 99352 10A. MODIFICATION OF CONTRACT/ ORDER NO. DUNS# 032987476 DE-AC05-76RL01830 ~ 10B. DATED AND APPROPRIATION DATA (Ifrequired} CHECK ONE D D D 13. THIS ITEM APPLIES ONLY TO MODIFICATIONS OF CONTRACTS

16

AMENDMENT OF SOLICITATIONIMODIFICATlON OF CONTRACT ( I- CONTRACT ID CODE PAGE I OF 2  

NLE Websites -- All DOE Office Websites (Extended Search)

( ( I- CONTRACT ID CODE PAGE I OF 2 PAGES I . . Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 2. AMENDMENTIMODIFICATION NO. M I 51 Albuquerque, NM 87185-5400 I Amarillo, TX 79120 90. DATED (SEE ITEM 11) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 3. EFFECTIVE DATE See Block 16C 9A. AMENDMENT OF SOLICITATION NO. extended. 6 . ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Su~pport Department P.O. Box 5400 CODE FACILITY CODE Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning -

17

AMENDMENT OF SOLICITATIONIMODIFICATlON OF CONTRACT ( I- CONTRACT ID CODE PAGE I OF 2  

National Nuclear Security Administration (NNSA)

( ( I- CONTRACT ID CODE PAGE I OF 2 PAGES I . . Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 2. AMENDMENTIMODIFICATION NO. M I 51 Albuquerque, NM 87185-5400 I Amarillo, TX 79120 90. DATED (SEE ITEM 11) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 3. EFFECTIVE DATE See Block 16C 9A. AMENDMENT OF SOLICITATION NO. extended. 6 . ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Su~pport Department P.O. Box 5400 CODE FACILITY CODE Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning -

18

AMENDMENT OF SOlLICITATION/MODIFICATlON OF CONTRACT I I. CONTRACr ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

SOlLICITATION/MODIFICATlON OF CONTRACT I SOlLICITATION/MODIFICATlON OF CONTRACT I I. CONTRACr ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, VA 24506 PAGE I OF 2 PAGES Albuquerque, NM 871 85-5400 I Amarillo, TX 79120 9B. DATED (SEE ITEM 1 1 ) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) DE-AC04-00AL66620 I I IOB. DATED (SEE ITEM 13) 2. AMENDMENTIMODIFICATION NO. MI41 9A. AMENDMENT OF Sol-ICITATION NO. CODE I ~ H L I L I I Y L U U ~ I I - 11. THlS ITEM ONLY APPLIES TO AMENDMENTS OF SOLICITATIONS 1. l l is not The above numbered solicitation is amended as set forth in Item 14. The hour and date specified- receipt of Offers is extendec 3. EFFECTIVE DATE See Block 16C . - extended. 6. ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center

19

AMENDMENT OF SOlLICITATION/MODIFICATlON OF CONTRACT I I. CONTRACr ID CODE  

National Nuclear Security Administration (NNSA)

SOlLICITATION/MODIFICATlON OF CONTRACT I SOlLICITATION/MODIFICATlON OF CONTRACT I I. CONTRACr ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, VA 24506 PAGE I OF 2 PAGES Albuquerque, NM 871 85-5400 I Amarillo, TX 79120 9B. DATED (SEE ITEM 1 1 ) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) DE-AC04-00AL66620 I I IOB. DATED (SEE ITEM 13) 2. AMENDMENTIMODIFICATION NO. MI41 9A. AMENDMENT OF Sol-ICITATION NO. CODE I ~ H L I L I I Y L U U ~ I I - 11. THlS ITEM ONLY APPLIES TO AMENDMENTS OF SOLICITATIONS 1. l l is not The above numbered solicitation is amended as set forth in Item 14. The hour and date specified- receipt of Offers is extendec 3. EFFECTIVE DATE See Block 16C . - extended. 6. ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center

20

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT I CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

CONTRACT ID CODE CONTRACT ID CODE Babcock & Wilcox Technical Services Pantex, LLC 9B. DATED (SEE ITEM 11) PO Box 30020 Amarillo, T X 79120 PAGE 1 OF 2 PAGES Albuquerque, NM 87185-5400 I Amarillo, TX 79120 I I DE-AC04-00AL66620 10B. DATED (SEE ITEM 13) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 2. AMENDMENTIMODIFICATION NO. MI74 9A. AMENDMENT OF SOLICITATION NO. extended. CODE I FACILITY CODE Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT ( I. ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

( ( I. ID CODE / DE-ACO4-OOAL6662O ' 10s. DATED (SEE ITEM 13) PAGE I OF 2 PAGES Babcock & W ~ ~ C O X Technical Services Pantex, LLC 800 Main Street Lynchburg, VA 24505 9B. DATED (SEE ITEM 11) 10A. MODIFICATION OF CONTRACTIORDER NO. Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR ACKNOWLEDGMENT TO BE RECEIVED AT THE PLACE DESIGNATED FOR THE RECEIPT OF OFFERS PRIOR TO THE HOUR AND DATE

22

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT I I, CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

I, CONTRACT ID CODE I, CONTRACT ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, V A 24506 PAGE I OF 2 PAGES Albuquerque, NM 87185-5400 I Amarillo, TX 79120 9B. DATED (SEE ITEM I I ) 8. NAME AND ADDRESS OF CONTRACTOR (No.. street, county, state, ZIP Code) I ( DE-AC04-00AL66620 10B. DATED (SEE ITEM 13) 2. AMENDMENTIMODIFICATION NO. M I 3 8 9A. AMENDMENT OF SOLICITATION NO. extended. 3. EFFECTIVE DATE See Block 16C CODE I FACILITY CODE Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

23

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT I ' CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

' ' CONTRACT ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, VA 24506 PAGE 1 OF 12 PAGES 9B. DATED (SEE ITEM 11) 5. PROJECT NO. (If applicable) 4. REQUlSlTlONlPURCHASE REQ. NO. 2. AMENDMENTIMODIFICATION NO. MI39 extended. 6. ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 871 85-5400 3. EFFECTIVE DATE See Block 16C CODE I FACILITY CODE Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the

24

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT I CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

I CONTRACT ID CODE Babcock & Wilcox Technical Services Pantex, LLC 9B. DATED (SEE ITEM 11) PO Box 30020 Amarillo, T X 79120 PAGE 1 OF 2 PAGES Albuquerque, NM 87185-5400 I Amarillo, TX 79120 I I DE-AC04-00AL66620 10B. DATED (SEE ITEM 13) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 2. AMENDMENTIMODIFICATION NO. MI74 9A. AMENDMENT OF SOLICITATION NO. extended. CODE I FACILITY CODE Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

25

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT I I. CONTRA'T ID CODE  

National Nuclear Security Administration (NNSA)

CONTRA'T ID CODE CONTRA'T ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, V A 24506 PAGE I OF 2 PAGES Albuquerque, NM 871 85-5400 / Amarillo, TX 79120 I I 9B. DATED (SEE ITEM 11) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) I 10A. MODIFICATION OF CONTRACTIORDER NO. 2. AMENDMENTIMODIFICATION NO. M I 0 8 9A. AMENDMENT OF SOLICITATION NO. DE-AC04-00AL66620 1 1 108. DATED (SEE ITEM 13) 3. EFFECTIVE DATE See Block 16C Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

26

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT I I. CONTRA'T ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

CONTRA'T ID CODE CONTRA'T ID CODE BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, V A 24506 PAGE I OF 2 PAGES Albuquerque, NM 871 85-5400 / Amarillo, TX 79120 I I 9B. DATED (SEE ITEM 11) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) I 10A. MODIFICATION OF CONTRACTIORDER NO. 2. AMENDMENTIMODIFICATION NO. M I 0 8 9A. AMENDMENT OF SOLICITATION NO. DE-AC04-00AL66620 1 1 108. DATED (SEE ITEM 13) 3. EFFECTIVE DATE See Block 16C Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

27

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1. CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

l PAGE 1 OF 3PAGES 2. AMENDMENT/MODIFICATION NO. I 3. EFFECTIVE DATE 4. REQUISITION/PURCHASE REQ. NO. I 5. PROJECT NO. (If applicable) 180 See Block 16 C 6.1SSUEDBY CODE 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Los Alamos Site Office 3747 West Jemez Road Los Alamos, NM 87544 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) 9A. AMENDMENT OF SOLICITATION NO. Los Alamos National Security, LLC 4200 West Jemez Road 9B. DATED (SEE ITEM 11) Suite 400 10A. MODIFICATION OF Los Alamos, NM 87544 CONTRACT/ORDER NO. DE-AC52-06NA25396 CODE FACILITY CODE 10B. DATED (SEE ITEM 13) December 21, 2005 -~ - - 11. THIS ITEM ONLY APPLIES TO AMENDMENTS OF SOLICITATIONS

28

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

1 PAGE 1 OF 1 PAGE 1 OF 23 PAGES 2. AMENDMENT/MODIFICATION NO. 13. EFFECTIVE DATE M188 See Block 16C 4. REQUISITION/PURCHASE I5. PROJECT NO. (If applicable) REQ. NO. 6. ISSUED BY CODE U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 87185·5400 7. ADMINISTERED BY (If other than Item 6) CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY CODE 9A. AMENDMENT OF SOLICITATION NO. 9B. DATED (SEE ITEM 11)

29

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 11. CONTRACT ID CODE  

NLE Websites -- All DOE Office Websites (Extended Search)

I I PAGE OF PAGES 1 1 2 2. AMENDMENTIMODIFICATION NO. 3. EFFECTIVE DATE 4. REaUISITIONIPURCHASE REa. NO. 15. PROJECT NO. (If applicable) 335 See Block 16C 12SCOO0484 Item 7 6. ISSUED BY CODE 00518 7. ADMINISTERED 8Y (If other than Item 6) CODE 100518 Oak Ridge Oak Ridge U.S. Department of Energy U.S. Department of Energy P.O. Box 2001 P.O. Box 2001 Oak Ridge TN 37831 Oak Ridge TN 37831 8. NAME AND ADDRESS OF CONTRACTOR (No .* stroot. COlUlty. Stato and ZIP Code) (x) 9A. AMENDMENT OF SOLICITATION NO. f-'-- o AK RIDGE ASSOCIATED UNIVERSITIES, INC. P.O. BOX 117 98. DATED (SEE ITEM 11) o AK RIDGE TN 37830-6218 x 10A. MODIFICATION OF CONTRACTIORDER NO. DE-AC05-060R23100 108. DATED (SEE /TEM 13) CODE 041152224 FACILITY CODE 12/21/2005 11. THIS ITEM ONLY APPLIES TO AMENDMENTS OF SOLICITATIONS

30

AMENDMENT OF SOLIC ITATION/MODIFICATION OF CONTRACT 11. CONTRACT ID CODE  

E-Print Network (OSTI)

Page 2 of4 The Department of Energy (DOE), Office of Science (SC), Pacific Northwest Site Office (PNSO) ICODE CODE U.S. Department of Energy Pacific Northwest Site Office Post Office Box 350 Richland, WA/ORDER IS MODIFIED TO REFLECT ADMINISTRATIVE CHANGES (such as changes in paying office, appropriation date, etc.) SET

31

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1. CONTRACT ID CODE PAGE  

E-Print Network (OSTI)

Purpose of Modification: The Department of Energy (DOE), Office of Science (SC), Pacific Northwest Site Northwest Site Office Post Office Box 350 Richland, WA 99352 7. ADMINISTERED BY (if other than Item 6) CODE/ORDER IS MODIFIED TO REFLECT ADMINISTRATIVE CHANGES (such as changes in paying office, appropriation date, etc.) SET

32

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTFWCT I 1 CONTRACT ID CODE PAGE I OF 2  

NLE Websites -- All DOE Office Websites (Extended Search)

CONTFWCT I CONTFWCT I 1 CONTRACT ID CODE PAGE I OF 2 PAGES MI10 I See Block 16C I REQ. NO. BWXT Pantex, LLC Route 726, Mt. Athos Road Lynchburg, VA 24506 2. AMENDMENTIMODIFICATION NO. 1 3. EFFECTIVE DATE 1 4. REQUISITIONIPURCHASE 1 5. PROJECT NO. (If a ~ ~ l i c a b l e l . a , U.S. Department of Energy National Nuclear Security Administration Service Center Property and M&O Contract Support Department P.O. Box 5400 Albuquerque, NM 871 85-5400 96. DATED (SEE ITEM 1 1 ) 6. ISSUED BY CODE 1 7. ADMINISTERED BY (If other than Item 6 J CODE U.S. Department of Energy National Nuclear Security Administration Manager, Pantex Site Office P.O. Box 30030 Amarillo, TX 79120 DE-AC04-00AL66620 1 1 106. DATED (SEE ITEM 1 0 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code)

33

T ID CODE I  

National Nuclear Security Administration (NNSA)

(Signatuk bf j n & d authorized to sign) I I U l b U f I 16A. NAME AND TITLE OF CONTRACTING OFFICER (Type or print) Anthony L. Lovato, Contracting Officer I fie AI-mne Ci+n...

34

11. CONTRACT ID CODE  

National Nuclear Security Administration (NNSA)

(Si nature of Contractin PREVIOUS EDITION UNUSABLE MS ( ) 16A. NAME AND TITLE OF CONTRACTING OFFICER (Type or print) Seb M. Klein 15C.DATE 16C.DATE SIGNED SJGN;..D. n.ILyW...

35

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

36

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

37

NAICS Codes Description:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Codes Description: Filters: Date Signed only show values between '10/01/2006' and '09/30/2007', Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001') Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Actions Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 251 $164,546,671 541611 ADMINISTRATIVE MANAGEMENT AND GENERAL MANAGEMENT CONSULTING SERVICES 236 $52,396,806 514210 DATA PROCESSING SERVICES 195 $28,941,727 531210 OFFICES OF REAL ESTATE AGENTS AND BROKERS 190 $6,460,652 541330 ENGINEERING SERVICES 165 $33,006,079 163 $11,515,387 541690 OTHER SCIENTIFIC AND TECHNICAL CONSULTING SERVICES 92 $40,527,088 531390 OTHER ACTIVITIES RELATED TO REAL ESTATE 79 -$659,654 337214 OFFICE FURNITURE (EXCEPT WOOD) MANUFACTURING 78 $1,651,732

38

DOE/ID-Number  

NLE Websites -- All DOE Office Websites (Extended Search)

www.inl.gov Prepared for the U.S. Department of Energy Office of Nuclear Energy Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 ii EXECUTIVE SUMMARY The U.S....

39

Data ID Service  

NLE Websites -- All DOE Office Websites (Extended Search)

ID Service First DOI for a DOE dataset was minted by OSTI and registered with DataCite on 8102011 from the DOE Atmospheric Radiation Measurement (ARM) Climate Research Facility...

40

Property:DSIRE/Id | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:DSIRE/Id Jump to: navigation, search This is a property of type String. DSIRE Incentive Code. Pages using the property "DSIRE/Id" Showing 25 pages using this property. (previous 25) (next 25) 2 2003 Climate Change Fuel Cell Buy-Down Program (Federal) + US04F + 3 30% Business Tax Credit for Solar (Vermont) + VT31F + A AEP (Central and North) - CitySmart Program (Texas) + TX141F + AEP (Central and North) - Residential Energy Efficiency Programs (Texas) + TX116F + AEP (Central and SWEPCO) - Coolsaver A/C Tune Up (Texas) + TX119F + AEP (Central, North and SWEPCO) - Commercial Solutions Program (Texas) + TX141F + AEP (SWEPCO) - Residential Energy Efficiency Programs (Texas) + TX138F +

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

AdvANCE CoNFErENCE GuIdE 2007 JavaoneSM  

E-Print Network (OSTI)

registration confirmation) as their Referral Code when registering for the 2007 JavaOneSM conference. You can receive the Referral Gift described below, based on the total number of completed registrations we receive that list your Registration ID number as the Referral Code. All Referral Codes must be submitted at the time

Tomkins, Andrew

42

401(a) Investment Provider Change Form Employee Name Employee ID #  

E-Print Network (OSTI)

401(a) Investment Provider Change Form Employee Name Employee ID # Address City State Zip Code Home to an account in my name with the following Investment Provider(s): Investment Provider Percent Fidelity Investments % TIAA-CREF % The numbers above must be in whole percents only and must total 100%. If you wish

Provancher, William

43

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

44

STUDENT ID Page 2 m  

E-Print Network (OSTI)

Write your name, student ID number, recitation instructor's name and recitation time in the space provided above. Also write your name at the top of pages 2, 3,...

45

DOE/ID-Number  

NLE Websites -- All DOE Office Websites (Extended Search)

014 AGR-1 Safety Test Predictions Using the PARFUME Code Blaise Collin May 2012 DISCLAIMER This information was prepared as an account of work sponsored by an agency of the U.S....

46

Product Service Codes @ Headquarters Description: Product Services Codes used at Headquartes Procurement Services  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes @ Headquarters Codes @ Headquarters Description: Product Services Codes used at Headquartes Procurement Services Filters: Signed Date only show values between , Contracting Agency ID only show values equal to '8900', Contracting Office ID only show values equal to '00001', Modification Number only show values equal to '0', Date Signed only show values between '05/01/2011' and '04/30/2012', Last Modified Date only show values between Contracting Agency ID: 8900, Contracting Office ID: 00001 Product or Service Code Product or Service Description Ultimate Contract Value R499 OTHER PROFESSIONAL SERVICES $48,396,439.74 7 R499 SUPPORT- PROFESSIONAL: OTHER $13,156,938.09 16 7030 ADP SOFTWARE $5,745,993.02 81 R408 PROGRAM MANAGEMENT/SUPPOR T SERVICES $5,343,000.00 5 AD26 SERVICES (MANAGEMENT/SUPPO

47

Product Service Codes Description: Product Service Codes used at Headquarters Proc Services  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes Codes Description: Product Service Codes used at Headquarters Proc Services Filters: Date Signed only show values between '10/01/2006' and '09/30/2007', Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001') Contracting Agency ID: 8900, Contracting Office ID: 00001 Product or Service Code Product or Service Description Actions Action Obligation D399 OTHER ADP & TELECOMMUNICATIONS SVCS 285 $131,825,633 R799 OTHER MANAGEMENT SUPPORT SERVICES 239 $128,006,080 R408 PROGRAM MANAGEMENT/SUPPOR T SERVICES 278 $59,852,844 S206 GUARD SERVICES 11 $26,628,827 B546 STUDY/SECURITY (PHYSICAL & PERSONAL 11 $22,187,799 AD26 SERVICES (MANAGEMENT/SUPPO RT) 56 $21,689,198 R499 OTHER PROFESSIONAL SERVICES 153 $17,482,267 D301 ADP FACILITY MANAGEMENT 28 $16,265,159 R425 ENGINEERING AND

48

NAICS Codes @ Headquarters Description: NAICS Codes used at Headquarters Procurement Services  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Codes @ Headquarters Codes @ Headquarters Description: NAICS Codes used at Headquarters Procurement Services Filters: Signed Date only show values between , Contracting Agency ID show only ('8900'), Contracting Office ID show only ('00001'), Date Signed only show values between '05/01/2011' and '04/30/2012', Last Modified Date only show values between Contracting Agency ID: 8900, Contracting Office ID: 00001 NAICS Code NAICS Description Action Obligation 541519 OTHER COMPUTER RELATED SERVICES 341 $141,587,250.76 531210 OFFICES OF REAL ESTATE AGENTS AND BROKERS 286 $2,204,687.38 541330 ENGINEERING SERVICES 245 $80,827,391.54 611430 PROFESSIONAL AND MANAGEMENT DEVELOPMENT TRAINING 216 -$1,452,480.09 541611 ADMINISTRATIVE MANAGEMENT AND GENERAL MANAGEMENT CONSULTING SERVICES 206 $67,689,373.27 562910 REMEDIATION

49

DOE/ID-Number  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INEEL/EXT-04-02423 INEEL/EXT-04-02423 ABB SCADA/EMS System INEEL Baseline Summary Test Report J. R. Davidson M. R. Permann B. L. Rolston S. J. Schaeffer November 2004 Prepared by: Idaho National Engineering and Environmental Laboratory INEEL/EXT-04-02423 ABB SCADA/EMS System INEEL Baseline Summary Test Report J. R. Davidson M. R. Permann B. L. Rolston S. J. Schaeffer November 2004 Idaho National Engineering and Environmental Laboratory INEEL National Security Division Idaho Falls, Idaho 83415 Prepared for the U.S. Department of Energy Office of Energy Assurance Under DOE Idaho Operations Office Contract DE-AC07-99ID13727 ABB SCADA/EMS System INEEL Baseline Summary Test Report INEEL/EXT-04-02423 November 2004 ABSTRACT The Idaho National Engineering and Environmental Laboratory

50

DOE/ID-Number  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL/EXT-08-13979 INL/EXT-08-13979 U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 November 2008 INL/EXT-08-13979 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program November 2008 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB

51

Category:Boise, ID | Open Energy Information  

Open Energy Info (EERE)

ID ID Jump to: navigation, search Go Back to PV Economics By Location Media in category "Boise, ID" The following 16 files are in this category, out of 16 total. SVFullServiceRestaurant Boise ID Idaho Power Co.png SVFullServiceRestauran... 61 KB SVHospital Boise ID Idaho Power Co.png SVHospital Boise ID Id... 62 KB SVLargeHotel Boise ID Idaho Power Co.png SVLargeHotel Boise ID ... 66 KB SVLargeOffice Boise ID Idaho Power Co.png SVLargeOffice Boise ID... 58 KB SVMediumOffice Boise ID Idaho Power Co.png SVMediumOffice Boise I... 63 KB SVMidriseApartment Boise ID Idaho Power Co.png SVMidriseApartment Boi... 61 KB SVOutPatient Boise ID Idaho Power Co.png SVOutPatient Boise ID ... 62 KB SVPrimarySchool Boise ID Idaho Power Co.png SVPrimarySchool Boise ... 62 KB SVQuickServiceRestaurant Boise ID Idaho Power Co.png

52

Cognitive Science Minor Approval Form Name __________________________________________ ID # _________________________  

E-Print Network (OSTI)

Cognitive Science Minor Approval Form Name __________________________________________ ID: ___________________________________________________ _______________ Cognitive Science Minor Committee Date

Gering, Jon C.

53

Integrated Datasets (IDs) Wood/Bretherton proposal  

E-Print Network (OSTI)

Integrated Datasets (IDs) Wood/Bretherton proposal ID Rationale Space/Time scale; Location; Platforms Parameters Combined Drizzle Dataset (CD ID) Collocated precipitation, aerosol and cloud micro, precip. rate, cloud Cross- Section Dataset (XS-ID) Data on E-W cross- section along 20°S from coast

Wood, Robert

54

DOE-ID Operations Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

in to service. NE-ID-BEA-TSD- 2013-0001 July 16, 2013: BEA discovered that a proper lockouttagout had not been installed for work being performed on the Advanced Test Reactor....

55

SLAC Dosimeter / ID Request Form A  

NLE Websites -- All DOE Office Websites (Extended Search)

Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 Feb 2009 (updated 13 May 2010) SLAC-I-760-0A07J-006-R010 1 of 2 SLAC Dosimeter / ID Request Form A (For applicants who have completed SLAC Environment, Safety, and Health Training) Sections 1-5 completed by applicant. Section 1: Contact Information Last name: First name: MI: Male Female Birth year (yyyy): Job title: Contact information/mailing address: City: State: Zip code: Country: Dept/Group: Phone number: Mail stop: Users or non-SLAC employees only: List employer, company, or university : Section 2: Identification Badge Request I am applying for my first SLAC identification badge; I have successfully completed the following ES&H training (indicate all that apply): SON SOC EOESH GERT RWT I RWT II

56

Mo Year Report Period: EIA ID NUMBER:  

U.S. Energy Information Administration (EIA) Indexed Site

Version No: 2013.01 Mo Year Report Period: EIA ID NUMBER: http://www.eia.gov/survey/form/eia_14/instructions.pdf Mailing Address: Secure File Transfer option available at: (e.g., PO Box, RR) https://signon.eia.doe.gov/upload/noticeoog.jsp Electronic Transmission: The PC Electronic Zip Code - Data Reporting Option (PEDRO) is available. If interested in software, call (202) 586-9659. Email form to: OOG.SURVEYS@eia.doe.gov - - - - Fax form to: (202) 586-9772 Mail form to: Oil & Gas Survey Email address: U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 PADD 4 Type of Report (Check One ): (Thousands of dollars) (Thousands of barrels) PADD 2 PADD 3 PAD DISTRICT (a) Revision to Report:

57

Harmonizing Above Code Codes  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Harmonizing "Above Code" Harmonizing "Above Code" Codes Doug Lewin Executive Director, SPEER 6 Regional Energy Efficiency Organizations SPEER Members Texas grid facing an energy crisis * No new generation coming online * Old, inefficient coal-fired plants going offline * ERCOT CEO Trip Doggett said "We are very concerned about the significant drop in the reserve margin...we will be very tight on capacity next summer and have a repeat of this year's emergency procedures and conservation appeals." Higher codes needed to relieve pressure Building Codes are forcing change * 2012 IECC 30% higher than 2006 IECC * IRC, the "weaker code," will mirror IECC in 2012 * City governments advancing local codes with

58

Copyright 2004 Auto-ID Labs, All Rights Reserved The Auto-ID Labs  

E-Print Network (OSTI)

2004 Auto-ID Labs, All Rights Reserved Research Projects ­ Seven Major Categories · Auto-ID Technology to create a free flow of models in a network (Internet or Intranet) #12;©Copyright 2004 Auto-ID Labs, All depends on the flow of data for effective management. · Auto-ID and other technologies will increase

Brock, David

59

11 . CONT RACT ID CODE IPAG~ OF PAGES  

E-Print Network (OSTI)

2 of 3 Purpose of Modification: The Department of Energy (DOE), Office of Science (SC), Pacific of Energy Pacific Northwest Site Office Post Office Box 350 Richland, WA 99352 8. NAME AND ADDRESS CHANGES (such as changes in paying office, appropriation date, etc.) SET FORTH IN ITEM 14, PURSUANT T O

60

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Energy.gov (U.S. Department of Energy (DOE))

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

DOE-ID Operations Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

June 5, 2013 June 5, 2013 DOE-ID Operations Summary For the Period May 16, through May 30, 2013 EDITOR'S NOTE: The following is a summary of contractor operations at the Idaho National Laboratory, managed by DOE- Idaho Operations Office. It has been compiled in response to a request from stakeholders for more information on health, safety and environmental incidents at DOE facilities in Idaho. It also includes a brief summary of accomplishments at the Site. POC - Shannon Brennan, DOE-ID, (208) 526-3993. Advanced Mixed Waste Treatment Project (AMWTP) [No items to Report] Idaho Cleanup Project (ICP) May 15 - 30, 2013: CH2M-WG Idaho, LLC discovered three instances of new information at the Integrated Waste Treatment Unit (IWTU) which have the potential to impact the nuclear safety analysis

62

Document ID Number: RL-721  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Document ID Number: Document ID Number: RL-721 REV 4 NEPA REVIEW SCREENING FORM DOE/CX-00066 I. Project Title: Nesting Bird Deterrent Study at the 241-C Tank Farm CX B3.8, "Outdoor Terrestrial Ecological and Environmental Research" II. Project Description and Location (including Time Period over which proposed action will occur and Project Dimensions - e.g., acres displaced/disturbed, excavation length/depth, area/location/number of buildings, etc.): Washington River Protection Solutions LLC (WRPS) will perform an outdoor, terrestrial ecological research study to attempt to control and deter nesting birds at the 241-C Tank Farm. This will be a preventative study to test possible methods for controlling &/or minimizing the presence and impacts of nesting birds inside the tank farm. A nesting bird

63

RL·721 Document ID Number:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Document ID Number: Document ID Number: REV 3 NEPA REVIEW SCREENING FORM DOE/CX-00045 . J.proj(;l~t Titl~: - - - -- - - - - - - - - - - - - - - - - - -- --------- ------_. . _ - - - - - - - - - - - - - . - - - - - - - - - - - - - - - - - - - LIMITED FIREBREAK MAINTENANCE ON THE HANFORD SITE DURING CALENDAR YEAR 2012 II. Project Description and Location (including Time Period over which proposed action will occur and Project Dimensions· e.g., acres displaced/disturbed, excavation length/depth, etc.): The Department of Energy (DOE) proposes to perform firebreak maintenance in selected areas of the Hanford Site during calendar year 2012 with limited use of physical, chemical, and prescribed burning methods. Prescribed burning will be performed by the Hanford Fire Department under approved burn plans and permits; and only in previously disturbed

64

APS Beamline 6-ID-D  

NLE Websites -- All DOE Office Websites (Extended Search)

MM-Group Home MM-Group Home MMG Advisory Committees 6-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info Beamline 6-ID-D Beamline 6-ID-D is operated by the Magnetic Materials Group in the X-ray Science Division (XSD) of the Advanced Photon Source. This is a high energy (50 - 130 keV) beamline used for structural studies primarily on single crystal materials. Recent Research Highlights LuFeO Unlikely route to ferroelectricity May 16, 2012 A new type of ferroelectric, LuO2Fe4, has been investigated at the APS by a research team from Julich research center. XAS & XMCD studies on beamline 4-ID-C determined the Fe magnetism and valence, while single crystal x-ray scattering measurements at 6-ID-B & 6-ID-D probed the associated structural and charge ordering.

65

Information compression for remote readable ID tags  

Science Journals Connector (OSTI)

Optical identity (ID) tags have been introduced and described to achieve remote target recognition and identification. Optical ID tags usually contain encrypted signatures to be read out, decrypted and verified. In this paper, new features are introduced so that ID tags can be reliably used for remote detection and verification even if the captured tag is extremely degraded by perspective or optical distortion. Optimization of the ID tag size as well as the number of bits required to display the complex-amplitude information are analysed and discussed. The highest compression of grey levels, which corresponds to binary ID tags, is studied. Decryption and verification results are provided to analyse the possibilities of the newly designed optical ID tags.

Sergi Horrillo; Elisabet Prez-Cabr; Mara S Milln

2010-01-01T23:59:59.000Z

66

Data Coding  

Science Journals Connector (OSTI)

Data coding is the classification of data and assignment of arepresentation for that data, or the assignment of aspecific code...

2008-01-01T23:59:59.000Z

67

College of Design ID Interior Design  

E-Print Network (OSTI)

College of Design ID Interior Design KEY: # = new course * = course changed = course dropped University of Kentucky 2013-2014 Undergraduate Bulletin 1 ID 101 INTRODUCTION TO INTERIOR DESIGN. (1) An introduction to the profession of Interior Design: historical perspective, career specializations, and career

MacAdam, Keith

68

2/21/2014 terragreen.teriin.org/popup.php?section_id=1905&category_id=10 http://terragreen.teriin.org/popup.php?section_id=1905&category_id=10 1/2  

E-Print Network (OSTI)

2/21/2014 terragreen.teriin.org/popup.php?section_id=1905&category_id=10 http://terragreen.teriin.org/popup.php in the material because of the durable nickel alloy and smart aerodynamic design. #12;2/21/2014 terragreen.teriin.org/popup.php?section_id=1905&category_id=10 http://terragreen.teriin.org/popup.php?section_id=1905&category_id=10 2/2 "The

Chiao, Jung-Chih

69

APS Beamline 6-ID-B,C  

NLE Websites -- All DOE Office Websites (Extended Search)

B,C Home B,C Home Recent Publications Beamline Info Optics Instrumentation Software User Info Beamline 6-ID-B,C Beamline 6-ID-B,C is operated by the Magnetic Materials Group in the X-ray Science Division (XSD) of the Advanced Photon Source. Research on this beamline centers on general x-ray scattering studies of materials. The beamline has 2 end-stations: 6-ID-B: Psi -Diffractomter & In-Field Studies 6-ID-C: UHV in-situ growth Recent Research Highlights LSMO pictures Searching for Next-Generation Electronic Materials December 14, 2009 A new class of layered oxide materials discovered thanks to research at the beamline 6-ID-B offers scientists unprecedented opportunities for creating the next generation of electronic devices. Local Contact: Phil Ryan Local Contacts: Philip Ryan (Surface Diffraction) 630.252.0252 ryan@aps.anl.gov

70

Durability of Diesel Engine Particulate Filters (Agreement ID...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Durability of Diesel Engine Particulate Filters (Agreement ID:10461) Durability of Diesel Engine Particulate Filters (Agreement ID:10461) 2013 DOE Hydrogen and Fuel Cells Program...

71

DOE-ID Operations Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

January 6, 2014 January 6, 2014 DOE-ID Operations Summary For the Period November 01, 2013 through November 30, 2013 EDITOR'S NOTE: The following is a summary of contractor operations at the Idaho National Laboratory, managed by DOE- Idaho Operations Office. It has been compiled in response to a request from stakeholders for more information on health, safety and environmental incidents at DOE facilities in Idaho. It also includes a brief summary of accomplishments at the Site. POC -Danielle Miller, (208) 526-5709. Advanced Mixed Waste Treatment Project (AMWTP) Nothing to Report Notable Accomplishments: Contracting companies supporting EM's cleanup program and the Office of Nuclear Energy at the Idaho site volunteered to be among the first to use a new DOE

72

DOE-ID Operations Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

26, 2013 26, 2013 DOE-ID Operations Summary For the Period July 29, 2013 through August 12, 2013 EDITOR'S NOTE: The following is a summary of contractor operations at the Idaho National Laboratory, managed by DOE- Idaho Operations Office. It has been compiled in response to a request from stakeholders for more information on health, safety and environmental incidents at DOE facilities in Idaho. It also includes a brief summary of accomplishments at the Site. POC -Danielle Miller, (208) 526-5709. Advanced Mixed Waste Treatment Project (AMWTP) July 31, 2013: The Idaho Treatment Group, LLC (ITG), the managing contractor for the Advanced Mixed Waste Treatment Project received a warning letter from the State of Idaho's Department of Environmental quality regarding self- reported RCRA permit violations which

73

DOE-ID Operations Summary  

NLE Websites -- All DOE Office Websites (Extended Search)

18, 2013 18, 2013 DOE-ID Operations Summary For the Period September 30, 2013 through October 31, 2013 EDITOR'S NOTE: The following is a summary of contractor operations at the Idaho National Laboratory, managed by DOE- Idaho Operations Office. It has been compiled in response to a request from stakeholders for more information on health, safety and environmental incidents at DOE facilities in Idaho. It also includes a brief summary of accomplishments at the Site. POC -Danielle Miller, (208) 526-5709. Advanced Mixed Waste Treatment Project (AMWTP) October 15, 2013: A manager at the Advanced Mixed Waste Treatment Project (AMWTP) determined that the AMWTP Safety Analysis process required review due to an operational trend of fire/combustion events in the Treatment Facility (TF) box lines. Safety analysis for the TF is

74

GRR/Section 7-ID-c - Certificate of Public Convenience and Necessity | Open  

Open Energy Info (EERE)

GRR/Section 7-ID-c - Certificate of Public Convenience and Necessity GRR/Section 7-ID-c - Certificate of Public Convenience and Necessity < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 7-ID-c - Certificate of Public Convenience and Necessity 07IDCCertificateOfPublicConvenienceAndNecessity (1).pdf Click to View Fullscreen Contact Agencies Idaho Public Utilities Commission Regulations & Policies Idaho Code 61-526 IDAPA 31.01.01 Triggers None specified Click "Edit With Form" above to add content 07IDCCertificateOfPublicConvenienceAndNecessity (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Electrical corporations must receive a Certificate of Public Convenience

75

GRR/Section 14-ID-a - Nonpoint Source Pollution | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 14-ID-a - Nonpoint Source Pollution GRR/Section 14-ID-a - Nonpoint Source Pollution < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 14-ID-a - Nonpoint Source Pollution 14IDANonpointSourcePollution.pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality United States Environmental Protection Agency Regulations & Policies Clean Water Act Idaho Code Triggers None specified Click "Edit With Form" above to add content 14IDANonpointSourcePollution.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Environmental Quality (IDEQ) developed Idaho's

76

GRR/Section 19-ID-a - Water Access and Water Rights | Open Energy  

Open Energy Info (EERE)

19-ID-a - Water Access and Water Rights 19-ID-a - Water Access and Water Rights < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-ID-a - Water Access and Water Rights 19IDAWaterAccessAndWaterRightsIssues.pdf Click to View Fullscreen Contact Agencies Idaho Department of Water Resources Regulations & Policies Idaho Code Title 42 Triggers None specified Click "Edit With Form" above to add content 19IDAWaterAccessAndWaterRightsIssues.pdf 19IDAWaterAccessAndWaterRightsIssues.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Water Resources (IDWR) has the exclusive authority for regulation of appropriation of the public surface and ground waters of

77

Do we get actual vendor name while we searched with zip code...  

Open Energy Info (EERE)

Co has utility id 14006 located in Ohio". But I had also check the zip code in google earth, It falling in other state "Rincorn, PR". Please let me know? Submitted by SUTHARI on...

78

1-ID: Sector 1, Insertion Device Beamline  

NLE Websites -- All DOE Office Websites (Extended Search)

1-ID beamline schematic 1-ID beamline schematic ID on-axis brilliance values 1-ID - Sector 1, Insertion Device Beamline Responsible Scientists Jon Almer, phone: (630) 252-1049, e-mail: almer@aps.anl.gov Sarvjit Shastri, phone: (630) 252-0129, e-mail: shastri@aps.anl.gov John Okasinski, phone: (630) 252-0162, e-mail: okasinski@aps.anl.gov Peter Kenesei, phone: (630) 252-0133, e-mail: kenesei@aps.anl.gov Scientific Programs Coupled high-energy SAXS/WAXS studies (HE-SAXS/WAXS) High-energy diffraction microscopy (HEDM) Single-grain studies Stress/strain/texture studies Pair-distribution function (PDF) measurements High-energy fluorescence Source Characteristics Upstream insertion device: APS Undulator A No. of Poles 72 Undulator Period 3.3 cm Device Length 2.4 m Minimum Gap 11 mm Downstream insertion device

79

Property:WFSPTurbineID | Open Energy Information  

Open Energy Info (EERE)

WFSPTurbineID WFSPTurbineID Jump to: navigation, search Property Name WFSPTurbineID Property Type Number This is a property of type Number. Pages using the property "WFSPTurbineID" Showing 25 pages using this property. (previous 25) (next 25) A Alleghany High School Wind Project + 110,608 + Appanoose Elementary School Wind Project + 108,442 + Auburn-Washburn Wind Project + 105,237 + Avery County High School Wind Project + 110,607 + B Bancroft-Rosalie Public Schools Wind Project + 108,812 + Bloomfield Public Schools Wind Project + 110,699 + Burlington High School Wind Project + 107,678 + C CAES Wind Project + 105,329 + Cedar Rapids Wind Project + 105,272 + Cherry Valley Elementary School Wind Project + 120,342 + Concordia High School Wind Project + 108,482 +

80

Winter Study Rebate Form 2012 Date______________________________ ID #________________________________  

E-Print Network (OSTI)

Winter Study Rebate Form 2012 Date______________________________ ID to receive your rebate? Credit term account______ EPH Dollars_______ WINTER STUDY REBATES ARE GIVEN 10 consecutive calendar days are entitled to a rebate Rebates will be calculated on a per day basis

Aalberts, Daniel P.

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Winter Study Rebate Form 2013 Date______________________________ ID #________________________________  

E-Print Network (OSTI)

Winter Study Rebate Form 2013 Date______________________________ ID to receive your rebate? Credit term account______ EPH Dollars_______ WINTER STUDY REBATES ARE GIVEN 10 consecutive calendar days are entitled to a rebate Rebates will be calculated on a per day basis

Aalberts, Daniel P.

82

Id-1 and Id-2 genes and products as markers of epithelial cancer  

DOE Patents (OSTI)

A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

Desprez, Pierre-Yves (El Cerrito, CA); Campisi, Judith (Berkeley, CA)

2011-10-04T23:59:59.000Z

83

Id-1 and Id-2 genes and products as markers of epithelial cancer  

DOE Patents (OSTI)

A method for detection and prognosis of breast cancer and other types of cancer. The method comprises detecting expression, if any, for both an Id-1 and an Id-2 genes, or the ratio thereof, of gene products in samples of breast tissue obtained from a patient. When expressed, Id-1 gene is a prognostic indicator that breast cancer cells are invasive and metastatic, whereas Id-2 gene is a prognostic indicator that breast cancer cells are localized and noninvasive in the breast tissue.

Desprez, Pierre-Yves (El Cerrito, CA); Campisi, Judith (Berkeley, CA)

2008-09-30T23:59:59.000Z

84

Code constructions and code families for nonbinary quantum stabilizer code  

E-Print Network (OSTI)

Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

Ketkar, Avanti Ulhas

2005-11-01T23:59:59.000Z

85

RH-TRU Waste Content Codes  

SciTech Connect

The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code. Requests for new or revised content codes may be submitted to the WIPP RH-TRU Payload Engineer for review and approval, provided all RH-TRAMPAC requirements are met.

Washington TRU Solutions

2007-07-01T23:59:59.000Z

86

APS Beamline 6-ID-D  

NLE Websites -- All DOE Office Websites (Extended Search)

D Home D Home Recent Publications Beamline Info Optics Instrumentation Software User Info Beamline 6-ID-D Beamline 6-ID-D is operated by the Magnetic Materials Group in the X-ray Science Division (XSD) of the Advanced Photon Source. This is a high energy (50 - 130 keV) beamline used for structural studies primarily on single crystal materials. Recent Research Highlights A New Family of Quasicrystals A New Family of Quasicrystals June 24, 2013 Scientists from the U.S. Department of Energy's Ames Laboratory and Iowa State University have used the high energy x-rays available on beamline 6-ID-D, to confirm the structure of the only known magnetic rare earth icosahedral binary quasicrystals. Contacts: Alan Goldman & Paul Canfield - Iowa State Univ. & Ames Lab Local Contacts:

87

Requesting a Digital ID | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Requesting a Digital ID Requesting a Digital ID Requesting a Digital ID Step One - Registering with MIS To request a DOE Digital Identity you must first register in DOE's Management Information System (MIS) by going to https://mis.doe.gov, selecting "Requesting Access" and following the onscreen instructions. Note: DOE Federal employees are already registered and do not need to complete this step, they may skip to step 2. During the registration process you will be required to search for, and select, a DOE sponsor. Your DOE sponsor is the DOE federal employee that is certifying that you have a recognized relationship with the Department and have a valid need for a DOE Digital Identity. For contractors this person is often your Contract Task Manager, Contracting Officer's Representatives

88

Comparison of isotopic transmutation modelling codes  

E-Print Network (OSTI)

. STAMATELATOS, "Fission Product Data for Thermal Reactors Part 2: Users Manual for EPRI-CINDER Code and Data, " LA-6746-MS, Los Alamos National Laboratory (Dec. 1976). 5. H. BATEMAN, ~RGE~di gH gf ~t gym~id 6. M. J. BEIL, "ORIGEN ? The ORNL Isotope... Generation and Depletion Code, " ORNL-4628, Oak Ridge National Laboratory (May, 1973). 7. O. W. HERMANN and R. M. WESTFALL, "ORIGEN-S Scale System Module to Calculate Fuel Depletion, Actinide Transmutation, Fission Product. Buildup and Decay...

Beard, Carl Allen

1990-01-01T23:59:59.000Z

89

Department Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Department Codes Department Codes Code Organization BO Bioscience Department BU Business Development & Analysis Office DI Business Operations NC Center for Functional Nanomaterials CO Chemistry Department AD Collider Accelerator Department PA Community, Education, Government and Public Affairs CC Computational Science Center PM Condensed Matter Physics and Materials Science Department CI Counterintelligence AE Department of Energy DC Directorate - Basic Energy Sciences DK Directorate - CEGPA DE Directorate - Deputy Director for Operations DO Directorate - Director's Office DH Directorate - Environment, Safety and Health DF Directorate - Facilities and Operations DA Directorate - Global and Regional Solutions DB Directorate - Nuclear and Particle Physics DL Directorate - Photon Sciences

90

High Performance Reach Codes  

E-Print Network (OSTI)

Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

Edelson, J.

2011-01-01T23:59:59.000Z

91

Coded Data  

Science Journals Connector (OSTI)

An individual is given anumber and all that individual's data is encoded under that number so that the individual cannot be recognized. Data are then collated, analyzed and reported on ... the code to the pers...

2008-01-01T23:59:59.000Z

92

Applications of IDS: Mead's Challenge (What is  

E-Print Network (OSTI)

· Orientation · Adaptability · Dynamic motor skill acquisition #12;Derek Harter IJCNN 2005, IDS Workshop Aug 5 Connectionism / NN · Better understand biological basis of computation Penrose Quantum Computation · Actual quantum computation at cell level Mead (IJCNN 2005 Plenary) · Structure supports exponential scaling

Andras, Peter

93

Mercury Chamber NF-IDS Meeting  

E-Print Network (OSTI)

-Battelle for the U.S. Department of Energy Mercury Chamber Update Oct 2011 Starting Point: Coil and Shielding Concept IDS120H #12;3 Managed by UT-Battelle for the U.S. Department of Energy Mercury Chamber Update Oct 2011 · Penetrations (ports) into chamber ­ Nozzle ­ Hg drains (overflow and maintenance) ­ Vents (in and out) ­ Beam

McDonald, Kirk

94

ID3, SEQUENTIAL BAYES, NAIVE BAYES AND BAYESIAN NEURAL NETWORKS  

E-Print Network (OSTI)

to ID3. ID3 learning algorithm (Quinlan 1979) and its successors ACLS (Paterson & Niblett 1982), C4#cient in many learning tasks. It is shown how Sequential Bayes can be transformed into ID3 by replacing of network's execution (Kononenko 1989) enables the us­ age of a neural network as an expert system shell

Kononenko, Igor

95

T-731:Symantec IM Manager Code Injection Vulnerability | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code Injection Vulnerability. PLATFORM: IM Manager versions prior to 8.4.18 are affected. ABSTRACT: Symantec IM Manager is prone to a vulnerability that will let attackers run arbitrary code. referecnce LINKS: Symantec Security Advisory SYM11-012 Symantec Security Updates Bugtraq ID: 49742 IMPACT ASSESSMENT: High Discussion: Symantec was notified of Cross-Site Scripting and Code injection/execution issues present in the Symantec IM Manager management console. The management console fails to properly filter/validate external inputs. Successful exploitation of SQL Injection or Remote Code execution might

96

GRR/Section 19-ID-b - Change Application Process | Open Energy Information  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » GRR/Section 19-ID-b - Change Application Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-ID-b - Change Application Process 19IDBChangeApplicationProcess (2).pdf Click to View Fullscreen Contact Agencies Idaho Department of Water Resources Regulations & Policies Idaho Code 42-222 Triggers None specified Click "Edit With Form" above to add content 19IDBChangeApplicationProcess (2).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative A water right transfer is a change to a water right's point of diversion,

97

Fetal Gene Mutations Linked with Schizophrenia http://www.biospace.com/news_story.aspx?StoryID=275054&full=1[11/12/2012 12:17:09 PM  

E-Print Network (OSTI)

Post Job | Search Resumes | Login HOME CAREER NETWORK NEWS HOTBEDS EVENT CENTER CAREER FAIRS COMPANY Bookmarks Tweet Enter email Job Title, Keyword or Company Name City, State, or Postal Code Search News://www.biospace.com/news_story.aspx?StoryID=275054&full=1[11/12/2012 12:17:09 PM] eNewsletter Signup Keywords Location Browse Jobs Search Job Title

98

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

99

Facility Representative Program ID Selects FR of the Year  

NLE Websites -- All DOE Office Websites (Extended Search)

Facility Representative Program ID Selects Facility Representative Program ID Selects FR of the Year John Martin DOE-ID Facility Representative John Martin DOE-ID Facility Representative of the Year. John Martin was selected as DOE-ID's Facility Representative of the Year and the office's nominee for the 2007 DOE Facility Representative of the Year Award. John was selected from an exceptional field of candidates to represent DOE-ID at the Facility Representative Annual Workshop in Las Vegas this May. Each year the Department of Energy recognizes the Facility Representative whose achievements during the calendar year are most exemplary. A panel of senior personnel representing the Office of Health, Safety and Security (HSS) National Nuclear Security Administration (NNSA), Environmental Management (EM), Science (SC), Nuclear Energy (NE) and at least five

100

Microsoft Word - DOE-ID-INL-12-015.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15 15 SECTION A. Project Title: Materials and Fuels Complex Underground and Aboveground Storage Tank Replacement SECTION B. Project Description: The purpose of this project is to permanently close and remove the Materials and Fuels Complex (MFC) 4,000 gallon bio-diesel underground storage tank (UST) [Site ID# 7230/Facility ID # 6-120614/Tank ID # 99ANL00013] and remove the 1,000 gallon E-85 aboveground storage tank (AST) [Site ID# 7230/Facility ID# 6-120614/Tank ID# 05MFC00035] and replace the two tanks with a 10,000 gallon aboveground storage tank (AST) split tank (5,000 gallons for bio-diesel/5,000 gallons for E-85). The 4,000 gallon bio-diesel UST and the 1,000 gallon E-85 AST are located in the parking lot area near building MFC-701.

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Codes and Standards Activities  

Energy.gov (U.S. Department of Energy (DOE))

TheFuel Cell Technologies Office works with code development organizations, code officials, industry experts, and national laboratory scientists to draft new model codes and equipment standards...

102

Green Building Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Green Building Codes Green Building Codes Green building codes go beyond minimum code requirements, raising the bar for energy efficiency. They can serve as a proving ground for future standards, and incorporate elements beyond the scope of the model energy codes, such as water and resource efficiency. As regional and national green building codes and programs become more available, they provide jurisdictions with another tool for guiding construction and development in an overall less impactful, more sustainable manner. ICC ASHRAE Beyond Codes International Green Construction Code (IgCC) The International Code Council's (ICC's) International Green Construction code (IgCC) is an overlay code, meaning it is written in a manner to be used with all the other ICC codes. The IgCC contains provisions for site

103

ECE 4514-Fall 2003-Martin Name: _____________________ ID #: _____________________  

E-Print Network (OSTI)

of the plaintext letters in the unencrypted message. Thus someone trying to break the code often has to guess only keyword 3. Find letter frequencies in message to four decimal places, in BCD format. 4. Make a guess different ways to attempt it. Pseudo-code for integer division For function 3, you will need a division

Martin, Tom

104

2011 Annual Planning Summary for Idaho Operations Office (ID)  

Energy.gov (U.S. Department of Energy (DOE))

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within the Idaho Operations Office (ID) (See Environmental Management).

105

RAPID/Roadmap/8-ID-c | Open Energy Information  

Open Energy Info (EERE)

Information Desktop Toolkit BETA RAPID Toolkit About Bulk Transmission Geothermal Solar Resources Contribute Contact Us 8-ID-c Certificate of Public Convenience and...

106

Microsoft Word - DOE-ID-10-003.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Description The state of Idaho receives funding from the Department of Energy to conduct independent oversight and monitoring of DOE-ID operations. Oversight activities...

107

Entity Name: ABC Company Entity ID:  

Gasoline and Diesel Fuel Update (EIA)

Entity Name: Entity Name: ABC Company Entity ID: 00000 Data Year: 2013 State Include or exclude pre-arranged interruptions? 1 2 3 Do you capture outage records for events that initiate outside your system (customer system that causes di 4 5 6 7 8 Point to calculation in P1782: use percentages weighted based upon the classification of the circuit. 9 10 11 12 REWORD: The percent of customers automatically reported when they have lost power? e.g. SCADA, AMI, Etc. 13 SAIDI value (w/o Major Events included) FORM EIA-861 OMB No. 1905-0129 ANNUAL ELECTRIC POWER INDUSTRY REPORT

108

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

109

RH-TRU Waste Content Codes (RH-TRUCON)  

SciTech Connect

The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code. Requests for new or revised content codes may be submitted to the WIPP RH-TRU Payload Engineer for review and approval, provided all RH-TRAMPAC requirements are met.

Washington TRU Solutions

2007-05-30T23:59:59.000Z

110

RH-TRU Waste Content Codes (RH-TRUCON)  

SciTech Connect

The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code. Requests for new or revised content codes may be submitted to the WIPP RH-TRU Payload Engineer for review and approval, provided all RH-TRAMPAC requirements are met.

Washington TRU Solutions LLC

2007-08-01T23:59:59.000Z

111

Id-1 and Id-2 genes and products as therapeutic targets for treatment of breast cancer and other types of carcinoma  

DOE Patents (OSTI)

A method for treatment and amelioration of breast, cervical, ovarian, endometrial, squamous cells, prostate cancer and melanoma in a patient comprising targeting Id-1 or Id-2 gene expression with a delivery vehicle comprising a product which modulates Id-1 or Id-2 expression.

Desprez, Pierre-Yves; Campisi, Judith

2014-09-30T23:59:59.000Z

112

Introduction Properties of Expander Codes  

E-Print Network (OSTI)

of Expander Codes Our Results Conclusions Background Basic Definitions LDPC Codes Expander Codes Turbo CodesIntroduction Properties of Expander Codes Our Results Conclusions Expander Codes: Constructions, Haifa 32000, Israel. Vitaly Skachek Expander Codes: Constructions and Bounds #12;Introduction Properties

Skachek, Vitaly

113

DOE Code:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

we1rbox installatiOn we1rbox installatiOn ____:....;...=.~;;....:..;=-+- DOE Code: - - !- Project Lead: Wes R1esland NEPA COMPLIANCE SURVEY J 3-24-10 1 Date: Project Information 1. Project Overview What are tne enwonmental mpacts? Contractor~~ _ _ _ _ ] 11 The purpose of this project is to prepare a pad for a 90 ton crane to get 1nto positiOn and ng up so we can 1 set our new weir box into position We will widen the existing road around 20 feet at the north end and taper our fill to about5 feet at the south end for a total of about 200 feeL and budd a near level pad for them tong up the crane on We will use the d1rt from the hill irnrnedJateiy north of the work to oe done 2. 3 4 What*s the legal location? What IS the durabon of the prOJed?

114

IDS Climate Change and Development Centre Resources | Open Energy  

Open Energy Info (EERE)

IDS Climate Change and Development Centre Resources IDS Climate Change and Development Centre Resources Jump to: navigation, search Tool Summary Name: IDS Climate Change and Development Centre Resources Agency/Company /Organization: Institute of Development Studies Sector: Energy, Land Topics: Policies/deployment programs Resource Type: Workshop, Publications, Training materials, Lessons learned/best practices References: Institute of Development Studies CCDC[1] Logo: IDS Climate Change and Development Centre Resources CCDC promotes "collaborative research and policy analysis, delivering high quality research programmes, knowledge services, teaching and training." References ↑ "Institute of Development Studies CCDC" Retrieved from "http://en.openei.org/w/index.php?title=IDS_Climate_Change_and_Development_Centre_Resources&oldid=375095"

115

Identification of Staphylococcus species and subspecies with the MicroScan Pos ID and Rapid Pos ID panel systems.  

Science Journals Connector (OSTI)

...hybridization. The Pos ID panel uses a battery of 18 tests, and the Rapid Pos ID panel uses a battery of 42 tests for the identification of Staphylococcus...Johnson. 1969. A batch procedure for thermal elution of DNA from hydroxyapatite. Anal...

W E Kloos; C G George

1991-04-01T23:59:59.000Z

116

Beamline 4-ID-D Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 2012 2011 2010 2009 2008 All Sector 4 Pubs. APS Pubs. Database Recent 4-ID-D Publications Publications 2013:(13) "Classical and quantum phase transitions revealed using transport and x-ray measurements," Arnab Banerjee, Ph.D.-Thesis, University of Chicago, 2013. "Charge transfer and multiple density waves in the rare earth tellurides," A. Banerjee, Yejun Feng, D.M. Silevitch, Jiyang Wang, J.C. Lang, H.-H. Kuo, I.R. Fisher, T.F. Rosenbaum, Phys. Rev. B 87, 155131 (2013). "Local structure, stripe pinning, and superconductivity in La1.875Ba0.125CuO4 at high pressure," G. Fabbris, M. Hücker, G.D. Gu, J.M. Tranquada, D. Haskel, Phys. Rev. B 88, 060507(R) (2013). "Different routes to pressure-induced volume collapse transitions in

117

Beamline 6-ID-D Publications  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 2011 2010 2009 2008 All Sector 6 Pubs. APS Pubs. Database Recent 6-ID-D Publications Publications 2013:(24) "Controlling Size-Induced Phase Transformations Using Chemically Designed Nanolaminates," Matt Beekman, Sabrina Disch, Sergei Rouvimov, Deepa Kasinathan, Klaus Koepernik, Helge Rosner, Paul Zschack, Wolfgang S. Neumann, David C. Johnson, Angew. Chem. Int. Ed. 52, 13211 (2013). "Thermophysical and Structural Measurements of Liquid Metallic Alloys Using Electrostatic Levitation," James Christopher Bendert, Ph.D.-Thesis, Washington University , 2013. "Pair distribution function analysis of X-ray diffraction from amorphous spheres in an asymmetric transmission geometry: application to a Zr58.5Cu15.6Ni12.8Al10.3Nb2.8 glass," J.C. Bendert, N.A. Mauro, K.F. Kelton, J. Appl. Crystallogr. 46, 999

118

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

119

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

120

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Codes 101 | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101 Codes 101 This course covers basic knowledge of energy codes and standards, the development processes of each, historical timelines, adoption, implementation, and enforcement of energy codes and standards, and voluntary energy efficiency programs. Most sections have links that provide additional details on that section's topic as well as additional resources for more information. Begin Learning! Estimated Length: 1-2 hours CEUs Offered: 1.0 AIA/CES LU (HSW); .10 CEUs towards ICC renewal certification. Course Type: Self-paced, online Building Type: Commercial Residential Focus: Adoption Code Development Compliance Code Version: ASHRAE Standard 90.1 International Energy Conservation Code (IECC) Model Energy Code (MEC) Target Audience: Advocate Architect/Designer Builder

122

Property:HPBD/ProjectId | Open Energy Information  

Open Energy Info (EERE)

ProjectId ProjectId Jump to: navigation, search This is a property of type Number. Pages using the property "HPBD/ProjectId" Showing 25 pages using this property. (previous 25) (next 25) H High Performance Buildings Database + 203 + High Performance Buildings Database + 358 + High Performance Buildings Database + 71 + High Performance Buildings Database + 833 + High Performance Buildings Database + 247 + High Performance Buildings Database + 20 + High Performance Buildings Database + 498 + High Performance Buildings Database + 132 + High Performance Buildings Database + 194 + High Performance Buildings Database + 323 + High Performance Buildings Database + 50 + High Performance Buildings Database + 785 + High Performance Buildings Database + 223 +

123

DOE Hydrogen Analysis Repository: Codes & Standards Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes & Standards Analysis Codes & Standards Analysis Project Summary Full Title: Codes & Standards Analysis Project ID: 180 Principal Investigator: Michael Swain Brief Description: Conducts a building safety analysis for the California Fuel Cell Partnership including an assessment of safety issues related to garaged vehicles. Keywords: transportation; safety; hydrogen sensor; codes and standards Purpose To conduct a building safety analysis for the California Fuel Cell Partnership including an assessment of safety issues related to garaged vehicles. Performer Principal Investigator: Michael Swain Organization: University of Miami Address: McArthur Engineering Building, Room 224, P.O. Box 248294 Coral Gables, FL 33124 Telephone: 305-284-3321 Email: mswain@eng.miami.edu Project Description

124

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

125

Microsoft Word - DOE-ID-INL-13-025.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

No.: DOE-ID-INL-13-025 SECTION A. Project Title: Willow Creek Building Pedestrian Bridge Replacement SECTION B. Project Description: The purpose and need for the proposed...

126

Microsoft Word - DOE-ID-INL-14-044.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

DETERMINATIO Idaho National Laboratory Page 1 of 2 CX Posting No.: DOE-ID-INL-14-044 SECTION A. Project Title: Materials and Fuels Complex (MFC)-752 Analytical Laboratory Water...

127

RAPID/Roadmap/6-ID-b | Open Energy Information  

Open Energy Info (EERE)

6-ID-b Construction Storm Water Permit 06IDBConstructionStormwaterPermit.pdf Click to View Fullscreen Permit Overview Not provided Click "Edit With Form" above to add content...

128

RAPID/Roadmap/18-ID-c | Open Energy Information  

Open Energy Info (EERE)

8-ID-c Wastewater Pretreatment Permit 18IDCWastewaterPretreatmentPermit.pdf Click to View Fullscreen Permit Overview Industrial wastewater permits are issued at the local level. If...

129

Eastport, ID Natural Gas Pipeline Imports From Canada (Million...  

Gasoline and Diesel Fuel Update (EIA)

data. Release Date: 1302015 Next Release Date: 2272015 Referring Pages: U.S. Natural Gas Pipeline Imports by Point of Entry Eastport, ID Natural Gas Imports by Pipeline from...

130

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

131

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

132

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

133

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

134

GRR/Section 3-ID-e - Term Easement | Open Energy Information  

Open Energy Info (EERE)

e - Term Easement e - Term Easement < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-ID-e - Term Easement 03IDGTermEasement.pdf Click to View Fullscreen Contact Agencies Idaho Department of Lands Regulations & Policies IDPA 20.03.08 Idaho Code 58-603 Triggers None specified Click "Edit With Form" above to add content 03IDGTermEasement.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Lands (IDL) requires a Term Easement for access across state lands and for right of ways across state lands. Note, an easement is not required for lands covered under a Geothermal Lease.

135

Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite)  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Instructions: (e.g., Street Address, Bldg, Floor, Suite) Secure File Transfer option available at: (e.g., PO Box, RR) Electronic Transmission: The PC Electronic Data Reporting Option (PEDRO) is available. Zip Code: - If interested in software, call (202) 586-9659. Email form to: Fax form to: (202) 586-9772 - - Mail form to: Oil & Gas Survey - - U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 OOG.SURVEYS@eia.doe.gov Contact Name: Version No.: 2013.01 Date of this Report: Mo Day State: Year Phone No.: DOMESTIC CRUDE OIL FIRST PURCHASE REPORT Company Name: A completed form must be filed by the 30th calendar day following the end of the report

136

Complete genome sequence of Conexibacter woesei type strain (ID131577T)  

SciTech Connect

The genus Conexibacter (Monciardini et al. 2003) represents the type genus of the family Conexibacteraceae (Stackebrandt 2005, emend. Zhi et al. 2009) with Conexibacter woesei as the type species of the genus. C. woesei is a representative of a deep evolutionary line of des-cent within the class Actinobacteria. Strain ID131577T was originally isolated from temperate forest soil in Gerenzano (Italy). Cells are small, short rods that are motile by peritrichous fla-gella. They may form aggregates after a longer period of growth and, then as a typical charac-teristic, an undulate structure is formed by self-aggregation of flagella with entangled bacteri-al cells. Here we describe the features of the organism, together with the complete sequence and annotation. The 6,359,369 bp long genome of C. woesei contains 5,950 protein-coding and 48 RNA genes and is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Glavina Del Rio, Tijana [U.S. Department of Energy, Joint Genome Institute; Copeland, A [U.S. Department of Energy, Joint Genome Institute; Tice, Hope [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Chen, Feng [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Bruce, David [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Ovchinnikova, Galina [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Chang, Yun-Juan [ORNL; Jeffries, Cynthia [Oak Ridge National Laboratory (ORNL); Chain, Patrick S. G. [Lawrence Livermore National Laboratory (LLNL); Meincke, Linda [Los Alamos National Laboratory (LANL); Sims, David [Los Alamos National Laboratory (LANL); Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute

2010-01-01T23:59:59.000Z

137

Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix B:  

U.S. Energy Information Administration (EIA) Indexed Site

Report Period: Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix B: Zip Code - Secure File Transfer option available at: - - - - Email form to: OOG.SURVEYS@eia.doe.gov Fax form to: (202) 586-9772 Email address: Oil & Gas Survey U.S. Department of Energy Ben Franklin Station PO Box 279 Washington, DC 20044-0279 Questions? Call toll free: 1-800-638-8812 1. Total Acquisitions (Enter the total volume of foreign crude oil acquired during the report month for importation into the United States. This is the sum of column (l), Part III, excluding resubmission.) 2. Offshore Inventories (Enter the total volume of foreign oil owned by the firm, for eventual importation into the United States which is held in storage outside the United States and/or is enroute to the United States as of the

138

1,CONTRACT ID CODE PAGE OF PAGES AMENDMENT OF SOLICITATION/MODIFICATIO...  

NLE Websites -- All DOE Office Websites (Extended Search)

jet fluidics, mixing, sampling, and transfer system operations; and 7. Demonstrating the PJM control strategy including logic and transition with prototypic equipment through the...

139

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1. CONTRACT ID CODE  

E-Print Network (OSTI)

OF AMENDMENT/MODIFICATION," continued. A. Office of Energy Science and Technology: The purpose of this contract.S. Department of Energy Pacific Northwest Site Office Post Office Box 350 Richland, WA 99352 8. NAME AND ADDRESS CONTRACT/ORDER IS MODIFIED TO REFLECT THE ADMINISTRATIVE CHANGES (such as changes in paying office

140

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 11. CONTRACT ID CODE  

E-Print Network (OSTI)

of Energy (DOE), Office of Science (SC), Pacific Northwest Site Office (PNSO) is modifying the Contract: Revise Part Ill, Section J -to delete Appendix F - Operational Agreement Between the Office of Science the Office of Science Pacific Northwe

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 11. CONTRACT ID CODE  

E-Print Network (OSTI)

The Department of Energy (DOE), Office of Science (SC), Pacific Northwest Site Office (PNSO) is modifying.S. Department of Energy Pacific Northwest Site Office Post Office Box 350 Richland, WA 99352 8. NAME AND ADDRESS (such as changes in paying office, appropriation date, etc.) SET FORTH IN ITEM 14, PURSUANT TO AUTHORITY

142

AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 1. CONTRACT ID CODE  

E-Print Network (OSTI)

/MODIFICATION," continued. A. Office of Science Nuclear Physics: The purpose of this contract modification is to deobligate funds under the American Recovery and Reinvestment Act of 2009 for the Office of Science Nuclear Physics.S. Department of Energy Pacific Northwest Site Office Post Office Box 350 Richland, WA 99352 8. NAME AND ADDRESS

143

11. CONTRACT ID CODE PAGE OF PAGES I AMENDMENT OF SOLICITATION...  

National Nuclear Security Administration (NNSA)

and effect. 15A. NAME AND TITLE OF SIGNER (Type or print) 16A. NAME AND TITLE OF CONTRACTING OFFICER (Type or print) Jill Y. Albaugh 15C. DATE SIGNED 16C. DATE SIGNED 15B....

144

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

145

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

146

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

147

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

148

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

149

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

150

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

151

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

152

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

153

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

154

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

155

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

156

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

157

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

158

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

159

Building Energy Software Tools Directory: ID-Spec Large  

NLE Websites -- All DOE Office Websites (Extended Search)

ID-Spec Large ID-Spec Large ID-Spec Large is software for the electrical installation design of industrial and tertiary buildings. It helps to design a green electrical installation by enabling the user to: - Assess the impact of selecting energy efficiency solutions like power factor correction and low losses transformers in terms of cost savings - Reduce power losses and consequently carbon emissions in the electrical installation by optimizing equipment locations - Reduce investment cost while using less raw materials by optimizing length and cross-section of cables - Assess the percentage of recyclable materials for cables and busbar trunking systems. Screen Shots Keywords Electrical installation design, power losses assessment, CO2 emissions, quantity of conductors

160

Microsoft Word - DOE-ID-INL-13-006.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID-NEPA CX DETERMINATION ID-NEPA CX DETERMINATION Idaho National Laboratory Page 1 of 3 EC Document No.: DOE-ID-INL-13-006 SECTION A. Project Title: Power Line Configuration 2013-1 SECTION B. Project Description: This project will install temporary distribution-level power lines between Materials and Fuels Complex (MFC) and Critical Infrastructure Test Range Complex (CITRC) to support research and development and testing using electric power infrastructure. Two circuits of three-phase distribution lines will be installed from Power Burst Facility (PBF)-613 to the MFC test pad. Standard new crossarms and insulators will be installed on the existing 138kV H structures (underbuild) to support standard aluminum conductors steel reinforced (ACSR) conductors for the majority of the configuration change (approximately from Pole 40E to Pole 127E - an

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Property:EiaUtilityId | Open Energy Information  

Open Energy Info (EERE)

EiaUtilityId EiaUtilityId Jump to: navigation, search This is a property of type String. Pages using the property "EiaUtilityId" Showing 25 pages using this property. (previous 25) (next 25) 3 3 Phases Energy Services + 21093 + 4 4-County Electric Power Assn + 6641 + A A & N Electric Coop + 84 + A & N Electric Coop (Virginia) + 84 + AEP Generating Company + 343 + AEP Texas Central Company + 3278 + AEP Texas North Company + 20404 + AES Eastern Energy LP + 134 + AGC Division of APG Inc + 261 + AP Holdings LLC + 56571 + AP Holdings LLC (New York) + 56571 + APN Starfirst, L.P. + 50153 + APN Starfirst, L.P. (Illinois) + 50153 + APN Starfirst, L.P. (Ohio) + 50153 + APN Starfirst, L.P. (Texas) + 50153 + APNA Energy + 55841 + ARCO Products Co-Watson + 867 +

162

Intergral Drive Systems AG IDS | Open Energy Information  

Open Energy Info (EERE)

Intergral Drive Systems AG IDS Intergral Drive Systems AG IDS Jump to: navigation, search Name Intergral Drive Systems AG (IDS) Place Zurich, Swaziland Zip CH-8005 Sector Wind energy Product Zurich based producer of power electronics systems for wind turbines, PV plants, and propulsion systems. Coordinates 47.37706°, 8.53955° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.37706,"lon":8.53955,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

163

Model Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

164

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

165

Building Energy Code  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

166

Coding AuthentiCity  

E-Print Network (OSTI)

This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

Mercier, Rachel Havens

2008-01-01T23:59:59.000Z

167

Introduction to Algebraic Codes  

E-Print Network (OSTI)

for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth

168

Sustainable Acquisition Coding System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

169

GENII Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Code GENII Code GENII is a second generation of environmental dosimetry computer code compiled in the Hanford Environmental Dosimetry System (Generation II). GENII provides a...

170

SEARLE SCHOLARS PROGRAM (http://www.searlescholars.net/go.php?id=23)  

E-Print Network (OSTI)

SEARLE SCHOLARS PROGRAM (http://www.searlescholars.net/go.php?id=23) The University of Pittsburgh at http://www.searlescholars.net/go.php?id=49. The University is invited to submit one nomination

Sibille, Etienne

171

Code of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Governance » Governance » Ethics, Accountability » Code of Conduct Code of Conduct Helping employees recognize and resolve the ethics and compliance issues that may arise in their daily work. Contact Code of Conduct (505) 667-7506 Code of Conduct LANL is committed to operating in accordance with the highest standards of ethics and compliance and with its core values of service to our nation, ethical conduct and personal accountability, excellence in our work, and mutual respect and teamwork. LANL must demonstrate to customers and the public that the Laboratory is accountable for its actions and that it conducts business in a trustworthy manner. What is LANL's Code of Conduct? Charlie McMillan 1:46 Laboratory Director Charlie McMillan introduces the code LANL's Code of Conduct is designed to help employees recognize and

172

Code Red 2 kills off Code Red 1  

E-Print Network (OSTI)

#12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

Paxson, Vern

173

Psychology Insight Taster Day with British Psychology Society (ID:325)  

E-Print Network (OSTI)

Psychology Insight Taster Day with British Psychology Society (ID:325) Outline The `Psychology and Lecturers aim to give a detailed picture of the various work within Psychology and the career/training options available. These are run in conjunction with the Welsh Branch of the British Psychological Society

Harman, Neal.A.

174

Psychology Taster Days in Schools and FE Colleges (ID:317)  

E-Print Network (OSTI)

Psychology Taster Days in Schools and FE Colleges (ID:317) Outline The University's Psychology department brings its students and staff to local schools and colleges to discuss studying psychology Psychology at Higher Education level. A pre-planned programme of events will focus on Psychology as a Science

Harman, Neal.A.

175

2012 -2013 BIRTH DATE VERIFICATION STUDENT NAME: SPU ID  

E-Print Network (OSTI)

an official copy of your Birth Certificate, Passport, or Driver's License with this form and we will update2012 - 2013 BIRTH DATE VERIFICATION STUDENT NAME: SPU ID: The date of birth reported on your Free Application for Federal Student Aid (FAFSA) does not match the date of birth reported in one of the following

Nelson, Tim

176

2013 -2014 BIRTH DATE VERIFICATION STUDENT NAME: SPU ID  

E-Print Network (OSTI)

an official copy of your Birth Certificate, Passport, or Driver's License with this form and we will update2013 - 2014 BIRTH DATE VERIFICATION STUDENT NAME: SPU ID: The date of birth reported on your Free Application for Federal Student Aid (FAFSA) does not match the date of birth reported in one of the following

Nelson, Tim

177

ORNL 2010-G00976/jcn UT-B ID 200802116  

E-Print Network (OSTI)

ORNL 2010-G00976/jcn UT-B ID 200802116 Detection of Latent Prints by Raman Imaging Technology, allowing the evidence to be visualized. The technology is capable of imaging latent prints on porous and non-porous surfaces, and is especially useful for prints that are low in oil (or "clean") and children

178

https://doyouliveunited.org 1. Enter you user ID  

E-Print Network (OSTI)

Search' button. 7. Enter you search terms for the agency of your choice and click on `Search'. #12;httpshttps://doyouliveunited.org 1. Enter you user ID: your email address Enter your password: welcome be different then the options listed here. 5. For a payroll pledge, enter the amount per pay or the total

179

Student ID Number Date of birth Cell Phone  

E-Print Network (OSTI)

Name Student ID Number Date of birth Cell Phone New Housing Student Current Housing Student All's phone Crime 2 Information about charges or crime convicted of Date of conviction Court convicted in Sentence received Probation dates Probation officer's name Probation officer's phone Consent: I authorize

Pantaleone, Jim

180

UCRL-ID-119170 LAWRENCE LIVERMORE NATIONAL LABORATORY  

E-Print Network (OSTI)

June 1995 UCRL-ID-119170 LAWRENCE LIVERMORE NATIONAL LABORATORY University of California · Livermore, California · 94550 Science on High-Energy Lasers: From Today to the NIF Richard W. Lee, Richard. WorkperformedundertheauspicesoftheU.S.DepartmentofEnergybyLawrenceLivermoreNationalLaboratoryunder Contract W-7405-Eng-48. #12

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

ORNL 2010-G00975/jcn UT-B ID 200802114  

E-Print Network (OSTI)

wastewater recycling ·· Electricity or hydrogen generation ·· Inexpensive ·· Versatile Potential Applications ·· Recycling of wastewater from cellulosic ethanol fermentation ·· Removal of inhibitors of the bioORNL 2010-G00975/jcn UT-B ID 200802114 Microbial Fuel Cells for Recycle of Process Water from

182

ORNL 2010-G00969/jcn UT-B ID 200802060  

E-Print Network (OSTI)

ORNL 2010-G00969/jcn UT-B ID 200802060 Carbon Nanotubes Grown on Various Fibers Technology Summary ORNL researchers invented a method for growing carbon nanotubes on the surfaces of various fiber materials, including quartz, carbon, and activated carbon fibers. These materials may have significant

183

Introduction to Health and Social Care (ID:250)  

E-Print Network (OSTI)

Introduction to Health and Social Care (ID:250) Outline This is a day event which will be designed will be given short talks from different staff about the various health and social care courses on offer details Learning outcomes: · The different health and social care courses offered at Swansea University

Harman, Neal.A.

184

Aquatic Chemistry Course Id: CHEM 605 (3 cr.)  

E-Print Network (OSTI)

Aquatic Chemistry Fall 2010 Course Id: CHEM 605 (3 cr.) Lecture: TR 3:40-5:20pm, REIC 165 of this course is to introduce students to the concepts and models used in aquatic chemistry while providing-base chemistry, complexation, precipitation-dissolution and reduction-oxidation reactions. Student Learning

Wagner, Diane

185

Article ID: Query Translation on the Fly in Deep Web  

E-Print Network (OSTI)

Article ID: Query Translation on the Fly in Deep Web Integration Jiang Fangjiao, Jia Linlin, Meng users to access the desired information, many researches have dedicated to the Deep Web (i.e. Web databases) integration. We focus on query translation which is an important part of the Deep Web integration

186

UGA ID Number Last Name First MI Academic Term THE UNIVERSITY OF GEORGIA  

E-Print Network (OSTI)

UGA ID Number Last Name First MI Academic Term THE UNIVERSITY OF GEORGIA APPLICATION TO MAKE LATE's Office UGA ID Number Last Name First MI Academic Term THE UNIVERSITY OF GEORGIA APPLICATION TO MAKE LATE's Office UGA ID Number Last Name First MI Academic Term THE UNIVERSITY OF GEORGIA APPLICATION TO MAKE LATE

Arnold, Jonathan

187

ATLAS ID Upgrade R&D Plan: Development of a Short-Strip Silicon Detector Module  

E-Print Network (OSTI)

ATLAS ID Upgrade R&D Plan: Development of a Short-Strip Silicon Detector Module and a Frontend of the optimum technology and layout of the tracking detectors for the upgraded ATLAS ID. The goal for the intermediate tracking region in the upgraded ATLAS ID. We anticipate that much of the work would then also

California at Santa Cruz, University of

188

Code loops in both parities  

Science Journals Connector (OSTI)

We present equivalent definitions of code loops in any characteristic p?0. The most natural definition is via combinatorial polarization, but we also show how to realize code loops by linear codes and as a class of symplectic conjugacy ... Keywords: Characteristic form, Code loop, Combinatorial polarization, Conjugacy closed loop, Doubly even code, Even code loop, Kronecker product, Moufang loop, Odd code loop, Self-orthogonal code, Small Frattini loop, Symmetric associator, Symplectic loop

Ale Drpal; Petr Vojt?chovsk

2010-06-01T23:59:59.000Z

189

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

190

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

191

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

192

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

193

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

194

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

195

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

196

Mechanical code comparator  

DOE Patents (OSTI)

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

197

Building Codes Resources  

Energy.gov (U.S. Department of Energy (DOE))

Some commercial and/or residential construction codes mandate certain energy performance requirements for the design, materials, and equipment used in new construction and renovations.

198

" Row: NAICS Codes;" " Column...  

U.S. Energy Information Administration (EIA) Indexed Site

2 Number of Establishments by Usage of General Energy-Saving Technologies, 2010;" " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within General Energy-Saving...

199

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2010;" " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

200

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

3 Number of Establishments by Usage of Cogeneration Technologies, 2002; " " Level: National Data; " " Row: NAICS Codes;" " Column: Usage within Cogeneration Technologies;" " Unit:...

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Tokamak Systems Code  

SciTech Connect

The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

1985-03-01T23:59:59.000Z

202

" Row: NAICS Codes;"  

U.S. Energy Information Administration (EIA) Indexed Site

Establishment","Onsite","per Establishment" "Code(a)","Subsector and Industry","(million sq ft)","(counts)","(sq ft)","(counts)","(counts)" ,,"Total United...

203

Codes and Standards  

Energy.gov (U.S. Department of Energy (DOE))

Currently, thirteen U.S. and two international standards development organizations (SDOs) are developing and publishing the majority of the voluntary domestic codes and standards. These...

204

" Row: NAICS Codes;" " ...  

U.S. Energy Information Administration (EIA) Indexed Site

1.3. Number of Establishments by Quantity of Purchased Electricity, Natural Gas, and Steam, 1998;" " Level: National Data; " " Row: NAICS Codes;" " Column: Supplier Sources of...

205

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

206

Microsoft Word - DOE-ID-INL-12-021.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE-ID-INL-12-021 DOE-ID-INL-12-021 SECTION A. Project Title: High Frequency Sounder - Permanent Installation at Water Reactor Research Test Facility (WRRTF) SECTION B. Project Description: The scope of this project is to construct and operate a 150-watt high frequency (HF) radio antenna (both transmit and receive) within the fenced area of the former Water Reactor Research Test Facility (WRRTF) to support various wireless test bed (WTB) activities and increase WTB capabilities by measuring the ionospheric characteristics of the region. The measurements are used to generate propagation maps of the ionosphere to graphically illustrate what HF frequencies are effective for communications. Construction is scheduled to take place in the August-September 2012 timeframe with operation beginning in October 2012.

207

Microsoft Word - DOE-ID-INL-13-007.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 EC Document No.: DOE-ID-INL-13-007 SECTION A. Project Title: Seismic Monitoring for Seismic Hazards Analyses SECTION B. Project Description: The Idaho National Laboratory (INL) Probabilistic Seismic Hazards Analysis (PSHA) Phase I - Data Collection and Evaluation project is being conducted by Battelle Energy Alliance (BEA) at the request of the U.S. Department of Energy Idaho Operations office (DOE-ID) and INL Management. The project is being conducted from FY-2013 to FY-2017. Earthquake data will be collected at seismic stations located near INL facility areas for at least two years using seismometers and for the long-term using accelerometers. Installation of the seismic stations is being funded by the INL PSHA - Data Collection and Evaluation project and, following completion of this project,

208

DOE-ID Procurement Services � the action team  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE-ID Procurement Services � the action team DOE-ID Procurement Services � the action team Passage of the American Recovery and Reinvestment Act of 2009 included billions of dollars in additional funding for energy efficiency improvements to U.S. homes and businesses. By early July, the U.S. Department of Energy was hard pressed to get that funding to the communities who needed it to reduce their power bills. That�s when DOE�s Office of Energy Efficiency asked the department�s Idaho Operations Office for support from DOE-ID�s Procurement Services team. Rapid response Pat Alexander-Johnson (top) and Jeff Fogg (bottom) are two highly-trained and experienced contract specialists with the U.S. Department of Energy's Idaho Operations Office. Within moments of receiving its orders, the 10-member team shifted into

209

Microsoft Word - DOE-ID-INL-12-024..doc  

NLE Websites -- All DOE Office Websites (Extended Search)

PostingNo.: DOE-ID-INL-12-024 PostingNo.: DOE-ID-INL-12-024 SECTION A. Project Title: Rigby Bus Lot Northwest Entrance SECTION B. Project Description: The purpose of the proposed action is to provide an additional bus entrance to the Rigby Park and Ride Bus Lot. A portion of chain link fencing (running east to west) on the northwest corner of the Rigby Park and Ride Bus Lot would be relocated to allow an opening off of the City of Rigby dirt access road so that buses may enter the Rigby Park and Ride Lot from the northwest. The existing fence material would then be placed across the City of Rigby dirt access road (running north and south). The new entrance would be for buses only. Approximately 4 to 6 buses would use this entrance. No personnel vehicles will have access. Buses would start using the new

210

Microsoft Word - DOE-ID-INL-12-012.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ECX Posting No.: DOE-ID-INL-12-012 ECX Posting No.: DOE-ID-INL-12-012 SECTION A. Project Title: Film Processing Project at Test Reactor Area (TRA)-678 SECTION B. Project Description The proposed action is to install a silver recovery unit to the film processor in the film processing area at TRA-678 for the purpose of minimizing waste generation and implementing pollution prevention. The proposed film processor (Kodak M-35A) generates approximately 90 ml of developer and 140 ml of fixer effluents per 17 inch film and approximately 40 gallons per hour of rinse water effluent. Developer and fixer effluents from the current film processing equipment are being collected in a Satellite Accumulation Area (SAA). The new equipment would eliminate the need for storing the effluent in the SAA by filtering silver from the effluent for recycling. The remaining

211

Microsoft Word - DOE-ID-INL-12-018.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

8 8 SECTION A. Project Title: Rexburg Bus Lot (B60-1789-D-NE) Lease Termination SECTION B. Project Description: The proposed activity will terminate the lease of approximately four bus spaces at the Rexburg Parking Lot (B60-1789-D-NE) at South 5 th West in Rexburg, ID on or about July 31, 2012 for cost savings and consolidation to the existing lot at Rigby, ID. A facility walkthrough by BEA personnel will be performed in order to ensure the facility is ready for turnover back to the owner. Approximate cost associated with the activity is estimated at $1,500.00. SECTION C. Environmental Aspects / Potential Sources of Impact: Transacting real property in Rexburg, Idaho and moving four buses to a lot in Rigby, Idaho will not affect any INL environmental

212

File:INL-geothermal-id.pdf | Open Energy Information  

Open Energy Info (EERE)

id.pdf id.pdf Jump to: navigation, search File File history File usage Idaho Geothermal Resources Size of this preview: 380 × 600 pixels. Full resolution ‎(3,458 × 5,456 pixels, file size: 1.67 MB, MIME type: application/pdf) Description Idaho Geothermal Resources Sources Idaho National Laboratory Authors Patrick Laney; Julie Brizzee Related Technologies Geothermal Creation Date 2003-11-01 Extent State Countries United States UN Region Northern America States Idaho File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:24, 16 December 2010 Thumbnail for version as of 12:24, 16 December 2010 3,458 × 5,456 (1.67 MB) MapBot (Talk | contribs) Automated upload from NREL's "mapsearch" data

213

Microsoft Word - DOE-ID-INL-12-018.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 SECTION A. Project Title: Rexburg Bus Lot (B60-1789-D-NE) Lease Termination SECTION B. Project Description: The proposed activity will terminate the lease of approximately four bus spaces at the Rexburg Parking Lot (B60-1789-D-NE) at South 5 th West in Rexburg, ID on or about July 31, 2012 for cost savings and consolidation to the existing lot at Rigby, ID. A facility walkthrough by BEA personnel will be performed in order to ensure the facility is ready for turnover back to the owner. Approximate cost associated with the activity is estimated at $1,500.00. SECTION C. Environmental Aspects / Potential Sources of Impact: Transacting real property in Rexburg, Idaho and moving four buses to a lot in Rigby, Idaho will not affect any INL environmental

214

Microsoft Word - DOE-ID-INL-12-021.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-ID-INL-12-021 DOE-ID-INL-12-021 SECTION A. Project Title: High Frequency Sounder - Permanent Installation at Water Reactor Research Test Facility (WRRTF) SECTION B. Project Description: The scope of this project is to construct and operate a 150-watt high frequency (HF) radio antenna (both transmit and receive) within the fenced area of the former Water Reactor Research Test Facility (WRRTF) to support various wireless test bed (WTB) activities and increase WTB capabilities by measuring the ionospheric characteristics of the region. The measurements are used to generate propagation maps of the ionosphere to graphically illustrate what HF frequencies are effective for communications. Construction is scheduled to take place in the August-September 2012 timeframe with operation beginning in October 2012.

215

Microsoft Word - DOE-ID-INL-12-003.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

EC Document No.: DOE-ID-INL-12-003 EC Document No.: DOE-ID-INL-12-003 SECTION A. Project Title: Auxiliary Canal Fill Project at Test Reactor Area (TRA)-670 SECTION B. Project Description: Although the ATR canal meets all design basis criteria, lessons learned following the earthquake and tsunami events at the Fukushima- Daiichi Nuclear Power Plant in March of 2011 indicate that an auxiliary water supply to the fuel storage canal with a fill connection located outside of the facility would have been valuable following the beyond design basis event. As a result of these lessons learned, the Department of Energy (DOE) has allocated additional funding to the Idaho National Laboratory (INL) to mitigate beyond design basis events similar to the Fukushima-Daiichi disaster. The Auxiliary Canal Fill Project is one of the projects being funded from this

216

Microsoft Word - DOE-ID-INL-12-012.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

ECX Posting No.: DOE-ID-INL-12-012 ECX Posting No.: DOE-ID-INL-12-012 SECTION A. Project Title: Film Processing Project at Test Reactor Area (TRA)-678 SECTION B. Project Description The proposed action is to install a silver recovery unit to the film processor in the film processing area at TRA-678 for the purpose of minimizing waste generation and implementing pollution prevention. The proposed film processor (Kodak M-35A) generates approximately 90 ml of developer and 140 ml of fixer effluents per 17 inch film and approximately 40 gallons per hour of rinse water effluent. Developer and fixer effluents from the current film processing equipment are being collected in a Satellite Accumulation Area (SAA). The new equipment would eliminate the need for storing the effluent in the SAA by filtering silver from the effluent for recycling. The remaining

217

Microsoft Word - DOE-ID-INL-10-020.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE-ID-INL-10-020 DOE-ID-INL-10-020 SECTION A. Project Title: Idaho National Laboratory (INL) Routine Maintenance Activities (Overarching) SECTION B. Project Description: The purpose of this overarching Environmental Checklist (EC) is to address activities that would meet the intent of the categorical exclusion (CX) B1.3 as described in 10 CFR 1021, Appendix B to Subpart D. These activities would consist of typical and non-typical types of actions, such as routine maintenance, minor modifications, and custodial service activities required to support safe and efficient plant operation, even if performed on an infrequent basis, and would occur on the INL Site and at those in town (Idaho Falls) facilities. These activities would be performed by INL Facility and Site Services personnel or off-site contractors. None of these activities would

218

Microsoft Word - DOE-ID-INL-13-007.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

8 8 EC Document No.: DOE-ID-INL-13-007 SECTION A. Project Title: Seismic Monitoring for Seismic Hazards Analyses SECTION B. Project Description: The Idaho National Laboratory (INL) Probabilistic Seismic Hazards Analysis (PSHA) Phase I - Data Collection and Evaluation project is being conducted by Battelle Energy Alliance (BEA) at the request of the U.S. Department of Energy Idaho Operations office (DOE-ID) and INL Management. The project is being conducted from FY-2013 to FY-2017. Earthquake data will be collected at seismic stations located near INL facility areas for at least two years using seismometers and for the long-term using accelerometers. Installation of the seismic stations is being funded by the INL PSHA - Data Collection and Evaluation project and, following completion of this project,

219

Microsoft Word - DOE-ID-INL-10-017.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-ID-INL-10-017 DOE-ID-INL-10-017 SECTION A. Project Title: ATR Complex Dial Room. SECTION B. Project Description: The proposed project is to construct and operate a new dial room at the Advanced Test Reactor Complex (ATR Complex) (formerly known as the Test Reactor Area [TRA]) in order to meet the U.S. Department of Energy Office of Nuclear Energy programmatic needs and to provide ongoing critical support at the Idaho National Laboratory (INL). The existing telecommunication and data systems located at the ATR Complex need to be updated to ensure the protection and continuity of telecommunications hardware and software property and provide reliability of communications and data connectivity. The new modular dial room facility will replace existing telecommunications systems equipment (telephony, optical transport, and data network infrastructure

220

Microsoft Word - DOE-ID-INL-10-020.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE-ID-INL-10-020 DOE-ID-INL-10-020 SECTION A. Project Title: Idaho National Laboratory (INL) Routine Maintenance Activities (Overarching) SECTION B. Project Description: The purpose of this overarching Environmental Checklist (EC) is to address activities that would meet the intent of the categorical exclusion (CX) B1.3 as described in 10 CFR 1021, Appendix B to Subpart D. These activities would consist of typical and non-typical types of actions, such as routine maintenance, minor modifications, and custodial service activities required to support safe and efficient plant operation, even if performed on an infrequent basis, and would occur on the INL Site and at those in town (Idaho Falls) facilities. These activities would be performed by INL Facility and Site Services personnel or off-site contractors. None of these activities would

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Microsoft Word - DOE-ID-INL-12-016.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No.: DOE-ID-INL-12-016 No.: DOE-ID-INL-12-016 SECTION A. Project Title: Reverse Osmosis System Removal SECTION B. Project Description: The project will remove a reverse osmosis water treatment system (FU-HA-101) from TAN 681 room 182. The system is out-of-service, with no intent of future use. Work will involve removal of the reverse osmosis system, and associated plumbing/piping and electrical lines and conduit. The project will clear the area of obstacles and tripping hazards associated with unused/unnecessary equipment and utilities. SECTION C. Environmental Aspects / Potential Sources of Impact: Generating and Managing Waste: Project activities will result in generation of an estimated 90 cubic ft. of low-level radioactive waste. Wastes will be characterized and dispositioned through Waste Generator Services. Reuse and recycling of materials will be practiced

222

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

223

Hydrogen Codes and Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes and Standards Codes and Standards James Ohi National Renewable Energy Laboratory 1617 Cole Blvd. Golden, CO 80401 Background The development and promulgation of codes and standards are essential if hydrogen is to become a significant energy carrier and fuel because codes and standards are critical to establishing a market-receptive environment for commercializing hydrogen-based products and systems. The Hydrogen, Fuel Cells, and Infrastructure Technologies Program of the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL), with the help of the National Hydrogen Association (NHA) and other key stakeholders, are coordinating a collaborative national effort by government and industry to prepare, review, and promulgate hydrogen codes and standards needed to expedite hydrogen infrastructure development. The

224

Residential Building Code Compliance  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 Residential Building Code Compliance: Recent Findings and Implications Energy use in residential buildings in the U.S. is significant-about 20% of primary energy use. While several approaches reduce energy use such as appliance standards and utility programs, enforcing state building energy codes is one of the most promising. However, one of the challenges is to understand the rate of compliance within the building community. Utility companies typically use these codes as the baseline for providing incentives to builders participating in utility-sponsored residential new construction (RNC) programs. However, because builders may construct homes that fail to meet energy codes, energy use in the actual baseline is higher than would be expected if all buildings complied with the code. Also,

225

Boeing issues smart ID cards to its employees  

Science Journals Connector (OSTI)

Boeing, one of the worlds leading aerospace companies, is embarking on an ambitious plan to roll out over 200,000 corporate smart ID cards to its staff globally. The project, once implemented, would be one of the worlds largest deployments of such technology by a private corporation. This is a short news story only. Visit www.compseconline.com for the latest computer security news.

2003-01-01T23:59:59.000Z

226

Web: http://dust.ess.uci.edu/prp/prp ids/prp ids.pdf NASA International Polar Year (IPY) Proposal Submitted: April 17, 2006  

E-Print Network (OSTI)

Web: http://dust.ess.uci.edu/prp/prp ids/prp ids.pdf NASA International Polar Year (IPY) Proposal Researchers and Postdocs on CRY- OLIST and on ESS Website. 6. 20070723: Registered for SPAC Workshop for potential collaborators/contributors: 1. Use CVS to obtain source to this proposal: cvs -d :ext:esmf.ess

Zender, Charles

227

ID09969_01_UCA195_3302_030513.raw:1 ID09969_01_UCA195_3302_030513.raw : 1  

E-Print Network (OSTI)

ID09969_01_UCA195_3302_030513.raw:1 ID09969_01_UCA195_3302_030513.raw : 1 INTRODUCTION-UPLC systems and ESI sources. To address these concerns, a prototype 150 um separation device was developed

Richardson, David

228

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT ID PAGE I OF 2  

National Nuclear Security Administration (NNSA)

/ ' / ' ID PAGE I OF 2 PAGES - . Albuquerque, NM 87185-5400 I Amarillo, TX 79120 I ( DE-AC04-00AL66620 10B. DATED (SEE ITEM 13) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & W ~ ~ C O X Technical Services Pantex, LLC 800 Main Street Lynchburg, VA 24505 2 . AMENDMENTIMODIFICATION NO. MI50 9A. AMENDMENT OF SOLICITATION NO. 9B. DATED (SEE ITEM 11) 10A. MODIFICATION OF CONTRACTIORDER NO. Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

229

AMENDMENT OF SOLlClTATlONlMODlFlCATlON OF CONTRACT ID PAGE I OF 2  

NLE Websites -- All DOE Office Websites (Extended Search)

/ ' / ' ID PAGE I OF 2 PAGES - . Albuquerque, NM 87185-5400 I Amarillo, TX 79120 I ( DE-AC04-00AL66620 10B. DATED (SEE ITEM 13) 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & W ~ ~ C O X Technical Services Pantex, LLC 800 Main Street Lynchburg, VA 24505 2 . AMENDMENTIMODIFICATION NO. MI50 9A. AMENDMENT OF SOLICITATION NO. 9B. DATED (SEE ITEM 11) 10A. MODIFICATION OF CONTRACTIORDER NO. Offers must acknowledge receipt of this amendment prior to the hour and date specified in the solicitation as amended, by one of the following methods: (a) By completing Items 8 and 15, and returning - copies of the amendment; (b) By acknowledging receipt of this amendment on each copy of the offer submitted; or (c) By separate letter or telegram which includes a reference to the solicitation and amendment numbers. FAILURE OF YOUR

230

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

231

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

232

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

233

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

234

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

235

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

236

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

237

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

238

Compiling Codes on Hopper  

NLE Websites -- All DOE Office Websites (Extended Search)

Compiling Codes Compiling Codes Compiling Codes on Hopper Overview Cray provides a convenient set of wrapper commands that should be used in almost all cases for compiling and linking parallel programs. Invoking the wrappers will automatically link codes with MPI libraries and other Cray system software. All MPI and Cray system include directories are also transparently imported. In addition the wrappers append the compiler's target processor arguments for the hopper compute node processors. NOTE: The intention is that programs are compiled on the login nodes and executed on the compute nodes. Because the compute nodes and login nodes have different operating systems, binaries created for compute nodes may not run on the login node. The wrappers mentioned above guarantee that

239

Code of Ethics  

Science Journals Connector (OSTI)

Acode of ethics clarifies the ethical principles that are followed in aspecific field. In this context we refer to the , formally adopted by the American Public Health Association in 2002. It is the first b...

2008-01-01T23:59:59.000Z

240

ANNOUNCEMENT: ZIP Code Information.  

Science Journals Connector (OSTI)

THE U. S. Post Office Department has announced that the use of ZIP Codes will be mandatory on all domestic addresses for subscriptions and other mailings by 1 January 1967. Accordingly, the American Institute of Physics has established a procedure for obtaining the necessary information. You are requested to follow this procedure exactly.First, do not submit a change of address request consisting merely of the addition of your ZIP Code. Second, if your address changes in any other way, do include the ZIP Code of the new address. Third, and most important, be sure to furnish your ZIP Code in accordance with instructions included with all renewal invoices and renewal orders which have been sent out by the AIP.Failure to conform to this procedure may result in delays.

1965-09-27T23:59:59.000Z

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Quantum error control codes  

E-Print Network (OSTI)

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

242

Joint design of multi-resolution codes and intra / inter- layer network coding  

E-Print Network (OSTI)

In this thesis, we study the joint design of multi-resolution (MR) coding and network coding. The three step coding process consists of MR source coding, layer coding and multi-stream coding. The source coding considers ...

Wang, Tong, S.M. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

243

Maine | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Maine Maine Last updated on 2013-11-04 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information As of September 28, 2011, municipalities over 4,000 in population were required to enforce the new code if they had a building code in place by August 2008. Municipalities under 4,000 are not required to enforce it unless they wish to do so and have the following options: 1. Adopt and enforce the Maine Uniform Building and Energy Code 2. Adopt and enforce the Maine Uniform Building Code (the building code without energy) 3. Adopt and enforce the Maine Uniform Energy Code (energy code only) 4. Have no code Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Maine (BECP Report, Sept. 2009)

244

Nested Quantum Error Correction Codes  

E-Print Network (OSTI)

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

245

Implementation of the REAL ID Act | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

recommendations of the 911 Commission, passed the REAL ID Act in an effort to reduce fraud and deter acts of terrorism using fraudulent identification. This Act sets minimum...

246

Annales Geophysicae, 23, 16031610, 2005 SRef-ID: 1432-0576/ag/2005-23-1603  

E-Print Network (OSTI)

Annales Geophysicae, 23, 1603­1610, 2005 SRef-ID: 1432-0576/ag/2005-23-1603 © European Geosciences

Paris-Sud XI, Université de

247

Human Cardiac High-Energy Phosphate Metabolite Concentrationsby ID-Resolved NMR Spectroscopy  

E-Print Network (OSTI)

Human Cardiac High-Energy Phosphate Metabolite Concentrationsby ID-Resolved NMR Spectroscopy Paul A myocytes can contribute no metabolite signal to the observed spectrum, the hypoth- esis

Atalar, Ergin

248

Alabama | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Adoption » Status of State Energy Code Adoption Adoption » Status of State Energy Code Adoption Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Alabama Last updated on 2013-05-31 Current News The Alabama Energy and Residential Codes Board adopted the 2009 International Energy Conservation Code (IECC) for Commercial Buildings and the 2009 International Residential Code (IRC) for Residential Construction. The new codes will become effective on October 1, 2012. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in Alabama (BECP Report, Sept. 2009)

249

Washington | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Washington Washington Last updated on 2013-11-05 Current News The Washington State Building Code Council recently completed deliberations on adoption and amendment of the 2012 codes. This includes adoption of the 2012 IECC with state amendments. The new codes became effective July 1, 2013. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information WA 2012 Nonresidential Codes Approved Compliance Tools Nonresidential Energy Code Compliance Tools Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2010 Effective Date 07/01/2013 Adoption Date 02/01/2013 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes Washington DOE Determination Letter, May 31, 2013 Washington State Certification of Commercial and Residential Building Energy Codes

250

Institute of Development Studies (IDS) | Open Energy Information  

Open Energy Info (EERE)

Institute of Development Studies (IDS) Institute of Development Studies (IDS) Jump to: navigation, search Logo: Institute of Development Studies Name Institute of Development Studies Address Library Road, Brighton, East Sussex Place Brighton, UK Zip BN1 9RE Number of employees 201-500 Year founded 1966 Phone number +44 (0)1273 606261 Coordinates 50.8659583°, -0.0901136° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.8659583,"lon":-0.0901136,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

251

Building Energy Codes Fact Sheet  

Energy.gov (U.S. Department of Energy (DOE))

Building energy codes have been in place for over 20 years. Today's codes are providing energy savings of more than 30% compared to the codes of a decade ago. They're also saving consumers an estimated $5 billion annually as of 2012. Since 1992, building codes have saved about 300 million tons of carbon cumulatively. Read the fact sheet below to learn more about the Building Technologies Office's Building Energy Codes program.

252

Coding for Cooperative Communications  

E-Print Network (OSTI)

develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

Uppal, Momin Ayub

2011-10-21T23:59:59.000Z

253

RAPID/Roadmap/5-ID-a | Open Energy Information  

Open Energy Info (EERE)

for which an application has been filed. Any applicant who desires a hearing pursuant to Section 42-4004, Idaho Code, must file a written request therefor with the Director of the...

254

Last Revision Date: 8/16/2010 Last Merged Filing ID:  

NLE Websites -- All DOE Office Websites (Extended Search)

Revision Date: 8/16/2010 Last Merged Filing ID: Revision Date: 8/16/2010 Last Merged Filing ID: Tariffs, Rate Schedules, and Other Tariff Documents Southwestern Power Administration Tariffs, Rate Schedules, and Other Tariff Documents Document Generated On: 10/1/2010 Contents TABLE OF CONTENTS ....................................................................................................................................1 PREAMBLE: AUTHORITIES AND OBLIGATIONS .............................................................................................1

255

UNCORRECTEDPROOF SPB-190570 Chapter ID 19 August 4, 2010 Time: 01:07pm Proof 1  

E-Print Network (OSTI)

UNCORRECTEDPROOF SPB-190570 Chapter ID 19 August 4, 2010 Time: 01:07pm Proof 1 01 02 03 04 05 06 07, LLC 2011 #12;UNCORRECTEDPROOF SPB-190570 Chapter ID 19 August 4, 2010 Time: 01:07pm Proof 1 46 47 48. Most studies supporting the DOHaD hypoth- esis are primarily nutritional in nature, thus the potential

Blumberg, Bruce

256

The visualization of data and the user-interface in the Auto-ID World  

E-Print Network (OSTI)

This thesis proposes a framework for user interface (UI) design in the Auto-ID world. The thesis includes the examination of issues related to visualizing data to the user from a top-down perspective in the Auto-ID World. ...

Chandrasekhar, Chaitra

2005-01-01T23:59:59.000Z

257

Liberty Alliance Project: Version: 1.0 Liberty ID-WSF Security and Privacy  

E-Print Network (OSTI)

Liberty Alliance Project: Version: 1.0 Liberty ID-WSF Security and Privacy OverviewVersion: 1-idwsf-security-privacy-overview-v1.0.pdf Liberty Alliance Project 1 #12;Liberty Alliance Project: Version: 1.0 Liberty ID Alliance. Permission is hereby granted to11 use the document solely for the purpose of implementing

Landau, Susan

258

Section 23: Models and Computer Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Transport ID Implementation Document LHS Latin Hypercube Sampling NQA Nuclear Quality Assurance PA Performance assessment PABC Performance Assessment Baseline Calculation PEF...

259

Usage Codes Vessel name  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Vessel name Int'l radio call sign (IRCS) Generator Other: Max hoisting Sonar Power (Kw) KHz: KHz: VMS Usage Y / N GPS: Internal / external KHz: KHz: Ratio Accuracy (m Incinerator: Burned on board: Net sensors Hull mounted / towed Wired / wireless Y / N Y / N Usage Manufacturer

260

Usage Codes Additional Information  

E-Print Network (OSTI)

Usage Codes 1 5 2 6 3 7 4 8 Additional Information Winches (on deck) Electronics RPM: Max hoistingPresent? Usage Model Ratio Accuracy (m) Type: Electric / Hydraulic / Other _________________ KHz: GPS: Internal Other: Y / N Other: Y / N Y / NOther: Hydrophone Burned on board: Net sensors Usage Manufacturer High

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

The Woodland Carbon Code  

E-Print Network (OSTI)

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

262

Nebraska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Nebraska Nebraska Last updated on 2013-11-04 Current News Nebraska Legislature adopted the 2009 IECC/ASHRAE 90.1-2007. The code became effective August 27, 2011. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Cities and counties may adopt codes that differ from the Nebraska Energy Code; however, state law requires the adopted code to be equivalent to the Nebraska Energy Code. For existing buildings, only those renovations that will cost more than 50 percent of the replacement cost of the building must comply with the code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Nebraska (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

263

Summary | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Summary The impact of energy codes on our future is apparent. From environmental and resource conservation to national security, energy concerns, and our economic challenges, energy codes will continue to be a key component of a sound public policy. For further information on building energy code adoption, compliance, and enforcement, review the ACE toolkits Adoption Compliance Enforcement Popular Links ACE Learning Series ACE Overview Top 10 Reasons for Energy Codes Development of Energy Codes Adoption of Energy Codes Compliance with Energy Codes Enforcement of Energy Codes Going Beyond Code Summary Acronyms and Abbreviations Toolkit Definitions Adoption Toolkit Compliance Toolkit Enforcement Toolkit Contacts Web Site Policies U.S. Department of Energy USA.gov Last Updated: Thursday, January 31, 2013 - 15:19

264

Florida | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Florida Florida Last updated on 2013-11-18 Current News The triennial code change process is currently underway. Florida expects to be equivalent to ASHRAE 90.1-10 and IECC 2012 by early 2014. Commercial Residential Code Change Current Code State Specific Amendments / Additional State Code Information N/A Approved Compliance Tools Can use State specific EnergyGauge Summit FlaCom State Specific Research Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/15/2012 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Florida DOE Determination Letter, May 31, 2013 Florida State Certification of Commercial Building Codes Current Code State Specific Amendments / Additional State Code Information Florida Building Code

265

GRR/Section 3-ID-d - Land Use Permit | Open Energy Information  

Open Energy Info (EERE)

d - Land Use Permit d - Land Use Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-ID-d - Land Use Permit 03-ID-d - Land Use Permit.pdf Click to View Fullscreen Contact Agencies Idaho Department of Lands Triggers None specified Click "Edit With Form" above to add content 03-ID-d - Land Use Permit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Lands issues Land Use Permits for non-invasive exploration on a case by case basis. 3-ID-d.1 to 3-ID-d.2 - Will Non-Invasive Exploration Be Preformed on State Lands? A Land Use Permit is required to preform non-invasive exploration on state

266

Finding Utility Companies Under a Given Utility ID | OpenEI Community  

Open Energy Info (EERE)

Finding Utility Companies Under a Given Utility ID Finding Utility Companies Under a Given Utility ID Home > Groups > Developer Jayhuggins's picture Submitted by Jayhuggins(15) Member 22 June, 2012 - 09:39 Utility+Utility Access Map Here's a quick way to find all the utility company pages under a given utility id. From the Special Ask page, in the query box enter the following: [[Category:Utility Companies]][[EiaUtilityId::15248]] substituting your utility id of interest for 15248, and click "Find results". Groups: Developer Login to post comments Jayhuggins's blog Latest blog posts Rmckeel The utility rate database version 1 API is now deprecated Posted: 6 Sep 2013 - 14:00 by Rmckeel Jweers New Robust References! Posted: 7 Aug 2013 - 18:23 by Jweers 1 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group.

267

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

268

Id-1 gene and gene products as therapeutic targets for treatment of breast cancer and other types of carcinoma  

DOE Patents (OSTI)

A method for treatment of breast cancer and other types of cancer. The method comprises targeting and modulating Id-1 gene expression, if any, for the Id-1 gene, or gene products in breast or other epithelial cancers in a patient by delivering products that modulate Id-1 gene expression. When expressed, Id-1 gene is a prognostic indicator that cancer cells are invasive and metastatic.

Desprez, Pierre-Yves; Campisi, Judith

2014-08-19T23:59:59.000Z

269

Building Energy Codes 101: An Introduction | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101: An Introduction Codes 101: An Introduction In order to provide a basic introduction to the varied and complex issues associated with building energy codes, the U.S. Department of Energy's Building Energy Codes Program, with valued assistance from the International Codes Council and ASHRAE, has prepared Building Energy Codes 101: An Introduction. This guide is designed to speak to a broad audience with an interest in building energy efficiency, including state energy officials, architects, engineers, designers, and members of the public. Publication Date: Wednesday, February 17, 2010 BECP_Building Energy Codes 101_February2010_v00.pdf Document Details Last Name: Britt Initials: M Affiliation: PNNL Document Number: PNNL-70586 Focus: Adoption Code Development Compliance Building Type:

270

Compliance with Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance with Energy Codes Compliance with Energy Codes Energy code compliance must be achieved to realize the considerable benefits inherent in energy codes. BECP supports successful compliance by making no-cost compliance tools, REScheck(tm) and COMcheck(tm), and other resources widely available to everyone. BECP has also developed several resources to help states uniformly assess the rate of compliance with their energy codes for residential and commercial buildings. It is important to note that regardless of the level of enforcement, as a law the building owner/developer is ultimately responsible to comply with the energy code. Compliance will be increased if the adopting agency prepares the building construction community to comply with the energy code and provides resources to code officials to enforce it.

271

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

272

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

273

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

274

Density profile sensitivity study of ASDEX Upgrade ICRF Antennas with the TOPICA code  

SciTech Connect

During operation of the ASDEX Upgrade (AUG) ion cyclotron radio frequency (ICRF) system, Tungsten (W)-coated poloidal limiters and structures connected along magnetic field lines to the antenna can be sources of W, which is attributed to sputtering by ions accelerated in radio frequency (RF) sheaths. In order to analyze and optimize the ICRF antenna performance, accurate and efficient simulation tools are necessary. TOPICA code was developed for analysis of ICRF antenna systems with plasma loading conditions modeled with ID FELICE code. This paper presents an initial comparative analysis of two AUG ICRF antennas for a set of model plasma density profiles (with varying density gradient and antenna cut-off distance). The antennas are presently installed in AUG and differ in that one was partially optimized using HFSS code to reduce E{sub ||} near fields. Power transferred to plasma and sheath driving RF potentials are computed.

Krivska, A. [Associazione EURATOM-ENEA sulla fusione, CR-Frascati, Frascati, Rome (Italy); Czech Technical University, Telecommunication Engineering Department, Prague (Czech Republic); Ceccuzzi, S.; Tuccillo, A. A. [Associazione EURATOM-ENEA sulla fusione, CR-Frascati, Frascati, Rome (Italy); Milanesio, D.; Maggiora, R. [Department of Electronics, Politecnico di Torino, Torino (Italy); Bobkov, V.; Braun, F. [Max Planck-Institut fuer Plasmaphysik, Euratom Association, Garching (Germany); Noterdaeme, J.-M. [Max Planck-Institut fuer Plasmaphysik, Euratom Association, Garching (Germany); University of Gent, EESA Department, Gent (Belgium)

2011-12-23T23:59:59.000Z

275

Microsoft Word - DOE-ID_INL-13-010.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 SECTION A. Project Title: North Boulevard Annex Lease Termination SECTION B. Project Description: The proposed activity would terminate the current lease of the North Boulevard Annex (IF-613) at 2095 North Boulevard in Idaho Falls, ID on or about July 31, 2013 for cost savings and footprint reduction purposes. A facility walkthrough by BEA personnel will occur prior to the lease termination to ensure the facility is ready for turnover back to the owner. Approximate cost associated with these activities is estimated at $2,000.00. SECTION C. Environmental Aspects or Potential Sources of Impact: Generating and Managing Waste: Various quantities of industrial waste (non-hazardous, non-radioactive) such as office trash are removed from the building for pickup and transportation by garbage collection services prior to lease termination.

276

Microsoft Word - DOE-ID-INL-13-019.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 9 SECTION A. Project Title: University Boulevard Water Meter Installation SECTION B. Project Description: This project would install water meters for the purpose of measuring water use at each of four University Boulevard (UB) buildings at 535, 655, 625, and 595 University Boulevard (IF-680 (UB1), IF-681 (UB2), IF-682 (UB3), and IF-684 (UB4)) in Idaho Falls, ID during the projected time period of August and September, 2013 at an approximate cost of $20 K - $95 K depending upon whether the work can be completed from inside the building(s) or must be performed exterior to the building(s). SECTION C. Environmental Aspects or Potential Sources of Impact: Air Emissions: If excavation is required, the activity has the potential to generate fugitive dust. All reasonable precautions shall be

277

Microsoft Word - DOE-ID-INL-13-012.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 CX Posting No.: DOE-ID-INL-13-012 SECTION A. Project Title: Water Security Test Bed (WSTB) SECTION B. Project Description: This project was extensively described in Environmental Checklists (ECs) Idaho National Laboratory (INL)-13-014 (Overarching [OA] 5) and INL-13-014 Revision (R) 1 (OA 5). Upon review, it was determined that additional planning and detail was required to fully describe the project and associated activities. Both INL-13-014 and R1 to that EC are canceled; this EC will replace them. Future revisions may address additional project details regarding design, construction, and operational details and limitations as they become known through the project planning process. Background Since its inception, the Environmental Protection Agency's (EPA) Homeland Security Research Program (Sponsor) has been providing

278

Microsoft Word - DOE-ID-INL-13-006.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

3 3 EC Document No.: DOE-ID-INL-13-006 SECTION A. Project Title: Power Line Configuration 2013-1 SECTION B. Project Description: This project will install temporary distribution-level power lines between Materials and Fuels Complex (MFC) and Critical Infrastructure Test Range Complex (CITRC) to support research and development and testing using electric power infrastructure. Two circuits of three-phase distribution lines will be installed from Power Burst Facility (PBF)-613 to the MFC test pad. Standard new crossarms and insulators will be installed on the existing 138kV H structures (underbuild) to support standard aluminum conductors steel reinforced (ACSR) conductors for the majority of the configuration change (approximately from Pole 40E to Pole 127E - an

279

Microsoft Word - DOE-ID-INL-12-022.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

IDAHO NATIONAL LABORATORY Page 1 of 3 CX Posting No.: DOE-ID-INL-12-022 SECTION A. Project Title: Radiological Dispersal Device (RDD)/Improvised Nuclear Device (IND) Material Training Activities and Evaluations Using Radiation Emitting Sources/Material/Devices - Overarching SECTION B. Project Description This Environmental Checklist (EC) will be an overarching EC for future training as described in this EC. Work Description The purpose of this overarching EC is to plan, prepare, coordinate, ship materials off-site, observe, and conduct training for response to radiological incidents at the Idaho National Laboratory (INL) locations and non-INL customer-hosted locations (such as Armed Forces installations). Only work performed at the INL is covered under this EC. Training at non-INL customer-hosted locations may be subject

280

IdJOO2 UNITED STATES ENVIRONMENTAL PROTECTION AGENCY  

NLE Websites -- All DOE Office Websites (Extended Search)

6/2004 13:39 FAX 6/2004 13:39 FAX IdJOO2 UNITED STATES ENVIRONMENTAL PROTECTION AGENCY WASHINGTON, D.C. 20460 MAR 26 2004 OFFICE OF AIR AND RADIATION R. Paul Detwiler, Acting Manager Carlsbad Field Office U.S. Department of Energy P.O. Box 3090 Carlsbad, NM 88221-3090 Dear Dr. Detwiler: This letter announces the U.S. Environmental Protection Agency's (EPA's) final decision to approve the Department of Energy's (DOE's) remote handled (RH) transuranic (TRU) Waste Characterization Program Implementation Plan (WCPIP), Revision aD, and the RH TRU Waste Characterization Plan for the Waste Isolation Pilot Plant (WIPP). We have detenDined that these documents provide an adeql.late general framework for the characterization ofRH waste for disposal at WIPP, while allowing flexibility for DOE to develop characterization programs

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Microsoft Word - DOE-ID-INL-13-022.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

Idaho National Laboratory Idaho National Laboratory Page 1 of 2 CX Posting No.: DOE-ID-INL-13-022 SECTION A. Project Title: Global Threat Reduction Initiative (GTRI) Irradiated Experiment Shipping Capability SECTION B. Project Description: The General Electric (GE) 2000 Model Cask is currently used to support the Global Threat Reduction Initiative (GTRI) irradiated experiment shipments from the Advanced Test Reactor (ATR) at Idaho National Laboratory's (INL) ATR Complex to the Hot Fuel Examination Facility (HFEF) at INL's Materials and Fuels Complex (MFC). However, due to changes in GE-Hitachi's business model, the continued availability of the GE Model 2000 cask is not guaranteed. Furthermore, the internal cavity of the GE Model 2000 cask is too short to support shipment of some larger GTRI experiments. The purpose of the proposed action is to develop and implement a

282

Microsoft Word - DOE-ID-INL-12-023.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Checklist Environmental Checklist Page 1 of 1 CX Posting No.: DOE-ID-INL-12-023 SECTION A. Project Title: Idaho Falls Power - Willow Creek Building (WCB) Conduit Installation SECTION B. Project Description: The purpose of this project is to provide the Idaho National Laboratory (INL) a communications pathway from the Willow Creek Building (WCB) northeast parking lot handhole to the handhole north of Research and Education Campus (REC)-617. INL and the City of Idaho Falls have an existing easement agreement that allows INL to place private telecommunications infrastructure in the City easement. Idaho Falls Power would provide and install a 1" conduit with pull rope for future INL use. Idaho Falls Power would provide and install a fiber patch panel, pull the fiber coiled in the WCB northeast parking lot handhole, and terminate and test the fiber to provide connectivity

283

Microsoft Word - DOE-ID-INL-12-006.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 SECTION A. Project Title: International Way Office Building Lease Termination SECTION B. Project Description: The proposed activity will terminate the current lease of the International Way Office Building (IF-674, IWB) at 1690 International Way in Idaho Falls, ID on or about March 28, 2012 for cost savings and footprint reduction purposes. A facility walkthrough by BEA personnel will occur on or about March 26 to ensure the building is ready for turnover back to the owner. Approximate cost associated with these activities is estimated at $2,500.00. SECTION C. Environmental Aspects / Potential Sources of Impact: Generating and Managing Waste: Small amounts of industrial waste (non-hazardous, non-radioactive) such as office trash are

284

Microsoft Word - DOE-ID-INL-12-022.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IDAHO NATIONAL LABORATORY Page 1 of 3 CX Posting No.: DOE-ID-INL-12-022 SECTION A. Project Title: Radiological Dispersal Device (RDD)/Improvised Nuclear Device (IND) Material Training Activities and Evaluations Using Radiation Emitting Sources/Material/Devices - Overarching SECTION B. Project Description This Environmental Checklist (EC) will be an overarching EC for future training as described in this EC. Work Description The purpose of this overarching EC is to plan, prepare, coordinate, ship materials off-site, observe, and conduct training for response to radiological incidents at the Idaho National Laboratory (INL) locations and non-INL customer-hosted locations (such as Armed Forces installations). Only work performed at the INL is covered under this EC. Training at non-INL customer-hosted locations may be subject

285

Microsoft Word - DOE-ID-INL-13-008.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOEID NEPA CX DETERMINATION DOEID NEPA CX DETERMINATION Idaho National Laboratory Page 1 of 2 EC Document No.: DOE-ID-INL-13-008 SECTION A. Project Title: Materials and Fuels Complex (MFC) Diversion Dam SECTION B. Project Description: There is a flood control dam about 2000 ft south of MFC. The dam is at risk of failure during a large runoff event. This project will reinforce the flood control dam with additional earthen material and a concrete headwall around the culvert inlet. The workscope consists of 1) Removing riprap from the existing slope around the culvert area. 2) Installing a concrete headwall structure around the culvert inlet. 3) Increase the slope of the dam at the culvert inlet and around the headwall to a 3:1 slope. 4) Replace riprap around headwall.

286

Microsoft Word - DOE-ID-INL-13-008.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

DOEID NEPA CX DETERMINATION DOEID NEPA CX DETERMINATION Idaho National Laboratory Page 1 of 2 EC Document No.: DOE-ID-INL-13-008 SECTION A. Project Title: Materials and Fuels Complex (MFC) Diversion Dam SECTION B. Project Description: There is a flood control dam about 2000 ft south of MFC. The dam is at risk of failure during a large runoff event. This project will reinforce the flood control dam with additional earthen material and a concrete headwall around the culvert inlet. The workscope consists of 1) Removing riprap from the existing slope around the culvert area. 2) Installing a concrete headwall structure around the culvert inlet. 3) Increase the slope of the dam at the culvert inlet and around the headwall to a 3:1 slope. 4) Replace riprap around headwall.

287

Material Safety Data Sheet MSDS ID NO.: 0137SPE012  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Material Safety Data Sheet Material Safety Data Sheet MSDS ID NO.: 0137SPE012 Revision date: 05/25/2011 1. CHEMICAL PRODUCT AND COMPANY INFORMATION Product name: Speedway E85 Synonym: Speedway ED75/ED85; E-75; E75; E-85; E85; Ethanol/Gasoline Fuel Blend; Fuel Ethanol ED75/ED85 Chemical Family: Gasoline/Ethanol Formula: Mixture Manufacturer: Speedway LLC P.O. Box 1500 Enon, OH 45501 Other information: 419-421-3070 Emergency telephone number: 877-627-5463 2. COMPOSITION/INFORMATION ON INGREDIENTS E85 is a mixture of ethyl alcohol and gasoline that is approved for use in an automobile spark ignition engine. Can contain small amounts of dye and other additives (>0.02%) which are not considered hazardous at the concentrations used. Product information: Name CAS Number

288

Microsoft Word - DOE-ID-INL-12-023.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Checklist Environmental Checklist Page 1 of 1 CX Posting No.: DOE-ID-INL-12-023 SECTION A. Project Title: Idaho Falls Power - Willow Creek Building (WCB) Conduit Installation SECTION B. Project Description: The purpose of this project is to provide the Idaho National Laboratory (INL) a communications pathway from the Willow Creek Building (WCB) northeast parking lot handhole to the handhole north of Research and Education Campus (REC)-617. INL and the City of Idaho Falls have an existing easement agreement that allows INL to place private telecommunications infrastructure in the City easement. Idaho Falls Power would provide and install a 1" conduit with pull rope for future INL use. Idaho Falls Power would provide and install a fiber patch panel, pull the fiber coiled in the WCB northeast parking lot handhole, and terminate and test the fiber to provide connectivity

289

POST-DOCTORAL FELLOWSHIP IN HIGH ENERGY THEORY GROUP The BNL job link for BNL JOB ID#15942 is  

E-Print Network (OSTI)

POST-DOCTORAL FELLOWSHIP IN HIGH ENERGY THEORY GROUP The BNL job link for BNL JOB ID#15942 is" within the dropdown box -Click on Job ID #15942, "Research Associate, High Energy Theory (6482)" After: https://jobs.bnl.gov/psc/Jobs/EMPLOYEE/HRMS/c/HRS_HRAM.HRS_CE.GBL The description of BNL Job ID #15942

Johnson, Peter D.

290

Underground Storage Tank Integrated Demonstration (UST-ID). Technology summary  

SciTech Connect

The DOE complex currently has 332 underground storage tanks (USTs) that have been used to process and store radioactive and chemical mixed waste generated from weapon materials production. Very little of the over 100 million gallons of high-level and low-level radioactive liquid waste has been treated and disposed of in final form. Two waste storage tank design types are prevalent across the DOE complex: single-shell wall and double-shell wall designs. They are made of stainless steel, concrete, and concrete with carbon steel liners, and their capacities vary from 5000 gallons (19 m{sup 3}) to 10{sup 6} gallons (3785 m{sup 3}). The tanks have an overburden layer of soil ranging from a few feet to tens of feet. Responding to the need for remediation of tank waste, driven by Federal Facility Compliance Agreements (FFCAs) at all participating sites, the Underground Storage Tank Integrated Demonstration (UST-ID) Program was created by the US DOE Office of Technology Development in February 1991. Its mission is to focus the development, testing, and evaluation of remediation technologies within a system architecture to characterize, retrieve, treat to concentrate, and dispose of radioactive waste stored in USTs at DOE facilities. The ultimate goal is to provide safe and cost-effective solutions that are acceptable to the public and the regulators. The UST-ID has focused on five DOE locations: the Hanford Site, which is the host site, in Richland, Washington; the Fernald Site in Fernald, Ohio; the Idaho National Engineering Laboratory near Idaho Falls, Idaho; the Oak Ridge Reservation in Oak Ridge, Tennessee, and the Savannah River Site in Savannah River, South Carolina.

Not Available

1994-02-01T23:59:59.000Z

291

Adaptive code generators for tree coding of speech  

E-Print Network (OSTI)

Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

Dong, Hui

1998-01-01T23:59:59.000Z

292

SIID Tangible CONTROLLED OBJECT CODES: CAPITALIZED OBJECT CODES  

E-Print Network (OSTI)

vehicle 1811 - Motor Vehicle Other 1812 - Aircraft 1813 - Motor Vehicle (Natural Gas conversion -Passengers Cars 1814 - Motor Vehicles - Natural Gas Conversion-other 1820 - Boats 1841- Software > 100kSIID Tangible CONTROLLED OBJECT CODES: CAPITALIZED OBJECT CODES: Capital Objects Codes That Do

Hofmann, Hans A.

293

Methane Hydrates Code Comparison  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Comparison Code Comparison Set-up for Problem 7 (Long-term simulations for Mt Elbert and PBU L- Pad "Like" Deposits) As discussed in the phone conference held on 11/9/2007, it is proposed that Problem 7 be made up of three separate cases: Problem 7a will look at a deposit similar to the Mt Elbert site. Problem 7b will be based on the PBU L-Pad site, and Problem 7c will be a down-dip version of the L-Pad site. In all three cases, a standard set of parameters will be used based on those found in Problem 6 (the history matches to the MDT data). The parameters chosen were consensus values based on the experiences of the various groups in attempting to match the MDT data for the C2 formation at Mount Elbert. Given below are the detailed descriptions of the three problems and the proposed

294

Minnesota | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minnesota Minnesota Last updated on 2013-06-03 Current News The 2009 editions of the International Residential Code (IRC), International Building Code (IBC), and International Fire Code (IFC) will be published soon and the Construction Codes and Licensing Division and the State Fire Marshal Division have been discussing this adoption. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2004 with Amendments Amendments / Additional State Code Information Commercial Energy Code Approved Compliance Tools Compliance forms can be downloaded from ASHRAE State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Minnesota (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than ASHRAE 90.1-2004 Effective Date 06/01/2009

295

News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

News News A variety of resources and news from BECP, states, and other news sources are available for anyone interested in learning more about building energy codes. This includes newsletters, articles, links and more. To receive BECP News and other updates from the Building Energy Codes Program via email, join our mailing list. Featured Codes News DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Mayors Urge Cities to Strengthen Energy Code AZ Legislature Preserves Local Control of Building Energy Efficiency Codes Washington State Home Builders Lead the Nation in Energy Code Compliance Mississippi Invests in Future Growth With Adoption of Best-in-Class Energy Efficiency Legislation Energy 2030 Report Calls for Stricter Energy Building Codes

296

Michigan | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Michigan Michigan Last updated on 2013-06-03 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information 2009 Commercial MI Uniform Energy Code Rules Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Michigan (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 03/09/2011 Adoption Date 11/08/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Michigan DOE Determination Letter, May 31, 2013 Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 2009 Residential MI Uniform Energy Code Rules Approved Compliance Tools Can use REScheck

297

Nevada Energy Code for Buildings  

Energy.gov (U.S. Department of Energy (DOE))

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

298

Network coding for anonymous broadcast  

E-Print Network (OSTI)

This thesis explores the use of network coding for anonymous broadcast. Network coding, the technique of transmitting or storing mixtures of messages rather than individual messages, can provide anonymity with its mixing ...

Sergeev, Ivan A

2013-01-01T23:59:59.000Z

299

Matlab-Kinect Interface Code  

E-Print Network (OSTI)

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

300

Code of Practice Research Degrees  

E-Print Network (OSTI)

........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

Evans, Paul

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Georgia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Georgia Georgia Last updated on 2013-07-18 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use COMcheck Must choose ASHRAE 90.1-2007 as code option. State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Georgia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 01/01/2011 Adoption Date 11/03/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Georgia State Certification of Commercial and Residential Building Codes Extension Request Current Code 2009 IECC with Amendments Amendments / Additional State Code Information GA Amendments Approved Compliance Tools Can use REScheck

302

Robust LT codes with alternating feedback  

Science Journals Connector (OSTI)

In this paper, we propose robust LT codes with alternating feedback (LT-AF codes), which lightly utilize the feedback channel and surpass the performance of existing LT codes with feedback. In LT-AF codes, we consider a loss prone feedback channel for ... Keywords: Erasure channel, Feedback channel, Forward error correction codes, LT codes, Rateless codes

Ali Talari, Nazanin Rahnavard

2014-08-01T23:59:59.000Z

303

What's coming in 2012 codes  

E-Print Network (OSTI)

Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

Lacey, E

2011-01-01T23:59:59.000Z

304

2009 Solar Decathlon Building Code  

NLE Websites -- All DOE Office Websites (Extended Search)

BUILDING CODE Last Updated: September 29, 2008 2009 Solar Decathlon Building Code i September 29, 2008 Contents Section 1. Introduction ............................................................................................................................................................. 1 Section 2. Adopted Codes ........................................................................................................................................................ 1 Section 3. Building Planning and Construction .............................................................................................................. 1 3-1. Fire Protection and Prevention ................................................................................................................................. 1

305

Rotationally invariant multilevel block codes  

E-Print Network (OSTI)

The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use of non-binary codes...

Kulandaivelu, Anita

2012-06-07T23:59:59.000Z

306

A short Id2 protein fragment containing the nuclear export signal forms amyloid-like fibrils  

SciTech Connect

The negative regulator of DNA-binding/cell-differentiation Id2 is a small protein containing a central helix-loop-helix (HLH) motif and a C-terminal nuclear export signal (NES). Whereas the former is essential for Id2 dimerization and nuclear localization, the latter is responsible for the transport of Id2 from the nucleus to the cytoplasm. Whereas the isolated Id2 HLH motif is highly helical, large C-terminal Id2 fragments including the NES sequence are either unordered or aggregation-prone. To study the conformational properties of the isolated NES region, we synthesized the Id2 segment 103-124. The latter was insoluble in water and only temporarily soluble in water/alcohol mixtures, where it formed quickly precipitating {beta}-sheets. Introduction of a positively charged N-terminal tail prevented aggressive precipitation and led to aggregates consisting of long fibrils that bound thioflavin T. These results show an interesting structural aspect of the Id2 NES region, which might be of significance for both protein folding and function.

Colombo, Noemi [Fakultaet fuer Chemie und Pharmazie, Universitaet Regensburg, Universitaetsstrasse 31, 93053 Regensburg (Germany); Schroeder, Josef [Institut fuer Pathologie, Zentrales EM-Labor, Fakultaet fuer Medizin, Universitaet Regensburg, Franz-Josef-Strauss-Allee 11, 93053 Regensburg (Germany); Cabrele, Chiara [Fakultaet fuer Chemie und Pharmazie, Universitaet Regensburg, Universitaetsstrasse 31, 93053 Regensburg (Germany)]. E-mail: chiara.cabrele@chemie.uni-regensburg.de

2006-07-21T23:59:59.000Z

307

MATH 406/806 Introduction to Coding Theory  

E-Print Network (OSTI)

, convolutional codes, turbo codes, expander codes, low-density parity-check (LDPC) codes. References: R.M. Roth

Offin, Dan

308

Southeast Energy Efficiency Alliance's Building Energy Codes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

309

Cal. Wat. Code 13376 | Open Energy Information  

Open Energy Info (EERE)

Wat. Code 13376Legal Abstract Cal. Wat. Code 13376, current through August 14, 2014. Published NA Year Signed or Took Effect 2014 Legal Citation Cal. Wat. Code 13376...

310

Development | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Printable Version Printable Version Development Commercial Residential Adoption Compliance Regulations Resource Center Development The U.S. Department of Energy (DOE) supports and participates in the model building energy code development processes administered by the ASHRAE and the International Code Council (ICC). DOE activities include developing and submitting code change proposals, conducting analysis of building energy efficiency and cost savings, and formulating underlying evaluation methodologies. Through participation in model energy code development for both commercial and residential buildings, DOE strives to make cost-effective, energy efficient upgrades to current model codes. DOE also establishes energy efficiency standards for federal buildings and manufactured housing. Further information on this process is defined under

311

Energy Codes at a Glance  

SciTech Connect

Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energys Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

Cole, Pamala C.; Richman, Eric E.

2008-09-01T23:59:59.000Z

312

Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding  

E-Print Network (OSTI)

to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

Yang, Yang

2005-11-01T23:59:59.000Z

313

Pennsylvania | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Pennsylvania Pennsylvania Last updated on 2013-11-05 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Pennsylvania (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 12/31/2009 Adoption Date 12/10/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Pennsylvania DOE Determination Letter, May 31, 2013 Pennsylvania State Certification of Commercial and Residential Building Energy Codes Current Code 2009 IECC Amendments / Additional State Code Information Pennsylvania's current residential code is the 2009 IECC, 2009 IRC, Chapter 11, and/or PA-Alt. Adherence to Pennsylvania's Alternative Residential Energy Provisions 2009 is an acceptable means of demonstrating compliance with the energy conservation code requirements of the Uniform Construction Code.

314

Ohio | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Ohio Ohio Last updated on 2013-10-21 Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Ohio's commercial code is the 2009 IECC with a direct reference to ASHRAE 90.1-07. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Ohio (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 11/01/2011 Adoption Date 03/07/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Ohio DOE Determination Letter, May 31, 2013 Ohio State Certification of Commercila and Residential Building Energy Codes Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Effective January 1, 2013 the residential code in Ohio is based on Chapter 11 of the 2009 IRC. It includes the 2009 IECC and state-specific alternative compliance paths. The 2013 Residential Code of Ohio (RCO) contains amendments to allow compliance to be demonstrated in three ways: (1) 2009 IECC; or (2) RCO Sections 1101 through 1104; or RCO Section 1105 ("The Ohio Homebuilder's Association Alternative Energy Code Option").

315

Kentucky | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Kentucky Kentucky Last updated on 2013-08-02 Current News Kentucky moves forward with the 2009 IECC by reference in their updated 2007 Kentucky Building Code. 2009 IECC is effective 3/6/2011 with mandatory compliance beginning 6/1/2011. Kentucky residential code was also updated to the 2009 IECC. The code is effective 7/1/2012 with an enforcement date of 10/1/2012. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Amendments are contained in the latest update to the 2007 Kentucky Building Code. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Kentucky (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC

316

Wyoming | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Wyoming Wyoming Last updated on 2013-06-03 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information The International Conference of Building Officials (ICBO) Uniform Building Code, which is based on the 1989 Model Energy Code (MEC), may be adopted and enforced by local jurisdictions. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE Standard 90.1-2007 for Commercial Buildings in the State of Wyoming (BECP Report, Sept. 2009) Approximate Energy Efficiency Less energy efficient than 2003 IECC Effective Date 08/13/2008 Code Enforcement Voluntary DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Wyoming DOE Determination Letter, May 31, 2013 Current Code None Statewide

317

GRR/Section 6-ID-b - Construction Storm Water Permit | Open Energy  

Open Energy Info (EERE)

6-ID-b - Construction Storm Water Permit 6-ID-b - Construction Storm Water Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 6-ID-b - Construction Storm Water Permit 06IDBConstructionStormwaterPermit.pdf Click to View Fullscreen Contact Agencies United States Environmental Protection Agency Triggers None specified Click "Edit With Form" above to add content 06IDBConstructionStormwaterPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative 6-ID-b.1 - EPA Construction General Permit Idaho does not have authority from the United States Environmental Protection Agency to issue a construction storm water permit. See Flowchart

318

GRR/Section 1-ID-a - Land Use Considerations | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 1-ID-a - Land Use Considerations GRR/Section 1-ID-a - Land Use Considerations < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 1-ID-a - Land Use Considerations 01IDALandUseConsiderations.pdf Click to View Fullscreen Triggers None specified Click "Edit With Form" above to add content 01IDALandUseConsiderations.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Add Text Print PDF Retrieved from "http://en.openei.org/w/index.php?title=GRR/Section_1-ID-a_-_Land_Use_Considerations&oldid=685536" Categories: Regulatory Roadmap State Sections Geothermal Regulatory Roadmap Sections

319

Comments on Docket ID: DOE-HQ-2011-0014 | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

on Docket ID: DOE-HQ-2011-0014 on Docket ID: DOE-HQ-2011-0014 Comments on Docket ID: DOE-HQ-2011-0014 This letter comprises the comments of the Pacific Gas and Electric Company (PG&E), Southern California Gas Company (SCGC), San Diego Gas and Electric (SDG&E), and Southern California Edison (SCE) in response to the U.S. Department of Energy's (DOE) Request for Information on Regulatory Burden. The signatories of this letter, collectively referred to herein as the California Investor Owned Utilities (CA IOUs) represent some of the largest utility companies in the Western United States, serving over 35 million customers. Comments on Docket ID: DOE-HQ-2011-0014 More Documents & Publications FINAL CA IOU Comment Letter RFI Regulatory Burden O:\IM-20\E-Government Program Office\FDMS\FDMS

320

GRR/Section 4-ID-a - State Exploration Process | Open Energy Information  

Open Energy Info (EERE)

4-ID-a - State Exploration Process 4-ID-a - State Exploration Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 4-ID-a - State Exploration Process 04IDAStateExplorationProcess.pdf Click to View Fullscreen Contact Agencies Idaho Department of Water Resources Triggers None specified Click "Edit With Form" above to add content 04IDAStateExplorationProcess.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative _ 4-ID-a.1 - Has the Environmental Process been Completed for Exploration? If an EA/EIS has not yet been completed for this portion of the project, the developer must first complete the applicable environmental process.

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Comments on Docket ID: DOE-HQ-2011-0014 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments on Docket ID: DOE-HQ-2011-0014 Comments on Docket ID: DOE-HQ-2011-0014 Comments on Docket ID: DOE-HQ-2011-0014 This letter comprises the comments of the Pacific Gas and Electric Company (PG&E), Southern California Gas Company (SCGC), San Diego Gas and Electric (SDG&E), and Southern California Edison (SCE) in response to the U.S. Department of Energy's (DOE) Request for Information on Regulatory Burden. The signatories of this letter, collectively referred to herein as the California Investor Owned Utilities (CA IOUs) represent some of the largest utility companies in the Western United States, serving over 35 million customers. Comments on Docket ID: DOE-HQ-2011-0014 More Documents & Publications FINAL CA IOU Comment Letter RFI Regulatory Burden O:\IM-20\E-Government Program Office\FDMS\FDMS

322

GRR/Section 8-ID-a - State Transmission | Open Energy Information  

Open Energy Info (EERE)

8-ID-a - State Transmission 8-ID-a - State Transmission < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 8-ID-a - State Transmission 08IDAStateTransmission.pdf Click to View Fullscreen Contact Agencies Idaho Public Utilities Commission Regulations & Policies IC §67-6508: Local Land Use Planning Duties IC §61-526: Certificate of Public Convenience and Necessity Triggers None specified Click "Edit With Form" above to add content 08IDAStateTransmission.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative 8-ID-a.1 - Will the Transmission Project Be Undertaken by a Public Utility?

323

COMPUTER SCIENCE AND ENGINEERING TRAVEL REIMBURSEMENT FORM Empl ID Name: Email  

E-Print Network (OSTI)

COMPUTER SCIENCE AND ENGINEERING TRAVEL REIMBURSEMENT FORM Empl ID Name: Email Address City Programming Languages Databases Robotics & Artificial Intelligence Education Software Engineering and GIS Systems and Security Presenting a paper or poster at this conference which acknowledges the sponsored

Minnesota, University of

324

Product traceability in the pharmaceutical supply chain : an analysis of the auto-ID approach  

E-Print Network (OSTI)

This thesis analyzes how the Auto-ID technology and information infrastructure will change the management and distribution of pharmaceutical products within the health care industry by enabling item level product traceability ...

Bellman, Attilio, 1967-

2003-01-01T23:59:59.000Z

325

Annales Geophysicae (2004) 22: 35833588 SRef-ID: 1432-0576/ag/2004-22-3583  

E-Print Network (OSTI)

Annales Geophysicae (2004) 22: 3583­3588 SRef-ID: 1432-0576/ag/2004-22-3583 © European Geosciences, and the equinoctial hypoth- esis in which the orientation of the Earth's axis of rotation relative to the Earth

Paris-Sud XI, Université de

326

Project ID: 35011 Title: The Floating Net Pen Transportation System Pilot Project  

E-Print Network (OSTI)

Project ID: 35011 Title: The Floating Net Pen Transportation System Pilot Project Sponsor: Columbia. Principal goals are to assess survival and straying at adulthood. Net pens are proposed as a low cost

327

Microsoft PowerPoint - ID 876 TourBooklet_revb_Geology [Compatibility...  

Office of Environmental Management (EM)

Bob Andrews Navarro-Intera December 10, 2014 Nevada National Security Site Underground Test Area (UGTA) Tour Page 2 Page 2Title ID 876 Tour Booklet 12102014 - Page 2 Log No....

328

Microsoft Word - 2013 (05-22-13) DOE-ID Operations Summary-13...  

NLE Websites -- All DOE Office Websites (Extended Search)

a discrepancy and lack of isolation of power supply in the starter cabinet. Equipment lockout and tagout was performed, and work was stopped immediately. NE-ID--BEA-ATR-2013-0011...

329

*Name: Date of Birth: Banner/Student ID # Social Security # Phone: Cell  

E-Print Network (OSTI)

Transmitted Infection Anemia Eye Disease (excluding glasses) Joint Disease/Injury Sickle Cell Trait*Name: Date of Birth: Banner/Student ID # Social Security # Phone: Cell Permanent Address: Home Age, contact: Name Relationship: Phone: Day____________________ Eve____________________ Cell

Gering, Jon C.

330

High-resolution x-ray diffraction microscopy of specifically labeled yeast cells (CXIDB ID 4)  

DOE Data Explorer (OSTI)

This is the first of five exposures of the same sample at different tilts. This one is at +0 degrees tilt. Check CXI IDs 4 to 8 for the complete set.

Nelson, Johanna

331

High-resolution x-ray diffraction microscopy of specifically labeled yeast cells (CXIDB ID 7)  

DOE Data Explorer (OSTI)

This is the fourth of five exposures of the same sample at different tilts. This one is at -15 degrees tilt. Check CXI IDs 4 to 8 for the complete set.

Nelson, Johanna

332

High-resolution x-ray diffraction microscopy of specifically labeled yeast cells (CXIDB ID 8)  

DOE Data Explorer (OSTI)

This is the fifth of five exposures of the same sample at different tilts. This one is at -30 degrees tilt. Check CXI IDs 4 to 8 for the complete set.

Nelson, Johanna

333

High-resolution x-ray diffraction microscopy of specifically labeled yeast cells (CXIDB ID 5)  

DOE Data Explorer (OSTI)

This is the second of five exposures of the same sample at different tilts. This one is at +15 degrees tilt. Check CXI IDs 4 to 8 for the complete set.

Nelson, Johanna

334

High-resolution x-ray diffraction microscopy of specifically labeled yeast cells (CXIDB ID 6)  

DOE Data Explorer (OSTI)

This is the third of five exposures of the same sample at different tilts. This one is at +30 degrees tilt. Check CXI IDs 4 to 8 for the complete set.

Nelson, Johanna

335

GrIDS A GRAPH BASED INTRUSION DETECTION SYSTEM FOR LARGE NETWORKS  

E-Print Network (OSTI)

or groups of hosts. By analyzing the characteristics of the activity graphs, GrIDS detects and reports under contract DOD DABT 63-93-C-0045. intra-networks intranets to share and disseminate internal

California at Davis, University of

336

J Forensic Sci, July 2004, Vol. 49, No. 4 Paper ID JFS2003303  

E-Print Network (OSTI)

J Forensic Sci, July 2004, Vol. 49, No. 4 Paper ID JFS2003303 Available online at: www. KEYWORDS: forensic science, Y-chromosome, single nucleotide polymorphism, SNP typing, Y-SNPs, SNa

337

Building Energy Codes News | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes News Building Energy Codes News News Category: National Policy DOE Activities and Methodology for Assessing Compliance With Building Energy Codes RFI Posted: Tuesday, August 6, 2013 On August 6, DOE published an RFI on its methodology for assessing code compliance into the Federal Register. Based on feedback received from the individual state compliance pilot studies in 2011-2012, the RFI seeks input on DOE's methodology and fundamental assumptions from the general public. Read the full article... Source: U.S. Department of Energy Building Energy Codes Program Energy 2030 Report Calls for Stricter Energy Building Codes Posted: Tuesday, February 12, 2013 The Alliance Commission on National Energy Efficiency Policy aims to double US energy productivity by 2030, and one of its many ways to achieve that

338

Top 10 Reasons for Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Top 10 Reasons for Energy Codes Top 10 Reasons for Energy Codes The projected energy savings attributable to energy codes translates into an estimated cumulative savings of 800 million metric tons of carbon dioxide by 2030-that's equivalent to removing 145 million vehicles from our nation's roadways. Here are the top 10 reasons for adopting and implementing energy codes. Today's global energy, economic, and environmental challenges necessitate a U.S. strategy identifying a suite of energy-efficiency-related initiatives that is implemented by the building industry and relevant stakeholders. Energy codes are a core component of that strategy and, in addition, have an impact on other strategies to improve our built environment. Energy Codes... SAVE money and help reduce needless consumption of energy to heat,

339

Arkansas | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Arkansas Arkansas Last updated on 2013-12-10 Current News ASHRAE 90.1-2007 became the effective commercial code in Arkansas on January 1, 2013. Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 with Amendments Amendments / Additional State Code Information Arkansas Supplements and Amendments Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Arkansas Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 01/01/2013 Adoption Date 01/13/2012 Code Enforcement Mandatory DOE Determination ASHRAE Standard 90.1-2007: Yes ASHRAE Standard 90.1-2010: No Energy cost savings for Arkansas resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $100 million annually by 2030.

340

Delaware | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Adoption Process State Technical Assistance Status of State Energy Code Adoption Compliance Regulations Resource Center Delaware Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information Agriculture structures are excluded. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Delaware (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 07/29/2009 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Delaware DOE Determination Letter, May 31, 2013 Delaware State Certification of Commercial and Residential Building Energy Codes

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Chapter 28 - Perceptual Audio Coding  

Science Journals Connector (OSTI)

Abstract Audio Coding has proliferated as a mainstream enabling digital technology for all types of applications that provide audio and multimedia to consumers using transmission or storage channels with limited capacity. Since its infancies in the eighties and early nineties, the technology behind low bitrate audio coding has developed rapidly until today. Nonetheless, the technology generations seen to date follow several common themes, including the use of time/frequency-domain processing, redundancy reduction (entropy coding), and irrelevancy removal through the pronounced exploitation of perceptual effects. The latter aspect is of paramount importance to the understanding and the performance of the coding systems and has gained more and more in importance over time. Starting from basic principles, this article provides an overview of methods for low bitrate perceptual audio coding and its evolution over time along with some related coding standards (e.g., mp3) and typical applications.

Jrgen Herre; Sascha Disch

2014-01-01T23:59:59.000Z

342

SEAMOPT - Stirling engine optimization code  

SciTech Connect

Experience is described with use of a fast-running Stirling engine optimization code developed at Argonne intended for public release. Stirling engine modeling is provided by the SEAM1 thermodynamic code. An interface was written to combine SEAM1 with a general optimization code and assess maximum component stress levels. Thus full engine thermodynamic and structural simulation is done during the optimization process. Several examples of the use of this code to optimize the GPU-3 engine are described. In one case efficiency was improved by over 25%.

Heames, T.J.; Daley, J.G.

1984-01-01T23:59:59.000Z

343

BPA Hotline & Codes of Conduct  

NLE Websites -- All DOE Office Websites (Extended Search)

Hotline & Codes of Conduct Pages default Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

344

FOUNDATION REVENUE OBJECT CODES LSU Foundation Revenue Object Codes  

E-Print Network (OSTI)

FOUNDATION REVENUE OBJECT CODES 4 page 1 LSU Foundation Revenue Object Codes 0F00 Foundation - Balance Forward 0F01 Foundation - Other Contributions 0F02 Foundation - State of Louisiana 0F03 Foundation - Corporate Contributions 0F04 Foundation - Corporate Match Contributions 0F05 Foundation - Individual

Harms, Kyle E.

345

Bureau of Construction Codes - 2009 Michigan Uniform Energy Code - Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

These rules take effect March 9, 2011 (By authority conferred on the director of the department of energy, labor, and economic growth by section 4 of 1972 PA 230, MCL 125.1504, and Executive Reorganization Order Nos. 2003-1 and 2008-20, MCL 445.2011 and MCL 445.2025) R 408.31087, R 408.31088, R 408.31089, and R 408.31090 of the Michigan Administrative Code are amended and R 408.31087a is added to the code as follows: PART 10a MICHIGAN UNIFORM ENERGY CODE R 408.31087 Applicable code. Rule 1087. Rules governing the energy efficiency for the design and construction of buildings and structures, not including residential buildings, shall be those contained in the international energy conservation code, 2009 edition, section 501.1 and the ASHRAE

346

4/2/2014 www.scienceworldreport.com/home/news/services/print.php?article_id=12131 http://www.scienceworldreport.com/home/news/services/print.php?article_id=12131 1/2  

E-Print Network (OSTI)

4/2/2014 www.scienceworldreport.com/home/news/services/print.php?article_id=12131 http://www.scienceworldreport.com/home/news/services/print.php fabrication foundry that took an initial interest #12;4/2/2014 www.scienceworldreport.com/home/news/services/print.php?article_id=12131 http://www.scienceworldreport.com/home/news/services/print.php?article_id=12131 2/2 in Rao's work

Chiao, Jung-Chih

347

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

348

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

349

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

350

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

351

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

352

Louisiana | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Louisiana Louisiana Last updated on 2013-08-02 Commercial Residential Code Change Current Code ASHRAE Standard 90.1-2007 Amendments / Additional State Code Information N/A Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Louisiana (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to ASHRAE 90.1-2007 Effective Date 07/20/2011 Adoption Date 07/20/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Louisiana DOE Determination Letter, May 31, 2013 Louisiana State Certification of Commercial and Residential Building Energy Codes Current Code 2006 IRC Amendments / Additional State Code Information Louisiana's current residential code is the 2006 IRC with direct reference to the 2006 IECC. All AC duct insulation is R6 instead of R8 and to include Section R301.2.1.1 of the 2003 edition of the IRC in lieu of Section R301.2.1.1 of the 2006 edition.

353

LFSC - Linac Feedback Simulation Code  

SciTech Connect

The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

Ivanov, Valentin; /Fermilab

2008-05-01T23:59:59.000Z

354

on education Code of Ethics  

E-Print Network (OSTI)

the forum Abroad on education Code of Ethics for Education Abroad #12;The Forum on Education Abroad Code of Ethics for Education Abroad Contents Page Section I Preamble 2 Section II Ethical Principles for Education Abroad 3 Section III Ethical Guidelines: Examples of Ethical Best 6 Practices for Education Abroad

Illinois at Chicago, University of

355

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network (OSTI)

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

356

Tennessee | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Tennessee Tennessee Last updated on 2013-08-02 Commercial Residential Code Change Current Code 2006 IECC Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Tennessee (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2006 IECC Effective Date 07/01/2011 Adoption Date 06/02/2011 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: No ASHRAE 90.1-2010: No Tennessee DOE Determination Letter, May 31, 2013 Tennessee State Certification of Commercial and Residential Building Energy Codes Current Code 2006 IECC Approved Compliance Tools Can use REScheck State Specific Research Impacts of the 2009 IECC for Residential Buildings in the State of Tennessee (BECP Report, Sept. 2009)

357

ALOHA Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ALOHA Code ALOHA Code ALOHA Code Central Registry Toolbox Code Version(s): V5.2.3 Code Owner: National Oceanic and Atmospheric Administration (NOAA) Description: The Arial Locations of Hazardous Atmospheres (ALOHA) is atmospheric dispersion model maintained by the Hazardous Materials Division of National Oceanic and Atmospheric Administration (NOAA). ALOHA is one of three separate, integrated software applications in the Computer-Aided Management of Emergency Operations (CAMEO) suite. While the other two software applications: Cameo is primarily a database application and Marplot is the mapping application. ALOHA is used primarily for the evaluations of the consequences of atmospheric releases of chemical species. In addition to safety analysis applications in the Department of Energy (DOE) Complex, ALOHA is applied

358

Alaska | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Printable Version Development Adoption Compliance Regulations Resource Center Alaska Last updated on 2013-12-10 Commercial Residential Code Change Current Code None Statewide Amendments / Additional State Code Information N/A Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Alaska (BECP Report, Sept. 2009) Approximate Energy Efficiency Effective Date Code Enforcement DOE Determination ASHRAE Standard 90.1-2007: No ASHRAE Standard 90.1-2010: No Energy cost savings for Alaska resulting from the state updating its commercial and residential building energy codes in accordance with federal law are significant, estimated to be on the order of nearly $50 million annually by 2030. Alaska DOE Determination Letter, May 31, 2013

359

GENII Code | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Code GENII Code GENII Code GENII is a second generation of environmental dosimetry computer code compiled in the Hanford Environmental Dosimetry System (Generation II). GENII provides a state-of-the-art, technically peer-reviewed, documented set of programs for calculating radiation dose and risk from radio nuclides released into the environment. The GENII System includes capabilities for calculating radiation doses following postulated chronic and acute releases. Version 2.10 is currently being evaluated for inclusion in the Central Registry. For more information on GENII to: http://radiologicalsciences.pnl.gov/resources/hardware.asp The GENII code-specific guidance report has been issued identifying applicable regimes in accident analysis, default inputs, and special

360

Massachusetts | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Massachusetts Massachusetts Last updated on 2013-11-04 Current News The BBRS voted to adopt the 2012 IECC and ASHRAE 90.1-2010 on July 9, 2013. They will be phased in over an extended concurrency period, and is expected to become the sole effective baseline energy code on July 1, 2014. Commercial Residential Code Change Current Code 2009 IECC with Amendments Amendments / Additional State Code Information 13.0 Energy Conservation- 2009 IECC Approved Compliance Tools State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Massachusetts (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 07/01/2010 Adoption Date 01/01/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: Yes

Note: This page contains sample records for the topic "id codes 000x" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Virginia | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Virginia Virginia Last updated on 2013-11-05 Current News BHCD/DHCD workgroups are currently meeting over the next 12+ months for the 2012 USBC/IECC regulatory process, with an anticipated effective date in early 2014. Commercial Residential Code Change Current Code 2009 IECC Amendments / Additional State Code Information Virginia's current code is the 2009 IECC with reference to ASHRAE 90.1-2007. Approved Compliance Tools Can use COMcheck State Specific Research Impacts of ASHRAE 90.1-2007 for Commercial Buildings in the State of Virginia (BECP Report, Sept. 2009) Approximate Energy Efficiency Equivalent to 2009 IECC Effective Date 03/01/2011 Adoption Date 07/26/2010 Code Enforcement Mandatory DOE Determination ASHRAE 90.1-2007: Yes ASHRAE 90.1-2010: No Virginia DOE Determination Letter, May 31, 2013

362

Ia(Sn2) and Id(Sn1) anation reactions of the aquapentaamminerhodium(III) ion  

Science Journals Connector (OSTI)

The anation of aquapentaamminerhodium(III) ion by HC2O 4 ? and C2O 4 2? proceeds according to an Id(Sn1) m...

R. van Eldik

1975-01-01T23:59:59.000Z

363

Building Technologies Office: Advancing Building Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes Building Energy Codes Printable Version Share this resource Send a link to Building Technologies Office: Advancing Building Energy Codes to someone by E-mail Share Building Technologies Office: Advancing Building Energy Codes on Facebook Tweet about Building Technologies Office: Advancing Building Energy Codes on Twitter Bookmark Building Technologies Office: Advancing Building Energy Codes on Google Bookmark Building Technologies Office: Advancing Building Energy Codes on Delicious Rank Building Technologies Office: Advancing Building Energy Codes on Digg Find More places to share Building Technologies Office: Advancing Building Energy Codes on AddThis.com... Popular Links Success Stories Previous Next Lighten Energy Loads with System Design. Warming Up to Pump Heat.

364

Building Energy Code | Open Energy Information  

Open Energy Info (EERE)

Code Code Jump to: navigation, search Building energy codes adopted by states (and some local governments) require commercial and/or residential construction to adhere to certain energy standards. While some governmental bodies have developed their own building energy codes, many use existing codes, such as the International Energy Conservation Code (IECC), developed and published by the International Code Council (ICC); or ASHRAE 90.1, developed by the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE). A few local building energy codes require certain commercial facilities to meet green building standards. [1] Building Energy Code Incentives CSV (rows 1 - 85) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

365

Business Models for Code Compliance | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Compliance Site Map Printable Version Development Adoption Compliance Basics Compliance Evaluation Software & Web Tools Regulations Resource Center Business Models for Code Compliance The U.S. Department of Energy is coordinating strategies and activities with companies, individuals, and government entities to demonstrate, quantify, and monetize energy code compliance and coordinate deployment at the local, state, and regional levels. Consumer Assurance through Code Compliance Energy efficiency measures in the buildings sector, if properly realized and captured, provide a tremendous opportunity to reduce energy consumption and expenditures. Yet currently there is a lack of assurance that buildings as designed realize the levels of energy efficiency established in the

366

San Francisco Building Code Amendments to the  

E-Print Network (OSTI)

occupancy types regulated by the San Francisco Building Code, including: A, B, E, F, H, I, L, M, R, S, and U1 2010 San Francisco Building Code Amendments to the 2010 California Green Building Standards Code (Omitting amendments to 2010 California Building Code and 2010 California Residential Code which do

367

About Building Energy Codes | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Compliance Compliance Regulations Resource Center About Building Energy Codes U.S. Energy Consumption by Sector (2011) Source: U.S. Energy Information Administration, Annual Energy Review According to the U.S. Energy Information Administration's Electric Power Annual, U.S. residential and commercial buildings account for approximately 41% of all energy consumption and 72% of electricity usage. Building energy codes increase energy efficiency in buildings, resulting in significant cost savings in both the private and public sectors of the U.S. economy. Efficient buildings reduce power demand and have less of an environmental impact. The Purpose of Building Energy Codes Energy codes and standards set minimum efficiency requirements for new and renovated buildings, assuring reductions in energy use and emissions over

368

Building Energy Codes Survey Tool  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes Program Codes Program Building Energy Codes Survey Tool The following surveys are available: No available surveys Please contact ( webmaster@energycode.pnl.gov ) for further assistance. English Albanian Arabic Basque Belarusian Bosnian Bulgarian Catalan Chinese (Simplified) Chinese (Traditional; Hong Kong) Chinese (Traditional; Taiwan) Croatian Czech Danish Dutch Dutch Informal English Estonian Finnish French Galician German German informal Greek Hebrew Hindi Hungarian Icelandic Indonesian Irish Italian Italian (formal) Japanese Korean Latvian Lithuanian Macedonian Malay Maltese Norwegian (Bokmal) Norwegian (Nynorsk) Persian Polish Portuguese Portuguese (Brazilian) Punjabi Romanian Russian Serbian Sinhala Slovak Slovenian Spanish Spanish (Mexico) Swedish Thai Turkish Urdu Vietnamese Welsh

369

DOE Patents Database - Widget Code  

Office of Scientific and Technical Information (OSTI)

Widget Inclusion Code Widget Inclusion Code Download and install the DOepatents widget by copying and pasting its HTML inclusion code.