National Library of Energy BETA

Sample records for incident command system

  1. ORISE: Incident Command System (ICS) Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Incident Command System (ICS) Training The Oak Ridge Institute for Science and Education (ORISE) supports the emergency response community by promoting interagency cooperation and...

  2. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    SciTech Connect (OSTI)

    NSTec Environmental Restoration

    2007-04-01

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS

  3. Command and Control during Security Incidents/Emergencies

    SciTech Connect (OSTI)

    Knipper, W.

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  4. Fuel cell system logic for differentiating between rapid and normal shutdown commands

    DOE Patents [OSTI]

    Keskula, Donald H.; Doan, Tien M.; Clingerman, Bruce J.

    2000-01-01

    A method of controlling the operation of a fuel cell system wherein each shutdown command for the system is subjected to decision logic which determines whether the command should be a normal shutdown command or rapid shutdown command. If the logic determines that the shutdown command should be a normal shutdown command, then the system is shutdown in a normal step-by-step process in which the hydrogen stream is consumed within the system. If the logic determines that the shutdown command should be a rapid shutdown command, the hydrogen stream is removed from the system either by dumping to atmosphere or routing to storage.

  5. ORISE: DeepwaterHorizon and Nuclear & Radiological Incidents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System's Incident Command System was utilized during the response, there were immense command and coordination challenges for the unified management team never before...

  6. Cyber Incidents Involving Control Systems

    SciTech Connect (OSTI)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to

  7. Empirical identification of user information requirements in command and control system evaluation

    SciTech Connect (OSTI)

    McCallum, M.C.; Bittner, A.C. Jr. ); Badalamente, R.V. )

    1990-06-01

    This paper summarizes a study that was conducted to address user information requirements for the Force Level Control System. It was the first in a series being conducted at the US Army Tactical Command and Control System Experimentation Site (AES). User information requirements were determined via monitoring and classification of communications during a command and control exercise, as well as through subsequent exercise participant input. Separate measures of observed communication frequency, rated importance, and rated perishability were obtained for a set of information elements that comprised a comprehensive taxonomy of tactical command and control communications content. Analyses were then conducted to explore the relationships between frequency, importance, and perishability as well as develop a comprehensive index of criticality. The resulting comprehensive index of criticality is intended to be used by systems developers in selecting the information to be conveyed and processed by the Force Level Control System. 2 refs., 2 figs.

  8. Detonation command and control

    DOE Patents [OSTI]

    Mace, Jonathan L.; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2015-11-10

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link therebetween. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  9. Detonation command and control

    DOE Patents [OSTI]

    Mace, Jonathan L.; Seitz, Gerald J.; Echave, John A.; Le Bas, Pierre-Yves

    2016-05-31

    The detonation of one or more explosive charges and propellant charges by a detonator in response to a fire control signal from a command and control system comprised of a command center and instrumentation center with a communications link there between. The fire control signal is selectively provided to the detonator from the instrumentation center if plural detonation control switches at the command center are in a fire authorization status, and instruments, and one or more interlocks, if included, are in a ready for firing status. The instrumentation and command centers are desirably mobile, such as being respective vehicles.

  10. Computerized Accident Incident Reporting System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Computerized Accident Incident Reporting System Computerized Accident Incident Reporting System CAIRS Database The Computerized Accident/Incident Reporting System is a database used to collect and analyze DOE and DOE contractor reports of injuries, illnesses, and other accidents that occur during DOE operations. CAIRS is a Government computer system and, as such, has security requirements that must be followed. Access to the database is open to DOE and DOE contractors. Additional information

  11. Implications of an Improvised Nuclear Device Detonation on Command and Control for Surrounding Regions at the Local, State and Federal Levels

    SciTech Connect (OSTI)

    Pasquale, David A.; Hansen, Richard G.

    2013-01-23

    This paper discusses command and control issues relating to the operation of Incident Command Posts (ICPs) and Emergency Operations Centers (EOCs) in the surrounding area jurisdictions following the detonation of an Improvised Nuclear Device (IND). Although many aspects of command and control will be similar to what is considered to be normal operations using the Incident Command System (ICS) and the National Incident Management System (NIMS), the IND response will require many new procedures and associations in order to design and implement a successful response. The scope of this white paper is to address the following questions: Would the current command and control framework change in the face of an IND incident? What would the management of operations look like as the event unfolded? How do neighboring and/or affected jurisdictions coordinate with the state? If the target areas command and control infrastructure is destroyed or disabled, how could neighboring jurisdictions assist with command and control of the targeted jurisdiction? How would public health and medical services fit into the command and control structure? How can pre-planning and common policies improve coordination and response effectiveness? Where can public health officials get federal guidance on radiation, contamination and other health and safety issues for IND response planning and operations?

  12. Job Launch Command: aprun

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aprun Job Launch Command: aprun You must use the aprun command to launch jobs on the Hopper compute nodes. Use it for serial, MPI, OpenMP, UPC, and hybrid MPI/OpenMP or hybrid MPI/CAF jobs. You should view the MAN pages for aprun on Hopper or you can see them here. Basic aprun Options OPTION DESCRIPTION -n Number of MPI tasks. -N (Optional) Number of tasks per Hopper Node. Default is 24. -d (Optional) Depth, or number of threads, per MPI task. Use this very important option in addition to

  13. An expert system for automating security incident assessment using OPS5 in an Ada environment

    SciTech Connect (OSTI)

    Canales, T.W.; Smart, J.C.

    1988-01-29

    An expert system that automatically assesses security incidents is being developed at Lawrence Livermore National Laboratory. The expert system associates, classifies, and prioritizes monitored sensor events. The outcome of these processes is a dynamic representation of the state of Laboratory security in the form of security ''incidents''. A graphical representation of the incidents is integrated into a map-oriented console monitor that provides the operator with a comprehensive view of incidents and their locations. A prototype expert system has been developed using the OPS5 rule-based language. A large Ada-based program provides control of the map display system and interfaces to the various monitoring and access-control devices. In addition to the expert system operation, the issues and methods involved in integrating the OPS5-based incident-assessment system to the large Ada-based control program are discussed. 7 refs., 7 figs.

  14. The absolute path command

    Energy Science and Technology Software Center (OSTI)

    2012-05-11

    The ap command traveres all symlinks in a given file, directory, or executable name to identify the final absolute path. It can print just the final path, each intermediate link along with the symlink chan, and the permissions and ownership of each directory component in the final path. It has functionality similar to "which", except that it shows the final path instead of the first path. It is also similar to "pwd", but it canmore » provide the absolute path to a relative directory from the current working directory.« less

  15. getnim - NIM's Command Line Interface

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    getnim command getnim - NIM's Command Line Interface This page describes the inquiry-only command called getnim that users can use interactively and in scripts to get their account balances. GETNIM(l) NERSC GETNIM(l) NAME getnim - query the NERSC banking database for remaining allocation, resources and repository information SYNOPSIS getnim [ options ] -Rrname or getnim [ options ] -Rrname { -uuid | -Uuname } or getnim [ options ][ -D ] { -uuid | -Uuname } or getnim [ options ] -Rrname { -l | -L

  16. Applicability of existing C3 (command, control and communications) vulnerability and hardness analyses to sentry system issues. Technical report

    SciTech Connect (OSTI)

    Lee, R.C.

    1983-01-13

    This report is a compilation of abstracts resulting from a literature search of reports relevant to Sentry Ballistic missile system C3 vulnerability and hardness. Primary sources consulted were the DOD Nuclear Information Analysis Center (DASIAC) and the Defense Technical Information Center (DTIC). Approximately 175 reports were reviewed and abstracted, including several related to computer programs for estimating nuclear effects on electromagnetic propagation. The reports surveyed were ranked in terms of their importance for Sentry C3 VandH issues.

  17. SU-E-T-524: Web-Based Radiation Oncology Incident Reporting and Learning System (ROIRLS)

    SciTech Connect (OSTI)

    Kapoor, R; Palta, J; Hagan, M; Grover, S; Malik, G

    2014-06-01

    Purpose: Describe a Web-based Radiation Oncology Incident Reporting and Learning system that has the potential to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: The VA National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and near miss data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. Software used for this program is deployed on the VAs intranet as a Website. All data entry forms (adverse event or near miss reports, work product reports) utilize standard causal, RT process step taxonomies and data dictionaries defined in AAPM and ASTRO reports on error reporting (AAPM Work Group Report on Prevention of Errors and ASTROs safety is no accident report). All reported incidents are investigated by the radiation oncology domain experts. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The operational workflow is similar to that of the Aviation Safety Reporting System. This system is also synergistic with ROSIS and SAFRON. Results: The ROIRLS facilitates the collection of data that help in tracking adverse events and near misses and develop new interventions to prevent such incidents. The ROIRLS electronic infrastructure is fully integrated with each registered facility profile data thus minimizing key strokes and multiple entries by the event reporters. Conclusions: OIRLS is expected to improve the quality and safety of a broad spectrum of radiation therapy patients treated in the VA and fulfills our goal of Effecting Quality While Treating Safely The Radiation Oncology Incident Reporting and Learning System software used for this program has been developed, conceptualized and maintained by TSG Innovations

  18. Command, control, and communications command post in space: A further step for nuclear deterrence and preserving national security. Research report

    SciTech Connect (OSTI)

    Raduege, H.D.

    1989-05-01

    A U.S. congressman thinks U.S. forces are at the brink of being out of control from a loss of communications. This paper describes the critical need for survivable national-level command, control, and communications. (C3). Brief description of the threat the U.S. faces from the Soviet Union with particular emphasis on growing space-based capabilities. General vulnerabilities of the U.S. National Command Authorities and supporting systems are described. Attributes of space-based command, communications, and control are compared to current land, sea, and air capabilities. Developing a permanently manned C3 command post in space would benefit U.S. security strategy through significant enhancements to nuclear deterrence and the political, economic, psychological, and military instruments of national power.

  19. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  20. Increasing the effectiveness of reachback and remote command and control

    SciTech Connect (OSTI)

    McGee, David R.

    2002-12-02

    Commanders and their staff, when geographically dispersed, continue to choose what they find to be the most effective remote collaboration tools: email and radio messages. Even command and control systems that provide a unified view of the battlefield among remote collaborators are often supplanted by more traditional tools, such as a large paper map (McGee, Cohen & Wu, 2000). Indeed, today's computer interfaces often impose too high a barrier for the capture and delivery of situational assessment (McGee, Cohen, Wesson & Horman, 2002). To compensate, commanders traditionally meet face-to-face at least once daily to debrief each other on the outcome of the day's fight and to coordinate a strategy for the next day's engagement. Each of these meetings presents a risk to commanders, in addition to lost time during travel and various other concerns. Ongoing activity at higher echelons may consist of this activity continuously. At lower echelons, coordination is typically mediated by a radio or other messaging platform. Common to each of these scenarios, the coordination and collaboration is mediated by physical tools, e.g., an up-to-date common operational picture. Much of the promise of collaboration technology, from video-conferencing to realtime collaboration tools, is meant to alleviate the need for face-to-face meetings and improve moment-to-moment coordination. However, these tools fall woefully short of meeting the needs of commanders in the battlefield.

  1. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  2. Meteorological Integration for the Biological Warning and Incident Characterization (BWIC) System: General Guidance for BWIC Cities

    SciTech Connect (OSTI)

    Shaw, William J.; Wang, Weiguo; Rutz, Frederick C.; Chapman, Elaine G.; Rishel, Jeremy P.; Xie, YuLong; Seiple, Timothy E.; Allwine, K Jerry

    2007-02-16

    The U.S. Department of Homeland Security (DHS) is responsible for developing systems to detect the release of aerosolized bioagents in urban environments. The system that accomplishes this, known as BioWatch, is a robust first-generation monitoring system. In conjunction with the BioWatch detection network, DHS has also developed a software tool for cities to use to assist in their response when a bioagent is detected. This tool, the Biological Warning and Incident Characterization (BWIC) System, will eventually be deployed to all BioWatch cities to aid in the interpretation of the public health significance of indicators from the BioWatch networks. BWIC consists of a set of integrated modules, including meteorological models, that estimate the effect of a biological agent on a city’s population once it has been detected. For the meteorological models in BWIC to successfully calculate the distribution of biological material, they must have as input accurate meteorological data, and wind fields in particular. The purpose of this document is to provide guidance for cities to use in identifying sources of good-quality local meteorological data that BWIC needs to function properly. This process of finding sources of local meteorological data, evaluating the data quality and gaps in coverage, and getting the data into BWIC, referred to as meteorological integration, is described. The good news for many cities is that meteorological measurement networks are becoming increasingly common. Most of these networks allow their data to be distributed in real time via the internet. Thus, cities will often only need to evaluate the quality of available measurements and perhaps add a modest number of stations where coverage is poor.

  3. National Incident Management System (NIMS) Standards Review Panel Workshop Summary Report

    SciTech Connect (OSTI)

    Stenner, Robert D.; Kirk, Jennifer L.; Stanton, James R.; Shebell, Peter; Schwartz, Deborah S.; Judd, Kathleen S.; Gelston, Gariann M.

    2006-02-07

    The importance and need for full compliant implementation of NIMS nationwide was clearly demonstrated during the Hurricane Katrina event, which was clearly expressed in Secretary Chertoff's October 4, 2005 letter addressed to the State's governors. It states, ''Hurricane Katrina was a stark reminder of how critical it is for our nation to approach incident management in a coordinated, consistent, and efficient manner. We must be able to come together, at all levels of government, to prevent, prepare for, respond to, and recover from any emergency or disaster. Our operations must be seamless and based on common incident management doctrine, because the challenges we face as a nation are far greater than capabilities of any one jurisdiction.'' The NIMS is a system/architecture for organizing response on a ''national'' level. It incorporations ICS as a main component of that structure (i.e., it institutionalizes ICS in NIMS). In a paper published on the NIMS Website, the following statements were made: ''NIMS represents a core set of doctrine, principles, terminology, and organizational processes to enable effective, efficient and collaborative incident management at all levels. To provide the framework for interoperability and compatibility, the NIMS is based on a balance between flexibility and standardization.'' Thus the NIC is challenged with the need to adopt quality SDO generated standards to support NIMS compliance, but in doing so maintain the flexibility necessary so that response operations can be tailored for the specific jurisdictional and geographical needs across the nation. In support of this large and complex challenge facing the NIC, the Pacific Northwest National Laboratory (PNNL) was asked to provide technical support to the NIC, through their DHS Science and Technology ? Standards Portfolio Contract, to help identify, review, and develop key standards for NIMS compliance. Upon examining the challenge, the following general process appears to be a

  4. V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am...

  5. Calculation of nuclear data for incident energies to 200 MeV with the FKK-GNASH code system

    SciTech Connect (OSTI)

    Chadwick, M.B.; Young, P.G.

    1993-02-01

    We describe how the FKK-GNASH code system has been extended to calculate nucleon-induced reactions up to 200 MeV, and used to predict (p,xn) and (p,xp) cross sections on {sup 208}Pb at incident energies of 25, 45, 80 and 160 MeV, for an intermediate energy code intercomparison. Details of the reaction mechanisms calculated by FKK-GNASH are given, and the calculational procedure is described.

  6. iTOUGH2 Command Reference

    SciTech Connect (OSTI)

    Finsterle, Stefan

    2002-06-18

    iTOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. This report contains a detailed description of all iTOUGH2 commands.

  7. Former Strategic Command chief emphasizes importance of Pantex, Y-12

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    missions | Y-12 National Security Complex Former Strategic Command ... Former Strategic Command chief emphasizes importance of Pantex, Y-12 missions Posted: February 16, 2016 - 6:56pm Gen. Kevin Chilton, former commander of U.S. Strategic Command, spoke to Pantex employees and thanked them for their service. Gen. Kevin Chilton, former commander of U.S. Strategic Command, recently spoke to Pantex employees and delivered a clear message: "From the bottom of my heart, thank you for what

  8. Incorporation of pollution prevention into the engineering command media

    SciTech Connect (OSTI)

    Harrington, E.; Hammonds, C.

    1997-10-08

    It has long been recognized that incorporation of pollution prevention (P2) into projects during the design phase yields superior results as compared to modification of facilities after construction. Generation of waste during construction can be minimized, products containing recycled materials can be incorporated into the facility, and the processes or systems can be optimized for P2 from the beginning. However, design engineers must have the proper mindset and training in order to achieve this, since standard engineering practice does not necessarily lead to construction of systems that are optimized for P2. It was determined that incorporation of P2 principles and methods into command media that govern the conduct of design and construction was one way of achieving P2 objectives during design. This would incorporate certain P2 elements into criteria and standard designs so that these elements are automatically incorporated into the designs. The Central Engineering Services (CES) Command Media, which provide direction, methodology, and criteria for performance of engineering design and construction, consist of Engineering Procedures, Master Design Criteria, Technical Specifications, and Engineering Standards. Incorporated in these documents are regulatory requirements, national consensus codes and standards, accepted and proven practices and designs, as well as DOE Orders governing design and construction. The documents were reviewed to identify potential areas into which P2 principles, practices, and methodologies could be incorporated.

  9. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  10. 2013 Federal Energy and Water Management Award Winner Commander Fleet

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Activities Yokosuka | Department of Energy Commander Fleet Activities Yokosuka 2013 Federal Energy and Water Management Award Winner Commander Fleet Activities Yokosuka fewm13_yokosuka_japan_highres.pdf (4.44 MB) fewm13_yokosuka_japan.pdf (1.84 MB) More Documents & Publications 2013 Federal Energy and Water Management Award Winner Commander Fleet Activities Yokosuka Thin-Film Photovoltaics on Solar House CX-002541: Categorical Exclusion Determination SunShot Vision Study: February 2012

  11. Former Strategic Command chief emphasizes importance of Pantex...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Former Strategic Command chief emphasizes importance of Pantex, Y-12 missions Posted: ... Security to support Pantex and Y-12 missions, was at Pantex as a member of a ...

  12. STATEMENT OF BRIGADIER GENERAL JOHN KEM COMMANDER UNITED STATES...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BRIGADIER GENERAL JOHN KEM COMMANDER UNITED STATES ARMY CORPS OF ENGINEERS NORTHWESTERN DIVISION MEMBER, UNITED STATES ENTITY FOR THE COLUMBIA RIVER TREATY AND STEPHEN OLIVER VICE...

  13. 2013 Federal Energy and Water Management Award Winner Commander...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications 2013 Federal Energy and Water Management Award Winner Commander Fleet Activities Yokosuka Thin-Film Photovoltaics on Solar House CX-002541: ...

  14. Anatomy of an incident

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Cournoyer, Michael E.; Trujillo, Stanley; Lawton, Cindy M.; Land, Whitney M.; Schreiber, Stephen B.

    2016-03-23

    A traditional view of incidents is that they are caused by shortcomings in human competence, attention, or attitude. It may be under the label of “loss of situational awareness,” procedure “violation,” or “poor” management. A different view is that human error is not the cause of failure, but a symptom of failure – trouble deeper inside the system. In this perspective, human error is not the conclusion, but rather the starting point of investigations. During an investigation, three types of information are gathered: physical, documentary, and human (recall/experience). Through the causal analysis process, apparent cause or apparent causes are identifiedmore » as the most probable cause or causes of an incident or condition that management has the control to fix and for which effective recommendations for corrective actions can be generated. A causal analysis identifies relevant human performance factors. In the following presentation, the anatomy of a radiological incident is discussed, and one case study is presented. We analyzed the contributing factors that caused a radiological incident. When underlying conditions, decisions, actions, and inactions that contribute to the incident are identified. This includes weaknesses that may warrant improvements that tolerate error. Measures that reduce consequences or likelihood of recurrence are discussed.« less

  15. The regulatory battleground: A briefing for commanders

    SciTech Connect (OSTI)

    Wirick, D.

    1995-12-31

    This imperfect analogy likens the history and current status of public utility regulation to a military campaign. Clearly, the relationship between regulators and utilities has not always been combative, but intermittent conflict has necessarily characterized the relationship. Nonetheless, this military analogy describes some of the elements of the history of regulation and may have implications for regulatory policy in the near term. The scene is a battlefield headquarters not far from the heat of the conflict. The commanders of regulatory units are gathered. In the distance, the low rumble of troop movements can be heard. Ladies and gentlemen, please take your seats. As you are aware, recent developments have placed regulatory forces in extreme jeopardy. Our forces are under stress, and though they continue to fight, the confusion of the current situation is beginning to take its toll. In most cases, reinforcements have been denied and our lines of logistical support have been weakened. Without effective and rapid action on our part, the regulatory battle will be lost and we will be driven from the field. Until consumers are well-enough armed to protect themselves, a process that is certainly suspect and potentially time-consuming, they will be powerless and undoubtedly victimized.

  16. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  17. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  18. JC3 Incident Reporting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management » JC3 Incident Reporting JC3 Incident Reporting technology-785742_960_720.jpg JC3 Incident Reporting Procedures U.S. Department of Energy Facilities/Contractors Only DOE O 205.1-B Chg 2 4.(c)(13) DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM requires a defined "process for incident reporting that requires all cyber security incidents involving information or information systems, including privacy breaches, under DOE or DOE contractor control must be identified, mitigated,

  19. Command and control in new nuclear states: Implications for stability. Master's thesis

    SciTech Connect (OSTI)

    Foley, D.C.

    1994-06-01

    Command and control systems of new nuclear states are likely to fail when placed under stress. This thesis will demonstrate that such failures can dramatically affect regional or international stability. Describing the current argument over the consequences of nuclear proliferation between proliferation pessimists and deterrence optimists, this thesis shows how C2 is in fact the crux of the debate. This thesis develops an analytical tool that may be applied to new nuclear states in order to classify their C2 systems and to predict when and how these evolving systems might fail. To show the tool's usefulness, it is applied to Ukraine, an important new nuclear state. This thesis also suggests several implications for U.S. foreign policy. Nuclear weapons, Command and control, Proliferation, Arms control, Regional stability, Russia, United States, Ukraine, Nuclear capabilities, U.S. Security policy.

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

  1. ITOUGH2 command reference. Version 3.1

    SciTech Connect (OSTI)

    Finsterle, S.

    1997-04-01

    This report contains a detailed description of all ITOUGH2 commands. It complements the ITOUGH2 User`s Guide and the collection of ITOUGH2 sample problems. ITOUGH2 is a program for parameter estimation, sensitivity analysis, and uncertainty propagation analysis. It is based on the TOUGH2 simulator for non-isothermal multiphase flow in fractured and porous media. Extensive experience in using TOUGH2 is a prerequisite for using ITOUGH2. The preparation of an input file for TOUGH2 or its derivatives is described in separate manuals and is not part of this report. The ITOUGH2 user`s guide summarizes the inverse modeling theory pertaining to ITOUGH2, and describes the program output. Furthermore, information about code architecture and installation are given. In Chapter 2 of this report, a brief summary of inverse modeling theory is given to restate the main concepts implemented in ITOUGH2 and to introduce certain definitions. Chapter 3 introduces the basic concepts of the ITHOUGH2 input language and the main structure of an ITOUGH2 input file. Chapter 4, the main part of this report, provides detailed descriptions of each ITOUGH2 command in alphabetical order. It is complemented by a command index in Appendix B in which the commands are given in logical order. The content of Chapter 4 is also available on-line using command it2help. Chapter 5 describes the usage of the UNIX script files for executing, checking, and terminating ITOUGH2 simulations.

  2. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and available to all the nodes in PDSF. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. You can display the UGE io units with the command "qconf -se global". Disk Vault Experiments SGE io

  3. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  4. Compensated gain control circuit for buck regulator command charge circuit

    DOE Patents [OSTI]

    Barrett, David M.

    1996-01-01

    A buck regulator command charge circuit includes a compensated-gain control signal for compensating for changes in the component values in order to achieve optimal voltage regulation. The compensated-gain control circuit includes an automatic-gain control circuit for generating a variable-gain control signal. The automatic-gain control circuit is formed of a precision rectifier circuit, a filter network, an error amplifier, and an integrator circuit.

  5. Compensated gain control circuit for buck regulator command charge circuit

    DOE Patents [OSTI]

    Barrett, D.M.

    1996-11-05

    A buck regulator command charge circuit includes a compensated-gain control signal for compensating for changes in the component values in order to achieve optimal voltage regulation. The compensated-gain control circuit includes an automatic-gain control circuit for generating a variable-gain control signal. The automatic-gain control circuit is formed of a precision rectifier circuit, a filter network, an error amplifier, and an integrator circuit. 5 figs.

  6. Commander, Seneca Army Depot Attention: Thomas Stincic, Safety Officer

    Office of Legacy Management (LM)

    9 1986 Department of Energy Washington, D .C. 20545 . Commander, Seneca Army Depot Attention: Thomas Stincic, Safety Officer Romulus, New York 14541 Dear Mr. Stincic: As you are aware, the Department of Energy is evaluating the radiological condition of sites formerly used by Department predecessors during the early years of nuclear energy development , and a portion of the Seneca Army Depot was identified as one such site. While our preliminary inves-tiga- tions did identify residual

  7. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  8. INCIDENT REPORTING: LEARNING FROM EXPERIENCE

    SciTech Connect (OSTI)

    Weiner, Steven C.; Kinzey, Bruce R.; Dean, Jesse D.; Davis, Patrick B.; Ruiz, Antonio

    2007-09-12

    Experience makes a superior teacher. Sharing the details surrounding safety events is one of the best ways to help prevent their recurrence elsewhere. This approach requires an open, non-punitive environment to achieve broad benefits. The Hydrogen Incident Reporting Tool (www.h2incidents.org) is intended to facilitate the sharing of lessons learned and other relevant information gained from actual experiences using and working with hydrogen and hydrogen systems. Its intended audience includes those involved in virtually any aspect of hydrogen technology, systems and use, with an emphasis towards energy and transportation applications. The database contains records of safety events both publicly available and/or voluntarily submitted. Typical records contain a general description of the occurrence, contributing factors, equipment involved, and some detailing of consequences and changes that have been subsequently implemented to prevent recurrence of similar events in the future. The voluntary and confidential nature and other characteristics surrounding the database mean that any analysis of apparent trends in its contents cannot be considered statistically valid for a universal population. A large portion of reported incidents have occurred in a laboratory setting due to the typical background of the reporting projects, for example. Yet some interesting trends are becoming apparent even at this early stage of the database’s existence and general lessons can already be taken away from these experiences. This paper discusses the database and a few trends that have already become apparent for the reported incidents. Anticipated future uses of this information are also described. This paper is intended to encourage wider participation and usage of the incidents reporting database and to promote the safety benefits offered by its contents.

  9. July 2013 Cyber Incident

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information ...

  10. January 2013 Cyber Incident

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) has confirmed a recent cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of...

  11. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  12. Command and Control Architectures for Autonomous Micro-Robotic Forces - FY-2000 Project Report

    SciTech Connect (OSTI)

    Dudenhoeffer, Donald Dean

    2001-04-01

    Advances in Artificial Intelligence (AI) and micro-technologies will soon give rise to production of large-scale forces of autonomous micro-robots with systems of innate behaviors and with capabilities of self-organization and real world tasking. Such organizations have been compared to schools of fish, flocks of birds, herds of animals, swarms of insects, and military squadrons. While these systems are envisioned as maintaining a high degree of autonomy, it is important to understand the relationship of man with such machines. In moving from research studies to the practical deployment of large-scale numbers of robots, one of critical pieces that must be explored is the command and control architecture for humans to re-task and also inject global knowledge, experience, and intuition into the force. Tele-operation should not be the goal, but rather a level of adjustable autonomy and high-level control. If a herd of sheep is comparable to the collective of robots, then the human element is comparable to the shepherd pulling in strays and guiding the herd in the direction of greener pastures. This report addresses the issues and development of command and control for largescale numbers of autonomous robots deployed as a collective force.

  13. A shared data environment for the Military Traffic Management Command Directorate of International Traffic

    SciTech Connect (OSTI)

    Russell, D.L.; Wheeler, V.V. ); Truett, L.F. )

    1992-01-01

    In September 1991, Oak Ridge National Laboratory (ORNL) completed tasking to assist the Military Traffic Management Command Directorate of International Traffic (MTIT) in the analysis of a potential Shared Data Environment (SDE) for MTIT automated cargo traffic systems. This analysis was a preliminary effort with emphasis on documentation of requirements, examination of design alternatives, and identification of specific MTIT systems' data sharing problems. This report records the results of the ORNL analysis. The SDE envisioned by ORNL at this point in the analysis is not merely a repository of information; it is also a system that allows processing of distributed data. To provide high-level access to and control over international cargo processes, ORNL recommends a loosely coupled, replicated database design with high-speed communications among all sites.

  14. A shared data environment for the Military Traffic Management Command Directorate of International Traffic

    SciTech Connect (OSTI)

    Russell, D.L.; Wheeler, V.V.; Truett, L.F.

    1992-01-01

    In September 1991, Oak Ridge National Laboratory (ORNL) completed tasking to assist the Military Traffic Management Command Directorate of International Traffic (MTIT) in the analysis of a potential Shared Data Environment (SDE) for MTIT automated cargo traffic systems. This analysis was a preliminary effort with emphasis on documentation of requirements, examination of design alternatives, and identification of specific MTIT systems` data sharing problems. This report records the results of the ORNL analysis. The SDE envisioned by ORNL at this point in the analysis is not merely a repository of information; it is also a system that allows processing of distributed data. To provide high-level access to and control over international cargo processes, ORNL recommends a loosely coupled, replicated database design with high-speed communications among all sites.

  15. Hazmat Cam Wireless Video System

    SciTech Connect (OSTI)

    Kevin L. Young

    2006-02-01

    This paper describes the Hazmat Cam Wireless Video System and its application to emergency response involving chemical, biological or radiological contamination. The Idaho National Laboratory designed the Hazmat Cam Wireless Video System to assist the National Guard Weapons of Mass Destruction - Civil Support Teams during their mission of emergency response to incidents involving weapons of mass destruction. The lightweight, handheld camera transmits encrypted, real-time video from inside a contaminated area, or hot-zone, to a command post located a safe distance away. The system includes a small wireless video camera, a true-diversity receiver, viewing console, and an optional extension link that allows the command post to be placed up to five miles from danger. It can be fully deployed by one person in a standalone configuration in less than 10 minutes. The complete system is battery powered. Each rechargeable camera battery powers the camera for 3 hours with the receiver and video monitor battery lasting 22 hours on a single charge. The camera transmits encrypted, low frequency analog video signals to a true-diversity receiver with three antennas. This unique combination of encryption and transmission technologies delivers encrypted, interference-free images to the command post under conditions where other wireless systems fail. The lightweight camera is completely waterproof for quick and easy decontamination after use. The Hazmat Cam Wireless Video System is currently being used by several National Guard Teams, the US Army, and by fire fighters. The system has been proven to greatly enhance situational awareness during the crucial, initial phase of a hazardous response allowing commanders to make better, faster, safer decisions.

  16. Incident Prevention, Warning, and Response (IPWAR) Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-09-30

    This Manual defines a structured, cohesive, and consistent process for performing incident prevention, warning, and response for DOE's Federal information systems and is consistent with the requirements of Federal laws, Executive orders, national security directives, and other regulations. The Manual also provides requirements and implementation instructions for the Department's Incident Prevention, Warning and Response process, and supplements DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03. DOE N 205.17 cancels this manual. This manual cancels DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, dated 3/18/2002.

  17. System-wide power management control via clock distribution network

    DOE Patents [OSTI]

    Coteus, Paul W.; Gara, Alan; Gooding, Thomas M.; Haring, Rudolf A.; Kopcsay, Gerard V.; Liebsch, Thomas A.; Reed, Don D.

    2015-05-19

    An apparatus, method and computer program product for automatically controlling power dissipation of a parallel computing system that includes a plurality of processors. A computing device issues a command to the parallel computing system. A clock pulse-width modulator encodes the command in a system clock signal to be distributed to the plurality of processors. The plurality of processors in the parallel computing system receive the system clock signal including the encoded command, and adjusts power dissipation according to the encoded command.

  18. Concept of Operations for Real-time Airborne Management System

    SciTech Connect (OSTI)

    Barr, Jonathan L.; Taira, Randal Y.; Orr, Heather M.

    2013-03-04

    The purpose of this document is to describe the operating concepts, capabilities, and benefits of RAMS including descriptions of how the system implementations can improve emergency response, damage assessment, task prioritization, and situation awareness. This CONOPS provides general information on operational processes and procedures required to utilize RAMS, and expected performance benefits of the system. The primary audiences for this document are the end users of RAMS (including flight operators and incident commanders) and the RAMS management team. Other audiences include interested offices within the Department of Homeland Security (DHS), and officials from other state and local jurisdictions who want to implement similar systems.

  19. Incident Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Incident Management IC2 (004).jpg The Incident Management Program (IMP) focuses on: threat information sharing critical infrastructure protection active defense incident preparedness. The IMP reports all incidents to the United States Computer Emergency Readiness Team (US-CERT), fulfilling statutory requirements and ensuring a coordinated response to cyber attacks. Joint Cybersecurity Coordination Center (JC3) The Joint Cybersecurity Coordination Center (JC3) provides DOE with

  20. Inline_System

    Energy Science and Technology Software Center (OSTI)

    2010-02-01

    Inline_System replaces a small subset of file query and manipulation commands, on computing platforms that do not offer a complete standard POSIX environment.

  1. Photo Release: U.S. Energy Secretary Chu at BP Command Center in Houston |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Release: U.S. Energy Secretary Chu at BP Command Center in Houston Photo Release: U.S. Energy Secretary Chu at BP Command Center in Houston May 28, 2010 - 12:00am Addthis Washington D.C. --- At the request of President Obama, U.S. Energy Secretary Steven Chu has been helping oversee BP's "top kill" efforts from the BP Command Center in Houston. Below are two photographs from this week. Photo credit: Department of Energy. Secretary Steven Chu and National

  2. A Low-Cost, Radiation-Hardened Single-Board Computer for Command...

    Office of Scientific and Technical Information (OSTI)

    A Low-Cost, Radiation-Hardened Single-Board Computer for Command and Data Handling Citation Details In-Document Search Title: A Low-Cost, Radiation-Hardened Single-Board Computer ...

  3. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  4. Adequacy of Power-to-Mass Scaling in Simulating PWR Incident Transient for Reduced-Height, Reduced-Pressure and Full-Height, Full-Pressure Integral System Test Facilities

    SciTech Connect (OSTI)

    Liu, T.-J.; Lee, C.-H

    2004-03-15

    A complete scheme of scaling methods to design the reduced-height, reduced-pressure (RHRP) Institute of Nuclear Energy Research Integral System Test (IIST) facility and to specify test conditions for incident simulation was developed. In order to preserve core decay power history and coolant mass inventory during a transient, a unique power-to-mass scaling method is proposed and utilized for RHRP and full-height, full-pressure (FHFP) systems. To validate the current scaling method, three counterpart tests done at the IIST facility are compared with the FHFP tests in small-break loss-of-coolant, station blackout, and loss-of-feedwater accidents performed at the Large-Scale Test Facility (LSTF) and the BETHSY test facility. Although differences appeared in design, scaling, and operation conditions among the IIST, LSTF, and BETHSY test facilities, the important physical phenomena shown in the facilities are almost the same. The physics involved in incident transient phenomena are well measured and modeled by showing the common thermal-hydraulic behavior of key parameters and the general consistency of chronological events. The results also confirm the adequacy of power-to-mass scaling methodology.

  5. LANL responds to radiological incident

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANL responds to radiological incident LANL responds to radiological incident Multiple tests indicate no health risks to public or employees. August 27, 2012 Aerial view of the Los Alamos Neutron Science Center(LANSCE). Aerial view of the Los Alamos Neutron Science Center (LANSCE). The contamination poses no danger to the public. The Laboratory is investigating the inadvertent spread of Technetium 99 by employees and contractors at the Lujan Neutron Scattering Center August 27, 2012-The

  6. Discriminating electromagnetic radiation based on angle of incidence

    DOE Patents [OSTI]

    Hamam, Rafif E.; Bermel, Peter; Celanovic, Ivan; Soljacic, Marin; Yeng, Adrian Y. X.; Ghebrebrhan, Michael; Joannopoulos, John D.

    2015-06-16

    The present invention provides systems, articles, and methods for discriminating electromagnetic radiation based upon the angle of incidence of the electromagnetic radiation. In some cases, the materials and systems described herein can be capable of inhibiting reflection of electromagnetic radiation (e.g., the materials and systems can be capable of transmitting and/or absorbing electromagnetic radiation) within a given range of angles of incidence at a first incident surface, while substantially reflecting electromagnetic radiation outside the range of angles of incidence at a second incident surface (which can be the same as or different from the first incident surface). A photonic material comprising a plurality of periodically occurring separate domains can be used, in some cases, to selectively transmit and/or selectively absorb one portion of incoming electromagnetic radiation while reflecting another portion of incoming electromagnetic radiation, based upon the angle of incidence. In some embodiments, one domain of the photonic material can include an isotropic dielectric function, while another domain of the photonic material can include an anisotropic dielectric function. In some instances, one domain of the photonic material can include an isotropic magnetic permeability, while another domain of the photonic material can include an anisotropic magnetic permeability. In some embodiments, non-photonic materials (e.g., materials with relatively large scale features) can be used to selectively absorb incoming electromagnetic radiation based on angle of incidence.

  7. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  8. The Department's Cyber Security Incident Management Program, IG-0787 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Cyber Security Incident Management Program, IG-0787 The Department's Cyber Security Incident Management Program, IG-0787 The Department of Energy operates numerous interconnected computer networks and systems to help accon~plishit s strategic missions in the areas of energy, defense, science, and the environment. These systems are frequently subjected to sophisticated cyber attacks that could potentially affect the Department's ability to carry out its mission. During

  9. Nuclear Incident Team | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Incident Team NNSA houses the Nuclear Incident Team (NIT), which is responsible for deploying assets at the request of coordinating agencies in response to a nuclear or ...

  10. ORISE: The Medical Aspects of Radiation Incidents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Medical Aspects of Radiation Incidents The Medical Aspects of Radiation Incidents provides the basic information needed for the medical management of victims of radiation ...

  11. Chemical incident economic impact analysis methodology. (Technical...

    Office of Scientific and Technical Information (OSTI)

    Chemical incident economic impact analysis methodology. Citation Details In-Document Search Title: Chemical incident economic impact analysis methodology. You are accessing a ...

  12. Computerized Accident Incident Reporting System | Department...

    Broader source: Energy.gov (indexed) [DOE]

    CAIRS References and Resources The Office of Environment, Health, Safety and Security (AU) ... DOE Summary Statistics - The CAIRS database is constantly being updated or revised, The ...

  13. Chapter_11_Incidents_of_Security_Concern

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. AU-42 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect

  14. An Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B; Payne, Patricia W

    2012-01-01

    Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

  15. Effect of Emergency Argon on FCF Operational Incidents

    SciTech Connect (OSTI)

    Charles Solbrig

    2011-12-01

    The following report presents analyses of operational incidents which are considered in the safety analysis of the FCF argon cell and the effect that the operability of the emergency argon system has on the course of these incidents. The purpose of this study is to determine if the emergency argon system makes a significant difference in ameliorating the course of these incidents. Six incidents were considered. The following three incidents were analyzed. These are: 1. Cooling failing on 2. Vacuum Pump Failing on 3. Argon Supplies Failing on. In the remaining three incidents, the emergency argon supply would have no effect on the course of these transients since it would not come on during these incidents. The transients are 1. Loss of Cooling 2. Loss of power (Differs from above by startup delay till the Diesel Generators come on.) 3. Cell rupture due to an earthquake or other cause. The analyses of the first three incidents are reported on in the next three sections. This report is issued realizing the control parameters used may not be optimum, and additional modeling must be done to model the inertia of refrigeration system, but the major conclusion concerning the need for the emergency argon system is still valid. The timing of some events may change with a more accurate model but the differences between the transients with and without emergency argon will remain the same. Some of the parameters assumed in the analyses are Makeup argon supply, 18 cfm, initiates when pressure is = -6 iwg., shuts off when pressure is = -3.1 iwg. 170,000 ft3 supply. Min 1/7th always available, can be cross connected to HFEF argon supply dewar. Emergency argon supply, 900 cfm, initiates when pressure is = -8 iwg. shuts off when pressure is =-4 iwg. reservoir 220 ft3, refilled when tank farm pressure reduces to 1050 psi which is about 110 ft3.

  16. The {open_quotes}Command and Control{close_quotes} philosophy of the Communist party of China

    SciTech Connect (OSTI)

    Kominiak, G.J.; Eisenberger, J.C.; Menaul, K.L.

    1996-01-01

    China`s central political authorities have constructed a system which is designed to enable them to exert their personal influence and control over each level of every organization in the country -- both civil and military. The Communist Party of China (CPC) is represented at all levels of each and every organization, including the People`s Liberation Army (PLA). These Party entities are intended to both provide oversight and to ensure that Party policies, directives and orders are obeyed. This penchant for political control, which may have its roots in China`s imperial past, appears to have been reinforced by the early developmental path chosen by the Party`s leadership. Current attempts aimed at maintaining political control of its resources, especially the military, are embodied in the formal system of {open_quotes}Political Work.{close_quotes} In the PLA, this system of political control results in the involvement of political organs in day-to-day military matters to an extent unheard of in the West. Further work is needed in order to understand, more fully, both the system of {open_quotes}Political Work{close_quotes} and its contributions to the overall military (and civil) command and control philosophic of the Communist Party of China.

  17. EA-1906: Operations, Consolidation, and Upgrades at the Office of Secure Transportation Western Command Site, Albuquerque, NM

    Office of Energy Efficiency and Renewable Energy (EERE)

    This EA evaluates environmental impacts associated with the siting and construction of several proposed buildings, including a new vehicle maintenance facility and mobile equipment maintenance building (and their support structures) at the Western Command Site, Albuquerque, NM.

  18. Nuclear Incident Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Apply for Our Jobs Our Jobs Working at NNSA Blog Home Nuclear Incident Team Nuclear Incident Team Fukushima: Five Years Later After the March 11, 2011, Japan earthquake, tsunami, ...

  19. ORISE: Incident Management Training Put to Test in Gulf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    response, was critical to a productive effort. Adhering to a common framework for command and control minimized confusion and allowed multiple agencies to work together. At...

  20. Air Combat Command deicing/anti-icing operation: Compliance evaluation and requirements

    SciTech Connect (OSTI)

    Fronapfel, P.J.

    1997-12-31

    This paper will present information on Air Combat Command`s (ACC) efforts in evaluating its deicing and anti-icing activities at all applicable ACC bases. This effort, led by Ecology and Environment (E and E), of Lancaster NY, will evaluate the operations, infrastructure, and management of deicing and anti-icing programs at ACC bases and will provide recommendations to each base for maintaining compliance with applicable regulations and minimizing the environmental impact of these operations. In addition to evaluating such operations at ACC bases, E and E, along with subcontractor Jacobs Engineering Group, Inc., will research activities around the nation and the world to assist in developing the best recommendations for each ACC base. Armstrong Laboratory`s Water Quality Branch of the Bioenvironmental Engineering Division (AL/OEBW) is responsible for technical and contractual oversight of this effort. A summary of information gathered to date will be presented in this paper. Although the disposal of deicing fluids has led a somewhat charmed life until recently, these activities are likely to receive increased regulatory scrutiny in the years to come. Air Combat Command has had more than one instance where NOVs or potential NOVs have arisen due to fish kills associated with deicing/anti-icing chemical laden runoff. In an effort to prevent future compliance problems and to foster proper stewardship of the environment, ACC has taken these proactive measures at its bases. ACC`s efforts will also be used at the Air Staff level to assist in making Air Force wide pollution prevention and best management practice (P2/BMP) recommendations.

  1. Recovery from chemical, biological, and radiological incidents :

    SciTech Connect (OSTI)

    Franco, David Oliver; Yang, Lynn I.; Hammer, Ann E.

    2012-06-01

    To restore regional lifeline services and economic activity as quickly as possible after a chemical, biological or radiological incident, emergency planners and managers will need to prioritize critical infrastructure across many sectors for restoration. In parallel, state and local governments will need to identify and implement measures to promote reoccupation and economy recovery in the region. This document provides guidance on predisaster planning for two of the National Disaster Recovery Framework Recovery Support Functions: Infrastructure Systems and Economic Recovery. It identifies key considerations for infrastructure restoration, outlines a process for prioritizing critical infrastructure for restoration, and identifies critical considerations for promoting regional economic recovery following a widearea disaster. Its goal is to equip members of the emergency preparedness community to systematically prioritize critical infrastructure for restoration, and to develop effective economic recovery plans in preparation for a widearea CBR disaster.

  2. Survivability enhancement study for C/sup 3/I/BM (communications, command, control and intelligence/battle management) ground segments: Final report

    SciTech Connect (OSTI)

    Not Available

    1986-10-30

    This study involves a concept developed by the Fairchild Space Company which is directly applicable to the Strategic Defense Initiative (SDI) Program as well as other national security programs requiring reliable, secure and survivable telecommunications systems. The overall objective of this study program was to determine the feasibility of combining and integrating long-lived, compact, autonomous isotope power sources with fiber optic and other types of ground segments of the SDI communications, command, control and intelligence/battle management (C/sup 3/I/BM) system in order to significantly enhance the survivability of those critical systems, especially against the potential threats of electromagnetic pulse(s) (EMP) resulting from high altitude nuclear weapon explosion(s). 28 figs., 2 tabs.

  3. Researchers correlate incidences of rheumatoid arthritis and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Researchers correlate incidences of rheumatoid arthritis and giant cell arteritis with solar cycles By John Greenwald June 15, 2015 Tweet Widget Google Plus One Share on Facebook A ...

  4. 2013 Federal Energy and Water Management Award Winner Naval Sea Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Command | Department of Energy Naval Sea Systems Command 2013 Federal Energy and Water Management Award Winner Naval Sea Systems Command fewm13_nswcphiladelphia_highres.pdf (5.43 MB) fewm13_nswcphiladelphia.pdf (1.75 MB) More Documents & Publications CX-005670: Categorical Exclusion Determination U.S. Navy Marine Diesel Engines and the Environment - Part 1 EIS-0259: Record of Decision

  5. Pendulation control system and method for rotary boom cranes

    DOE Patents [OSTI]

    Robinett, III, Rush D.; Groom, Kenneth N.; Feddema, John T.; Parker, Gordon G.

    2002-01-01

    A command shaping control system and method for rotary boom cranes provides a way to reduce payload pendulation caused by real-time input signals, from either operator command or automated crane maneuvers. The method can take input commands and can apply a command shaping filter to reduce contributors to payload pendulation due to rotation, elevation, and hoisting movements in order to control crane response and reduce tangential and radial payload pendulation. A filter can be applied to a pendulation excitation frequency to reduce residual radial pendulation and tangential pendulation amplitudes.

  6. Bi-directional power control system for voltage converter

    DOE Patents [OSTI]

    Garrigan, N.R.; King, R.D.; Schwartz, J.E.

    1999-05-11

    A control system for a voltage converter includes: a power comparator for comparing a power signal on input terminals of the converter with a commanded power signal and producing a power comparison signal; a power regulator for transforming the power comparison signal to a commanded current signal; a current comparator for comparing the commanded current signal with a measured current signal on output terminals of the converter and producing a current comparison signal; a current regulator for transforming the current comparison signal to a pulse width modulator (PWM) duty cycle command signal; and a PWM for using the PWM duty cycle command signal to control electrical switches of the converter. The control system may further include: a command multiplier for converting a voltage signal across the output terminals of the converter to a gain signal having a value between zero (0) and unity (1), and a power multiplier for multiplying the commanded power signal by the gain signal to provide a limited commanded power signal, wherein power comparator compares the limited commanded power signal with the power signal on the input terminals. 10 figs.

  7. Bi-directional power control system for voltage converter

    DOE Patents [OSTI]

    Garrigan, Neil Richard; King, Robert Dean; Schwartz, James Edward

    1999-01-01

    A control system for a voltage converter includes: a power comparator for comparing a power signal on input terminals of the converter with a commanded power signal and producing a power comparison signal; a power regulator for transforming the power comparison signal to a commanded current signal; a current comparator for comparing the commanded current signal with a measured current signal on output terminals of the converter and producing a current comparison signal; a current regulator for transforming the current comparison signal to a pulse width modulator (PWM) duty cycle command signal; and a PWM for using the PWM duty cycle command signal to control electrical switches of the converter. The control system may further include: a command multiplier for converting a voltage signal across the output terminals of the converter to a gain signal having a value between zero (0) and unity (1), and a power multiplier for multiplying the commanded power signal by the gain signal to provide a limited commanded power signal, wherein power comparator compares the limited commanded power signal with the power signal on the input terminals.

  8. Establishing and operating an incident response team

    SciTech Connect (OSTI)

    Padgett, K.M.

    1992-01-01

    Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.

  9. Establishing and operating an incident response team

    SciTech Connect (OSTI)

    Padgett, K.M.

    1992-09-01

    Occurrences of improprieties dealing with computer usage are on the increase. They range all the way from misuse by employees to international computer telecommunications hacking. In addition, natural disasters and other disasters such as catastrophic fires may also fall into the same category. These incidents, like any other breach of acceptable behavior, may or may not involve actual law breaking. A computer incident response team should be created as a first priority. This report discusses the establishment and operation of a response team.

  10. PSM case history: Regulatory compliance can prevent catastrophic incidents

    SciTech Connect (OSTI)

    Kiihne, E.J.; Mannan, M. [RMT/Jones and Neuse, Inc., Austin, TX (United States)

    1995-12-31

    As mandated by the Clean Air Act Amendments of 1990, the Occupational Safety and Health Administration promulgated on February 24, 1992 the Process Safety Management (PSM) rule: 29 CFR 1910.119. The PSM rule represents a holistic program which requires facilities to develop, implement and practice 14 different elements. Each of the 14 elements are significant in the protection of health and safety of all employees and personnel working in and around the plant site. PSM programs developed in compliance with the PSM rule are expected to reduce the probability and consequence of occurrence of hazardous incidents. This paper presents a real life incident that occurred in a plant before a PSM program was put in place. A detailed description of the incident is provided with appropriate discussions of non compliance with the PSM rule. Finally, the paper provides a theoretical scenario where a fully operational PSM program would have prevented the incident. The case history and discussion provided in this paper also reinforces the concept of maintaining process and equipment integrity through multiple barriers of safety. A fully operational PSM program represents such a multiple barrier safety system.

  11. Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B.

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability to be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is used to

  12. Incident Management Preparedness and Coordination Toolkit

    Energy Science and Technology Software Center (OSTI)

    2013-04-01

    As with many professions, safety planners and first responders tend to be specialists in certain areas. To be truly useful, tools should be tailored to meet their specific needs. Thus, general software suites aimed at the professional geographic information system (GIS) community might not be the best solution for a first responder with little training in GIS terminology and techniques. On the other hand, commonly used web-based map viewers may not have the capability tomore » be customized for the planning, response, and recovery (PR&R) mission. Data formats should be open and foster easy information flow among local, state, and federal partners. Tools should be free or low-cost to address real-world budget constraints at the local level. They also need to work both with and without a network connection to be robust. The Incident Management Preparedness and Coordination Toolkit (IMPACT) can satisfy many of these needs while working in harmony with established systems at the local, state, and federal levels. The IMPACT software framework, termed the Geospatial Integrated Problem Solving Environment (GIPSE), organizes tasks, tools, and resources for the end user. It uses the concept of software wizards to both customize and extend its functionality. On the Tasks panel are a number of buttons used to initiate various operations. Similar to macros, these task buttons launch scripts that utilize the full functionality of the underlying foundational components such as the SQL spatial database and ORNL-developed map editor. The user is presented with a series of instruction pages which are implemented with HTML for interactivity. On each page are links which initiate specific actions such as creating a map showing various features. Additional tasks may be quickly programmed and added to the panel. The end user can customize the graphical interface to faciltate its use during an emergency. One of the major components of IMPACT is the ORNL Geospatial Viewer (OGV). It is

  13. The commanding heights of oil: Control over the International oil market

    SciTech Connect (OSTI)

    Krapels, E.N.

    1992-01-01

    The Commanding Heights of Oil is an analysis of oil's role in the international environment. It identifies the degree of control over oil in terms of what is asserted as the most important processes and factors that determine the condition of international affairs: (1) The state of oil demand in relation to the capacity to supply, with special emphasis on the amount of spare production capacity; (2) The nature of the business, and how the structure of the industry changes over time as companies cope with the risks peculiar to an extremely capital intensive enterprise; (3) The financial strength of the parties contending for control, including their ability to outlast their opponents in contests for influence over oil affairs; and (4) The nature of the mechanisms whereby the governments and companies strive to create a situation in which they do not have to rely on price to balance supply and demand. Each of the four central factors was prominent at every major turn of the international oil market over the decades. The dissertation argues that the international oil market was controlled in the past by first a group of companies, and, later, a group of countries, for a combination of reasons that is unlikely to be repeated. That does not mean that the 1990s will be spared oil price shocks such as occurred in the 1970s and 1980s. It does suggest that those shocks are unlikely to last long, that OPEC members are unlikely to be able to leverage their position in oil into larger positions in world affairs. It means that oil is unlikely to play as prominent a role in world affairs in the 1990s as it has in the past, even if oil demand, and along with it dependence on OPEC oil, rises.

  14. Control apparatus and method for efficiently heating a fuel processor in a fuel cell system

    DOE Patents [OSTI]

    Doan, Tien M.; Clingerman, Bruce J.

    2003-08-05

    A control apparatus and method for efficiently controlling the amount of heat generated by a fuel cell processor in a fuel cell system by determining a temperature error between actual and desired fuel processor temperatures. The temperature error is converted to a combustor fuel injector command signal or a heat dump valve position command signal depending upon the type of temperature error. Logic controls are responsive to the combustor fuel injector command signals and the heat dump valve position command signal to prevent the combustor fuel injector command signal from being generated if the heat dump valve is opened or, alternately, from preventing the heat dump valve position command signal from being generated if the combustor fuel injector is opened.

  15. Innovative science and technology (IST) in support of SDI (Strategic Defense Initiative) BM/C3 (Battle Management/Command, Control and Communications). Final report, June 1987-March 1988

    SciTech Connect (OSTI)

    Balko, B.; Albini, F.A.; Cohen, L.; Penner, S.S.; Sworder, D.D.

    1988-08-01

    Battle Management and Command, Control and Communications (BM/C3) issues in the Strategic Defense Initiative (SDI) context were discussed at a two-day workshop at the Institute for Defense Analyses (IDA). Another workshop-probed civilian systems that require handling of large amounts of data and that have fault-tolerant features that may be useful in resolving the SDI BM/C3 problems. The findings are summarized in this report, with special emphasis on possible research to be supported by the Innovative Science and Technology Office of SDIO.

  16. Sensitivity of fenestration solar gain to source spectrum and angle of incidence

    SciTech Connect (OSTI)

    McCluney, W.R.

    1996-12-31

    The solar heat gain coefficient (SHGC) is the fraction of solar radiant flux incident on a fenestration system entering a building as heat gain. In general it depends on both the angle of incidence and the spectral distribution of the incident solar radiation. In attempts to improve energy performance and user acceptance of high-performance glazing systems, manufacturers are producing glazing systems with increasing spectral selectivity. This poses potential difficulties for calculations of solar heat gain through windows based upon the use of a single solar spectral weighting function. The sensitivity of modern high-performance glazing systems to both the angle of incidence and the shape of the incident solar spectrum is examined using a glazing performance simulation program. It is found that as the spectral selectivity of the glazing system increases, the SHGC can vary as the incident spectral distribution varies. The variations can be as great as 50% when using several different representative direct-beam spectra. These include spectra having low and high air masses and a standard spectrum having an air mass of 1.5. The variations can be even greater if clear blue diffuse skylight is considered. It is recommended that the current broad-band shading coefficient method of calculating solar gain be replaced by one that is spectral based.

  17. American Recovery and Reinvestment Act, Federal Energy Management Program, Technical Assistance Project 228 - US Army Installation Management Command - Pacific Region, Honolulu, Hawaii

    SciTech Connect (OSTI)

    Arends, J.; Sandusky, William F.

    2010-09-30

    This report documents the activities of a resource efficiency manager that served the US Army Installation Management Command - Pacific Region during the period November 23, 2009 and August 31, 2010.

  18. PHASE II CHARACTERIZATION SURVEY OF THE USNS BRIDGE (T AOE 10), MILITARY SEALIFT FLEET SUPPORT COMMAND, NAVAL STATION, NORFOLK, VIRGINIA DCN 5180-SR-01-0

    SciTech Connect (OSTI)

    NICK A. ALTIC

    2012-08-30

    In March 2011, the USNS Bridge was deployed off northeastern Honshu, Japan with the carrier USS Ronald Reagan to assist with relief efforts after the 2011 T?hoku earthquake and tsunami. During that time, the Bridge was exposed to air-borne radioactive materials leaking from the damaged Fukushima I Nuclear Power Plant. The proximity of the Bridge to the air-borne impacted area resulted in the contamination of the ships air-handling systems and the associated components, as well as potential contamination of other ship surfaces due to either direct intake/deposition or inadvertent spread from crew/operational activities. Preliminary surveys in the weeks after the event confirmed low-level contamination within the heating, ventilation, and air conditioning (HVAC) ductwork and systems, and engine and other auxiliary air intake systems. Some partial decontamination was performed at that time. In response to the airborne contamination event, Military Sealift Fleet Support Command (MSFSC) contracted Oak Ridge Associated Universities (ORAU), under provisions of the Oak Ridge Institute for Science and Education (ORISE) contract, to assess the radiological condition of the Bridge. Phase I identified contamination within the CPS filters, ventilation systems, miscellaneous equipment, and other suspect locations that could not accessed at that time (ORAU 2011b). Because the Bridge was underway during the characterization, all the potentially impacted systems/spaces could not be investigated. As a result, MSFSC contracted with ORAU to perform Phase II of the characterization, specifically to survey systems/spaces previously inaccessible. During Phase II of the characterization, the ship was in port to perform routine maintenance operations, allowing access to the previously inaccessible systems/spaces.

  19. Electrically floating, near vertical incidence, skywave antenna

    DOE Patents [OSTI]

    Anderson, Allen A.; Kaser, Timothy G.; Tremblay, Paul A.; Mays, Belva L.

    2014-07-08

    An Electrically Floating, Near Vertical Incidence, Skywave (NVIS) Antenna comprising an antenna element, a floating ground element, and a grounding element. At least part of said floating ground element is positioned between said antenna element and said grounding element. The antenna is separated from the floating ground element and the grounding element by one or more electrical insulators. The floating ground element is separated from said antenna and said grounding element by one or more electrical insulators.

  20. A common language for computer security incidents

    SciTech Connect (OSTI)

    John D. Howard; Thomas A Longstaff

    1998-10-01

    Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently be combined or compared because a common language has yet to emerge in the field of computer security. A common language consists of terms and taxonomies (principles of classification) which enable the gathering, exchange and comparison of information. This paper presents the results of a project to develop such a common language for computer security incidents. This project results from cooperation between the Security and Networking Research Group at the Sandia National Laboratories, Livermore, CA, and the CERT{reg_sign} Coordination Center at Carnegie Mellon University, Pittsburgh, PA. This Common Language Project was not an effort to develop a comprehensive dictionary of terms used in the field of computer security. Instead, the authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information. They hope these high-level terms and their structure will gain wide acceptance, be useful, and most importantly, enable the exchange and comparison of computer security incident information. They anticipate, however, that individuals and organizations will continue to use their own terms, which may be more specific both in meaning and use. They designed the common language to enable these lower-level terms to be classified within the common language structure.

  1. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  2. Carbon-initiated effluent tank overpressure incident

    SciTech Connect (OSTI)

    Sherman, R.E.; Crawford, K.C.; Cusick, T.M.; Csengery, L.V.

    1996-12-31

    This report provides, for information purposes, a description of an unusual event and the corrective actions undertaken by the Shell facility involved. Shell and the authors hope that this information will help personnel associated with other facilities understand a non-obvious failure mechanism and take action to prevent their experiencing similar incidents. While drawn from actual experience, the information provided should be considered illustrative. Each company should be considered illustrative. Each company should review their own facilities, materials or processes to determine the appropriate equipment and procedures for their own specific circumstances.

  3. EP&R Standards Project Report: Technical Review of National Incident Management Standards

    SciTech Connect (OSTI)

    Stenner, Robert D.

    2007-04-24

    The importance and necessity for a fully developed and implemented National Incident Management System (NIMS) has been demonstrated in recent years by the impact of national events such as Hurricane Katrina in 2005. Throughout the history of emergency response to major disasters, especially when multiple response organizations are involved, there have been systemic problems in the consistency and uniformity of response operations. Identifying national standards that support the development and implementation of NIMS is key to helping solve these systemic problems. The NIMS seeks to provide uniformity and consistency for incident management by using common terminology and protocols that will enable responders to coordinate their efforts to ensure an efficient response.

  4. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  5. ORISE: Chemical Stockpile Emergency Preparedness Program Training...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training HSEEP Training Spokesperson Training Incident Command System Training Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is...

  6. ORISE: National Security Training Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training HSEEP Training Spokesperson Training Incident Command System Training Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is...

  7. Personnel Accountability for Non-COOP Incidents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Personnel Accountability for Non-COOP Incidents Personnel Accountability for Non-COOP Incidents This document establishes reporting requirements for non-COOP incidents. Personnel Accountability for Non-COOP Incidents (1.26 MB) Responsible Contacts Bruce Murray HR Policy Advisor E-mail bruce.murray@hq.doe.gov Phone 202-586-3372 More Documents & Publications Inspection Report: IG-0784 Audit Report: IG-0845 Fiscal Year 2013 Department of Energy Annual Occupational Safety and Health Report for

  8. Nuclear Incident Team | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Incident Team NNSA houses the Nuclear Incident Team (NIT), which is responsible for deploying assets at the request of coordinating agencies in response to a nuclear or radiological incident. The NIT's mission is to coordinate NNSA assets for deployment, continually monitor deployment activities, and provide situational awareness of activities to NNSA management. The NIT is staffed and fully operational within two hours of notification

  9. Servo control booster system for minimizing following error

    DOE Patents [OSTI]

    Wise, William L.

    1985-01-01

    A closed-loop feedback-controlled servo system is disclosed which reduces command-to-response error to the system's position feedback resolution least increment, .DELTA.S.sub.R, on a continuous real-time basis for all operating speeds. The servo system employs a second position feedback control loop on a by exception basis, when the command-to-response error .gtoreq..DELTA.S.sub.R, to produce precise position correction signals. When the command-to-response error is less than .DELTA.S.sub.R, control automatically reverts to conventional control means as the second position feedback control loop is disconnected, becoming transparent to conventional servo control means. By operating the second unique position feedback control loop used herein at the appropriate clocking rate, command-to-response error may be reduced to the position feedback resolution least increment. The present system may be utilized in combination with a tachometer loop for increased stability.

  10. A report on training equipment enhancements for the U.S. Special Operations Command

    SciTech Connect (OSTI)

    1996-04-01

    Training support systems - including devices, simulators and simulations - significantly improve training. Of course this is important for all military units. But for Special Operations Forces, such improvements are critical. Special Operations Forces must be prepared to operate in the most difficult, least forgiving of environments and do it right on the first try. The objective of this project is to report on the latest state-of-the-art training devices and systems which can enhance the training of Special Operations Forces.

  11. Summary of canister overheating incident at the Carbon Tetrachloride Expedited Response Action site

    SciTech Connect (OSTI)

    Driggers, S.A.

    1994-03-10

    The granular activated carbon (GAC)-filled canister that overheated was being used to adsorb carbon tetrachloride vapors drawn from a well near the 216-Z-9 Trench, a subsurface disposal site in the 200 West Area of the Hanford Site. The overheating incident resulted in a band of discolored paint on the exterior surface of the canister. Although there was no other known damage to equipment, no injuries to operating personnel, and no releases of hazardous materials, the incident is of concern because it was not anticipated. It also poses the possibility of release of carbon tetrachloride and other hazardous vapors if the incident were to recur. All soil vapor extraction system (VES) operations were halted until a better understanding of the cause of the incident could be determined and controls implemented to reduce the possibility of a recurrence. The focus of this report and the intent of all the activities associated with understanding the overheating incident has been to provide information that will allow safe restart of the VES operations, develop operational limits and controls to prevent recurrence of an overheating incident, and safely optimize recovery of carbon tetrachloride from the ground.

  12. Security incidents on the Internet, 1989--1995

    SciTech Connect (OSTI)

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  13. Seismic intrusion detector system

    DOE Patents [OSTI]

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  14. Source term estimation during incident response to severe nuclear...

    Office of Scientific and Technical Information (OSTI)

    response to severe nuclear power plant accidents Citation Details In-Document Search Title: Source term estimation during incident response to severe nuclear power plant ...

  15. Headquarters Facilities Master Security Plan - Chapter 11, Incidents...

    Office of Environmental Management (EM)

    Security Plan - Chapter 11, Incidents of Security Concern Whenever a failure to properly protect classified matter is detected, it must be formally reported and investigated. ...

  16. NNSA Nuclear/Radiological Incident Response | National Nuclear...

    National Nuclear Security Administration (NNSA)

    NNSA NuclearRadiological Incident Response December 01, 2008 The National Nuclear Security Administration (NNSA) has over 60 years of nuclear weapons experience in responding to ...

  17. Model Recovery Procedure for Response to a Radiological Transportation Incident

    Broader source: Energy.gov [DOE]

    This Transportation Emergency Preparedness Program (TEPP) Model Recovery Procedure contains the recommended elements for developing and conducting recovery planning at transportation incident scene...

  18. Laser Incident Lessons Learned and Action List (Technical Report...

    Office of Scientific and Technical Information (OSTI)

    Laser Incident Lessons Learned and Action List Citation Details In-Document Search Title: ... output into two work areas in which qualified operators conduct research experiments. ...

  19. Laser Incident Lessons Learned and Action List (Technical Report...

    Office of Scientific and Technical Information (OSTI)

    Title: Laser Incident Lessons Learned and Action List You are accessing a document from ... output into two work areas in which qualified operators conduct research experiments. ...

  20. JC3 Incident Reporting | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    in their Cyber Security Program Plans (CSPPs) or similar documents for classified systems. ... Classified Spillage: Transfer of classified or sensitive information to unaccredited or ...

  1. Control system health test system and method

    DOE Patents [OSTI]

    Hoff, Brian D.; Johnson, Kris W.; Akasam, Sivaprasad; Baker, Thomas M.

    2006-08-15

    A method is provided for testing multiple elements of a work machine, including a control system, a component, a sub-component that is influenced by operations of the component, and a sensor that monitors a characteristic of the sub-component. In one embodiment, the method is performed by the control system and includes sending a command to the component to adjust a first parameter associated with an operation of the component. Also, the method includes detecting a sensor signal from the sensor reflecting a second parameter associated with a characteristic of the sub-component and determining whether the second parameter is acceptable based on the command. The control system may diagnose at least one of the elements of the work machine when the second parameter of the sub-component is not acceptable.

  2. Microsoft Word - NNSS Incident Initial News Release.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    January 29, 2013 Darwin.morgan@nnsa.doe.gov Incident at Nevada National Security Site LAS VEGAS, NV - Emergency responders are currently responding to an incident on the central portion of the Nevada National Security Site. More information will be released as it becomes available. -30- NSO-13-04

  3. Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-03-18

    To establish Department of Energy (DOE) requirements and responsibilities for reporting cyber security incidents involving classified and unclassified systems and responding to cyber security alerts and advisories; and to implement requirements of DOE N 205.1, Unclassified Cyber Security Program, and DOE M 471.2-2, Classified Information Systems Security Manual. DOE N 205.13, dated 7-6-04, extends this notice until 7-6-05. Cancels DOE M 471.2-2, Chapter III, section 8.

  4. DISTRICT COMMAND BRIEF

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Major Maintenance at Philpott Lake Daniel Brown Chief, Lakes Branch, Operations Division April 2, 2015 BUILDING STRONG GovernorExciter Replacement BUILDING STRONG Switchgear ...

  5. SU-C-BRD-05: Implementation of Incident Learning in the Safety and Quality Management of Radiotherapy: The Primary Experience in a New Established Program with Advanced Techniques

    SciTech Connect (OSTI)

    Yang, R; Wang, J

    2014-06-15

    Purpose: To explore the implementation and effectiveness of incident learning for the safety and quality of radiotherapy in a new established radiotherapy program with advanced technology. Methods: Reference to the consensus recommendations by American Association of Physicist in Medicine, an incident learning system was specifically designed for reporting, investigating, and learning of individual radiotherapy incidents in a new established radiotherapy program, with 4D CBCT, Ultrasound guided radiotherapy, VMAT, gated treatment delivered on two new installed linacs. The incidents occurring in external beam radiotherapy from February, 2012 to January, 2014 were reported. Results: A total of 33 reports were analyzed, including 28 near misses and 5 incidents. Among them, 5 originated in imaging for planning, 25 in planning, 1 in plan transfer, 1 in commissioning and 1 in treatment delivery. Among them, three near misses originated in the safety barrier of the radiotherapy process. In terms of error type, 1 incident was classified as wrong patient, 7 near misses/incidents as wrong site, 6 as wrong laterality, 5 as wrong dose, 7 as wrong prescription, and 7 as suboptimal plan quality. 5 incidents were all classified as grade 1/2 of dosimetric severity, 1 as grade 0, and the other 4 as grade 1 of medical severity. For the causes/contributory factors, negligence, policy not followed, inadequate training, failure to develop an effective plan, and communication contributed to 19, 15, 12, 5 and 3 near misses/incidents, respectively. The average incident rate per 100 patients treated was 0.4; this rate fell to 0.28% in the second year from 0.56% in the first year. The rate of near miss fell to 1.24% from 2.22%. Conclusion: Effective incident learning can reduce the occurrence of near miss/incidents, enhance the culture of safety. Incident learning is an effective proactive method for improving the quality and safety of radiotherapy.

  6. Federal Response Assets for a Radioactive Dispersal Device Incident

    SciTech Connect (OSTI)

    Sullivan,T.

    2009-06-30

    If a large scale RDD event where to occur in New York City, the magnitude of the problem would likely exceed the capabilities of City and State to effectively respond to the event. New York State could request Federal Assistance if the United States President has not already made the decision to provide it. The United States Federal Government has a well developed protocol to respond to emergencies. The National Response Framework (NRF) describes the process for responding to all types of emergencies including RDD incidents. Depending on the location and type of event, the NRF involves appropriate Federal Agencies, e.g., Department of Homeland Security (DHS), the Department of Energy (DOE), Environmental Protection Agency (EPA), United States Coast Guard (USCG), Department of Defense (DOD), Department of Justice (DOJ), Department of Agriculture (USDA), and Nuclear Regulatory Commission (NRC). The Federal response to emergencies has been refined and improved over the last thirty years and has been tested on natural disasters (e.g. hurricanes and floods), man-made disasters (oil spills), and terrorist events (9/11). However, the system has never been tested under an actual RDD event. Drills have been conducted with Federal, State, and local agencies to examine the initial (early) phases of such an event (TopOff 2 and TopOff 4). The Planning Guidance for Protection and Recovery Following Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) incidents issued by the Department of Homeland Security (DHS) in August 2008 has never been fully tested in an interagency exercise. Recently, another exercise called Empire 09 that was situated in Albany, New York was conducted. Empire 09 consists of 3 different exercises be held in May and June, 2009. The first exercise, May 2009, involved a table top exercise for phase 1 (0-48 hours) of the response to an RDD incident. In early June, a full-scale 3- day exercise was conducted for the mid-phase response (48

  7. ORISE: REAC/TS Medical Management of Radiation Incidents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Medical Management of Radiation Incidents As part of its primary mission for the U.S. Department of Energy (DOE), the Radiation Emergency Assistance CenterTraining Site (REACTS) ...

  8. NNSA Nuclear/Radiological Incident Response | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) December 01, 2008 The National Nuclear Security Administration (NNSA) has over 60 years of nuclear weapons experience in responding to nuclear and radiological accidents and incidents. NNSA provides technical support to the Departments of Homeland Security, Justice, State, and Defense for nuclear terrorism events and domestic nuclear weapon accidents and incidents. The NNSA emergency response assets also provide support to nuclear site and facility accidents and

  9. NNSA Nuclear/Radiological Incident Response | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) January 01, 2009 The National Nuclear Security Administration (NNSA) has more than 60 years of nuclear weapons experience in responding to nuclear and radiological accidents and incidents. NNSA provides technical support to the Departments of Homeland Security, Justice, State, and Defense for nuclear terrorism events and domestic nuclear weapon accidents and incidents. The NNSA emergency response assets also provide support to nuclear site and facility accidents and

  10. Radioactive Waste Issues in Major Nuclear Incidents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Radioactive Waste Issues in Major Nuclear Incidents Radioactive Waste Issues in Major Nuclear Incidents S.Y. Chen*, Illinois Institute of Technology Abstract: Large amounts of radioactive waste had been generated in major nuclear accidents such as the Chernobyl nuclear accident in Ukraine of 1986 and the recent Fukushima nuclear accident in Japan of 2011. The wastes were generated due to the accidental releases of radioactive materials that resulted in widespread contamination throughout the

  11. Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event Symposium

    SciTech Connect (OSTI)

    Lesperance, Ann M.

    2008-06-30

    On March 19, 2008, policy makers, emergency managers, and medical and Public Health officials convened in Seattle, Washington, for a workshop on Catastrophic Incident Recovery: Long-Term Recovery from an Anthrax Event. The day-long symposium was aimed at generating a dialogue about restoration and recovery through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems.

  12. Method and apparatus for controlling a powertrain system including a multi-mode transmission

    DOE Patents [OSTI]

    Hessell, Steven M.; Morris, Robert L.; McGrogan, Sean W.; Heap, Anthony H.; Mendoza, Gil J.

    2015-09-08

    A powertrain including an engine and torque machines is configured to transfer torque through a multi-mode transmission to an output member. A method for controlling the powertrain includes employing a closed-loop speed control system to control torque commands for the torque machines in response to a desired input speed. Upon approaching a power limit of a power storage device transferring power to the torque machines, power limited torque commands are determined for the torque machines in response to the power limit and the closed-loop speed control system is employed to determine an engine torque command in response to the desired input speed and the power limited torque commands for the torque machines.

  13. Comprehensive Energy Assessment: EE and RE Project Optimization Modeling for United States Pacific Command (USPACOM) American Recovery and Reinvestment Act (ARRA) FEMP Technical Assistance

    SciTech Connect (OSTI)

    Brigantic, Robert T.; Papatyi, Anthony F.; Perkins, Casey J.

    2010-09-30

    This report summarizes a study and corresponding model development conducted in support of the United States Pacific Command (USPACOM) as part of the Federal Energy Management Program (FEMP) American Reinvestment and Recovery Act (ARRA). This research was aimed at developing a mathematical programming framework and accompanying optimization methodology in order to simultaneously evaluate energy efficiency (EE) and renewable energy (RE) opportunities. Once developed, this research then demonstrated this methodology at a USPACOM installation - Camp H.M. Smith, Hawaii. We believe this is the first time such an integrated, joint EE and RE optimization methodology has been constructed and demonstrated.

  14. Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  15. Follow-up Audit of the Department's Cyber Security Incident Management...

    Energy Savers [EERE]

    information security incident center, law enforcement agencies and Inspectors General. ... program and adversely impacted the ability of law enforcement to investigate incidents. ...

  16. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  17. Field Deployable Tritium Assay System Remote Control Software

    Energy Science and Technology Software Center (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTASmore » auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.« less

  18. Field Deployable Tritium Assay System Remote Control Software

    SciTech Connect (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTAS auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.

  19. Instrumented SSH on NERSC Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Instrumented SSH Instrumented SSH on NERSC Systems NERSC uses a modified version of SSH on all of our systems that allows us to record and analyze the content of interactive SSH sessions. Why are We Doing This? Credential theft represents the single greatest threat to security here at NERSC. We are addressing this problem by analyzing user command activity and looking for behavior that is recognizably hostile. Until SSH came into widespread use, it was trivial to monitor login sessions and

  20. Violation of Laws, Losses, and Incidents of Security Concerns

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-15

    To set forth Department of Energy (DOE) procedures to assure timely and effective action relating to violations of criminal, laws, loses, and incidents of security concern to DOE. Cancels DOE O 5631.5. Canceled by DOE O 470.1 of 9-28-1995.

  1. Oscillation control system for electric motor drive

    DOE Patents [OSTI]

    Slicker, James M.; Sereshteh, Ahmad

    1988-01-01

    A feedback system for controlling mechanical oscillations in the torsionally complaint drive train of an electric or other vehicle. Motor speed is converted in a processor to estimate state signals in which a plant model which are used to electronically modify thetorque commands applied to the motor.

  2. Oscillation control system for electric motor drive

    DOE Patents [OSTI]

    Slicker, J.M.; Sereshteh, A.

    1988-08-30

    A feedback system for controlling mechanical oscillations in the torsionally complaint drive train of an electric or other vehicle. Motor speed is converted in a processor to estimate state signals in which a plant model which are used to electronically modify the torque commands applied to the motor. 5 figs.

  3. MO-G-BRE-09: Validating FMEA Against Incident Learning Data: A Study in Stereotactic Body Radiation Therapy

    SciTech Connect (OSTI)

    Yang, F; Cao, N; Young, L; Howard, J; Sponseller, P; Logan, W; Arbuckle, T; Korssjoen, T; Meyer, J; Ford, E

    2014-06-15

    Purpose: Though FMEA (Failure Mode and Effects Analysis) is becoming more widely adopted for risk assessment in radiation therapy, to our knowledge it has never been validated against actual incident learning data. The objective of this study was to perform an FMEA analysis of an SBRT (Stereotactic Body Radiation Therapy) treatment planning process and validate this against data recorded within an incident learning system. Methods: FMEA on the SBRT treatment planning process was carried out by a multidisciplinary group including radiation oncologists, medical physicists, and dosimetrists. Potential failure modes were identified through a systematic review of the workflow process. Failure modes were rated for severity, occurrence, and detectability on a scale of 1 to 10 and RPN (Risk Priority Number) was computed. Failure modes were then compared with historical reports identified as relevant to SBRT planning within a departmental incident learning system that had been active for two years. Differences were identified. Results: FMEA identified 63 failure modes. RPN values for the top 25% of failure modes ranged from 60 to 336. Analysis of the incident learning database identified 33 reported near-miss events related to SBRT planning. FMEA failed to anticipate 13 of these events, among which 3 were registered with severity ratings of severe or critical in the incident learning system. Combining both methods yielded a total of 76 failure modes, and when scored for RPN the 13 events missed by FMEA ranked within the middle half of all failure modes. Conclusion: FMEA, though valuable, is subject to certain limitations, among them the limited ability to anticipate all potential errors for a given process. This FMEA exercise failed to identify a significant number of possible errors (17%). Integration of FMEA with retrospective incident data may be able to render an improved overview of risks within a process.

  4. METEOROLOGICAL INFLUENCES ON VAPOR INCIDENTS IN THE 200 EAST & 200 WEST TANK FARMS FROM CY2001 THRU CY2004

    SciTech Connect (OSTI)

    FAUROTE, J.M.

    2004-09-30

    Investigation into the meteorological influences on vapor incidents in the tank farms to determine what, if any, meteorological influences contribute to the reporting of odors, smells, vapors, and other gases. Weather phenomena, specifically barometric pressure, and wind velocity and direction can potentially cause or exacerbate a vapor release within the farm systems.

  5. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  6. A Planning Tool for Estimating Waste Generated by a Radiological Incident and Subsequent Decontamination Efforts - 13569

    SciTech Connect (OSTI)

    Boe, Timothy; Lemieux, Paul; Schultheisz, Daniel; Peake, Tom; Hayes, Colin

    2013-07-01

    Management of debris and waste from a wide-area radiological incident would probably constitute a significant percentage of the total remediation cost and effort. The U.S. Environmental Protection Agency's (EPA's) Waste Estimation Support Tool (WEST) is a unique planning tool for estimating the potential volume and radioactivity levels of waste generated by a radiological incident and subsequent decontamination efforts. The WEST was developed to support planners and decision makers by generating a first-order estimate of the quantity and characteristics of waste resulting from a radiological incident. The tool then allows the user to evaluate the impact of various decontamination/demolition strategies on the waste types and volumes generated. WEST consists of a suite of standalone applications and Esri{sup R} ArcGIS{sup R} scripts for rapidly estimating waste inventories and levels of radioactivity generated from a radiological contamination incident as a function of user-defined decontamination and demolition approaches. WEST accepts Geographic Information System (GIS) shape-files defining contaminated areas and extent of contamination. Building stock information, including square footage, building counts, and building composition estimates are then generated using the Federal Emergency Management Agency's (FEMA's) Hazus{sup R}-MH software. WEST then identifies outdoor surfaces based on the application of pattern recognition to overhead aerial imagery. The results from the GIS calculations are then fed into a Microsoft Excel{sup R} 2007 spreadsheet with a custom graphical user interface where the user can examine the impact of various decontamination/demolition scenarios on the quantity, characteristics, and residual radioactivity of the resulting waste streams. (authors)

  7. Researchers correlate incidences of rheumatoid arthritis and giant cell

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    arteritis with solar cycles | Princeton Plasma Physics Lab Researchers correlate incidences of rheumatoid arthritis and giant cell arteritis with solar cycles By John Greenwald June 15, 2015 Tweet Widget Google Plus One Share on Facebook A coronal mass ejection hurling plasma from the sun (Photo by NASA) A coronal mass ejection hurling plasma from the sun What began as a chat between husband and wife has evolved into an intriguing scientific discovery. The results, published in May in BMJ

  8. Researchers correlate incidences of rheumatoid arthritis and giant cell

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    arteritis with solar cycles | Princeton Plasma Physics Lab Researchers correlate incidences of rheumatoid arthritis and giant cell arteritis with solar cycles By John Greenwald June 15, 2015 Tweet Widget Google Plus One Share on Facebook A coronal mass ejection hurling plasma from the sun (Photo by NASA) A coronal mass ejection hurling plasma from the sun What began as a chat between husband and wife has evolved into an intriguing scientific discovery. The results, published in May in BMJ

  9. Incidents at nuclear power plants caused by the human factor

    SciTech Connect (OSTI)

    Mashin, V. A.

    2012-09-15

    Psychological analysis of the causes of incorrect actions by personnel is discussed as presented in the report 'Methodological guidelines for analyzing the causes of incidents in the operation of nuclear power plants.' The types of incorrect actions and classification of the root causes of errors by personnel are analyzed. Recommendations are made for improvements in the psychological analysis of causes of incorrect actions by personnel.

  10. ORISE: REAC/TS Medical Management of Radiation Incidents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Medical Management of Radiation Incidents As part of its primary mission for the U.S. Department of Energy (DOE), the Radiation Emergency Assistance Center/Training Site (REAC/TS) at the Oak Ridge Institute for Science and Education (ORISE) is available 24 hours a day, seven days a week to consult with officials from any federal, state or local government agency; industries; international governments or organizations; or individuals needing assistance with the medical management of a radiation

  11. INSPECTION REPORT Technetium-99 Incident at Los Alamos National Laboratory

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technetium-99 Incident at Los Alamos National Laboratory OAI-L-16-13 August 2016 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Department of Energy Washington, DC 20585 August 2, 2016 MEMORANDUM FOR THE ASSOCIATE ADMINISTRATOR FOR EMERGENCY OPERATIONS, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo Deputy Assistant Inspector General for Audits and Inspections Office of Inspector General SUBJECT: INFORMATION: Inspection Report on the

  12. SDI (Strategic Defense Initiative) Battle Management/C3 (Command, Control and Communications) algorithms technology program plan. Final report, March-November 1987

    SciTech Connect (OSTI)

    Frenkel, G.; Paterson, T.S.; Smith, M.E.

    1988-04-01

    The Institute for Defense Analyses (IDA) has collected and analyzed information on battle management algorithm technology that is relevant to Battle Management/Command, Control and Communications (BM/C3). This Memorandum Report represents a program plan that will provide the BM/C3 Directorate of the Strategic Defense Initiative Organization (SDIO) with administrative and technical insight into algorithm technology. This program plan focuses on current activity in algorithm development and provides information and analysis to the SDIO to be used in formulating budget requirements for FY 1988 and beyond. Based upon analysis of algorithm requirements and ongoing programs, recommendations have been made for research areas that should be pursued, including both the continuation of current work and the initiation of new tasks. This final report includes all relevant material from interim reports as well as new results.

  13. SDI (Strategic Defense Initiative) Battle Management/C3 (Command, Control, and Communications) networking technology program plan. Final report, January 1987-October 1988

    SciTech Connect (OSTI)

    Botta, R.; Noll, S.

    1988-12-01

    The Institute for Defense Analyses (IDA) has collected and analyzed information on network technology that is relevant to Battle Management Command, Control, and Communications (BM/C3). This memorandum report represents a program plan that will provide the SDIO BM C3 directorate with administrative and technical insight into network technology. This program plan focuses on C3 network concepts and provides information and analysis to the SDIO to be used in formulating budget requirements for FY 1988 and beyond. Based upon analysis of network requirements and ongoing programs, recommendations have been made for research areas that should be funded, including both the continuation of current work and the initiation of new tasks. While emphasis here is on the SDIO-funded tasks, other relevant government-sponsored and commercial efforts, such as packet radio networks, also have been examined.

  14. Control system and method for payload control in mobile platform cranes

    SciTech Connect (OSTI)

    Robinett, III, Rush D.; Groom, Kenneth N.; Feddema, John T.; Parker, Gordon G.

    2002-01-01

    A crane control system and method provides a way to generate crane commands responsive to a desired payload motion to achieve substantially pendulation-free actual payload motion. The control system and method apply a motion compensator to maintain a payload in a defined payload configuration relative to an inertial coordinate frame. The control system and method can further comprise a pendulation damper controller to reduce an amount of pendulation between a sensed payload configuration and the defined payload configuration. The control system and method can further comprise a command shaping filter to filter out a residual payload pendulation frequency from the desired payload motion.

  15. Office of Enterprise Assessments Review of the Sandia National...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Material IC Incident Commander ICP Incident Command Post KAFB-FD Kirtland Air Force Base Fire Department NARAC National Atmospheric Release Advisory Center OE Operational ...

  16. Strategic Defense Initiative Demonstration/Validation program environmental assessment. Battle management/command, control, and communications (BM/C3)

    SciTech Connect (OSTI)

    Brown, G.

    1987-08-01

    The Strategic Defense Initiative Organization (SDIO) and its proponents (U.S. Army and U.S. Air Force) plan to conduct Demonstration/Validation tests of the BM/C3 technology. These tests will demonstrate the ability of the technology to perform the required tasks, and will validate a future decision on whether to proceed with Full-Scale Development. Demonstration/Validation tests would be conducted at the Advanced Research Center, Electronic Systems Division, National Test Facility, Rome Air Development Center, Nevada Test Site, Harry Diamond Laboratories, and at contractor facilities. Tests would include analyses, simulations, and component/assembly tests. This document addresses the potential environmental consequences of the Demonstration/Validation testing of the BM/C3 technology.

  17. Evaluation of computer-aided system design tools for SDI (Strategic Defense Initiative) Battle Management/C3 (command, control and communications) architecture development. Final report

    SciTech Connect (OSTI)

    Fife, D.W.; Campbell, K.; Chludzinski, J.; Corcoran, N.; Gonzalez, C.

    1987-10-01

    This IDA paper was prepared at the request of the Strategic Defense Initiative Organization. The paper documents findings of an evaluation on the capabilities of certain computer software/computer-aided software engineering (CASE) tools to provide computer-aided graphic design of Battle Management/C3 for the SDIO. Each tool (of the five selected on the basis of the best available at this time), was installed at IDA. After training by vendor tool staff, an IDA team, using a hands-on design experience determined the merits of the tools for SDI application. A comparative summary of the tools is given relative to envisaged SDI requirements and an extensive questionnaire is answered for each.

  18. Challenges for Early Responders to a Nuclear / Radiological Terrorism Incident

    SciTech Connect (OSTI)

    Wells, M.A.; Stearns, L.J.; Davie, A.D.; Day, E.

    2007-07-01

    Even in the best of circumstances, most municipalities would face severe challenges in providing effective incident response to a large scale radiation release caused by nuclear terrorism or accident. Compounding obvious complexities, the effectiveness of first and early responders to a radiological emergency may also be hampered by an insufficient distribution of radiation detection and monitoring equipment, local policies concerning triage and field decontamination of critical victims, malfunctioning communications, inadequate inter-agency agility, and the psychological 'fear' impact on early responders. This paper examines several issues impeding the early response to nuclear terrorism incidents with specific consideration given to the on-going and forward-thinking preparedness efforts currently being developed in the Sacramento, California region. Specific recommendations are provided addressing hot zone protocols, radiation detection and monitoring equipment, hasty patient packaging techniques, vertically and horizontally integrated pre-event training, mitigating psychological fear, and protocols for the effective 'hand-off' from first responders to subsequent early response-recovery teams. (authors)

  19. Investigation of excess thyroid cancer incidence in Los Alamos County

    SciTech Connect (OSTI)

    Athas, W.F.

    1996-04-01

    Los Alamos County (LAC) is home to the Los Alamos National Laboratory, a U.S. Department of Energy (DOE) nuclear research and design facility. In 1991, the DOE funded the New Mexico Department of Health to conduct a review of cancer incidence rates in LAC in response to citizen concerns over what was perceived as a large excess of brain tumors and a possible relationship to radiological contaminants from the Laboratory. The study found no unusual or alarming pattern in the incidence of brain cancer, however, a fourfold excess of thyroid cancer was observed during the late-1980`s. A rapid review of the medical records for cases diagnosed between 1986 and 1990 failed to demonstrate that the thyroid cancer excess had resulted from enhanced detection. Surveillance activities subsequently undertaken to monitor the trend revealed that the excess persisted into 1993. A feasibility assessment of further studies was made, and ultimately, an investigation was conducted to document the epidemiologic characteristics of the excess in detail and to explore possible causes through a case-series records review. Findings from the investigation are the subject of this report.

  20. The effect of diet and exercise on incidence of 7,12dimethylbenz...

    Office of Scientific and Technical Information (OSTI)

    The effect of diet and exercise on incidence of 7,12 dimethylbenz(a)anthracene-induced ... appeared to be related to mammary tumor incidence rather than body wt. or dietary fat. ...

  1. Rapid Deployment Shelter System | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rapid Deployment Shelter ... Rapid Deployment Shelter System The mp4 video format is not supported by this browser. Download video Captions: On Time: 5:03 min. Originally designed as a mobile surgical suite, the RDSS can also be converted and used for a command, control, logisitics, or operations center

  2. Servo control booster system for minimizing following error

    DOE Patents [OSTI]

    Wise, W.L.

    1979-07-26

    A closed-loop feedback-controlled servo system is disclosed which reduces command-to-response error to the system's position feedback resolution least increment, ..delta..S/sub R/, on a continuous real-time basis, for all operational times of consequence and for all operating speeds. The servo system employs a second position feedback control loop on a by exception basis, when the command-to-response error greater than or equal to ..delta..S/sub R/, to produce precise position correction signals. When the command-to-response error is less than ..delta..S/sub R/, control automatically reverts to conventional control means as the second position feedback control loop is disconnected, becoming transparent to conventional servo control means. By operating the second unique position feedback control loop used herein at the appropriate clocking rate, command-to-response error may be reduced to the position feedback resolution least increment. The present system may be utilized in combination with a tachometer loop for increased stability.

  3. The incidence of stellar mergers and mass gainers among massive stars

    SciTech Connect (OSTI)

    De Mink, S. E.; Sana, H.; Langer, N.; Izzard, R. G.; Schneider, F. R. N.

    2014-02-10

    Because the majority of massive stars are born as members of close binary systems, populations of massive main-sequence stars contain stellar mergers and products of binary mass transfer. We simulate populations of massive stars accounting for all major binary evolution effects based on the most recent binary parameter statistics and extensively evaluate the effect of model uncertainties. Assuming constant star formation, we find that 8{sub −4}{sup +9}% of a sample of early-type stars are the products of a merger resulting from a close binary system. In total we find that 30{sub −15}{sup +10}% of massive main-sequence stars are the products of binary interaction. We show that the commonly adopted approach to minimize the effects of binaries on an observed sample by excluding systems detected as binaries through radial velocity campaigns can be counterproductive. Systems with significant radial velocity variations are mostly pre-interaction systems. Excluding them substantially enhances the relative incidence of mergers and binary products in the non-radial velocity variable sample. This poses a challenge for testing single stellar evolutionary models. It also raises the question of whether certain peculiar classes of stars, such as magnetic O stars, are the result of binary interaction and it emphasizes the need to further study the effect of binarity on the diagnostics that are used to derive the fundamental properties (star-formation history, initial mass function, mass-to-light ratio) of stellar populations nearby and at high redshift.

  4. System and method for representing and manipulating three-dimensional objects on massively parallel architectures

    DOE Patents [OSTI]

    Karasick, M.S.; Strip, D.R.

    1996-01-30

    A parallel computing system is described that comprises a plurality of uniquely labeled, parallel processors, each processor capable of modeling a three-dimensional object that includes a plurality of vertices, faces and edges. The system comprises a front-end processor for issuing a modeling command to the parallel processors, relating to a three-dimensional object. Each parallel processor, in response to the command and through the use of its own unique label, creates a directed-edge (d-edge) data structure that uniquely relates an edge of the three-dimensional object to one face of the object. Each d-edge data structure at least includes vertex descriptions of the edge and a description of the one face. As a result, each processor, in response to the modeling command, operates upon a small component of the model and generates results, in parallel with all other processors, without the need for processor-to-processor intercommunication. 8 figs.

  5. System and method for representing and manipulating three-dimensional objects on massively parallel architectures

    DOE Patents [OSTI]

    Karasick, Michael S.; Strip, David R.

    1996-01-01

    A parallel computing system is described that comprises a plurality of uniquely labeled, parallel processors, each processor capable of modelling a three-dimensional object that includes a plurality of vertices, faces and edges. The system comprises a front-end processor for issuing a modelling command to the parallel processors, relating to a three-dimensional object. Each parallel processor, in response to the command and through the use of its own unique label, creates a directed-edge (d-edge) data structure that uniquely relates an edge of the three-dimensional object to one face of the object. Each d-edge data structure at least includes vertex descriptions of the edge and a description of the one face. As a result, each processor, in response to the modelling command, operates upon a small component of the model and generates results, in parallel with all other processors, without the need for processor-to-processor intercommunication.

  6. Methods, systems and apparatus for controlling operation of two alternating current (AC) machines

    DOE Patents [OSTI]

    Gallegos-Lopez, Gabriel; Nagashima, James M.; Perisic, Milun; Hiti, Silva

    2012-06-05

    A system is provided for controlling two alternating current (AC) machines via a five-phase PWM inverter module. The system comprises a first control loop, a second control loop, and a current command adjustment module. The current command adjustment module operates in conjunction with the first control loop and the second control loop to continuously adjust current command signals that control the first AC machine and the second AC machine such that they share the input voltage available to them without compromising the target mechanical output power of either machine. This way, even when the phase voltage available to either one of the machines decreases, that machine outputs its target mechanical output power.

  7. Energy Management System Lowers U.S. Navy Energy Costs Through PV System Interconnection (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-04-01

    To meet the U.S. Navy's energy goals, the National Renewable Energy Laboratory (NREL) and the Naval Facilities Engineering Command (NAVFAC) spent two years collaborating on demonstrations that tested market-ready energy efficiency measures, renewable energy generation, and energy systems integration. One such technology - an energy management system - was identified as a promising method for reducing energy use and costs, and can contribute to increasing energy security.

  8. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    SciTech Connect (OSTI)

    Medina, Richard M; Siebeneck, Laura K.; Hepner, George F.

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  9. Technical Review of Law Enforcement Standards and Guides Relative to Incident Management

    SciTech Connect (OSTI)

    Stenner, Robert D.; Salter, R.; Stanton, J. R.; Fisher, D.

    2009-03-24

    enforcement standards and guides identified the following four guides as having content that supports incident management: • TE-02-02 Guide to Radio Communications Interoperability Strategies and Products • OSHA 335-10N Preparing and Protecting Security Personnel in Emergencies • NIJ 181584 Fire and Arson Scene Evidence: A Guide for Public Safety Personnel • NIJ 181869 A Guide for Explosion and Bombing Scene Investigation In conversations with various state and local law enforcement officials, it was determined that the following National Fire Protection Association (NPFA) standards are generally recognized and tend to be universally used by law enforcement organizations across the country: • NFPA 1600 Standard on Disaster/Emergency Management and Business Continuity Programs • NFPA 1561 Standard on Fire Department Incident Management Systems • NFPA 472 Standard for Competence of Responders to Hazardous Materials/Weapons of Mass Destruction Incidents (2008 Edition) • NFPA 473 Standard for Competencies for EMS Personnel Responding to Hazardous Materials/Weapons of Mass Destruction Incidents (2008 Edition)

  10. Straddle Carrier Interface and Dispatching System

    Energy Science and Technology Software Center (OSTI)

    2012-09-13

    SCIDS is the Data Dispatching and Transfer Point (DDTP) component of a straddle carrier-based radiation detection system developed for the DOE Megaports Initiative for scanning shipping containers in transshipment ports. Its purpose is to communicate with a Radiation Detection Straddle Carrier (RDSC) developed by Detector Networks International, sending commands to the RDSC and receiving sensor data from the RDSC. Incoming sensor and status data from the RDSC is forwarded to a back-end data storage andmore » display system that is external to SCIDS. SCIDS provides a graphical user interface for port operations personnel that displays location and status of the RDSC and status of each container in the port, and accepts commands from the operator directing the scanning operations of the RDSC.« less

  11. Reaction cross sections of carbon isotopes incident on a proton

    SciTech Connect (OSTI)

    Abu-Ibrahim, B.; Horiuchi, W.; Kohama, A.; Suzuki, Y.

    2008-03-15

    We systematically study total reaction cross sections of carbon isotopes with N=6-16 on a proton target for wide range of incident energies. An emphasis is put on the difference from the case of a carbon target. The calculations include the reaction cross sections of {sup 19,20,22}C at 40A MeV, the data of which have recently been measured at RIKEN. The Glauber theory is used to calculate the reaction cross sections. To describe the intrinsic structure of the carbon isotopes, we use a Slater determinant generated from a phenomenological mean-field potential, and construct the density distributions. To go beyond the simple mean-field model, we adopt two types of dynamical models: One is a core+n model for odd-neutron nuclei, and the other is a core+n+n model for {sup 16}C and {sup 22}C. We propose empirical formulas which are useful in predicting unknown cross sections.

  12. Erigo and EaglePicher | Energy Systems Integration | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Erigo and EaglePicher NREL researchers are testing an energy storage system for a microgrid-developed by Erigo and EaglePicher and sponsored by U.S. Northern Command-that contains three independently controllable energy storage technologies. Photo of energy storage system hardware in a laboratory Photo by Dennis Schroeder Microgrids-and effective storage systems supporting them-are especially important for remote military bases where accessing energy can be costly and dangerous. This research is

  13. Power-cable-carrier control (PC/sup 3/) system

    SciTech Connect (OSTI)

    Alvis, R.L.; Wally, K.; Rosborough, J.R.

    1981-04-01

    A control system has been developed that uses a carrier signal imposed on an existing ac power circuit to transmit commands. This system was specifically developed to control an entire solar collector field by sending sun-tracking information to the trough collectors or by commanding them to assume safe positions (STOW) if out-of-limit conditions were encountered. Objectives were to develop a control system that operates reliably and has enough functions to control an entire collector field, yet do it at less cost than for conventional approaches. Development, design, operating characteristics, and field testing and results of the new system, the Power Cable Carrier Control (PC/sup 3/) System are described.

  14. Residential radon and lung cancer incidence in a Danish cohort

    SciTech Connect (OSTI)

    Braeuner, Elvira V.; Andersen, Claus E.; Sorensen, Mette; Jovanovic Andersen, Zorana; Center for Epidemiology Screening, Department of Public Health, University of Copenhagen ; Gravesen, Peter; Ulbak, Kaare; Hertel, Ole; Pedersen, Camilla; Overvad, Kim; Tjonneland, Anne; Raaschou-Nielsen, Ole

    2012-10-15

    High-level occupational radon exposure is an established risk factor for lung cancer. We assessed the long-term association between residential radon and lung cancer risk using a prospective Danish cohort using 57,053 persons recruited during 1993-1997. We followed each cohort member for cancer occurrence until 27 June 2006, identifying 589 lung cancer cases. We traced residential addresses from 1 January 1971 until 27 June 2006 and calculated radon at each of these addresses using information from central databases regarding geology and house construction. Cox proportional hazards models were used to estimate incidence rate ratios (IRR) and 95% confidence intervals (CI) for lung cancer risk associated with residential radon exposure with and without adjustment for sex, smoking variables, education, socio-economic status, occupation, body mass index, air pollution and consumption of fruit and alcohol. Potential effect modification by sex, traffic-related air pollution and environmental tobacco smoke was assessed. Median estimated radon was 35.8 Bq/m{sup 3}. The adjusted IRR for lung cancer was 1.04 (95% CI: 0.69-1.56) in association with a 100 Bq/m{sup 3} higher radon concentration and 1.67 (95% CI: 0.69-4.04) among non-smokers. We found no evidence of effect modification. We find a positive association between radon and lung cancer risk consistent with previous studies but the role of chance cannot be excluded as these associations were not statistically significant. Our results provide valuable information at the low-level radon dose range.

  15. NNSA Nuclear/Radiological Incident Response | National Nuclear...

    National Nuclear Security Administration (NNSA)

    use and interpretation of specialized radiation detection equipment; core technical ... Aerial Measuring System (AMS) - AMS characterizes ground-deposited radiation from aerial ...

  16. Oblique incidence effects in direct x-ray detectors: A first-order approximation using a physics-based analytical model

    SciTech Connect (OSTI)

    Badano, Aldo; Freed, Melanie; Fang Yuan

    2011-04-15

    Purpose: The authors describe the modifications to a previously developed analytical model of indirect CsI:Tl-based detector response required for studying oblique x-ray incidence effects in direct semiconductor-based detectors. This first-order approximation analysis allows the authors to describe the associated degradation in resolution in direct detectors and compare the predictions to the published data for indirect detectors. Methods: The proposed model is based on a physics-based analytical description developed by Freed et al. [''A fast, angle-dependent, analytical model of CsI detector response for optimization of 3D x-ray breast imaging systems,'' Med. Phys. 37(6), 2593-2605 (2010)] that describes detector response functions for indirect detectors and oblique incident x rays. The model, modified in this work to address direct detector response, describes the dependence of the response with x-ray energy, thickness of the transducer layer, and the depth-dependent blur and collection efficiency. Results: The authors report the detector response functions for indirect and direct detector models for typical thicknesses utilized in clinical systems for full-field digital mammography (150 {mu}m for indirect CsI:Tl and 200 {mu}m for a-Se direct detectors). The results suggest that the oblique incidence effect in a semiconductor detector differs from that in indirect detectors in two ways: The direct detector model produces a sharper overall PRF compared to the response corresponding to the indirect detector model for normal x-ray incidence and a larger relative increase in blur along the x-ray incidence direction compared to that found in indirect detectors with respect to the response at normal incidence angles. Conclusions: Compared to the effect seen in indirect detectors, the direct detector model exhibits a sharper response at normal x-ray incidence and a larger relative increase in blur along the x-ray incidence direction with respect to the blur in the

  17. Upgrading RESRAD-RDD and Planning for Improvised Nuclear Device Incidents--The RESRAD-RDD&IND

    Broader source: Energy.gov [DOE]

    Upgrading RESRAD-RDD and Planning for Improvised Nuclear Device Incidents--The RESRAD-RDD&IND Abstract: The RESRAD-RDD code was developed through the interagency Operational Guidelines Task Group (OGT) to assist decision makers, emergency responders, and emergency preparedness planners for response to radiological dispersal device incidents (RDD). The RESRAD-RDD code was released as a companion software tool in 2009 to support the OGT Manual—Preliminary Report on Operational Guidelines Developed for Use in Emergency Preparedness and Response to a Radiological Dispersal Device Incident (DOE/HS-0001). The original RESRAD-RDD code was Microsoft Excel based software with the user interface written in Visual Basic. This version of RESRAD-RDD is being converted to a database driven software that runs on Windows 7 operating system in the .NET environment. The new RESRAD-RDD code is being tested to make sure it reproduces old code results. The new code runs faster than the old spreadsheets code by a factor of 10 or so, fewer clicks are required for the same calculations, operational guidelines can be easily located, and the reports can be written to PDFs instead of HTML. Additional radionuclides are also being added to the new RESRAD-RDD code. An Improvised Nuclear Device (IND) scenario is also being added to the code and about 44 - 60 radionuclides will be added to handle IND incident. A new OGT Task Group is in the process of updating the OGT Manual and providing guidance on the development of the IND scenario and methodology. The new code, RESRAD-RDD&IND is expected to be released in early 2015. Charley Yu*, Argonne National Laboratory ; Carlos Corredor, U.S. Department of Energy; Jing-Jy Cheng, Argonne National Laboratory; Sunita Kamboj, Argonne National Laboratory; David LePoire, Argonne National Laboratory; Paul Flood, Argonne National Laboratory

  18. Independent Oversight Inspection of Emergency Management at the...

    Broader source: Energy.gov (indexed) [DOE]

    ...NEEDS IMPROVEMENT Emergency Response LANL Incident Command Team and EOC Decision-Making ... NEEDS IMPROVEMENT Readiness...

  19. Sputter deposition of Al-doped ZnO films with various incident angles

    SciTech Connect (OSTI)

    Sato, Yasushi; Yanagisawa, Kei; Oka, Nobuto; Nakamura, Shin-ichi; Shigesato, Yuzo

    2009-09-15

    Al-doped ZnO (AZO) films were sputter deposited on glass substrates heated at 200 degree sign C under incident angles of sputtered particles at 0 degree sign (incidence normal to substrate), 20 deg., 40 deg., 60 deg., and 80 deg. In the case of normal incidence, x-ray diffraction pole figures show a strong [001] preferred orientation normal to the film surface. In contrast, in the case wherein the incident angles were higher than 60 degree sign , the [001] orientation inclined by 25 deg. - 35 deg. toward the direction of sputtered particles. Transmission electron microscopy revealed that the tilt angle of the [001] orientation increased with increasing angle of the incident sputtered particles, whereas the columnar structure did not show any sign of inclination with respect to the substrate plane.

  20. Renewable Energy, Photovoltaic Systems Near Airfields. Electromagnetic Interference

    SciTech Connect (OSTI)

    Deline, Chris; Dann, Geoff

    2015-04-01

    Recent increases in photovoltaic (PV) systems on Department of the Navy (DON) land and potential siting near airfields prompted Commander, Naval Installations Command to fund the Naval Facilities Engineering Command to evaluate the impact of electromagnetic interference (EMI) from PV systems on airfield electronic equipment. Naval Facilities Engineering and Expeditionary Warfare Center tasked Department of Energy National Renewable Energy laboratory (NREL) to conduct the assessment. PV systems often include high-speed switching semiconductor circuits to convert the voltage produced by the PV arrays to the voltage needed by the end user. Switching circuits inherently produce electromagnetic radiation at harmonics of the switching frequency. In this report, existing literature is summarized and tests to measure emissions and mitigation methods are discussed. The literature shows that the emissions from typical PV systems are low strength and unlikely to cause interference to most airfield electronic systems. With diligent procurement and siting of PV systems, including specifications for FCC Part 15 Class A compliant equipment and a 250-foot setback from communication equipment, NREL anticipates little to no EMI impact on nearby communications or telemetry equipment.

  1. Do solar cycles influence giant cell arteritis and rheumatoid arthritis incidence?

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Wing, Simon; Rider, Lisa G.; Johnson, Jay R.; Miller, Federick W.; Matteson, Eric L.; Crowson, C. S.; Gabriel, S. E.

    2015-05-15

    Our objective was to examine the influence of solar cycle and geomagnetic effects on the incidence of giant cell arteritis (GCA) and rheumatoid arthritis (RA). Methods: We used data from patients with GCA (1950-2004) and RA (1955-2007) obtained from population-based cohorts. Yearly trends in age-adjusted and sex-adjusted incidence were correlated with the F10.7 index (solar radiation at 10.7 cm wavelength, a proxy for the solar extreme ultraviolet radiation) and AL index (a proxy for the westward auroral electrojet and a measure of geomagnetic activity). Fourier analysis was performed on AL, F10.7, and GCA and RA incidence rates. Results: The correlationmore » of GCA incidence with AL is highly significant: GCA incidence peaks 0-1 year after the AL reaches its minimum (ie, auroral electrojet reaches a maximum). The correlation of RA incidence with AL is also highly significant. RA incidence rates are lowest 5-7 years after AL reaches maximum. AL, GCA and RA incidence power spectra are similar: they have a main peak (periodicity) at about 10 years and a minor peak at 4-5 years. However, the RA incidence power spectrum main peak is broader (8-11 years), which partly explains the lower correlation between RA onset and AL. The auroral electrojets may be linked to the decline of RA incidence more strongly than the onset of RA. The incidences of RA and GCA are aligned in geomagnetic latitude. Conclusions: AL and the incidences of GCA and RA all have a major periodicity of about 10 years and a secondary periodicity at 4-5 years. Geomagnetic activity may explain the temporal and spatial variations, including east-west skewness in geographic coordinates, in GCA and RA incidence, although the mechanism is unknown. Lastly, the link with solar, geospace and atmospheric parameters need to be investigated. These novel findings warrant examination in other populations and with other autoimmune diseases.« less

  2. Structure and Dynamics of Polymer Nanocomposites by Grazing-Incidence X-Ray

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Techniques (Presentation) | Department of Energy Structure and Dynamics of Polymer Nanocomposites by Grazing-Incidence X-Ray Techniques (Presentation) Structure and Dynamics of Polymer Nanocomposites by Grazing-Incidence X-Ray Techniques (Presentation) Presented at the High Temperature Membrane Working Group (HTMWG) Meeting held on October 10, 2007 in Washington, D.C. htwmg_oct07_wang.pdf (1.78 MB) More Documents & Publications Block Copolymer Separators for Lithium Batteries FY 2004

  3. Investigation of Incident at Waste Isolation Pilot Plant by Technical Assessment Team

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Investigation of Incident at Waste Isolation Pilot Plant by Technical Assessment Team March 2015 Overall Findings On February 14, 2014, an incident in Panel 7 Room 7 (P7R7) of the Waste Isolation Pilot Plant (WIPP) underground repository resulted in the release of radioactive material into the environment and contaminated 21 people with low-level radioactivity. The Technical Assessment Team (TAT) concluded that one drum, Drum 68660, was the source of radioactive contamination released during the

  4. Staged venting of fuel cell system during rapid shutdown

    DOE Patents [OSTI]

    Clingerman, Bruce J.; Doan, Tien M.; Keskula, Donald H.

    2002-01-01

    A venting methodology and system for rapid shutdown of a fuel cell apparatus of the type used in a vehicle propulsion system. H.sub.2 and air flows to the fuel cell stack are slowly bypassed to the combustor upon receipt of a rapid shutdown command. The bypass occurs over a period of time (for example one to five seconds) using conveniently-sized bypass valves. Upon receipt of the rapid shutdown command, the anode inlet of the fuel cell stack is instantaneously vented to a remote vent to remove all H.sub.2 from the stack. Airflow to the cathode inlet of the fuel cell stack gradually diminishes over the bypass period, and when the airflow bypass is complete the cathode inlet is also instantaneously vented to a remote vent to eliminate pressure differentials across the stack.

  5. Fast Low-Cost Multiple Sensor Readout System

    DOE Patents [OSTI]

    Carter-Lewis, David; Krennich, Frank; Le Bohec, Stephane; Petry, Dirk; Sleege, Gary

    2004-04-06

    A low resolution data acquisition system is presented. The data acquisition system has a plurality of readout modules serially connected to a controller. Each readout module has a FPGA in communication with analog to digital (A/D) converters, which are connected to sensors. The A/D converter has eight bit or lower resolution. The FPGA detects when a command is addressed to it and commands the A/D converters to convert analog sensor data into digital data. The digital data is sent on a high speed serial communication bus to the controller. A graphical display is used in one embodiment to indicate if a sensor reading is outside of a predetermined range.

  6. Staged venting of fuel cell system during rapid shutdown

    DOE Patents [OSTI]

    Keskula, Donald H.; Doan, Tien M.; Clingerman, Bruce J.

    2004-09-14

    A venting methodology and system for rapid shutdown of a fuel cell apparatus of the type used in a vehicle propulsion system. H.sub.2 and air flows to the fuel cell stack are slowly bypassed to the combustor upon receipt of a rapid shutdown command. The bypass occurs over a period of time (for example one to five seconds) using conveniently-sized bypass valves. Upon receipt of the rapid shutdown command, the anode inlet of the fuel cell stack is instantaneously vented to a remote vent to remove all H.sub.2 from the stack. Airflow to the cathode inlet of the fuel cell stack gradually diminishes over the bypass period, and when the airflow bypass is complete the cathode inlet is also instantaneously vented to a remote vent to eliminate pressure differentials across the stack.

  7. Method and apparatus for operating a powertrain system upon detecting a stuck-closed clutch

    DOE Patents [OSTI]

    Hansen, R. Anthony

    2014-02-18

    A powertrain system includes a multi-mode transmission having a plurality of torque machines. A method for controlling the powertrain system includes identifying all presently applied clutches including commanded applied clutches and the stuck-closed clutch upon detecting one of the torque-transfer clutches is in a stuck-closed condition. A closed-loop control system is employed to control operation of the multi-mode transmission accounting for all the presently applied clutches.

  8. International Border Management Systems (IBMS) Program : visions and strategies.

    SciTech Connect (OSTI)

    McDaniel, Michael; Mohagheghi, Amir Hossein

    2011-02-01

    Sandia National Laboratories (SNL), International Border Management Systems (IBMS) Program is working to establish a long-term border security strategy with United States Central Command (CENTCOM). Efforts are being made to synthesize border security capabilities and technologies maintained at the Laboratories, and coordinate with subject matter expertise from both the New Mexico and California offices. The vision for SNL is to provide science and technology support for international projects and engagements on border security.

  9. Holbrook Substation Superconductor Cable System, Long Island, New York Final Report

    SciTech Connect (OSTI)

    Maguire, James; McNamara, Joseph

    2010-06-25

    The LIPA Superconductor project broke ground on July 4, 2006, was first energized on April 22, 2008 (Earth Day) and was commissioned on June 25, 2008. Since commissioning, up until early March, 2009, there were numerous refrigeration events that impacted steady state operations. This led to the review of the alarms that were being generated and a rewrite of the program logic in order to decrease the hypersensitivity surrounding these alarms. The high temperature superconductor (HTS) cable was energized on March 5, 2009 and ran uninterrupted until a human error during a refrigeration system switchover knocked the cable out of the grid in early February 2010. The HTS cable was in the grid uninterrupted from March 5, 2009 to February 4, 2010. Although there have been refrigeration events (propagated mainly by voltage sags/surges) during this period, the system was able to automatically switch over from the primary to the backup refrigeration system without issue as required during this period. On February 4, 2010, when switching from the backup over to the primary refrigeration system, two rather than one liquid nitrogen pumps were started inadvertently by a human error (communication) causing an overpressure in the cable cooling line. This in turn activated the pressure relief valve located in the grounding substation. The cable was automatically taken out of the grid without any damage to the components or system as a result of signals sent from the AMSC control cabinet to the LIPA substation. The cable was switched back into the grid again on March 16, 2010 without incident and has been operational since that time. Since switching from the backup to the primary is not an automatic process, a recent improvement was added to the refrigeration operating system to allow remote commands to return the system from backup to primary cooling. This improvement makes the switching procedure quicker since travel to the site to perform this operation is no longer necessary and

  10. System and method for controlling microgrid

    DOE Patents [OSTI]

    Bose, Sumit; Achilles, Alfredo Sebastian; Liu, Yan; Ahmed, Emad Ezzat; Garces, Luis Jose

    2011-07-19

    A system for controlling a microgrid includes microgrid assets and a tieline for coupling the microgrid to a bulk grid; and a tieline controller coupled to the tieline. At least one of the microgrid assets comprises a different type of asset than another one of the microgrid assets. The tieline controller is configured for providing tieline control signals to adjust active and reactive power in respective microgrid assets in response to commands from the bulk grid operating entity, microgrid system conditions, bulk grid conditions, or combinations thereof.

  11. Heidi Poxon Cobalt Batch System on Theta

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for Running and Tuning Programs on Cray XC Systems with KNL Heidi Poxon Cobalt Batch System on Theta 2 EXAMPLE: qsub -n 2 -t 15 --mode script -A Theta_ESP -q cache-quad --env OMP_NUM_THREADS=16 \ ./runScript qsub -n <number of nodes> -t <wallclock time> --mode script -A <project(allocation)> \ -q <queue> --env <var1=value1:var2=value2....> myScriptFile #!/bin/bash -evx # Command line options will override the three settings below: #COBALT -t 5 #COBALT -q cache-quad

  12. Shutdown system for a nuclear reactor

    DOE Patents [OSTI]

    Groh, Edward F.; Olson, Arne P.; Wade, David C.; Robinson, Bryan W.

    1984-01-01

    An ultimate shutdown system is provided for termination of neutronic activity in a nuclear reactor. The shutdown system includes bead chains comprising spherical containers suspended on a flexible cable. The containers are comprised of mating hemispherical shells which provide a ruggedized enclosure for reactor poison material. The bead chains, normally suspended above the reactor core on storage spools, are released for downward travel upon command from an external reactor monitor. The chains are capable of horizontal movement, so as to flow around obstructions in the reactor during their downward motion.

  13. Shutdown system for a nuclear reactor

    DOE Patents [OSTI]

    Groh, E.F.; Olson, A.P.; Wade, D.C.; Robinson, B.W.

    1984-06-05

    An ultimate shutdown system is provided for termination of neutronic activity in a nuclear reactor. The shutdown system includes bead chains comprising spherical containers suspended on a flexible cable. The containers are comprised of mating hemispherical shells which provide a ruggedized enclosure for reactor poison material. The bead chains, normally suspended above the reactor core on storage spools, are released for downward travel upon command from an external reactor monitor. The chains are capable of horizontal movement, so as to flow around obstructions in the reactor during their downward motion. 8 figs.

  14. Determination of the distribution of incident solar radiation in cavity receivers with approximately real parabolic dish collectors

    SciTech Connect (OSTI)

    Bammert, K.; Lange, H. ); Hegazy, A. )

    1990-11-01

    The absorption of solar heat and the attendant thermal and mechanical loadings on the tubes of cavity receivers depend predominantly on the flux distribution of the incident solar radiation. For an axially symmetric cavity receiver with a parabolic dish collector, it is simple to determine the insolation pattern on the receiver internal surfaces if the system is ideal. In such a system the surface of the dish is perfectly parabolic (no contour flaws are present), and the sun's central ray impinges on the dish surface parallel to the focal axis (no sun tracking flaws are present). These two conditions cannot be achieved in practice, and therefore the feasible parabolic dish system is referred to as a real system although, in actual fact, it is only an approximation to any actual system. The purpose of this paper is to devise calculation principles which permit analysis of a receiver designed for ideal conditions to verify its structural adequacy under the nonideal conditions to be expected in reality. Of the many possible imperfections in real collectors, two were selected which increase the loadings sustained. The first case concerns flaws in the contour of the dish surface. These locally increase the radiation concentration on the receiver inside walls and tubing. In the second case, sun-tracking errors give rise to axially asymmetric radiation distributions. In both examples, greater than design basis loadings will occur in the receiver tubing. Both kinds of flaws considered in this paper are of a purely deterministic nature.

  15. System and method for determining stator winding resistance in an AC motor using motor drives

    DOE Patents [OSTI]

    Lu, Bin; Habetler, Thomas G; Zhang, Pinjia

    2013-02-26

    A system and method for determining the stator winding resistance of AC motors is provided. The system includes an AC motor drive having an input connectable to an AC source and an output connectable to an input terminal of an AC motor, a pulse width modulation (PWM) converter having switches therein to control current flow and terminal voltages in the AC motor, and a control system connected to the PWM converter. The control system generates a command signal to cause the PWM converter to control an output of the AC motor drive corresponding to an input to the AC motor, selectively generates a modified command signal to cause the PWM converter to inject a DC signal into the output of the AC motor drive, and determines a stator winding resistance of the AC motor based on the DC signal of at least one of the voltage and current.

  16. Channeling Doping Profiles Studies for Small Incident Angle Implantation into Silicon Wafers

    SciTech Connect (OSTI)

    Guo, B.N.; Variam, N.; Jeong, U.; Mehta, S.; Posselt, M.; Lebedev, A.

    2003-08-26

    Traditional de-channeling dopant profiles in the silicon crystal wafers have been achieved by tilting the wafer away from the incident beam. As feature sizes of device shrink, the advantages for channeled doping profiles for implants with small or near zero degree incident angles are being recognized. For example, high-energy CMOS well spacing limitations caused by shadowing and encroachment of the ion beam by photoresist mask can be avoided for near zero degree incident implants. Accurate models of channeled profiles are essential to predict the device performance. This paper mainly discusses the damage effect on channeled dopant profiles. Especially, damage effects on channeled dopant profiles are correlated to ThermaWave (TW) measurements. It is demonstrated that there is a critical dose at which the damage effects have to be considered for channeled dopant profile evolvements.

  17. Energetic deposition of metal ions: Observation of self-sputtering and limited sticking for off-normal angles of incidence

    SciTech Connect (OSTI)

    Wu, Hongchen; Anders, Andre

    2009-09-15

    The deposition of films under normal and off-normal angle of incidence has been investigated to show the relevance of non-sticking of and self-sputtering by energetic ions, leading to the formation of neutral atoms. The flow of energetic ions was obtained using a filtered cathodic arc system in high vacuum and therefore the ion flux had a broad energy distribution of typically 50-100 eV per ion. The range of materials included Cu, Ag, Au, Ti, and Ni. Consistent with molecular dynamics simulations published in the literature, the experiments show, for all materials, that the combined effects of non-sticking and self-sputtering are very significant, especially for large off-normal angles. Modest heating and intentional introduction of oxygen background affect the results.

  18. Method and system for high power reflective optical elements

    SciTech Connect (OSTI)

    Demos, Stavros G.; Rubenchik, Alexander M.; Negres, Raluca A.

    2013-03-12

    A method of repairing damage in an optical element includes providing a laser system including at least one optical element having a coating layer having an incident light surface and directing a laser pulse from the laser system to impinge on the incident light surface. The method also includes sustaining damage to a portion of the incident light surface and melting the damaged portion of the incident light surface and a region adjacent to the damaged portion. The method further includes flowing material from the region adjacent the damaged portion to the damaged portion and solidifying the material in the damaged portion and the region adjacent to the damaged portion.

  19. Control system and method for a power delivery system having a continuously variable ratio transmission

    DOE Patents [OSTI]

    Frank, A.A.

    1984-07-10

    A control system and method for a power delivery system, such as in an automotive vehicle, having an engine coupled to a continuously variable ratio transmission (CVT). Totally independent control of engine and transmission enable the engine to precisely follow a desired operating characteristic, such as the ideal operating line for minimum fuel consumption. CVT ratio is controlled as a function of commanded power or torque and measured load, while engine fuel requirements (e.g., throttle position) are strictly a function of measured engine speed. Fuel requirements are therefore precisely adjusted in accordance with the ideal characteristic for any load placed on the engine. 4 figs.

  20. Control system and method for a power delivery system having a continuously variable ratio transmission

    DOE Patents [OSTI]

    Frank, Andrew A.

    1984-01-01

    A control system and method for a power delivery system, such as in an automotive vehicle, having an engine coupled to a continuously variable ratio transmission (CVT). Totally independent control of engine and transmission enable the engine to precisely follow a desired operating characteristic, such as the ideal operating line for minimum fuel consumption. CVT ratio is controlled as a function of commanded power or torque and measured load, while engine fuel requirements (e.g., throttle position) are strictly a function of measured engine speed. Fuel requirements are therefore precisely adjusted in accordance with the ideal characteristic for any load placed on the engine.

  1. Systems and methods for improved telepresence

    DOE Patents [OSTI]

    Anderson, Matthew O.; Willis, W. David; Kinoshita, Robert A.

    2005-10-25

    The present invention provides a modular, flexible system for deploying multiple video perception technologies. The telepresence system of the present invention is capable of allowing an operator to control multiple mono and stereo video inputs in a hands-free manner. The raw data generated by the input devices is processed into a common zone structure that corresponds to the commands of the user, and the commands represented by the zone structure are transmitted to the appropriate device. This modularized approach permits input devices to be easily interfaced with various telepresence devices. Additionally, new input devices and telepresence devices are easily added to the system and are frequently interchangeable. The present invention also provides a modular configuration component that allows an operator to define a plurality of views each of which defines the telepresence devices to be controlled by a particular input device. The present invention provides a modular flexible system for providing telepresence for a wide range of applications. The modularization of the software components combined with the generalized zone concept allows the systems and methods of the present invention to be easily expanded to encompass new devices and new uses.

  2. Biomedical nuclear and X-ray imager using high-energy grazing incidence mirrors

    DOE Patents [OSTI]

    Ziock, Klaus-Peter; Craig, William W.; Hasegawa, Bruce; Pivovaroff, Michael J.

    2005-09-27

    Imaging of radiation sources located in a subject is explored for medical applications. The approach involves using grazing-incidence optics to form images of the location of radiopharmaceuticals administered to a subject. The optics are "true focusing" optics, meaning that they project a real and inverted image of the radiation source onto a detector possessing spatial and energy resolution.

  3. Solid state laser disk amplifer architecture: the normal-incidence stack

    DOE Patents [OSTI]

    Dane, C. Brent; Albrecht, Georg F.; Rotter, Mark D.

    2005-01-25

    Normal incidence stack architecture coupled with the development of diode array pumping enables the power/energy per disk to be increased, a reduction in beam distortions by orders of magnitude, a beam propagation no longer restricted to only one direction of polarization, and the laser becomes so much more amendable to robust packaging.

  4. American Recovery and Reinvestment Act (ARRA) FEMP Technical Assistance - United States Pacific Command (PACOM) Guam, Task 3.3: Building Retuning Training

    SciTech Connect (OSTI)

    Hatley, Darrel D.; Underhill, Ronald M.

    2010-09-30

    Document describes an onsite workshop and building retuning training conducted in Guam in August 2010. Document reports on issues identified during an audit of several buildings and recommendations to save energy throughout the site. During the workshop, it became apparent that as site personnel maintain the facilities at Guam, the following retuning efforts and strategies should be prioritized: (1) Controlling the mechanical systems operational hours and zone temperature set points appeared to present the best opportunities for savings; (2) Zone temperature set points in some buildings are excessively low, especially at night, when the zone temperatures are so cold that they approached the dewpoint; and (3) Manually-set outside air dampers are providing excessive outside air, especially for spaces that are unoccupied. Two of the larger schools, one on the Naval Base and one on Anderson AFB, are in need of a significant recommissioning effort. These facilities are relatively new, with direct digital controls (DDC) but are significantly out of balance. The pressure in one school is extremely negative, which is pulling humid air through the facility each time a door is opened. The draft can be felt several feet down the halls. The pressure in the other school is extremely positive relative to the outside, and you can stand 20-feet outside and still feel cool drafts of air exiting the building. It is recommended that humidity sensors be installed in all new projects and retrofitted into exist facilities. In this humid climate, control of humidity is very important. There are significant periods of time when the mechanical systems in many buildings can be unloaded and dehumidification is not required. The use of CO{sub 2} sensors should also be considered in representative areas. CO{sub 2} sensors determine whether spaces are occupied so that fresh air is only brought into the space when needed. By reducing the amount of outside air brought into the space, the humidity

  5. The LANSCE RICE control system upgrade.

    SciTech Connect (OSTI)

    Oothoudt, Michael; Schaller, S.; Bjorklund, E. A.; Burns, M. J.; Carr, G.; Carr, G.; Faucett, John Allen,; Hayden, D. J.; Lusk, M. D.; Merl, R. B.; Potter, J. M.; Reynolds, J. A.; Romero, D. B.; Shelley, F. E.

    2003-01-01

    The LANSCE (Los Alamos Neutron Science Center) control system upgrade program continues with the impending replacement of the RICE (Remote Instrumentation and Control Equipment) subsystem. The RICE subsystem upgrade is a challenge because of its technology (late 1960s), number of channels (>10,000), and unique characteristics (all-modules data takes, timed/flavored data takes). The plan is to replace at least the non-timed data and the command portions of the subsystem with Programmable Logic Controllers (PLCs). We discuss motivations, technological challenges, proof-of-principle, and planning. The boundary condition, as usual, is that we must implement these major changes on a running accelerator.

  6. Tank monitor and control system (TMACS) software configuration management plan

    SciTech Connect (OSTI)

    GLASSCOCK, J.A.

    1999-05-13

    This Software Configuration Management Plan (SCMP) describes the methodology for control of computer software developed and supported by the Systems Development and Integration (SD and I) organization of Lockheed Martin Services, Inc. (LMSI) for the Tank Monitor and Control System (TMACS). This plan controls changes to the software and configuration files used by TMACS. The controlled software includes the Gensym software package, Gensym knowledge base files developed for TMACS, C-language programs used by TMACS, the operating system on the production machine, language compilers, and all Windows NT commands and functions which affect the operating environment. The configuration files controlled include the files downloaded to the Acromag and Westronic field instruments.

  7. Field Deployable Tritium Assay System Host Graphical User Interface Software

    Energy Science and Technology Software Center (OSTI)

    1998-05-12

    The FDTASHOST software is a Graphical User Interface for the Field Deployable Tritium Assay System (FDTAS - Invention Disclosure SRS-96-09-091 has been submitted). The program runs on the Host computer which is located in the Laboratory and connected to the FDTAS remote field system via a modem over a phone line. The operator receives status information and messages from the Remote system. The operator can enter in commands to be executed by the remote systemmore » using the mouse and a pull down menu.« less

  8. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (OSTI)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  9. Methods, systems and apparatus for adjusting duty cycle of pulse width modulated (PWM) waveforms

    SciTech Connect (OSTI)

    Gallegos-Lopez, Gabriel; Kinoshita, Michael H; Ransom, Ray M; Perisic, Milun

    2013-05-21

    Embodiments of the present invention relate to methods, systems and apparatus for controlling operation of a multi-phase machine in a vector controlled motor drive system when the multi-phase machine operates in an overmodulation region. The disclosed embodiments provide a mechanism for adjusting a duty cycle of PWM waveforms so that the correct phase voltage command signals are applied at the angle transitions. This can reduce variations/errors in the phase voltage command signals applied to the multi-phase machine so that phase current may be properly regulated thus reducing current/torque oscillation, which can in turn improve machine efficiency and performance, as well as utilization of the DC voltage source.

  10. Incident Energy Dependence of pt Correlations at RHIC

    SciTech Connect (OSTI)

    Adams, J.; Aggarwal, M. M.; Ahammed, Z.; Amonett, J.; Anderson, B. D.; Arkhipkin, D.; Averichev, G. S.; Badyal, S. K.; Bai, Y.; Balewski, J.; Barannikova, O.; Barnby, L. S.; Baudot, J.; Bekele, S.; Belaga, V. V.; Bellwied, R.; Berger, J.; Bezverkhny, B. I; Bharadwaj, S.; Bhasin, A.; Bhati, A. K.; Bhatia, V. S.; Bichsel, H.; Billmeier, A.; Bland, L. C.; Blyth, C. O.; Bonner, B. E.; Botje, M.; Boucham, A.; Brandin, A. V.; Bravar, A.; Bystersky, M.; Cadman, R. V.; Cai, X. Z.; Caines, H.; Castillo, J.; Cebra, D.; Chajecki, Z.; Chaloupka, P.; Chattopadhyay, S.; Chen, H. F.; Chen, Y.; Cheng, J.; Cherney, M.; Chikanian, A.; Christie, W.; Coffin, J. P.; Cormier, T. M.; Cramer, J. G.; Crawford, H. J.; Das, D.; Das, S.; de Moura, M. M.; Derevschikov, A. A.; Didenko, L.; Dietel, T.; Dogra, S. M.; Dong, W. J.; Dong, X.; Draper, J. E.; Du, F.; Dubey, A. K.; Dunin, V. B.; Dunlop, J. C.; Dutta Mazumdar, M. R.; Eckardt, V.; Edwards, W. R.; Efimov, L. G.; Emelianov, V.; Engelage, J.; Eppley, G.; Erazmus, B.; Estienne, M.; Fachini, P.; Faivre, J.; Fatemi, R.; Fedorisin, J.; Filimonov, K.; Filip, P.; Finch, E.; Fine, V.; Fisyak, Y.; Fomenko, K.; Fu, J.; Gagliardi, C. A.; Gaillard, L.; Gans, J.; Ganti, M. S.; Gaudichet, L.; Geurts, F.; Ghazikhanian, V.; Ghosh, P.; Gonzalez, J. E.; Grachov, O.; Grebenyuk, O.; Grosnick, D.; Guertin, S. M.; Guo, Y.; Gupta, A.; Gutierrez, T. D.; Hallman, T. J.; Hamed, A.; Hardtke, D.; Harris, J. W.; Heinz, M.; Henry, T. W.; Hepplemann, S.; Hippolyte, B.; Hirsch, A.; Hjort, E.; Hoffmann, G. W.; Huang, H. Z.; Huang, S. L.; Hughes, E. W.; Humanic, T. J.; Igo, G.; Ishihara, A.; Jacobs, P.; Jacobs, W. W.; Janik, M.; Jiang, H.; Jones, P. G.; Judd, E. G.; Kabana, S.; Kang, K.; Kaplan, M.; Keane, D.; Khodyrev, V. Yu; Kiryluk, J.; Kisiel, A.; Kislov, E. M.; Klay, J.; Klein, S. R.; Koetke, D. D.; Kollegger, T.; Kopytine, M.; Kotchenda, L.; Kramer, M.; Kravtsov, P.; Kravtsov, V. I.; Krueger, K.; Kuhn, C.; Kulikov, A. I.; Kumar, A.; Kutuev, R. Kh

    2005-10-01

    We present results for two-particle transverse momentum correlations, Δpt,iΔt,j, as a function of event centrality for Au+Au collisions at √(sNN) = 20, 62, 130, and 200 GeV at the Relativistic Heavy Ion Collider. We observe correlations decreasing with centrality that are similar at all four incident energies. The correlations multiplied by the multiplicity density increase with incident energy and the centrality dependence may show evidence of processes such as thermalization, jet production, or the saturation of transverse flow. The square root of the correlations divided by the event-wise average transverse momentum per event shows little or no beam energy dependence and generally agrees with previous measurements at the Super Proton Synchrotron.

  11. Analysis of incident-energy dependence of delayed neutron yields in actinides

    SciTech Connect (OSTI)

    Nasir, Mohamad Nasrun bin Mohd Metorima, Kouhei Ohsawa, Takaaki Hashimoto, Kengo

    2015-04-29

    The changes of delayed neutron yields (?{sub d}) of Actinides have been analyzed for incident energy up to 20MeV using realized data of precursor after prompt neutron emission, from semi-empirical model, and delayed neutron emission probability data (P{sub n}) to carry out a summation method. The evaluated nuclear data of the delayed neutron yields of actinide nuclides are still uncertain at the present and the cause of the energy dependence has not been fully understood. In this study, the fission yields of precursor were calculated considering the change of the fission fragment mass yield based on the superposition of fives Gaussian distribution; and the change of the prompt neutrons number associated with the incident energy dependence. Thus, the incident energy dependent behavior of delayed neutron was analyzed.The total number of delayed neutron is expressed as ?{sub d}=?Y{sub i} P{sub ni} in the summation method, where Y{sub i} is the mass yields of precursor i and P{sub ni} is the delayed neutron emission probability of precursor i. The value of Y{sub i} is derived from calculation of post neutron emission mass distribution using 5 Gaussian equations with the consideration of large distribution of the fission fragments. The prompt neutron emission ?{sub p} increases at higher incident-energy but there are two different models; one model says that the fission fragment mass dependence that prompt neutron emission increases uniformly regardless of the fission fragments mass; and the other says that the major increases occur at heavy fission fragments area. In this study, the changes of delayed neutron yields by the two models have been investigated.

  12. Nucleation of diindenoperylene and pentacene at thermal and hyperthermal incident kinetic energies

    SciTech Connect (OSTI)

    Kish, Edward R.; Desai, Tushar V.; Greer, Douglas R.; Engstrom, James R.; Woll, Arthur R.

    2015-05-15

    The authors have examined the nucleation of diindenoperylene (DIP) on SiO{sub 2} employing primarily atomic force microscopy and focusing on the effect of incident kinetic energy employing both thermal and supersonic sources. For all incident kinetic energies examined (E{sub i} = 0.09–11.3 eV), the nucleation of DIP is homogeneous and the dependence of the maximum island density on the growth rate is described by a power law. A critical nucleus of approximately two molecules is implicated by our data. A re-examination of the nucleation of pentacene on SiO{sub 2} gives the same major result that the maximum island density is determined by the growth rate, and it is independent of the incident kinetic energy. These observations are readily understood by factoring in the size of the critical nucleus in each case, and the island density, which indicates that diffusive transport of molecules to the growing islands dominate the dynamics of growth in the submonolayer regime.

  13. Advanced grazing-incidence techniques for modern soft-matter materials analysis

    SciTech Connect (OSTI)

    Hexemer, Alexander; Müller-Buschbaum, Peter

    2015-01-01

    The complex nano-morphology of modern soft-matter materials is successfully probed with advanced grazing-incidence techniques. Based on grazing-incidence small- and wide-angle X-ray and neutron scattering (GISAXS, GIWAXS, GISANS and GIWANS), new possibilities arise which are discussed with selected examples. Due to instrumental progress, highly interesting possibilities for local structure analysis in this material class arise from the use of micro- and nanometer-sized X-ray beams in micro- or nanofocused GISAXS and GIWAXS experiments. The feasibility of very short data acquisition times down to milliseconds creates exciting possibilities forin situandin operandoGISAXS and GIWAXS studies. Tuning the energy of GISAXS and GIWAXS in the soft X-ray regime and in time-of flight GISANS allows the tailoring of contrast conditions and thereby the probing of more complex morphologies. In addition, recent progress in software packages, useful for data analysis for advanced grazing-incidence techniques, is discussed.

  14. Advanced grazing-incidence techniques for modern soft-matter materials analysis

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hexemer, Alexander; Müller-Buschbaum, Peter

    2015-01-01

    The complex nano-morphology of modern soft-matter materials is successfully probed with advanced grazing-incidence techniques. Based on grazing-incidence small- and wide-angle X-ray and neutron scattering (GISAXS, GIWAXS, GISANS and GIWANS), new possibilities arise which are discussed with selected examples. Due to instrumental progress, highly interesting possibilities for local structure analysis in this material class arise from the use of micro- and nanometer-sized X-ray beams in micro- or nanofocused GISAXS and GIWAXS experiments. The feasibility of very short data acquisition times down to milliseconds creates exciting possibilities forin situandin operandoGISAXS and GIWAXS studies. Tuning the energy of GISAXS and GIWAXS in themore » soft X-ray regime and in time-of flight GISANS allows the tailoring of contrast conditions and thereby the probing of more complex morphologies. In addition, recent progress in software packages, useful for data analysis for advanced grazing-incidence techniques, is discussed.« less

  15. Federal Emergency Management Information System (FEMIS) system administration guide. Version 1.3

    SciTech Connect (OSTI)

    Burford, M.J.; Burnett, R.A.; Downing, T.R.

    1996-12-01

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that was developed by the (Pacific Northwest National Laboratory) (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package. 91 This document also contains information on the following: software installation for the FEMIS data servers, communication server, mail server, and the emergency management workstations; distribution media loading and FEMIS installation validation and troubleshooting; and system management of FEMIS users, login, privileges, and usage. The system administration utilities (tools), available in the FEMIS client software, are described for user accounts and site profile. This document also describes the installation and use of system and database administration utilities that will assist in keeping the FEMIS system running in an operational environment.

  16. Facility Energy Decision System (FEDS) Assessment Report for US Army Garrison, Japan - Honshu Installations

    SciTech Connect (OSTI)

    Kora, Angela R.; Brown, Daryl R.; Dixon, Douglas R.

    2010-03-09

    This report documents an assessment was performed by a team of engineers from Pacific Northwest National Laboratory (PNNL) under contract to the Installation Management Command (IMCOM) Pacific Region Office (PARO). The effort used the Facility Energy Decision System (FEDS) model to determine how energy is consumed at five U.S. Army Garrison-Japan (USAG-J) installations in the Honshu area, identify the most cost-effective energy retrofit measures, and calculate the potential energy and cost savings.

  17. Spatial Estimation of Populations at Risk from Radiological Dispersion Device Terrorism Incidents

    SciTech Connect (OSTI)

    Regens, J.L.; Gunter, J.T.

    2008-07-01

    Delineation of the location and size of the population potentially at risk of exposure to ionizing radiation is one of the key analytical challenges in estimating accurately the severity of the potential health effects associated with a radiological terrorism incident. Regardless of spatial scale, the geographical units for which population data commonly are collected rarely coincide with the geographical scale necessary for effective incident management and medical response. This paper identifies major government and commercial open sources of U.S. population data and presents a GIS-based approach for allocating publicly available population data, including age distributions, to geographical units appropriate for planning and implementing incident management and medical response strategies. In summary: The gravity model offers a straight-forward, empirical tool for estimating population flows, especially when geographical areas are relatively well-defined in terms of accessibility and spatial separation. This is particularly important for several reasons. First, the spatial scale for the area impacted by a RDD terrorism event is unlikely to match fully the spatial scale of available population data. That is, the plume spread typically will not uniformly overlay the impacted area. Second, the number of people within the impacted area varies as a function whether an attack occurs during the day or night. For example, the population of a central business district or industrial area typically is larger during the day while predominately residential areas have larger night time populations. As a result, interpolation techniques that link population data to geographical units and allocate those data based on time-frame at a spatial scale that is relevant to enhancing preparedness and response. The gravity model's main advantage is that it efficiently allocates readily available, open source population data to geographical units appropriate for planning and implementing

  18. Second harmonic generation by propagation of a p-polarized obliquely incident laser beam in underdense plasma

    SciTech Connect (OSTI)

    Jha, Pallavi; Agrawal, Ekta

    2014-05-15

    An analytical study of second harmonic generation due to interaction an intense, p-polarized laser beam propagating obliquely in homogeneous underdense plasma, in the mildly relativistic regime, has been presented. The efficiency of the second harmonic radiation as well as its detuning length has been obtained and their variation with the angle of incidence is analyzed. It is shown that, for a given plasma electron density, the second harmonic efficiency increases with the angle of incidence while the detuning length decreases. The second harmonic amplitude vanishes at normal incidence of the laser beam.

  19. Incidence of Leukoencephalopathy After Whole-Brain Radiation Therapy for Brain Metastases

    SciTech Connect (OSTI)

    Ebi, Junko; Sato, Hisashi; Nakajima, Masaru; Shishido, Fumio

    2013-04-01

    Purpose: To evaluate the incidence of leukoencephalopathy after whole-brain radiation therapy (WBRT) in patients with brain metastases. Methods and Materials: We retrospectively reviewed 111 patients who underwent WBRT for brain metastases from April 2001 through March 2008 and had evaluable computed tomography (CT) and/or magnetic resonance imaging (MRI) at least 1 month after completion of WBRT. We evaluated the leukoencephalopathy according to the Common Terminology Criteria for Adverse Events, version 3.0. The patients who had brain tumor recurrence after WBRT were censored at the last follow-up CT or MRI without recurrence. To evaluate the risk factors for leukoencephalopathy, bivariate analysis was performed using a logistic regression analysis adjusted for follow-up time. Factors included in the analysis were age, gender, dose fractionation, 5-fluorouracil, methotrexate, cisplatin, and other chemotherapeutic agents. Results: The median age of the 111 patients was 60.0 years (range, 23-89 years). The median follow-up was 3.8 months (range, 1.0-38.1 months). Leukoencephalopathy developed in 23 of the 111 patients. Grades 1, 2, and 3 were observed in 8, 7, and 8 patients, respectively. The incidence was 34.4% (11 of 32), 42.9% (6 of 14), 66.7% (2 of 3), and 100% (2 of 2) of the patients who were followed up for ≥6, ≥12, ≥24, and ≥36 months, respectively. In the bivariate analysis, older age (≥65 years) was significantly correlated with higher risk of leukoencephalopathy (odds ratio 3.31; 95% confidence interval 1.15-9.50; P=.03). Conclusions: The incidence of leukoencephalopathy after WBRT was 34.4% with ≥6 months follow-up, and increased with longer follow-up. Older age was a significant risk factor. The schedule of WBRT for patients with brain metastases should be carefully determined, especially for favorable patients.

  20. Incidence, Risks, and Sequelae of Posterior Fossa Syndrome in Pediatric Medulloblastoma

    SciTech Connect (OSTI)

    Korah, Mariam P.; Esiashvili, Natia; Mazewski, Claire M.; Hudgins, Roger J.; Tighiouart, Mourad; Janss, Anna J.; Schwaibold, Frederick P.; Crocker, Ian R.; Curran, Walter J.; Marcus, Robert B.

    2010-05-01

    Purpose: To investigate the incidence, risks, severity, and sequelae of posterior fossa syndrome (PFS) in children with medulloblastoma. Methods and Materials: Between 1990 and 2007, 63 children with medulloblastoma at Emory University and Children's Healthcare of Atlanta were treated with craniectomy followed by radiation. Fifty-one patients were assigned to a standard-risk group, and 12 patients were assigned to a high-risk group. Five patients had <1.5-cm{sup 2} residual tumor, 4 had >=1.5-cm{sup 2} residual tumor, and the remainder had no residual tumor. Eleven patients had disseminated disease. Patients received craniospinal irradiation at a typical dose of 23.4 Gy or 36 Gy for standard- or high-risk disease, respectively. The posterior fossa was given a total dose of 54 or 55.8 Gy. Nearly all patients received chemotherapy following cooperative group protocols. Results: Median follow-up was 7 years. PFS developed in 18 patients (29%). On univariate analysis, brainstem invasion, midline tumor location, younger age, and the absence of radiographic residual tumor were found to be predictors of PFS; the last two variables remained significant on multivariate analysis. From 1990 to 2000 and from 2001 to 2007, the proportions of patients with no radiographic residual tumor were 77% and 94%, respectively. During the same eras, the proportions of patients with PFS were 17% and 39%. Only 4 patients had complete recovery at last follow-up. Conclusions: The incidence of PFS increased in the latter study period and is proportional to more aggressive surgery. Children with midline tumors exhibiting brainstem invasion are at increased risk. With the increased incidence of PFS and the permanent morbidity in many patients, the risks and benefits of complete tumor removal in all patients need to be reexamined.

  1. Navy/Marine Engineering Command Visits Sandia

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... renewable energyrelated topics: wind-turbineradar interaction, photovoltaics (PV), ... grid modernization, wind energy, water power, concentrating solar power (CSP), ...

  2. Commanding general visits Pantex | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    USACE is managing construction in cooperation with NNSA, B&W Pantex and main construction contractor Kiewit Building Group. Construction on HEPF is approximately 90 percent ...

  3. Fact Sheet Investigation of Incident at Waste Isolation Pilot Plant by Technical Assessment Team

    Broader source: Energy.gov [DOE]

    On February 14, 2014, an incident in Panel 7 Room 7 (P7R7) of the Waste Isolation Pilot Plant (WIPP) underground repository resulted in the release of radioactive material into the environment and contaminated 21 people with low-level radioactivity. The Technical Assessment Team (TAT) concluded that one drum, Drum 68660, was the source of radioactive contamination released during the February 14, 2014, radiological event at WIPP. The contents of Drum 68660 were chemically incompatible, and the drum breached as a result of internal chemical reactions.

  4. Electron emission induced by resonant coherent ion-surface interaction at grazing incidence

    SciTech Connect (OSTI)

    Garcia de Abajo, F.J. ); Ponce, V.H. ); Echenique, P.M. )

    1992-10-19

    A new spectroscopy based on the resonant coherently induced electron loss to the continuum in ion-surface scattering under grazing incidence is proposed. A series of peaks, corresponding to the energy differences determined by the resonant interaction with the rows of atoms in the surface, is predicted to appear in the energy distribution of electrons emitted from electronic states bound to the probe. Calculations for MeV He{sup +} ions scattered at a W(001) surface along the {l angle}100{r angle} direction with a glancing angle of 0--2 mrad show a total yield close to 1.

  5. Reducing the Probability of Incidents Through Behavior-Based Safety -- An Anomaly or Not?

    SciTech Connect (OSTI)

    Turek, John A

    2002-07-23

    Reducing the probability of incidents through Behavior-Based Safety--an anomaly or not? Can a Behavior-Based Safety (BBS) process reduce the probability of an employee sustaining a work-related injury or illness? This presentation describes the actions taken to implement a sustainable BBS process and evaluates its effectiveness. The BBS process at the Stanford Linear Accelerator Center used a pilot population of national laboratory employees to: Achieve employee and management support; Reduce the probability of employees' sustaining work-related injuries and illnesses; and Provide support for additional funding to expand within the laboratory.

  6. Reducing the Probability of Incidents Through Behavior-Based Safety -- An Anomaly or Not?

    SciTech Connect (OSTI)

    Turek, John A

    2002-07-23

    Reducing the probability of incidents through Behavior-Based Safety-an anomaly or not? Can a Behavior-Based Safety (BBS) process reduce the probability of an employee sustaining a work-related injury or illness? This presentation describes the actions taken to implement a sustainable BBS process and evaluates its effectiveness. The BBS process at the Stanford Linear Accelerator Center used a pilot population of national laboratory employees to: Achieve employee and management support; Reduce the probability of employees' sustaining work-related injuries and illnesses; and Provide support for additional funding to expand within the laboratory.

  7. Rapid deployable global sensing hazard alert system

    DOE Patents [OSTI]

    Cordaro, Joseph V; Tibrea, Steven L; Shull, Davis J; Coleman, Jerry T; Shuler, James M

    2015-04-28

    A rapid deployable global sensing hazard alert system and associated methods of operation are provided. An exemplary system includes a central command, a wireless backhaul network, and a remote monitoring unit. The remote monitoring unit can include a positioning system configured to determine a position of the remote monitoring unit based on one or more signals received from one or more satellites located in Low Earth Orbit. The wireless backhaul network can provide bidirectional communication capability independent of cellular telecommunication networks and the Internet. An exemplary method includes instructing at least one of a plurality of remote monitoring units to provide an alert based at least in part on a location of a hazard and a plurality of positions respectively associated with the plurality of remote monitoring units.

  8. Blast furnace supervision and control system

    SciTech Connect (OSTI)

    Remorino, M.; Lingiardi, O.; Zecchi, M.

    1997-12-31

    On December 1992, a group of companies headed by Techint, took over Somisa, the state-owned integrated steel plant located at San Nicolas, Province of Buenos Aires, Argentina, culminating an ambitious government privatization scheme. The blast furnace 2 went into a full reconstruction and relining in January 1995. After a 140 MU$ investment the new blast furnace 2 was started in September 1995. After more than one year of operation of the blast furnace the system has proven itself useful and reliable. The main reasons for the success of the system are: same use interface for all blast furnace areas -- operation, process, maintenance and management, (full horizontal and vertical integration); and full accessibility to all information and process tools though some restrictions apply to field commands (people empowerment). The paper describes the central system.

  9. Bro Intrusion Detection System

    Energy Science and Technology Software Center (OSTI)

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  10. Electron-impact excitation of xenon at incident energies between 15 and 80 eV

    SciTech Connect (OSTI)

    Filipovic-acute-accent, D.; Marinkovic-acute-accent, B.; Pejcev, V.; Vuskovic-acute-accent, a.L.

    1988-01-15

    Normalized, absolute differential cross sections (DCS's) have been measured for the 20 lowest electronic states of xenon. Incident electron energies were 15, 20, 30, and 80 eV and the scattering angles ranged from 5/sup 0/ to 150/sup 0/. The energy resolution was 40 meV. Absolute elastic DCS's have been obtained by normalizing the relative values to the recently published absolute elastic DCS's by Register et al. (J. Phys. B 19, 1685 (1986)). Elastic-to-inelastic intensity ratios, at different incident energies for the 6s((3/2)/sub 1/ state were determined. These ratios were utilized as secondary standards to establish the absolute scale for the other inelastic processes in accordance with intensity ratios of lines in energy-loss spectra. The absolute inelastic DCS's were extrapolated to 0/sup 0/ and 180/sup 0/ and integrated to yield the integral cross sections (ICS's). A comparison of the present DCS's with the only available measurements at 20 eV impact energy shows satisfactory agreement in shape but considerable difference in absolute value.

  11. Electron emission induced by resonant coherent interaction in ion-surface scattering at grazing incidence

    SciTech Connect (OSTI)

    Garcia de Abajo, F.J. ); Ponce, V.H.; Echenique, P.M. )

    1994-01-15

    The resonant coherent interaction of an ion with an oriented crystal surface, under grazing-incidence conditions with respect to a special direction of the crystal, gives rise to electron loss to the continuum from electronic bound states of the ion. The calculations presented below predict large probabilities for electron emission due to this mechanism. The electrons are emitted with well defined energies, expressed in terms of the condition of resonance. Furthermore, the emission takes place around certain preferential directions, which are determined by both the latter condition and the symmetry of the surface lattice. Our calculations for MeV He[sup +] ions scattered at a W(001) surface along the [l angle]100[r angle] direction with glancing angle of 0--2 mrad indicate a yield of emission close to 1. Using heavier projectiles, one obtains smaller yields, but still large enough to be measurable in some cases (e.g., [approx]0.9 for 53 MeV B[sup 4+] and an angle of incidence of 1 mrad). Besides, the initial bound state is energy shifted due to the interaction with both the crystal potential and the velocity-dependent image potential. This results in a slight shift of the peaks of emission, which suggests a possible spectroscopy for analyzing the dynamical interaction of electronic bound states with solid surfaces.

  12. Control system and method for a hybrid electric vehicle

    DOE Patents [OSTI]

    Phillips, Anthony Mark; Blankenship, John Richard; Bailey, Kathleen Ellen; Jankovic, Miroslava

    2001-01-01

    A vehicle system controller (20) is presented for a LSR parallel hybrid electric vehicle having an engine (10), a motor (12), wheels (14), a transmission (16) and a battery (18). The vehicle system controller (20) has a state machine having a plurality of predefined states (22-32) that represent operating modes for the vehicle. A set of rules is defined for controlling the transition between any two states in the state machine. The states (22-32) are prioritized according to driver demands, energy management concerns and system fault occurrences. The vehicle system controller (20) controls the transitions from a lower priority state to a higher priority state based on the set of rules. In addition, the vehicle system controller (20) will control a transition to a lower state from a higher state when the conditions no longer warrant staying in the current state. A unique set of output commands is defined for each state for the purpose of controlling lower level subsystem controllers. These commands serve to achieve the desire vehicle functionality within each state and insure smooth transitions between states.

  13. Reactor safety assessment system

    SciTech Connect (OSTI)

    Sebo, D.E.; Bray, M.A.; King, M.A.

    1987-01-01

    The Reactor Safety Assessment System (RSAS) is an expert system under development for the United States Nuclear Regulatory Commission (USNRC). RSA is designed for use at the USNRC Operations Center in the event of a serious incident at a licensed nuclear power plant. RSAS is a situation assessment expert system which uses plant parametric data to generate conclusions for use by the NRC Reactor Safety Team. RSAS uses multiple rule bases and plant specific setpoint files to be applicable to all licensed nuclear power plants in the United States. RSAS currently covers several generic reactor categories and multiple plants within each category.

  14. RADIATION DETECTING AND TELEMETERING SYSTEM

    DOE Patents [OSTI]

    Richards, H.K.

    1959-12-15

    A system is presented for measuring ionizing radiation at several remote stations and transmitting the measured information by radio to a central station. At each remote station a signal proportioned to the counting rate is applied across an electrical condenser made of ferroelectric material. The voltage across the condenser will vary as a function of the incident radiation and the capacitance of the condenser will vary accordingly. This change in capacitance is used to change the frequency of a crystalcontrolled oscillator. The output of the oscillator is coupled to an antenna for transmitting a signal proportional to the incident radiation.

  15. Malfunctions of Implantable Cardiac Devices in Patients Receiving Proton Beam Therapy: Incidence and Predictors

    SciTech Connect (OSTI)

    Gomez, Daniel R., E-mail: dgomez@mdanderson.org [Department of Radiation Oncology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Poenisch, Falk [Department of Radiation Physics, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Pinnix, Chelsea C. [Department of Radiation Oncology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Sheu, Tommy [Department of Experimental Radiation Oncology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Chang, Joe Y. [Department of Radiation Oncology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Memon, Nada [Department of Cardiology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Mohan, Radhe [Department of Radiation Physics, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Rozner, Marc A. [Department of Anesthesiology and Perioperative Medicine, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Dougherty, Anne H. [Department of Cardiology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States)

    2013-11-01

    Purpose: Photon therapy has been reported to induce resets of implanted cardiac devices, but the clinical sequelae of treating patients with such devices with proton beam therapy (PBT) are not well known. We reviewed the incidence of device malfunctions among patients undergoing PBT. Methods and Materials: From March 2009 through July 2012, 42 patients with implanted cardiac implantable electronic devices (CIED; 28 pacemakers and 14 cardioverter-defibrillators) underwent 42 courses of PBT for thoracic (23, 55%), prostate (15, 36%), liver (3, 7%), or base of skull (1, 2%) tumors at a single institution. The median prescribed dose was 74 Gy (relative biological effectiveness; range 46.8-87.5 Gy), and the median distance from the treatment field to the CIED was 10 cm (range 0.8-40 cm). Maximum proton and neutron doses were estimated for each treatment course. All CIEDs were checked before radiation delivery and monitored throughout treatment. Results: Median estimated peak proton and neutron doses to the CIED in all patients were 0.8 Gy (range 0.13-21 Gy) and 346 Sv (range 11-1100 mSv). Six CIED malfunctions occurred in 5 patients (2 pacemakers and 3 defibrillators). Five of these malfunctions were CIED resets, and 1 patient with a defibrillator (in a patient with a liver tumor) had an elective replacement indicator after therapy that was not influenced by radiation. The mean distance from the proton beam to the CIED among devices that reset was 7.0 cm (range 0.9-8 cm), and the mean maximum neutron dose was 655 mSv (range 330-1100 mSv). All resets occurred in patients receiving thoracic PBT and were corrected without clinical incident. The generator for the defibrillator with the elective replacement indicator message was replaced uneventfully after treatment. Conclusions: The incidence of CIED resets was about 20% among patients receiving PBT to the thorax. We recommend that PBT be avoided in pacing-dependent patients and that patients with any type of CIED receiving

  16. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect (OSTI)

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In todays increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  17. Incident angle insensitive tunable multichannel perfect absorber consisting of nonlinear plasma and matching metamaterials

    SciTech Connect (OSTI)

    Kong, Xiang-kun; Liu, Shao-Bin Bian, Bo-rui; Chen, Chen; Zhang, Hai-feng

    2014-12-15

    A novel, compact, and multichannel nonreciprocal absorber through a wave tunneling mechanism in epsilon-negative and matching metamaterials is theoretically proposed. Nonreciprocal absorption properties are acquired via the coupling together of evanescent and propagating waves in an asymmetric configuration, constituted of nonlinear plasma alternated with matching metamaterial. The absorption channel number can be adjusted by changing the periodic number. Due to the positive feedback between nonlinear permittivity of plasma and the inner electric field, bistable absorption and reflection are achieved. Moreover, compared with some truncated photonic crystal or multilayered designs proposed before, our design is more compact and independent of incident angle or polarization. This kind of multilayer structure offers additional opportunities to design novel omnidirectional electromagnetic wave absorbers.

  18. Light trapping for emission from a photovoltaic cell under normally incident monochromatic illumination

    SciTech Connect (OSTI)

    Takeda, Yasuhiko Iizuka, Hideo; Mizuno, Shintaro; Hasegawa, Kazuo; Ichikawa, Tadashi; Ito, Hiroshi; Kajino, Tsutomu; Ichiki, Akihisa; Motohiro, Tomoyoshi

    2014-09-28

    We have theoretically demonstrated a new light-trapping mechanism to reduce emission from a photovoltaic (PV) cell used for a monochromatic light source, which improves limiting conversion efficiency determined by the detailed balance. A multilayered bandpass filter formed on the surface of a PV cell has been found to prevent the light generated inside by radiative recombination from escaping the cell, resulting in a remarkable decrease of the effective solid angle for the emission. We have clarified a guide to design a suitable configuration of the bandpass filter and achieved significant reduction of the emission. The resultant gain in monochromatic conversion efficiency in the radiative limit due to the optimally designed 18-layerd bandpass filters is as high as 6% under normally incident 1064 nm illumination of 10 mW/cm~ 1 kW/cm, compared with the efficiency for the perfect anti-reflection treatment to the surface of a conventional solar cell.

  19. Fractures of the Sacrum After Chemoradiation for Rectal Carcinoma: Incidence, Risk Factors, and Radiographic Evaluation

    SciTech Connect (OSTI)

    Kim, Han Jo; Boland, Patrick J.; Meredith, Dennis S.; Lis, Eric; Zhang Zhigang; Shi Weiji; Yamada, Yoshiya J.; Goodman, Karyn A.

    2012-11-01

    Purpose: Sacral insufficiency fractures after adjuvant radiation for rectal carcinoma can present similarly to recurrent disease. As a complication associated with pelvic radiation, it is important to be aware of the incidence and risk factors associated with sacral fractures in the clinical assessment of these patients. Methods and Materials: Between 1998 and 2007, a total of 582 patients with locally advanced rectal carcinoma received adjuvant chemoradiation and surgical excision. Of these, 492 patients had imaging studies available for review. Hospital records and imaging studies from all 492 patients were retrospectively evaluated to identify risk factors associated with developing a sacral insufficiency fracture. Results: With a median follow-up time of 3.5 years, the incidence of sacral fractures was 7.1% (35/492). The 4-year sacral fracture free rate was 0.91. Univariate analysis showed that increasing age ({>=}60 vs. <60 years), female sex, and history of osteoporosis were significantly associated with shorter time to sacral fracture (P=.01, P=.004, P=.001, respectively). There was no significant difference in the time to sacral fracture for patients based on stage, radiotherapy dose, or chemotherapy regimen. Multivariate analysis showed increasing age ({>=}60 vs. <60 years, hazard ratio [HR] = 2.50, 95% confidence interval [CI] = 1.22-5.13, P=.01), female sex (HR = 2.64, CI = 1.29-5.38, P=.008), and history of osteoporosis (HR = 3.23, CI = 1.23-8.50, P=.02) were independent risk factors associated with sacral fracture. Conclusions: Sacral insufficiency fractures after pelvic radiation for rectal carcinoma occur more commonly than previously described. Independent risk factors associated with fracture were osteoporosis, female sex, and age greater than 60 years.

  20. Incidence of Second Malignancies Among Patients Treated With Proton Versus Photon Radiation

    SciTech Connect (OSTI)

    Chung, Christine S.; Yock, Torunn I.; Nelson, Kerrie; Xu, Yang; Keating, Nancy L.; Tarbell, Nancy J.

    2013-09-01

    Purpose: Proton radiation, when compared with photon radiation, allows delivery of increased radiation dose to the tumor while decreasing dose to adjacent critical structures. Given the recent expansion of proton facilities in the United States, the long-term sequelae of proton therapy should be carefully assessed. The objective of this study was to compare the incidence of second cancers in patients treated with proton radiation with a population-based cohort of matched patients treated with photon radiation. Methods and Materials: We performed a retrospective cohort study of 558 patients treated with proton radiation from 1973 to 2001 at the Harvard Cyclotron in Cambridge, MA and 558 matched patients treated with photon therapy in the Surveillance, Epidemiology, and End Results (SEER) Program cancer registry. Patients were matched by age at radiation treatment, sex, year of treatment, cancer histology, and site. The main outcome measure was the incidence of second malignancies after radiation. Results: We matched 558 proton patients with 558 photon patients from the Surveillance, Epidemiology, and End Results registry. The median duration of follow-up was 6.7 years (interquartile range, 7.4) and 6.0 years (interquartile range, 9.3) in the proton and photon cohorts, respectively. The median age at treatment was 59 years in each cohort. Second malignancies occurred in 29 proton patients (5.2%) and 42 photon patients (7.5%). After we adjusted for sex, age at treatment, primary site, and year of diagnosis, proton therapy was not associated with an increased risk of second malignancy (adjusted hazard ratio, 0.52 [95% confidence interval, 0.32-0.85]; P=.009). Conclusions: The use of proton radiation therapy was not associated with a significantly increased risk of secondary malignancies compared with photon therapy. Longer follow-up of these patients is needed to determine if there is a significant decrease in second malignancies. Given the limitations of the study

  1. Lessons Learned Concerning the Human Element in Events and Training

    SciTech Connect (OSTI)

    Michael D. Sandvig

    2006-02-01

    As the number and complexity of responses to hazardous material incidents have increased, government regulators have implemented a national incident command system, bolstered by a host of protective measures and response equipment. Special advanced technical equipment has also been developed and made available to on-scene responders and command staff. Yet with all the investment in organizational and technical advance, the human element of emergency response remains critical and also needs our continued attention to ensure effective operation and success. This paper focuses on lessons learned from radiological events and training exercises that pertain to these human elements.

  2. Feedwater temperature control methods and systems

    SciTech Connect (OSTI)

    Moen, Stephan Craig; Noonan, Jack Patrick; Saha, Pradip

    2014-04-22

    A system for controlling the power level of a natural circulation boiling water nuclear reactor (NCBWR) is disclosed. The system, in accordance with an example embodiment of the present invention, may include a controller configured to control a power output level of the NCBWR by controlling a heating subsystem to adjust a temperature of feedwater flowing into an annulus of the NCBWR. The heating subsystem may include a steam diversion line configured to receive steam generated by a core of the NCBWR and a steam bypass valve configured to receive commands from the controller to control a flow of the steam in the steam diversion line, wherein the steam received by the steam diversion line has not passed through a turbine. Additional embodiments of the invention may include a feedwater bypass valve for controlling an amount of flow of the feedwater through a heater bypass line to the annulus.

  3. Rotary fast tool servo system and methods

    DOE Patents [OSTI]

    Montesanti, Richard C.; Trumper, David L.

    2007-10-02

    A high bandwidth rotary fast tool servo provides tool motion in a direction nominally parallel to the surface-normal of a workpiece at the point of contact between the cutting tool and workpiece. Three or more flexure blades having all ends fixed are used to form an axis of rotation for a swing arm that carries a cutting tool at a set radius from the axis of rotation. An actuator rotates a swing arm assembly such that a cutting tool is moved in and away from the lathe-mounted, rotating workpiece in a rapid and controlled manner in order to machine the workpiece. A pair of position sensors provides rotation and position information for a swing arm to a control system. A control system commands and coordinates motion of the fast tool servo with the motion of a spindle, rotating table, cross-feed slide, and in-feed slide of a precision lathe.

  4. Evaluation of the Reanalysis Surface Incident Shortwave Radiation Products from NCEP, ECMWF, GSFC, and JMA Using Satellite and Surface Observations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Zhang, Xiaotong; Liang, Shunlin; Wang, Guoxin; Yao, Yunjun; Jiang, Bo; Cheng, Jie

    2016-03-10

    Solar radiation incident at the Earth’s surface (Rs) is an essential component of the total energy exchange between the atmosphere and the surface. Reanalysis data have been widely used, but a comprehensive validation using surface measurements is still highly needed. In this study, we evaluated the Rs estimates from six current representative global reanalyses (NCEP–NCAR, NCEP-DOE; CFSR; ERA-Interim; MERRA; and JRA-55) using surface measurements from different observation networks [GEBA; BSRN; GC-NET; Buoy; and CMA] (674 sites in total) and the Earth’s Radiant Energy System (CERES) EBAF product from 2001 to 2009. The global mean biases between the reanalysis Rs andmore » surface measurements at all sites ranged from 11.25 W/m2 to 49.80 W/m2. Comparing with the CERES-EBAF Rs product, all the reanalyses overestimate Rs, except for ERA-Interim, with the biases ranging from 2.98 W/m2 to 21.97 W/m2 over the globe. It was also found that the biases of cloud fraction (CF) in the reanalyses caused the overestimation of Rs. Lastly, ffter removing the averaged bias of CERES-EBAF, weighted by the area of the latitudinal band, a global annual mean Rs values of 184.6 W/m2, 180.0 W/m2, and 182.9 W/m2 were obtained over land, ocean, and the globe, respectively.« less

  5. US Army Weapon Systems Human-Computer Interface (WSHCI) style guide, Version 1

    SciTech Connect (OSTI)

    Avery, L.W.; O`Mara, P.A.; Shepard, A.P.

    1996-09-30

    A stated goal of the U.S. Army has been the standardization of the human computer interfaces (HCIS) of its system. Some of the tools being used to accomplish this standardization are HCI design guidelines and style guides. Currently, the Army is employing a number of style guides. While these style guides provide good guidance for the command, control, communications, computers, and intelligence (C4I) domain, they do not necessarily represent the more unique requirements of the Army`s real time and near-real time (RT/NRT) weapon systems. The Office of the Director of Information for Command, Control, Communications, and Computers (DISC4), in conjunction with the Weapon Systems Technical Architecture Working Group (WSTAWG), recognized this need as part of their activities to revise the Army Technical Architecture (ATA). To address this need, DISC4 tasked the Pacific Northwest National Laboratory (PNNL) to develop an Army weapon systems unique HCI style guide. This document, the U.S. Army Weapon Systems Human-Computer Interface (WSHCI) Style Guide, represents the first version of that style guide. The purpose of this document is to provide HCI design guidance for RT/NRT Army systems across the weapon systems domains of ground, aviation, missile, and soldier systems. Each domain should customize and extend this guidance by developing their domain-specific style guides, which will be used to guide the development of future systems within their domains.

  6. Federal Emergency Management Information System (FEMIS) system administration guide, version 1.4.5

    SciTech Connect (OSTI)

    Arp, J.A.; Burnett, R.A.; Carter, R.J.

    1998-06-26

    The Federal Emergency Management Information Systems (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the US Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are connected via a local area network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication, data distribution, and notification functionality necessary to operate FEMIS in a networked, client/server environment. The UNIX server provides an Oracle relational database management system (RDBMS) services, ARC/INFO GIS (optional) capabilities, and basic file management services. PNNL developed utilities that reside on the server include the Notification Service, the Command Service that executes the evacuation model, and AutoRecovery. To operate FEMIS, the Application Software must have access to a site specific FEMIS emergency management database. Data that pertains to an individual EOC`s jurisdiction is stored on the EOC`s local server. Information that needs to be accessible to all EOCs is automatically distributed by the FEMIS

  7. The status of the Fermilab data storage system

    SciTech Connect (OSTI)

    Bakken, J.; Berman, E.; Huang, Chi-Hao; Moibenko, A.; Petravick, D.; Zalokar, M.; /Fermilab

    2004-12-01

    This document describes the Fermilab Data Storage System Enstore, its design concepts, structure, and current status. Enstore provides storage of the data in robotic tape libraries according to requirements of the experiments. High fault tolerance and availability, as well as multilevel priority based request processing allows experiments to effectively store and access data in the Enstore. Amount of data stored in the system currently approaches 2 PBytes. The Enstore system includes 5 robotic tape libraries, more than 100 PC nodes, and 90 tape drives. The distributed structure and modularity of Enstore allows scaling of the system and adding of more storage equipment as the requirements and needs grow. Users access data in Enstore directly using a special command. They can also use ftp, GridFtp, and SRM interfaces to the dCache caching and buffering system [1], which uses Enstore as its lower layer storage.

  8. A reevaluation of cancer incidence near the Three Mile Island nuclear plant: The collision of evidence and assumptions

    SciTech Connect (OSTI)

    Wing, S.; Richardson, D.; Armstrong, D.; Crawford-Brown, D.

    1997-01-01

    Previous studies concluded that there was no evidence that the 1979 nuclear accident at Three Mile Island (TMI) affected cancer incidence in the surrounding area; however, there were logical and methodological problems in earlier reports that led us to reconsider data previously collected. A 10-mile area around TMI was divided into 69 study tracts, which were assigned radiation dose estimates based on radiation readings and models of atmospheric dispersion. Incident cancers from 1975 to 1985 were ascertained from hospital records and assigned to study tracts. Associations between accident doses and incidence rates of leukemia, lung cancer, and all cancer were assessed using relative dose estimates calculated by the earlier investigators. Adjustments were made for age, sex, socioeconomic characteristics, and preaccident variation in incidence. Considering a 2-year latency, the estimated percent increase per dose unit {plus_minus} standard error was 0.020 {plus_minus} 0.012 for all cancer, 0.082 {plus_minus} 0.032 for lung cancer, and 0.116 {plus_minus} 0.067 for leukemia. Adjustment for socioeconomic variables increased the estimates to 0.034 {plus_minus} 0.013, 0.103 {plus_minus} 0.035, and 0.139 {plus_minus} 0.073 for all cancer, lung cancer, and leukemia, respectively. Associations were generally larger considering a 5-year latency, but were based on smaller numbers of cases. Results support the hypothesis that radiation doses are related to increased cancer incidence around TMI. The analysis avoids medical detection bias, but suffers from inaccurate dose classification; therefore, results may underestimate the magnitude of the association between radiation and cancer incidence. These associations would not be expected, based on previous estimates of near-background levels of radiation exposure following the accident. 35 refs., 3 tabs.

  9. Realizing thin electromagnetic absorbers for wide incidence angles from commercially available planar circuit materials

    SciTech Connect (OSTI)

    Glover, Brian B; Whites, Kieth W; Radway, Matthew J

    2009-01-01

    In this study, recent work on engineering R-card surface resistivity with printed metallic patterns is extended to the design of thin electromagnetic absorbers. Thin electromagnetic absorbers for wide incidence angles and both polarizations have recently been computationally verified by Luukkonen et al.. These absorbers are analytically modeled high-impedance surfaces with capacitive arrays of square patches implemented with relatively high dielectric constant and high loss substrate. However, the advantages provided by the accurate analytical model are largely negated by the need to obtain high dielectric constant material with accurately engineered loss. Fig. I(c) illustrates full-wave computational results for an absorber without vias engineered as proposed by Luukkonen et al.. Unique values for the dielectric loss are required for different center frequencies. Parameters for the capacitive grid are D=5.0 mm and w=O.l mm for a center frequency of 3.36 GHz. The relative permittivity and thickness is 9.20(1-j0.234) and 1=3.048 mm. Consider a center frequency of5.81 GHz and again 1=3.048 mm, the required parameters for the capacitive grid are D=2.0 mm and w=0.2 mm where the required relative permittivity is now 9.20(1-j0.371) Admittedly, engineered dielectrics are themselves a historically interesting and fruitful research area which benefits today from advances in monolithic fabrication using direct-write of dielectrics with nanometer scale inclusions. However, our objective in the present study is to realize the advantages of the absorber proposed by Luukkonen et al. without resort to engineered lossy dielectrics. Specifically we are restricted to commercially available planer circuit materials without use of in-house direct-write technology or materials engineering capability. The materials considered here are TMM 10 laminate with (35 {mu}lm copper cladding with a complex permittivity 9.20-j0.0022) and Ohmegaply resistor conductor material (maximum 250 {Omega

  10. Evaluation of internal contamination levels after a radiological dispersal device incident using portal monitors

    SciTech Connect (OSTI)

    Palmer, R.C.; Hertel, Nolan; Ansari, A.; Manger, Ryan P; Freibert, E.J.

    2012-01-01

    Following a radioactive dispersal device (RDD) incident, it may be necessary to evaluate the internal contamination levels of a large number of potentially affected individuals to determine if immediate medical follow-up is necessary. Since the current laboratory capacity to screen for internal contamination is limited, rapid field screening methods can be useful in prioritizing individuals. This study evaluated the suitability of a radiation portal monitor for such screening. A model of the portal monitor was created for use with models of six anthropomorphic phantoms in Monte Carlo N-Particle Transport Code Version 5 (MCNP) X-5 Monte Carlo Team (MCNP A General Monte Carlo N-Particle Transport Code Version 5. LA-CP-03-0245. Vol. 2. Los Alamos National Laboratory, 2004.). The count rates of the portal monitor were simulated for inhalation and ingestion of likely radionuclides from an RDD for each of the phantoms. The time-dependant organ concentrations of the radionuclides were determined using Dose and Risk Calculation Software Eckerman, Leggett, Cristy, Nelson, Ryman, Sjoreen and Ward (Dose and Risk Calculation Software Ver. 8.4. ORNL/TM-2001/190. Oak Ridge National Laboratory, 2006.). Portal monitor count rates corresponding to a committed effective dose E(50) of 10 mSv are reported.