Powered by Deep Web Technologies
Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

2

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

3

V-139: Cisco Network Admission Control Input Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common...

4

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

5

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm'...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting...

6

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits...

7

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

8

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

9

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

10

U-001:Symantec IM Manager Input Validation Flaws | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws October 3, 2011 - 12:45pm Addthis PROBLEM: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. PLATFORM: Version(s): prior to 8.4.18 ABSTRACT: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. reference LINKS: Security Advisory: SYM11-012 SecurityTracker Alert ID: 1026130 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in Symantec IM Manager. A remote user can conduct cross-site scripting attacks. A remote user can inject SQL commands. Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2011-0552]. A remote user can create a

11

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

12

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

13

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

14

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

15

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

16

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

17

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

18

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

19

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

20

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

22

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

23

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

24

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

25

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

26

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache...

27

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

28

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

29

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Skype Input Validation Flaw in 'mobile phone' Profile Entry 70: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

30

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Skype Input Validation Flaw in 'mobile phone' Profile Entry 0: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

31

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

32

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

33

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

34

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

35

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

36

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

37

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

38

T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Access Gateway Enterprise Edition Input Validation 1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks August 25, 2011 - 3:33pm Addthis PROBLEM: A vulnerability was reported in Citrix Access Gateway Enterprise Edition. A remote user can conduct cross-site scripting attacks. PLATFORM: Citrix Access Gateway Enterprise Edition 9.2-49.8 and prior. Citrix Access Gateway Enterprise Edition version 9.3 is not affected by this vulnerability. ABSTRACT: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. reference LINKS: SecurityTracker Alert ID: 1025973 Citrix Document ID: CTX129971

39

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

40

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

42

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

43

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

44

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

45

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy Savers (EERE)

Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or...

46

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

47

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

48

T-670: Skype Input Validation Flaw in 'mobile phone' Profile...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

affected. Skype has now confirmed it is aware of the hole and has already developed a patch to be published within the next week. Skype provides a plausible explanation as to why...

49

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

50

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

51

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

52

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

53

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

54

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

55

T-623: HP Business Availability Center Input Validation Hole...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting...

56

T-623: HP Business Availability Center Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Business Availability Center Input Validation Hole 3: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks May 16, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in HP Business Availability Center. A remote user can conduct cross-site scripting attacks. PLATFORM: HP Business Availability Center software 8.06 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: SecurityTracker Alert ID:1025535 HP Knowledge Base CVE-2011-1856 Secunia ID: SA44569 HP Document ID:c02823184 | ESB-2011.0525 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed by the

57

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

58

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024...

59

U-270:Trend Micro Control Manager Input Validation Flaw in Ad...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the underlying database. Solution: The vendor has issued a fix. For 5.5: Critical Patch - Build 1823 For 6.0: Critical Patch - Build 1449 Addthis Related Articles V-139:...

60

U-147:Red Hat Enterprise MRG Grid Input Validation Flaw | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

via network Modification of user information Solution: The vendor has issued a fix. The patch is available at RedHat.com Addthis Related Articles U-217: Red Hat Certificate System...

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds  

SciTech Connect

The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

GJ Schuster, FA Simonen, SR Doctor

2008-04-01T23:59:59.000Z

62

The SCALE Verified, Archived Library of Inputs and Data - VALID  

SciTech Connect

The Verified, Archived Library of Inputs and Data (VALID) at ORNL contains high quality, independently reviewed models and results that improve confidence in analysis. VALID is developed and maintained according to a procedure of the SCALE quality assurance (QA) plan. This paper reviews the origins of the procedure and its intended purpose, the philosophy of the procedure, some highlights of its implementation, and the future of the procedure and associated VALID library. The original focus of the procedure was the generation of high-quality models that could be archived at ORNL and applied to many studies. The review process associated with model generation minimized the chances of errors in these archived models. Subsequently, the scope of the library and procedure was expanded to provide high quality, reviewed sensitivity data files for deployment through the International Handbook of Evaluated Criticality Safety Benchmark Experiments (IHECSBE). Sensitivity data files for approximately 400 such models are currently available. The VALID procedure and library continue fulfilling these multiple roles. The VALID procedure is based on the quality assurance principles of ISO 9001 and nuclear safety analysis. Some of these key concepts include: independent generation and review of information, generation and review by qualified individuals, use of appropriate references for design data and documentation, and retrievability of the models, results, and documentation associated with entries in the library. Some highlights of the detailed procedure are discussed to provide background on its implementation and to indicate limitations of data extracted from VALID for use by the broader community. Specifically, external users of data generated within VALID must take responsibility for ensuring that the files are used within the QA framework of their organization and that use is appropriate. The future plans for the VALID library include expansion to include additional experiments from the IHECSBE, to include experiments from areas beyond criticality safety, such as reactor physics and shielding, and to include application models. In the future, external SCALE users may also obtain qualification under the VALID procedure and be involved in expanding the library. The VALID library provides a pathway for the criticality safety community to leverage modeling and analysis expertise at ORNL.

Marshall, William BJ J [ORNL] [ORNL; Rearden, Bradley T [ORNL] [ORNL

2013-01-01T23:59:59.000Z

63

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

64

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

65

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

66

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

67

V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site 93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks July 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN PLATFORM: Version(s) prior to 2.3.3.216 ABSTRACT: Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters REFERENCE LINKS: SecurityTracker Alert ID: 1028736 Barracuda SSL VPN Release Notes Zero Science Lab IMPACT ASSESSMENT: Medium DISCUSSION: The code will originate from the Barracuda SSL VPN interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if

68

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

69

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

70

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

71

T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM WebSphere Commerce Edition Input Validation Holes Permit 2: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks September 21, 2011 - 8:15am Addthis PROBLEM: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks. PLATFORM: WebSphere Commerce Edition V7.0 ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: IBM Recommended Fixes for WebSphere Commerce IBM Support SecurityTracker Alert ID: 1026074

72

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

73

Flawed reasoning  

SciTech Connect

The FERC's failure to investigate the Entergy/GSU merger's effects on market power may force other agencies to examine electric utility mergers on their own. The competitive effects of the proposed merger Entergy and Gulf States Utilities (GSU) will not be further investigated by the Federal Energy Regulatory Commission (FERC), according to a January 1993 order. The FERC's primary justification is that the [open quotes]open access[close quotes] transmission conditions offered by the merging parties eliminated concern over market power in transmission and bulk power. The FERC's reasoning is flawed. If the merger were to lead to an increase in market power, the proposed transmission conditions would not prevent the merged firm from exercising that power. The FERC also justifies its decision not to investigate the competitive effects of the merger on the grounds that no intervenor had demonstrated that present competition between the two systems is more than de minimis. This is not an appropriate standard. Intervenors demonstrated that Entergy's and GSU's transmission system offer alternative contract routes for bulk power between generators and customers. Even if Entergy and GSU both do not actually sell significant amounts of the same transmission-service, an antitrust evaluation should consider whether the availability of a second, independent route constrains the pricing of the first. The FERC's reasoning indicates that it has lost its way in carrying out its responsibilities to protect consumers. Open access to transmission systems may play an important role in increasing competition in bulk power markets. However, the FERC's goal should be to promote competition, not merely to open access for its own sake. In its enthusiasm to secure [open quotes]open access[close quotes], the FERC appears willing to ignore possible reductions in competition.

Frankena, M.W.; Owen, B.M.

1993-07-15T23:59:59.000Z

74

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

75

Fabrication Flaws in Reactor Pressure Vessel Repair Welds  

SciTech Connect

This paper describes the fabrication flaw distribution and characterization in the repair weld metal of reactor pressure vessels. This work indicates that the large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the repair ends. Parametric analysis using an exponential fit is performed on the data. A description of repair flaw morphology is provided. Fabrication flaws in repairs are characterized using high sensitivity nondestructive ultrasonic testing, validation by other nondestructive evaluation (NDE) techniques, and complemented by destructive testing.

Schuster, George J.; Doctor, Steven R.

2007-12-01T23:59:59.000Z

76

Improved Criteria for the Repair of Fabrication Flaws  

SciTech Connect

Section III of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code for nuclear power plant components requires radiographic examinations (RT) of welds and requires repairs for RT indications that exceed code acceptable sizes. This paper describes research that has generated data on welding flaws, which indicated that the largest flaws occur in repaired welds. The fabrication flaws were detected in material removed from cancelled nuclear power plants using high sensitivity Nondestructive Examination (NDE) and validated by complementary NDE and destructive testing. Evidence suggests that repairs are often for small and benign RT indications at locations buried within the vessel or pipe wall. Probabilistic fracture mechanics calculations are described in this paper to predict the increases in vessel and piping failure probabilities caused by the repair-induced flaws. Calculations address failures of embrittled vessel welds for pressurized thermal shock (PTS) transients and piping failures caused by fatigue crack growth. For vessels the small flaws, which are relatively common, can cause brittle fracture, such that the rarely encountered repair flaws of large sizes gave only modestly increased failure probabilities. Calculations for piping show that only relatively large fabrication flaws can cause failures because of the ductile nature of the piping material. The large repair flaws therefore significantly increased the failure probabilities. The paper recommends the use of more discriminating ultrasonic examinations in place of RT examinations along with repair criteria based on a fitness-for-purpose approach that minimize the number of unjustified repairs.

Doctor, Steven R.; Schuster, George J.; Simonen, Fredric A.

2004-12-01T23:59:59.000Z

77

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

78

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

79

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

80

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

82

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary...

83

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

84

Flaws Identification Using Eddy Current Differential Transducer and Artificial Neural Networks  

SciTech Connect

In this paper we present a multi-frequency excitation eddy current differential transducer and dynamic neural models which were used to detect and identify artificial flaws in thin conducting plates. Plates are made of Inconel600. EDM notches have relative depth from 10% to 80% and length from 2 mm to 7 mm. All flaws were located on the opposite surface of the examined specimen. Measured signals were used as input for training and verifying dynamic neural networks with a moving window. Wide range of ANN (Artificial Neural Network) structures are examined for different window length and different number of frequency components in excitation signal. Observed trends are presented in this paper.

Chady, T.; Lopato, P. [Szczecin University of Technology. al Piastow 17, 70-310 Szczecin (Poland)

2006-03-06T23:59:59.000Z

85

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks...

86

Status of French flaw evaluation procedures  

SciTech Connect

The RSE-M Code is under development in France and the 1996 edition will include a complete flaw evaluation procedure for operating PWRs. For FBRs the authors have developed the RCC-MR for design and they are now developing RSE-MR rules for operating plants; a first set of flaw evaluation rules are proposed in the A16 document for low and high temperature regime. After some comments on the organization of RSE and RCC Committees, the paper presents: (1) the status of the different French code rules (RSE-M and A16 document); (2) how can one take into consideration some complex geometry or loading case situations; (3) some comparisons with ASME Code-Section XI; and (4) few examples of major on-going developments for flaw evaluation for different components. In conclusion, two different sets of rules are under development one in RSE-M for PWRs and one in RSE-MR for FBRs using partly the A16 proposals. These rules have to remain consistent, but not necessary identical due to the specific components covered by these documents. The components can be very different in term of pressure load, operating temperature, transient thermal loads and seismic loads.

Faidy, C. [Electricite de France-SEPTEN, Villeurbanne (France); Barthelet, B. [Electricite de France-EPN, Paris La Defense (France); Drubay, B. [CEA CEN Saclay, Gif-sur-Yvette (France)

1996-12-01T23:59:59.000Z

87

On the validity of Akasofu’s ? parameter and of the Vasyliunas et al. general formula for the rate of solar wind-magnetosphere energy input  

Science Journals Connector (OSTI)

The ? parameter of Akasofu and the general formula of Vasyliunas et al....(1982) have been widely used as functions representing the rate of the solar wind energy input into the Earth’s magnetosphere. These...B, ...

Takao Aoki

2005-02-01T23:59:59.000Z

88

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

89

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

90

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

91

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Execute Arbitrary Commands V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-067: Oracle Java Flaw Lets Remote Users Execute...

92

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

93

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

94

Fabrication Flaw Density and Distribution in Piping Weldments  

SciTech Connect

The U.S. Nuclear Regulatory Commission supported the Pacific Northwest National Laboratory (PNNL) to develop empirical data on the density and distribution of fabrication flaws in nuclear reactor components. These data are needed to support probabilistic fracture mechanics calculations and studies on component structural integrity. PNNL performed nondestructive examination inspections and destructive testing on archived piping welds to determine the fabrication flaw size and distribution characteristics of the flaws in nuclear power plant piping weldments. Eight different processes and product forms in piping weldments were studied including wrought stainless steel and dissimilar metal weldments. Parametric analysis using an exponential fit was performed on the data. Results were created as a function of the through-wall size of the fabrication flaws as well as the length distribution. The results are compared and contrasted with those developed for reactor pressure vessel processes and product forms. The most significant findings were that the density of fabrication flaws versus through-wall size was higher in piping weldments than that for the reactor pressure vessel weldments, and the density of fabrication flaws versus through-wall size in both reactor pressure vessel weld repairs and piping weldments were greater than the density in the original weldments. Curves showing these distributions are presented.

Doctor, Steven R.

2009-09-01T23:59:59.000Z

95

Ultrasonic Flaw Detection of Cracks and Machined Flaws as Observed Through Austenitic Stainless Steel Piping Welds  

SciTech Connect

Piping welds in the pressure boundary of light water reactors (LWRs) are subject to a volumetric examination based on Section XI of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. Due to access limitations and high background radiation levels, the technique used is primarily ultrasonic rather than radiographic. Many of the austenitic welds in safety-related piping systems provide limited access to both sides of the weld, so a far-side examination is necessary. Historically, far-side inspections have performed poorly because of the coarse and elongated grains that make up the microstructures of austenitic weldments. The large grains cause the ultrasound to be scattered, attenuated, and redirected. Additionally, grain boundaries or weld geometry may reflect coherent ultrasonic echoes, making flaw detection and discrimination a more challenging endeavor. Previous studies conducted at the Pacific Northwest National Laboratory (PNNL) on ultrasonic far-side examinations in austenitic piping welds involved the application of conventional transducers, use of low-frequency Synthetic Aperture Focusing Techniques (SAFT), and ultrasonic phased-array (PA) methods on specimens containing implanted thermal fatigue cracks and machined reflectors [1-2]. From these studies, PA inspection provided the best results, detecting nearly all of the flaws from the far side. These results were presented at the Fifth International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components in 2006. This led to an invitation to examine field-removed specimens containing service-induced intergranular stress corrosion cracks (IGSCC) at the Electric Power Research Institute’s (EPRI) Nondestructive Evaluation (NDE) Center, in Charlotte, North Carolina. Results from this activity are presented.

Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Cumblidge, Stephen E.; Diaz, Aaron A.

2009-07-01T23:59:59.000Z

96

V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: IBM Tivoli Federated Identity Manager Signature Verification 3: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes January 21, 2013 - 12:15am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes PLATFORM: Tivoli Federated Identity Manager versions 6.2.0, 6.2.1, 6.2.2 ABSTRACT: A vulnerability was reported in IBM Tivoli Federated Identity Manager. REFERENCE LINKS: IBM Security Bulletin: 1615744 SecurityTracker Alert ID: 1028011 CVE-2012-6359 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not check that all attributes have been signed. A remote user with the ability to conduct a man-in-the-middle attack can modify

97

Probabilistic assessment of critically flawed LMFBR PHTS piping elbows  

SciTech Connect

One of the important functions of the Primary Heat Transport System (PHTS) of a large Liquid Metal Fast Breeder Reactor (LMFBR) plant is to contain the circulating radioactive sodium in components and piping routed through inerted areas within the containment building. A significant possible failure mode of this vital system is the development of cracks in the piping components. This paper presents results from the probabilistic assessment of postulated flaws in the most-critical piping elbow of each piping leg. The criticality of calculated maximum sized flaws is assessed against an estimated material fracture toughness to determine safety factors and failure probability estimates using stress-strength interference theory. Subsequently, a different approach is also employed in which the randomness of the initial flaw size and loading are more-rigorously taken into account. This latter approach yields much smaller probability of failure values when compared to the stress-strength interference analysis results.

Balkey, K.R.; Wallace, I.T.; Vaurio, J.K.

1982-01-01T23:59:59.000Z

98

Solubility of Flaws in Heavily-Doped Semiconductors  

Science Journals Connector (OSTI)

The solubility of a charged impurity in a semiconductor depends upon the Fermi level. This dependence may be understood in terms of a conceptual model in which an impurity is allowed to diffuse in a specimen containing a p-n junction, so that the Fermi level varies in respect to the band edges. If the impurity can exist in many states of charge (i.e., is a "flaw"), then the concentration of flaws with charge r times the electronic charge varies as the rth power of the hole density. Summing the concentrations for the different states of charge gives the solubility and its dependence upon hole concentration, and, hence, Fermi level.

W. Shockley and J. L. Moll

1960-09-01T23:59:59.000Z

99

Flawed analysis of the possibility of air capture  

E-Print Network (OSTI)

(2009) Capture of carbon dioxide from ambient air. Eur Phys J Spec Top 176: 93­106. Author contributionsLETTER Flawed analysis of the possibility of air capture In the article entitled "Economic capture and other gas separation processes. It concludes that (i) "unless air capture significantly

100

Detection of Strength-Impairing Surface Flaws in Glass  

Science Journals Connector (OSTI)

...of Strength-Impairing Surface Flaws in Glass F. M. Ernsberger Experiments have shown...sodium vapour treatment on the surface of glass (Andrade Tsien 1937) are fractures due...can also be developed, in soda-lime glass, by treatment with a molten lithium salt...

1960-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

On flaw tolerance of nacre: a theoretical study  

Science Journals Connector (OSTI)

...superior flaw-tolerance feature. The maximal crack size that does not evidently reduce the tensile strength of nacre is up to...PC Paris, and GR Irwin. 1985 The stress analysis of cracks handbook. St Louis, MO: Paris Productions. 48 Bao, G , and Y Song...

2014-01-01T23:59:59.000Z

102

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

103

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users...

104

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

105

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

106

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

107

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

108

Refiner Crude Oil Inputs  

NLE Websites -- All DOE Office Websites (Extended Search)

Day) Refiner Percent Operable Utilization Net Inputs (Refiner and Blender) of Motor Gasoline Blending Comp Net Inputs (Refiner and Blender) of RBOB Blending Components Net...

109

Automatic input rectification  

E-Print Network (OSTI)

We present a novel technique, automatic input rectification, and a prototype implementation, SOAP. SOAP learns a set of constraints characterizing typical inputs that an application is highly likely to process correctly. ...

Long, Fan

110

Automatic Input Rectification  

E-Print Network (OSTI)

We present a novel technique, automatic input rectification, and a prototype implementation called SOAP. SOAP learns a set of constraints characterizing typical inputs that an application is highly likely to process ...

Long, Fan

2011-10-03T23:59:59.000Z

111

TART input manual  

SciTech Connect

The TART code is a Monte Carlo neutron/photon transport code that is only on the CRAY computer. All the input cards for the TART code are listed, and definitions for all input parameters are given. The execution and limitations of the code are described, and input for two sample problems are given. (WHK)

Kimlinger, J.R.; Plechaty, E.F.

1982-04-01T23:59:59.000Z

112

A methodology for determining fabrication flaws in a reactor pressure vessel  

SciTech Connect

The Pacific Northwest National Laboratory (PNNL) conducted a program with the major objective of estimating the rate of occurrence of fabrication flaws in US light-water reactor pressure vessels (RPVs). In this study, RPV mate4rial was examined using the Synthetic Aperture Focusing Technique for Ultrasonic Testing (SAFT-UT) to detect and characterize flaws created during fabrication. The inspection data obtained in this program has been analyzed to address the rates of flaw occurrence.

Schuster, G.J.; Doctor, S.R.; Simonen, F.A. [Pacific Northwest National Lab., Richland, WA (United States)

1996-06-01T23:59:59.000Z

113

E-Print Network 3.0 - axial flaw detection Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

data mining for flaw identification in ceramics manufacture ORHAN DENGIZy, ALICE E. SMITH*y and IAN... elements is governed by its fracture strength, which is greatly...

114

Application of the TANDEM scheme for reconstructing flaw images by the SAFT method  

Science Journals Connector (OSTI)

The question of applying the TANDEM scheme for reconstructing flaw images by the SAFT method is considered. When the reflection of...

A. E. Bazulin; E. G. Bazulin; D. A. Koval

2009-07-01T23:59:59.000Z

115

Eddy current probe and method for flaw detection in metals  

DOE Patents (OSTI)

A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

Watjen, J.P.

1987-06-23T23:59:59.000Z

116

Eddy current probe and method for flaw detection in metals  

DOE Patents (OSTI)

A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner.

Watjen, John P. (Sunnyvale, CA)

1987-06-23T23:59:59.000Z

117

Evaluation of outer flaws in titanium alloys using eddy current measuring system  

SciTech Connect

In this paper results of shallow outer flaw detection in thick titanium alloy specimens is presented. In order to increase efficiency of inspections of minor defects an eddy current measuring system with a lock-in amplifier was used. The measurements were carried out for flat and cylindrical specimens with artificial flaws.

Chady, T.; Psuj, G.; Kowalczyk, J. [Department of Electrical and Computer Engineering, West Pomeranian University of Technology in Szczecin, ul. Sikorskiego 37, 70-313 Szczecin (Poland)

2011-06-23T23:59:59.000Z

118

Fracture response of externally flawed aluminum cylindrical shells under internal gaseous detonation loading  

E-Print Network (OSTI)

Fracture response of externally flawed aluminum cylindrical shells under internal gaseous. Experiments were performed to observe the fracture behavior of thin- wall and initially-flawed aluminum tubes to different fracture events are analyzed. Keywords: tube fracture, detonation, crack branching, crack curving

Barr, Al

119

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

120

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

DEVELOPMENT AND APPLICATION OF MATERIALS PROPERTIES FOR FLAW STABILITY ANALYSIS IN EXTREME ENVIRONMENT SERVICE  

SciTech Connect

Discovery of aging phenomena in the materials of a structure may arise after its design and construction that impact its structural integrity. This condition can be addressed through a demonstration of integrity with the material-specific degraded conditions. Two case studies of development of fracture and crack growth property data, and their application in development of in-service inspection programs for nuclear structures in the defense complex are presented. The first case study covers the development of fracture toughness properties in the form of J-R curves for rolled plate Type 304 stainless steel with Type 308 stainless steel filler in the application to demonstrate the integrity of the reactor tanks of the heavy water production reactors at the Savannah River Site. The fracture properties for the base, weld, and heat-affected zone of the weldments irradiated at low temperatures (110-150 C) up to 6.4 dpa{sub NRT} and 275 appm helium were developed. An expert group provided consensus for application of the irradiated properties for material input to acceptance criteria for ultrasonic examination of the reactor tanks. Dr. Spencer H. Bush played a lead advisory role in this work. The second case study covers the development of fracture toughness for A285 carbon steel in high level radioactive waste tanks. The approach in this case study incorporated a statistical experimental design for material testing to address metallurgical factors important to fracture toughness. Tolerance intervals were constructed to identify the lower bound fracture toughness for material input to flaw disposition through acceptance by analysis.

Sindelar, R; Ps Lam, P; Andrew Duncan, A; Bruce Wiersma, B; Karthik Subramanian, K; James Elder, J

2007-04-18T23:59:59.000Z

122

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

123

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

124

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

125

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Blue Coat Director HTTP Trace Processing Flaw Permits 0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks September 19, 2011 - 8:45am Addthis PROBLEM Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks. PLATFORM: All versions of Director prior to 5.5.2.3 are vulnerable. ABSTRACT: A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks. reference LINKS: Blue Coat Advisories ID: SA62 SecurityTracker Alert ID: 1026061 Blue Coat Director 510 Blue Coat SGME 5 IMPACT ASSESSMENT: Medium Discussion: An attacker can use the HTTP TRACE method to echo malicious script back to the client as part of a Cross Site Scripting (XSS) attack. No

126

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

127

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

128

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

129

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

130

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

NLE Websites -- All DOE Office Websites (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

131

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

132

T-713: Blue Coat Reporter Directory Traversal Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Blue Coat Reporter Directory Traversal Flaw 3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue Coat Reporter. A remote user can view files on the target system and gain full control of the target application. PLATFORM: All pre-9.3 versions of Reporter installed on a Windows server are vulnerable. ABSTRACT: Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. reference LINKS: Blue Coat Security Advisory ID: SA60 SecurityTracker Alert ID: 1026023 About Path Traversal IMPACT ASSESSMENT: High Discussion: Reporter installed on a Windows server is vulnerable to an HTTP directory traversal attack. An unauthenticated user can browse the file system and read any file. Data from these files can be used by an attacker to gain

133

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

134

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

135

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

136

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

137

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

138

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

139

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

140

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

142

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

143

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

144

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

145

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

146

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

147

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

148

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

149

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

150

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

151

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

152

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

153

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

154

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

155

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

156

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

157

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

158

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

159

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

160

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

162

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

163

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

164

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

165

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

166

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

167

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

168

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

169

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

170

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

171

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

172

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

173

NUPlans Budgeting Grant Input View  

E-Print Network (OSTI)

NUPlans Budgeting Grant Input View FMS704 NUPlansGrantInputViewV2 Last updated 4/7/2014 - rb © 2014 Northwestern University FMS704 NUPlans Contributor Budgeting 1 of 5 NUPlans Grant Input View NUPlans enables schools and units with grant projects to input grant expense estimates per project for the next fiscal

Shull, Kenneth R.

174

Statistics of the Charge Distribution for a Localized Flaw in a Semiconductor  

Science Journals Connector (OSTI)

A localized flaw such as a vacancy-interstitial pair, gold atom, or small void is considered. It is found that the charge situation can be described by a set of energy levels which are independent of the Fermi level but which are temperature-dependent. If the flaw is electrically neutral for a certain position of the Fermi level, then as the Fermi level is raised from the neutral level successively above each higher-lying level of the set, the flaw acquires an additional electron unit of negative charge. These levels are called the first-acceptor level, second-acceptor level, etc. The energy levels are essentially equal to kTln(Z1Z2), where Z1 and Z2 are the contributions of the flaw to the state sum for the system for the two conditions of charge. Similarly, as the Fermi level is lowered below the neutral point, it passes the first-donor level, second-donor level, etc., and the flaw acquires charges of plus one, plus two, etc. The statistics are derived for the distribution for the various conditions of charge, referred to as first-donor condition, neutral condition, first-acceptor condition, etc.

W. Shockley and J. T. Last

1957-07-15T23:59:59.000Z

175

Predicting Flaw-Induced Resonance Spectrum Shift with Theoretical Perturbation Analysis  

SciTech Connect

Resonance inspection is an emerging non-destructive evaluation (NDE) technique which uses the resonance spectra differences between the good part population and the flawed parts to identify anomalous parts. It was previously established that finite-element (FE)-based modal analysis can be used to predict the resonance spectrum for an engineering scale part with relatively good accuracy. However, FE-based simulations can be time consuming in examining the spectrum shifts induced by all possible structural flaws. This paper aims at developing a computationally efficient perturbation technique to quantify the frequency shifts induced by small structural flaws, based on the FE simulated resonance spectrum for the perfect part. A generic automotive connecting rod is used as the example part for our study. The results demonstrate that the linear perturbation theory provides a very promising way in predicting frequency changes induced by small structural flaws. As the flaw size increases, the discrepancy between the perturbation analysis and the actual FE simulation results increases due to nonlinearity, yet the perturbation analysis is still able to predict the right trend in frequency shift.

Lai, Canhai; Sun, Xin

2013-10-28T23:59:59.000Z

176

Obtaining flaw images by the SAFT method taking the variable velocity of sound in a test object into account  

Science Journals Connector (OSTI)

A modification of the SAFT method for obtaining flaw images in test ... are presented. The images obtained by the SAFT method without taking different SVs into account...

E. G. Bazulin

2010-11-01T23:59:59.000Z

177

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

178

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

179

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

180

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

182

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

183

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

184

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

185

V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local  

NLE Websites -- All DOE Office Websites (Extended Search)

7: VMware Workstation and Player vmware-mount Command Flaw Lets 7: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges August 26, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation and Player on Debian-based systems PLATFORM: VMware Workstation 8.x, 9.x and Player 4.x, 5.x ABSTRACT: VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command REFERENCE LINKS: Security Tracker Alert ID 1028948 VMware Security Advisory VMSA-2013-0010 CVE-2013-1662 IMPACT ASSESSMENT: Medium DISCUSSION: A local malicious user may exploit this vulnerability to escalate their privileges to root on the host OS. The issue is present when Workstation or

186

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

187

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

188

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

189

An Electrical Instrument for Detecting Invisible Flaws in Nonmagnetic Conductors Such as Tungsten  

Science Journals Connector (OSTI)

In this instrument the conductor being inspected is passed axially through a coil forming a part of the tuned circuit of an oscillator. Any flaws in the conductor cause a change in the tuning and thus in the frequency generated which is conveniently observed through heterodyning with a fixed frequency. By using high frequency of the order of 6000 kilocycles the response is limited to flaws near the surface of the conductor. This instrument is used in the factory inspection of tungsten wire particularly for the location of longitudinal cracks and is also effective in the determination of asymmetry of coated wires.

D. W. Dana

1934-01-01T23:59:59.000Z

190

Technical Letter Report Development of Flaw Size Distribution Tables Including Effects of Flaw Depth Sizing Errors for Draft 10CFR 50.61a (Alternate PTS Rule) JCN-N6398, Task 4  

SciTech Connect

This document describes a new method to determine whether the flaws in a particular reactor pressure vessel are consistent with the assumptions regarding the number and sizes of flaws used in the analyses that formed the technical justification basis for the new voluntary alternative Pressurized Thermal Shock (PTS) rule (Draft 10 CFR 50.61a). The new methodology addresses concerns regarding prior methodology because ASME Code Section XI examinations do not detect all fabrication flaws, they have higher detection performance for some flaw types, and there are flaw sizing errors always present (e.g., significant oversizing of small flaws and systematic under sizing of larger flaws). The new methodology allows direct comparison of ASME Code Section XI examination results with values in the PTS draft rule Tables 2 and 3 in order to determine if the number and sizes of flaws detected by an ASME Code Section XI examination are consistent with those assumed in the probabilistic fracture mechanics calculations performed in support of the development of 10 CFR 50.61a.

Simonen, Fredric A.; Gosselin, Stephen R.; Doctor, Steven R.

2013-04-22T23:59:59.000Z

191

Prioritization Tool Measurement Input Form  

Energy.gov (U.S. Department of Energy (DOE))

BTO encourages stakeholders to recommend updates and improvements to the Prioritization Tool by using the below Measure Input Form.

192

T-546: Microsoft MHTML Input Validation Hole May Permit Cross...  

Office of Environmental Management (EM)

vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim's Internet Explorer. The script could spoof...

193

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

194

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

195

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

196

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

197

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

198

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

199

Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems  

E-Print Network (OSTI)

Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems Soon Tee Teoh T the complex behaviors of computer network systems. We describe three log-file analysis applications operation of a large computer network sys- tem, the common practice is to constantly collect system logs

Ma, Kwan-Liu

200

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Data Validation  

Science Journals Connector (OSTI)

Data validation is a process which ensures the correctness of data, reduces database error rate and ensures an acceptable level of . Data validation is the key to the quality of the database. It is carried ou...

2008-01-01T23:59:59.000Z

202

,"U.S. Blender Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

Blender Net Input of Residuum (Thousand Barrels)","U.S. Blender Net Input of Gasoline Blending Components (Thousand Barrels)","U.S. Blender Net Input of Reformulated...

203

Characterization of Service Induced Flaws on the Far Side of Austenitic Welds Using Phased Array Technology  

SciTech Connect

Conventional ultrasonic testing methods continue to exhibit problems for applications involving coarse-grained structures. Pacific Northwest National Laboratory is evaluating the capabilities and limitations of phased array (PA) technology to detect service-type flaws in these coarse-grained materials. The work is being sponsored by the U.S. Nuclear Regulatory Commission, Office of Research. Work to determine detection capabilities through welds with varied grain structures is being explored to provide a better understanding of the acoustic properties of these welded structures. Piping specimens with welds fabricated in vertical and horizontal positions to simulate field conditions have been studied. The insights gained from the austenitic piping will be applied to dissimilar metal weld configurations, corrosion resistant clad piping and cast stainless steels. This paper presents results for using PA ultrasonic technology to determine the effectiveness of detecting and accurately characterizing flaws on the far-side of austenitic piping welds.

Anderson, Michael T.; Cumblidge, Stephen E.

2004-01-01T23:59:59.000Z

204

Toward a Theory of Input Acceptance for Transactional Memories  

E-Print Network (OSTI)

-core architectures requires numerous events to be treated upon reception. In fact, the transactional code executed, experimental validation compares the presented TM designs in terms of input acceptance with realistic workloads database systems transac- tional events can be buffered on the server-side before treatment

Guerraoui, Rachid

205

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

206

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

207

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

208

Estimation of the Residual Magnetic Field Strength Inside a Pipeline after Testing by a Magnetic Flaw Detector  

Science Journals Connector (OSTI)

The residual magnetic field strength inside a pipeline after testing by a magnetic flaw detector ... demagnetizing local joint-pipe sections in carrying out repair-welding works is proposed.

R. V. Zagidulin; V. F. Muzhitskii

2003-07-01T23:59:59.000Z

209

Theoretical estimation of discontinuity flaw of adhesive contacts between multilayer elements of the liquid metal blanket in a fusion reactor  

Science Journals Connector (OSTI)

A technique developed for calculating the discontinuity flaw of an adhesive contact and the adhesion energy for two bodies makes it possible to take into account these effects in designing a multilayer cermet wal...

I. V. Vitkovsky; A. N. Konev; V. S. Shorkin; S. I. Yakushina

2007-06-01T23:59:59.000Z

210

Verification and validation benchmarks.  

SciTech Connect

Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

Oberkampf, William Louis; Trucano, Timothy Guy

2007-02-01T23:59:59.000Z

211

Model Validation Status Review  

SciTech Connect

The primary objective for the Model Validation Status Review was to perform a one-time evaluation of model validation associated with the analysis/model reports (AMRs) containing model input to total-system performance assessment (TSPA) for the Yucca Mountain site recommendation (SR). This review was performed in response to Corrective Action Request BSC-01-C-01 (Clark 2001, Krisha 2001) pursuant to Quality Assurance review findings of an adverse trend in model validation deficiency. The review findings in this report provide the following information which defines the extent of model validation deficiency and the corrective action needed: (1) AMRs that contain or support models are identified, and conversely, for each model the supporting documentation is identified. (2) The use for each model is determined based on whether the output is used directly for TSPA-SR, or for screening (exclusion) of features, events, and processes (FEPs), and the nature of the model output. (3) Two approaches are used to evaluate the extent to which the validation for each model is compliant with AP-3.10Q (Analyses and Models). The approaches differ in regard to whether model validation is achieved within individual AMRs as originally intended, or whether model validation could be readily achieved by incorporating information from other sources. (4) Recommendations are presented for changes to the AMRs, and additional model development activities or data collection, that will remedy model validation review findings, in support of licensing activities. The Model Validation Status Review emphasized those AMRs that support TSPA-SR (CRWMS M&O 2000bl and 2000bm). A series of workshops and teleconferences was held to discuss and integrate the review findings. The review encompassed 125 AMRs (Table 1) plus certain other supporting documents and data needed to assess model validity. The AMRs were grouped in 21 model areas representing the modeling of processes affecting the natural and engineered barriers, plus the TSPA model itself Description of the model areas is provided in Section 3, and the documents reviewed are described in Section 4. The responsible manager for the Model Validation Status Review was the Chief Science Officer (CSO) for Bechtel-SAIC Co. (BSC). The team lead was assigned by the CSO. A total of 32 technical specialists were engaged to evaluate model validation status in the 21 model areas. The technical specialists were generally independent of the work reviewed, meeting technical qualifications as discussed in Section 5.

E.L. Hardin

2001-11-28T23:59:59.000Z

212

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Red Hat Enterprise MRG Messaging Qpid Python Certificate 8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks July 12, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Enterprise MRG Messaging. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A remote user can conduct a man-in-the-middle attack to access potentially sensitive information REFERENCE LINKS: SecurityTracker Alert ID: 1028774 Redhat Advisory RHSA-2013:1024-1 CVE-2013-1909 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not properly validate the remote server's TLS/SSL certificates. A remote user can conduct a man-in-the-middle attack to

213

Development of flaw accept/reject criteria for solid propellant rocket grains  

E-Print Network (OSTI)

OF SCIENCE May 1976 Major Subjects Aerospace Engineering DEVELOPMENT OF FLAW ACCEPT/REJECT CRITERIA FOR SOLID PROPELLANT ROCKET GRAINS A Thesis by JAMES JEROME ROTTER Approved as to style and content bys Head o Depar men Mem er Mem er May 1976 4... crack, ) Mathematically, dU & ~dAa dA dA where& U = internal strain energy A = area of one surface of the crack 10 ~ = s pec if ic surface energy density More recent advances in fracture mechanics have resulted from a detailed examination...

Rotter, James Jerome

2012-06-07T23:59:59.000Z

214

Intermediate inputs and economic productivity  

Science Journals Connector (OSTI)

...US sectoral-level production functions. Both the...316) and plastics and rubber-(326). The relationship...coefficients of the production function sum to a quantity...inputs were used in the production process. 16 This estimate...products 326 plastics and rubber products 327 non-metallic...

2013-01-01T23:59:59.000Z

215

PADD 3 Weekly Inputs & Utilization  

U.S. Energy Information Administration (EIA) Indexed Site

Utilization 97.4 95.3 94.8 94.9 95.9 92.2 2010-2015 Refiner and Blender Net Inputs Motor Gasoline Blending Components -2,174 -2,008 -2,012 -2,095 -2,214 -2,291 2004-2015 RBOB -283...

216

Resources Abstracts Input Transaction Form  

E-Print Network (OSTI)

#12;Resources Abstracts Input Transaction Form 4. Title 5. Report Date 6.Urban Aquaculture Covered The University of the District of Columbia 12. Sponsoring Organization Water Resources Research of the rainbow trout (Salmo gairdneri) in a closed recycling water system in an urban environment is described

District of Columbia, University of the

217

Flaw Shape Reconstruction from SH-Wave Array Ultrasonic Data Using Time Domain Linearized Inverse Scattering Method  

SciTech Connect

A linearized inverse scattering method, so called the Kirchhoff inversion, is formulated in time domain for SH-waves measured by a contact ultrasonic transducer and tested using experimental data. The data for reconstruction are experimentally obtained by measuring ultrasonic echoes from artificial flaws in steel plate specimens. For an efficient and accurate data collection, a contact SH-wave linear array transducer is used. The shapes of the artificial flaws are reconstructed by the Kirchhoff inversion and the conventional SAFT (Synthetic Aperture Focusing Technique) using the waves from a single ray path. Comparison of the two methods shows that the Kirchhoff inversion works well for experimental data and outperforms SAFT although only an illuminated portion of the flaw boundaries is reconstructed by either method. In order to gain more information on the flaw boundaries, the Kirchhoff inversion which takes into account multiple ray paths is also tested with the same experimental data. As a result, it is shown that a larger part of the flaw boundaries can be visualized by considering the multiple ray paths.

Kimoto, K.; Hirose, S. [Department of Mechanical and Environmental Informatics, Graduate School of Information Science and Engineering, Tokyo Institute of Technology 2-12-1 O-okayama, Meguro-ku, Tokyo 152-8552 (Japan)

2005-04-09T23:59:59.000Z

218

BISON Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Validation Validation BISON Validation January 29, 2013 - 11:54am Addthis BISON Validation Predictive Maturity Work continued on the previously developed discovery, accumulation, and assessment (DAA) process to plan, track, assess, and communicate VU activities and results. DAA was applied to the BISON sensitivity analysis described above, and the results were exported to Synopsis, the DAA management tool. [SNL, LANL, INL] Building on previous sensitivity studies of the LIFE-IV nuclear fuels code, a recently completed VU study focused on a methodology by which experimental campaigns may be devised to improve code calibration. Specifically, a principal component analysis is performed on the input parameters of the experiments, and the experiments that offer the least residual error when reconstructed from the principal components are

219

In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements  

SciTech Connect

Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (§50.61), “Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events,” adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, §50.61a, published on January 4, 2010, entitled “Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events” (75 FR 13). Use of the new rule by licensees is optional. The §50.61a rule differs from §50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensee’s reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with §50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in §50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

2012-09-17T23:59:59.000Z

220

Reference flaw size for structural and fracture analysis of Types 1 and 2 waste tanks  

SciTech Connect

High Level Waste Engineering (HLWE) is reviewing the Technical Standard requirements for tank level and minimum wall temperature. These requirements are necessary to minimize the probability of brittle fracture of the primary liner due to normal operating and/or seismic loads. The review includes the determination of a reference flaw size, a maximum through-wall crack length, which may reasonably be applied to structural and fracture analysis of the Type I and II waste tank primary liners. This memorandum briefly discusses the mechanism of crack initiation and propagation, the inspections of primary wall cracks, and a statistical analysis of the measured crack lengths. Recommendations on additional analyses which may increase the confidence in the reference flaw size will also be presented. The primary liner for Type I and II waste tanks is fabricated from ASTM A285, Grade B carbon steel (A285). The liner received no heat treatments to relieve residual stresses in the heat affected zones. Five Type I waste tanks and all four Type II waste tanks developed through-wall cracks. Leaks developed in tanks 9, 10,14 and 16 within less than two years. Small surface cracks were also observed on the interior of the tank primary. The cracks were perpendicular to the butt welds and extended through the heat affected zone before stopping shortly after penetrating the base metal. The largest leakage of radioactive waste, approximately 185,000 gallons from the primary into the annulus, occurred from Tank 16, a Type II waste tank. During inspections of this tank over 300 leaks were discovered with the longest observed crack being approximately 6 inches. Due to the large number of observed cracks and the amount of leakage, this wag the only tank that was surveyed for crack lengths. For this analysis, Tank 16 will be considered representative of all Type I and II waste tanks because the materials, construction practices, and tank chemistry represented a worst case.

Wiersma, B.J.; Sindelar, R.L.

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

SANSMIC Validation.  

SciTech Connect

SANSMIC is solution mining software that was developed and utilized by SNL in its role as geotechnical advisor to the US DOE SPR for planning purposes. Three SANSMIC leach modes - withdrawal, direct, and reverse leach - have been revalidated with multiple test cases for each mode. The withdrawal mode was validated using high quality data from recent leach activity while the direct and reverse modes utilized data from historical cavern completion reports. Withdrawal results compared very well with observed data, including the location and size of shelves due to string breaks with relative leached volume differences ranging from 6 - 10% and relative radius differences from 1.5 - 3%. Profile comparisons for the direct mode were very good with relative leached volume differences ranging from 6 - 12% and relative radius differences from 5 - 7%. First, second, and third reverse configurations were simulated in order to validate SANSMIC over a range of relative hanging string and OBI locations. The first-reverse was simulated reasonably well with relative leached volume differences ranging from 1 - 9% and relative radius differences from 5 - 12%. The second-reverse mode showed the largest discrepancies in leach profile. Leached volume differences ranged from 8 - 12% and relative radius differences from 1 - 10%. In the third-reverse, relative leached volume differences ranged from 10 - 13% and relative radius differences were ~4 %. Comparisons to historical reports were quite good, indicating that SANSMIC is essentially the same as documented and validated in the early 1980's.

Weber, Paula D.; Rudeen, David Keith; Lord, David

2014-08-01T23:59:59.000Z

222

Joint Estimation of NDE Inspection Capability and Flaw-size Distribution for in-service Aircraft Inspections  

E-Print Network (OSTI)

1 Joint Estimation of NDE Inspection Capability and Flaw- size Distribution for in-service Aircraft, Dayton, OH 45469 Abstract: Nondestructive evaluation (NDE) is widely used in the aerospace industry of unknown existing cracks is more difficult. If NDE signal strength is recorded at all inspections

223

Program for field validation of the synthetic aperture focusing technique for ultrasonic testing (SAFT UT). Quarterly progress report, November 1980-January 1981  

SciTech Connect

The purpose of the project is to validate the usefulness of SAFT UT for industrial nondestructive evaluations (NDE). SAFT UT is an ultrasonic imaging method for accurate measurement of the spatial location and extent of acoustically reflective surfaces (flaws) contained in objects such as structural components and weldments in nuclear power reactor systems. The increased measurement accuracy offered by SAFT, when compared with that provided by measurement methods now in use, will improve the reliability of flaw severity assessments with resultant safety and economic benefits to the nuclear power industry.

Hamlin, D.R.; Jackson, J.L.; Mueller, T.A.

1981-03-01T23:59:59.000Z

224

Code input alternatives John C. Wright  

E-Print Network (OSTI)

Code input alternatives John C. Wright John Wright Oct 2009 ­ CSWIM Workshop@ORNL Extensible markup

Wright, John C.

225

THE CHOICE OF OPTIMAL STRUCTURE OF ARTIFICIAL NEURAL NETWORK CLASSIFIER INTENDED FOR CLASSIFICATION OF WELDING FLAWS  

SciTech Connect

Nondestructive testing and evaluation are under continuous development. Currently researches are concentrated on three main topics: advancement of existing methods, introduction of novel methods and development of artificial intelligent systems for automatic defect recognition (ADR). Automatic defect classification algorithm comprises of two main tasks: creating a defect database and preparing a defect classifier. Here, the database was built using defect features that describe all geometrical and texture properties of the defect. Almost twenty carefully selected features calculated for flaws extracted from real radiograms were used. The radiograms were obtained from shipbuilding industry and they were verified by qualified operator. Two weld defect's classifiers based on artificial neural networks were proposed and compared. First model consisted of one neural network model, where each output neuron corresponded to different defect group. The second model contained five neural networks. Each neural network had one neuron on output and was responsible for detection of defects from one group. In order to evaluate the effectiveness of the neural networks classifiers, the mean square errors were calculated for test radiograms and compared.

Sikora, R.; Chady, T.; Baniukiewicz, P.; Caryk, M.; Piekarczyk, B. [West Pomeranian University of Technology in Szczecin, Department of Electrical Engineering, 70-313 Szczecin (Poland)

2010-02-22T23:59:59.000Z

226

Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system  

DOE Patents (OSTI)

A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

Thompson, Donald O. (Ames, IA); Wormley, Samuel J. (Ames, IA)

1989-03-28T23:59:59.000Z

227

Automated Flaw Detection Scheme For Cast Austenitic Stainless Steel Weld Specimens Using Hilbert Huang Transform Of Ultrasonic Phased Array Data  

SciTech Connect

The objective of this work is to develop processing algorithms to detect and localize the flaws using NDE ultrasonic data. Data was collected using cast austenitic stainless steel (CASS) weld specimens on-loan from the U.S. nuclear power industry’s Pressurized Water Reactor Owners Group (PWROG) specimen set. Each specimen consists of a centrifugally cast stainless steel (CCSS) pipe section welded to a statically cast (SCSS) or wrought (WRSS) section. The paper presents a novel automated flaw detection and localization scheme using low frequency ultrasonic phased array inspection signals in the weld and heat affected zone of the base materials. The major steps of the overall scheme are preprocessing and region of interest (ROI) detection followed by the Hilbert Huang transform (HHT) of A-scans in the detected ROIs. HHT offers time-frequency-energy distribution for each ROI. The accumulation of energy in a particular frequency band is used as a classification feature for the particular ROI.

Khan, T.; Majumdar, Shantanu; Udpa, L.; Ramuhalli, Pradeep; Crawford, Susan L.; Diaz, Aaron A.; Anderson, Michael T.

2012-01-01T23:59:59.000Z

228

Program for field validation of the Synthetic Aperture Focusing Technique for Ultrasonic Testing (SAFT UT). Final report  

SciTech Connect

This final report describes work performed by Southwest Research Institute for the Nuclear Regulatory Commission (NRC) in fulfillment of NRC Contract No. NRC-04-77-145: ''Program for Field Validation of the Synthetic Aperture Focusing Technique for Ultrasonic Testing (SAFT UT).'' The purpose of the project was to validate the effectiveness of SAFT UT as a nondestructive examination technique for nuclear power and other related industries. SAFT UT is an ultrasonic imaging method for accurate measurement of the spatial location and extent of acoustically reflective surfaces (flaws) contained in objects such as structural components and weldments in nuclear power reactor systems. The increased measurement accuracy offered by SAFT, when compared with that provided by measurement methods now in use, will improve the reliability of flaw severity assessment with resultant safety and economic benefits to the nuclear power industry. This report presents a comprehensive discussion of the work accomplished in evaluating the performance capabilities of the developed SAFT UT inspection system. Inspection results obtained using both 0-degree longitudinal and angle-beam operating modes are presented. These results include laboratory and nuclear power plant field site examinations on a variety of defect types contained within carbon and stainless steel flat plate and cylindrical test specimens or components. The SAFT UT processed data flaw images are evaluated by comparing them to results obtained from destructive sectioning or by using flaw fabrication data which predicted actual flaw depth, orientation and size. On the basis of these evaluations, conclusions are presented which summarize the performance capabilities of the SAFT UT inspection technique. 116 figs.

Hamlin, D.R.

1985-11-01T23:59:59.000Z

229

Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high strength steel cylinder  

SciTech Connect

High pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-Notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3mm to 10mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6(O.D. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) {times} Design Pressure.

Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States). Process and Systems R and D; Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O.

1996-12-01T23:59:59.000Z

230

Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high-strength steel cylinder  

SciTech Connect

High-pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high-pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3 to 10 mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6 (o.d. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) x Design Pressure.

Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States); Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O. [Tribolet (R.O.), Van Wert, OH (United States)

1997-11-01T23:59:59.000Z

231

Dilatation-strain analysis of the effects of flaws on the mechanical behavior of a highly filled elastomer  

E-Print Network (OSTI)

DILATATION-STRAIN ANALYSIS OF THE EFFECTS OF FLANS ON THE MECHANICAL BEHAVIOR OF A HIGHLY FILLED ELASTOMER A Thesis By BENJAMIN RAY SMITH Submitted to the Graduate College of the Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE August 1966 Major Subject. 'Aerospace Engineering DILATATION-STRAIN ANALYSIS OF THE EFFECTS OF FLAWS ON THE MECHANICAL BEHAVIOR OF A HIGHLY FILLED ELASTOMER A Thesis By BENJAMIN RAY SMITH Approved...

Smith, Benjamin Ray

2012-06-07T23:59:59.000Z

232

SAFT imaging of flaws in the rail base blade with consideration of multiple reflections of an ultrasonic pulse from the boundaries of a test object  

Science Journals Connector (OSTI)

The possibility of obtaining images of type-69 flaws in blades of the railroad rail base is considered. For this purpose, a modification of the SAFT algorithm is proposed, in which, during...

E. G. Bazulin

2010-02-01T23:59:59.000Z

233

Reconstruction of flaw images by the C-SAFT method from echo signals measured by an antenna array in the triple-scanning mode  

Science Journals Connector (OSTI)

The application of antenna matrices (AMs) for obtaining flaw images during automated nondestructive ultrasonic testing is considered. The conventional technique of using an AM as a phased AM (PAM) has a number...

E. G. Bazulin

2012-01-01T23:59:59.000Z

234

Energy Input Output Calculator | Open Energy Information  

Open Energy Info (EERE)

Input Output Calculator Input Output Calculator Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy Input-Output Calculator Agency/Company /Organization: Department of Energy Sector: Energy Focus Area: Energy Efficiency Resource Type: Online calculator User Interface: Website Website: www2.eere.energy.gov/analysis/iocalc/Default.aspx Web Application Link: www2.eere.energy.gov/analysis/iocalc/Default.aspx OpenEI Keyword(s): Energy Efficiency and Renewable Energy (EERE) Tools Language: English References: EERE Energy Input-Output Calculator[1] The Energy Input-Output Calculator (IO Calculator) allows users to estimate the economic development impacts from investments in alternate electricity generating technologies. About the Calculator The Energy Input-Output Calculator (IO Calculator) allows users to estimate

235

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28580 of 31,917 results. 71 - 28580 of 31,917 results. Article T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. http://energy.gov/cio/articles/t-701-citrix-access-gateway-enterprise-edition-input-validation-flaw-logon-portal Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article IRS Announces New Tribal Economic Development Bond Allocation Guidance Treasury and the IRS published new guidance today allocating Tribal

236

National Climate Assessment: Available Technical Inputs  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technical Inputs Print E-mail Available Technical Inputs Print E-mail Technical inputs for the 2013 National Climate Assessment were due March 1, 2012. Please note that these reports were submitted independently to the National Climate Assessment for consideration and have not been reviewed by the National Climate Assessment Development and Advisory Committee. Links to agency-sponsored reports will be posted here as they are made available. Sectors National Climate Assessment Health Sector Literature Review and Bibliography. Technical Input for the Interagency Climate Change and Human Health Group, September 2012. Overview Bibliography Bibliography User's Guide Search Strategy and Results Walthall et al. 2012. Climate Change and Agriculture in the United States: Effects and Adaptation. USDA Technical Bulletin 1935. Washington, DC. 186 pages. | Report FAQs

237

Evaluation of boolean formulas with restricted inputs  

E-Print Network (OSTI)

In this thesis, I will investigate the running time of quantum algorithms for evaluating boolean functions when the input is promised to satisfy certain conditions. The two quantum algorithms considered in this paper are ...

Zhan, Bohua

2010-01-01T23:59:59.000Z

238

Generation of RTL verification input stimulus  

E-Print Network (OSTI)

This thesis presents an approach for generating input stimulus for verification of register-transfer level (RTL) design of VLSI circuits. RTL design is often subjected to a significant verification effort due to errors introduced during manual...

Selvarathinam, Anand Manivannan

2012-06-07T23:59:59.000Z

239

Total Blender Net Input of Petroleum Products  

U.S. Energy Information Administration (EIA) Indexed Site

Input Input Product: Total Input Natural Gas Plant Liquids and Liquefied Refinery Gases Pentanes Plus Liquid Petroleum Gases Normal Butane Isobutane Other Liquids Oxygenates/Renewables Methyl Tertiary Butyl Ether (MTBE) Renewable Fuels (incl. Fuel Ethanol) Fuel Ethanol Renewable Diesel Fuel Other Renewable Fuels Unfinished Oils (net) Unfinished Oils, Naphthas and Lighter Unfinished Oils, Kerosene and Light Gas Oils Unfinished Oils, Heavy Gas Oils Residuum Motor Gasoline Blending Components (MGBC) (net) MGBC - Reformulated MGBC - Reformulated - RBOB MGBC - Reformulated, RBOB for Blending w/ Alcohol MGBC - Reformulated, RBOB for Blending w/ Ether MGBC - Reformulated, GTAB MGBC - Conventional MGBC - Conventional, CBOB MGBC - Conventional, GTAB MGBC - Other Conventional Period-Unit: Monthly-Thousand Barrels Monthly-Thousand Barrels per Day Annual-Thousand Barrels Annual-Thousand Barrels per Day

240

Opportunities for Public Input Into DOE Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

Opportunities for Public Input Into DOE Projects Opportunities for Public Input Into DOE Projects There are currently several DOE-proposed activities that citizens can comment on in the near future. Here is a summary of each, as well as a description of how to provide your input into the project: Hanford Draft Closure and Waste Management Environmental Impact Statement Idahoans might be interested in this document because one of the proposed actions involves sending a small amount of radioactive waste (approximately 5 cubic meters of special reactor components) to the Idaho Nuclear Technology and Engineering Center on DOE's Idaho Site for treatment. Here is a link to more information about the document: http://www.hanford.gov . A public hearing on the draft EIS will be held in Boise on Tuesday, Feb. 2 at the Owyhee Plaza Hotel. It begins at 6 p.m.

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Watfactory Virtual Manufacturing Process Varying Inputs  

E-Print Network (OSTI)

with the virtual process: · Allows quick exploration (i.e. during a short course) of process improvement ideasWatfactory Virtual Manufacturing Process Machine 1 Machine 2 Machine 3 Stream 1 Machine B Stream 2 Inputs Can be Set by Stream z19, ..., z24 The Watfactory virtual process simulates a manufacturing

Zhu, Mu

242

Automatic interpretation of loosely encoded input  

Science Journals Connector (OSTI)

Knowledge-based systems are often brittle when given unanticipated input, i.e. assertions or queries that misalign with the ontology of the knowledge base. We call such misalignments ''loose speak''. We found that loose speak occurs frequently in interactions ... Keywords: Knowledge based systems, Metonymy, Noun compound, Question answering

James Fan; Ken Barker; Bruce Porter

2009-02-01T23:59:59.000Z

243

U.S. Weekly Inputs & Utilization  

U.S. Energy Information Administration (EIA) Indexed Site

Utilization 95.4 93.5 93.5 94.4 93.9 91 1990-2015 Refiner and Blender Net Inputs Motor Gasoline Blending Components 8 234 445 192 -558 -219 2004-2015 RBOB 167 330 371 103 9 261...

244

Contractive Systems with Inputs Eduardo D. Sontag  

E-Print Network (OSTI)

Contractive Systems with Inputs Eduardo D. Sontag Dedicated to Y. Yamamoto on the occasion of his 60th birthday Abstract. Contraction theory provides an elegant way of analyzing the behaviors-contained introduction to some basic results, with a focus on contractions with respect to non-Euclidean metrics. 1

Sontag, Eduardo

245

Green Computing input for better outcomes  

E-Print Network (OSTI)

Journal Profile: Udi Dahan Green Maturity Model for Virtualization Profiling Energy Usage for Efficient suggests that tracking energy consumption at every level will become the factor of success for greenGreen Computing input for better outcomes Learn the discipline, pursue the art, and contribute

Amir, Yair

246

Input to Priorities Panel August 7, 2012  

E-Print Network (OSTI)

Input to Priorities Panel August 7, 2012 Jeff Freidberg MIT 1 #12;The Emperor of Fusion has · Comparison (1 GW overnight cost) · Coal $ 3B · Gas $ 1B · Nuclear $ 4B · Wind $ 2B · Solar-T $ 3B · ITER $25B

247

Dale Meade regarding input international collaboration panel  

E-Print Network (OSTI)

Dale Meade regarding input international collaboration panel 1 message Saskia to add 2 comments to this discussion: 1. This regards not only international collaborations, but also national collaborations. We need to decide on using 1 video conferencing system. One of the main

248

Technology Validation Fact Sheet  

Energy.gov (U.S. Department of Energy (DOE))

Fact sheet produced by the Fuel Cell Technologies Office describing hydrogen and fuel cell technology validation efforts.

249

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

250

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

251

Tribal Leaders Provide White House with Input on Bolstering Climate...  

Energy Savers (EERE)

Tribal Leaders Provide White House with Input on Bolstering Climate Resilience Tribal Leaders Provide White House with Input on Bolstering Climate Resilience January 7, 2015 -...

252

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

actions on the site acting as the target user. Solution: HP has provided HP Diagnostics patch version 8.05.54.225 to resolve the vulnerability. This patch can be obtained by...

253

T-722: IBM WebSphere Commerce Edition Input Validation Holes...  

Energy Savers (EERE)

the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference...

254

Application of computer voice input/output  

SciTech Connect

The advent of microprocessors and other large-scale integration (LSI) circuits is making voice input and output for computers and instruments practical; specialized LSI chips for speech processing are appearing on the market. Voice can be used to input data or to issue instrument commands; this allows the operator to engage in other tasks, move about, and to use standard data entry systems. Voice synthesizers can generate audible, easily understood instructions. Using voice characteristics, a control system can verify speaker identity for security purposes. Two simple voice-controlled systems have been designed at Los Alamos for nuclear safeguards applicaations. Each can easily be expanded as time allows. The first system is for instrument control that accepts voice commands and issues audible operator prompts. The second system is for access control. The speaker's voice is used to verify his identity and to actuate external devices.

Ford, W.; Shirk, D.G.

1981-01-01T23:59:59.000Z

255

Generalized Input-Output Inequality Systems  

SciTech Connect

In this paper two types of generalized Leontief input-output inequality systems are introduced. The minimax properties for a class of functions associated with the inequalities are studied. Sufficient and necessary conditions for the inequality systems to have solutions are obtained in terms of the minimax value. Stability analysis for the solution set is provided in terms of upper semi-continuity and hemi-continuity of set-valued maps.

Liu Yingfan [Department of Mathematics, Nanjing University of Post and Telecommunications, Nanjing 210009 (China)], E-mail: yingfanliu@hotmail.com; Zhang Qinghong [Department of Mathematics and Computer Science, Northern Michigan University, Marquette, MI 49855 (United States)], E-mail: qzhang@nmu.edu

2006-09-15T23:59:59.000Z

256

EOS Land Validation Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

EOS Land Validation Presentations EOS Land Validation Presentations Meeting: Land Cover Validation Workshop Date: February 2, 2004 Place: Boston, MA Title: Validation Data Support Activities at the ORNL DAAC (Power Point) Presenter: Bob Cook Meeting: Fall 2003 American Geophysical Union (AGU) Meeting Date: December 9, 2003 Place: San Francisco, CA Title: Ground-Based Data Supporting the Validation of MODIS Land Products (Power Point) Presenter: Larry Voorhees Meeting: Terra and Aqua Products Review Date: March 2003 Place: NASA HQ Title: Supporting the Validation of MODIS Land Products (Power Point) Presenter: Larry Voorhees Meeting: Terra and Aqua Products Review Date: March 2003 Place: NASA HQ Title: MODIS Land Summary (Power Point) Presenter: Chris Justice, University of Maryland Meeting: Spring 2002 American Geophysical Union (AGU) Meeting

257

Accelerated Testing Validation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Accelerated Testing Validation Rangachary Mukundan (PI), Rodney Borup, John Davey, Roger Lujan Los Alamos National Laboratory Adam Z. Weber Lawrence Berkeley National Laboratory...

258

Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels  

SciTech Connect

This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

1991-10-01T23:59:59.000Z

259

Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industry’s Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

2014-03-24T23:59:59.000Z

260

A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL  

SciTech Connect

A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

2014-04-07T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Determining the flaw type from images obtained by the C-SAFT method with account for transformations of wave types upon reflections of ultrasonic pulses from the irregular boundaries of a test object  

Science Journals Connector (OSTI)

The application of antenna arrays (AAs) for obtaining flaw images during automated non-destructive testing is considered. The conventional technique of using an AA as a phased AA has a number of drawbacks. An alt...

E. G. Bazulin

2011-01-01T23:59:59.000Z

262

On the Wind Power Input to the Ocean General Circulation  

E-Print Network (OSTI)

The wind power input to the ocean general circulation is usually calculated from the time-averaged wind products. Here, this wind power input is reexamined using available observations, focusing on the role of the synoptically ...

Zhai, Xiaoming

263

INGEN: A COBRA-NC input generator user's manual  

SciTech Connect

The INGEN (INput GENerator) computer program has been developed as a preprocessor to simplify input generation for the COBRA-NC computer program. INGEN uses several empirical correlations and geometric assumptions to simplify the data input requirements for the COBRA-NC computer code. The simplified input scheme is obtained at the expense of much flexibility provided by COBRA-NC. For more complex problems requiring additional flexibility however, INGEN may be used to provide a skeletal input file to which the more detailed input may be added. This report describes the input requirements for INGEN and describes the algorithms and correlations used to generate the COBRA-NC input. 9 refs., 3 figs., 6 tabs.

Wheeler, C.L.; Dodge, R.E.

1986-12-01T23:59:59.000Z

264

,"U.S. Refinery Crude Oil Input Qualities"  

U.S. Energy Information Administration (EIA) Indexed Site

Sulfur Content (Weighted Average) of Crude Oil Input to Refineries (Percent)","U.S. API Gravity (Weighted Average) of Crude Oil Input to Refineries (Degrees)" 31062,0.88,32.64...

265

,"U.S. Refinery Crude Oil Input Qualities"  

U.S. Energy Information Administration (EIA) Indexed Site

Sulfur Content (Weighted Average) of Crude Oil Input to Refineries (Percent)","U.S. API Gravity (Weighted Average) of Crude Oil Input to Refineries (Degrees)" 31228,0.91,32.46...

266

Validated SCR Concept Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Validated SCR Concept Development 2007 DEER Conference, Detroit, MI Dr. Michael Traver, IAV Inc James Ireton, IAV Inc Dr. Lutz Krmer, IAV GmbH Jrgen Manns, IAV GmbH Poster...

267

Validating Energy Measures  

E-Print Network (OSTI)

Energy measurements play a very important role in a detailed energy analysis. The role is more important in industrial processes where wide variations of process conditions exist. Valid energy measurements make the decision making process easier...

Chari, S.; Thomas, D.

268

How Sensitive is Processor Customization to the Workload's Input Datasets?  

E-Print Network (OSTI)

How Sensitive is Processor Customization to the Workload's Input Datasets? Maximilien Breughe Zheng though is to what extent processor customiza- tion is sensitive to the training workload's input datasets. Current practice is to consider a single or only a few input datasets per workload during the processor

Eeckhout, Lieven

269

U.S. Blender Net Input  

U.S. Energy Information Administration (EIA) Indexed Site

2007 2008 2009 2010 2011 2012 View 2007 2008 2009 2010 2011 2012 View History Total Input 1,184,435 1,522,193 1,850,204 2,166,784 2,331,109 2,399,318 2005-2012 Natural Gas Plant Liquids and Liquefied Refinery Gases 3,445 5,686 6,538 7,810 10,663 2008-2012 Pentanes Plus 2,012 474 1,808 1,989 2,326 4,164 2005-2012 Liquid Petroleum Gases 2,971 3,878 4,549 5,484 6,499 2008-2012 Normal Butane 2,943 2,971 3,878 4,549 5,484 6,499 2005-2012 Isobutane 2005-2006 Other Liquids 1,518,748 1,844,518 2,160,246 2,323,299 2,388,655 2008-2012 Oxygenates/Renewables 234,047 274,974 286,837 295,004 2009-2012 Methyl Tertiary Butyl Ether (MTBE) 2005-2006 Renewable Fuels (incl. Fuel Ethanol) 234,047 274,974 286,837 295,004 2009-2012 Fuel Ethanol 131,810 182,772 232,677 273,107 281,507 287,433 2005-2012

270

U.S. Blender Net Input  

U.S. Energy Information Administration (EIA) Indexed Site

Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 View Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 View History Total Input 206,541 217,867 212,114 216,075 219,783 208,203 2005-2013 Natural Gas Plant Liquids and Liquefied Refinery Gases 891 352 376 196 383 1,397 2008-2013 Pentanes Plus 261 301 313 67 287 393 2005-2013 Liquid Petroleum Gases 630 51 63 129 96 1,004 2008-2013 Normal Butane 630 51 63 129 96 1,004 2005-2013 Isobutane 2005-2006 Other Liquids 205,650 217,515 211,738 215,879 219,400 206,806 2008-2013 Oxygenates/Renewables 25,156 26,576 26,253 26,905 27,788 25,795 2009-2013 Methyl Tertiary Butyl Ether (MTBE) 2005-2006 Renewable Fuels (incl. Fuel Ethanol) 25,156 26,576 26,253 26,905 27,788 25,795 2009-2013 Fuel Ethanol 24,163 25,526 24,804 25,491 25,970 24,116 2005-2013

271

Technology Validation | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Technology Validation Technology Validation 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting, May 18-22, 2009 --...

272

Model Validation Bernie Lesieutre  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Model Validation Model Validation Bernie Lesieutre University of Wisconsin lesieutre@wisc.edu 27 June 2013 Washington, DC DOE/OE Transmission Reliability Program 2 Project Objectives To Develop techniques and tools for PMU- and feature-based power system model validation. Background: Our prior proof-of-concept research demonstrated that feature-based sensitivity models can be used to calibrate power system dynamic models. This was applied to the WECC composite load model for oscillatory and FIDVR events. 3 Project Objectives PSLF simulation features features Sensitivity Model (parameters) Measured Data Simulated Data Features Error Adjust Parameters Technical Approach 4 Project Objectives Current Research: Use PMU data to calibrate power plant models. Four Tasks:

273

validation | OpenEI  

Open Energy Info (EERE)

validation validation Dataset Summary Description (Abstract): 31Conclusiones y recomendacionesEl método de cálculo de la radiación solar global desarrollado ha obtenido resultadoscomparables a otros métodos revisados en la bibliografía. A diferencia de muchos deestos métodos, que han sido ajustados y refinados por sus autores a lo largo de variosaños de trabajo, este es completamente nuevo y parte de un enfoque diferente, por loque tiene un gran potencial de ajuste y sintonización.Algunos cambios que pueden sugerirse son tomar distribuciones espaciales ytemporales Source Instituto de Meteorología de Cuba Date Released November 30th, 2005 (9 years ago) Date Updated November 07th, 2007 (7 years ago) Keywords América Latina Cuba documentation solar SWERA validation

274

Accelerated Testing Validation  

NLE Websites -- All DOE Office Websites (Extended Search)

Testing Validation Testing Validation Rangachary Mukundan (PI), Rodney Borup, John Davey, Roger Lujan Los Alamos National Laboratory Adam Z. Weber Lawrence Berkeley National Laboratory Greg James Ballard Power Systems, Inc Mike Brady Oak Ridge National Laboratory Steve Grot Ion Power, Inc This presentation does not contain any proprietary or confidential information Objective/Barrier/Target The objectives of this project are 3-fold 1. Correlation of the component lifetimes measured in an AST to real-world behavior of that component. 2. Validation of existing ASTs for Catalyst layers and Membranes 3. Development of new ASTs for GDLs, bipolar plates and interfaces Technical Barrier Addressed: A. Durability * Durability of fuel cell systems operating over automotive drive cycles has not

275

Aneuploidy: Cancer's Fatal Flaw?  

E-Print Network (OSTI)

Aneuploidy is a characteristic of cancer, with greater than 90% of all solid tumors in humans carrying an aberrant karyotype. Yet, whether or how this condition contributes to tumorigenesis is not understood. Here we ...

Williams, Bret R.

276

Independent Verification and Validation  

E-Print Network (OSTI)

&V works best when incorporated into the entire software and hardware development life cycle -- fromIndependent Verification and Validation Evaluating integrity and quality of hardware and software&V must be applied at the systems level to include hardware and software interactions. High

Kemner, Ken

277

9. Technology Validation Introduction  

E-Print Network (OSTI)

.20 2.20 2.25 2.20 2.20 2.22 Texas Hydrogen Highway - Fuel Cell Hybrid Bus and Fueling Infrastructure and the corresponding hydrogen infrastructure that can be addressed only by integrating the components into complete infrastructure). Technology validation confirms that component technologies can be incorporated into a complete

278

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations  

E-Print Network (OSTI)

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations Angel Lozano gives the power allocation policy, referred to as mercury/waterfilling, that maximizes the sum mutual

Verdú, Sergio

279

,"New York Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Name","Description"," Of Series","Frequency","Latest Data for" ,"Data 1","New York Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2013 ,"Release Date:","1031...

280

Solar swimming pool heating: Description of a validated model  

SciTech Connect

In the framework of a European Demonstration Programme, co-financed by CEC and national bodies, a model was elaborated and validated for open-air swimming pools having a minimal surface of 100 m[sup 2] and a minimal depth of 0.5 m. The model consists of two parts, the energy balance of the pool and the solar plant. The theoretical background of the energy balance of an open-air swimming pool was found to be poor. Special monitoring campaigns were used to validate the dynamic model using mathematical parameter identification methods. The final model was simplified in order to shorten calculation time and to improve the user-friendliness by reducing the input values to the most important one. The programme is commercially available. However, it requires the hourly meteorological data of a test reference year (TRY) as an input. The users are mainly designing engineers.

Haaf, W.; Luboschik, U.; Tesche, B. (IST Energietechnik GmbH, Hauptsitz Wollbach, Kandern (Germany))

1994-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Development and validation of a real-time SAFT-UT system for the inspection of light water reactor components. Semiannual report, April 1984-September 1984. Volume 1  

SciTech Connect

The Pacific Northwest Laboratory is working to design, fabricate, and evaluate a real-time flaw detection and characterization system based on the synthetic aperture focusing technique for ultrasonic testing (SAFT-UT). The system is for inservice inspection of light water reactor components. Included objectives of this program for the Nuclear Regulatory Commission are to develop procedures for system calibration and field operation, to validate the system through laboratory and field inspections, and to generate an engineering data base to support ASME Code acceptance of the technology. This process report covers the programmatic work from April 1984 through September 1984. 58 figs.

Doctor, S.R.; Busse, L.J.; Crawford, S.L.; Hall, T.E.; Gribble, R.P.; Baldwin, A.J.; Van Houten, L.P.

1986-05-01T23:59:59.000Z

282

Development and validation of a real-time SAFT-UT system for the inspection of light water reactor components: Annual report, October 1984-September 1985  

SciTech Connect

The Pacific Northwest Laboratory is working to design, fabricate, and evaluate a real-time flaw detection and characterization system based on the synthetic aperture focusing technique for ultrasonic testing (SAFT-UT). The system is designed to perform inservice inspection of light-water reactor components. Included objectives of this program for the Nuclear Regulatory Commission are to develop procedures for system calibration and field operation, to validate the system through laboratory and field inspections, and to generate an engineering data base to support ASME Code acceptance of the technology. This progress report covers the programmatic work from October 1984 through September 1985.

Doctor, S.R.; Hall, T.E.; Reid, L.D.; Crawford, S.L.; Littlefield, R.J.; Gilbert, R.W.

1987-06-01T23:59:59.000Z

283

Performance Measures For Input Shaping and Command Generation  

E-Print Network (OSTI)

Performance Measures For Input Shaping and Command Generation Kris Kozak Department of Precision performance measures for input shaping and command generation have appeared in the literature, but very rarely have these measures been critically evaluated or thoroughly discussed. In this paper we review

Singhose, William

284

Univariate input models for stochastic simulation , NM Steiger4  

E-Print Network (OSTI)

of the continuous univariate probabilistic input processes that drive discrete-event simulation experiments that accu- rately mimic the behaviour of the random input processes driving the system under study. Often the following interrelated difficulties arise in attempts to use standard distribution families for simulation

285

ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO  

E-Print Network (OSTI)

ADIOS ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO NATIONAL RADIO ASTRONOMY OBSERVATORY TABLES ADIOS - ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE COMPUTER TABLE FOR CONTENTS Page I Module and Apple Card (Photograph) Figure 3 Complete Apple/ADIOS System (Photograph) Figure 4 Analog

Groppi, Christopher

286

Soft-Input Soft-Output Sphere Decoding Christoph Studer  

E-Print Network (OSTI)

Soft-Input Soft-Output Sphere Decoding Christoph Studer Integrated Systems Laboratory ETH Zurich Laboratory ETH Zurich, 8092 Zurich, Switzerland Email: boelcskei@nari.ee.ethz.ch Abstract--Soft-input soft, 8092 Zurich, Switzerland Email: studer@iis.ee.ethz.ch Helmut Bölcskei Communication Technology

287

Link: exploiting the web of data to generate test inputs  

Science Journals Connector (OSTI)

Applications that process complex data, such as maps, personal data, book information, travel data, etc., are becoming extremely common. Testing such applications is hard, because they require realistic and coherent test inputs that are expensive to ... Keywords: System testing, Web of data, realistic test input

Leonardo Mariani; Mauro Pezzè; Oliviero Riganelli; Mauro Santoro

2014-07-01T23:59:59.000Z

288

FCT Technology Validation: Integrated Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Projects to Integrated Projects to someone by E-mail Share FCT Technology Validation: Integrated Projects on Facebook Tweet about FCT Technology Validation: Integrated Projects on Twitter Bookmark FCT Technology Validation: Integrated Projects on Google Bookmark FCT Technology Validation: Integrated Projects on Delicious Rank FCT Technology Validation: Integrated Projects on Digg Find More places to share FCT Technology Validation: Integrated Projects on AddThis.com... Home Transportation Projects Stationary/Distributed Generation Projects Integrated Projects DOE Projects Non-DOE Projects Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Manufacturing Codes & Standards Education Systems Analysis Contacts Integrated Projects To maximize overall system efficiencies, reduce costs, and optimize

289

PV array simulator development and validation.  

SciTech Connect

The ability to harvest all available energy from a photovoltaic (PV) array is essential if new system developments are to meet levelized cost of energy targets and achieve grid parity with conventional centralized utility power. Therefore, exercising maximum power point tracking (MPPT) algorithms, dynamic irradiance condition operation and startup and shutdown routines and evaluating inverter performance with various PV module fill-factor characteristics must be performed with a repeatable, reliable PV source. Sandia National Laboratories is collaborating with Ametek Programmable Power to develop and demonstrate a multi-port TerraSAS PV array simulator. The simulator will replicate challenging PV module profiles, enabling the evaluation of inverter performance through analyses of the parameters listed above. Energy harvest algorithms have traditionally implemented methods that successfully utilize available energy. However, the quantification of energy capture has always been difficult to conduct, specifically when characterizing the inverter performance under non-reproducible dynamic irradiance conditions. Theoretical models of the MPPT algorithms can simulate capture effectiveness, but full validation requires a DC source with representative field effects. The DC source being developed by Ametek and validated by Sandia is a fully integrated system that can simulate an IV curve from the Solar Advisor Model (SAM) module data base. The PV simulator allows the user to change the fill factor by programming the maximum power point voltage and current parameters and the open circuit voltage and short circuit current. The integrated PV simulator can incorporate captured irradiance and module temperature data files for playback, and scripted profiles can be generated to validate new emerging hardware embedded with existing and evolving MPPT algorithms. Since the simulator has multiple independent outputs, it also has the flexibility to evaluate an inverter with multiple MPPT DC inputs. The flexibility of the PV simulator enables the validation of the inverter's capability to handle vastly different array configurations.

Kuszmaul, Scott S.; Gonzalez, Sigifredo; Lucca, Roberto (Ametek Programmable Power, San Diego, CA); Deuel, Don (Ametek Programmable Power, San Diego, CA)

2010-06-01T23:59:59.000Z

290

Wavelength meter having single mode fiber optics multiplexed inputs  

DOE Patents (OSTI)

A wavelength meter having a single mode fiber optics input is disclosed. The single mode fiber enables a plurality of laser beams to be multiplexed to form a multiplexed input to the wavelength meter. The wavelength meter can provide a determination of the wavelength of any one or all of the plurality of laser beams by suitable processing. Another aspect of the present invention is that one of the laser beams could be a known reference laser having a predetermined wavelength. Hence, the improved wavelength meter can provide an on-line calibration capability with the reference laser input as one of the plurality of laser beams.

Hackel, R.P.; Paris, R.D.; Feldman, M.

1993-02-23T23:59:59.000Z

291

Wavelength meter having single mode fiber optics multiplexed inputs  

DOE Patents (OSTI)

A wavelength meter having a single mode fiber optics input is disclosed. The single mode fiber enables a plurality of laser beams to be multiplexed to form a multiplexed input to the wavelength meter. The wavelength meter can provide a determination of the wavelength of any one or all of the plurality of laser beams by suitable processing. Another aspect of the present invention is that one of the laser beams could be a known reference laser having a predetermined wavelength. Hence, the improved wavelength meter can provide an on-line calibration capability with the reference laser input as one of the plurality of laser beams.

Hackel, Richard P. (Livermore, CA); Paris, Robert D. (San Ramon, CA); Feldman, Mark (Pleasanton, CA)

1993-01-01T23:59:59.000Z

292

DOE Seeks Industry Input on Nickel Disposition Strategy | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Seeks Industry Input on Nickel Disposition Strategy DOE Seeks Industry Input on Nickel Disposition Strategy DOE Seeks Industry Input on Nickel Disposition Strategy March 23, 2012 - 12:00pm Addthis WASHINGTON, D.C. - The Energy Department's prime contractor, Fluor-B&W Portsmouth (FBP), managing the Portsmouth Gaseous Diffusion Plant (GDP), issued a request for Expressions of Interest (EOI) seeking industry input to support the development of an acquisition strategy for potential disposition of DOE nickel. The EOI requests technical, financial, and product market information to review the feasibility of technologies capable of decontaminating the nickel to a level indistinguishable from what is commercially available, such that it could be safely recycled and reused. The EOI scope is for 6,400 tons of nickel to be recovered from the uranium enrichment process

293

Input to the 2012-2021 Strategic Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Federal Climate Efforts Related Federal Climate Efforts Input to the 2012-2021 Strategic Plan Print E-mail Engaging Stakeholders The USGCRP is dedicated to engaging stakeholders in strategic planning efforts. Our community outreach activities created a dialogue with our stakeholders through various communication channels, such as opportunities for interagency collaboration, town hall meetings, public presentations and listening sessions. These channels alongside our 60 day public comment period enabled the program to incorporate stakeholder input int the process of drafting this decadal plan. In addition, we welcome input - particularly on the future direction of USGCRP and on the climate information you need and use. Please send your comments to input@usgcrp.gov. Listening Sessions

294

Abandoned Uranium Mines Report to Congress: LM Wants Your Input |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Abandoned Uranium Mines Report to Congress: LM Wants Your Input Abandoned Uranium Mines Report to Congress: LM Wants Your Input Abandoned Uranium Mines Report to Congress: LM Wants Your Input April 11, 2013 - 1:33pm Addthis C-SR-10 Uintah Mine, Colorado, LM Uranium Lease Tracts C-SR-10 Uintah Mine, Colorado, LM Uranium Lease Tracts What does this project do? Goal 4. Optimize the use of land and assets Abandoned Uranium Mines Report to Congress The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is seeking stakeholder input on an abandoned uranium mines report to Congress. On January 2, 2013, President Obama signed into law the National Defense Authorization Act for Fiscal Year 2013, which requires the Secretary of Energy, in consultation with the Secretary of the U.S Department of the Interior (DOI) and the Administrator

295

DOE Seeks Industry Input on Nickel Disposition Strategy | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Industry Input on Nickel Disposition Strategy Industry Input on Nickel Disposition Strategy DOE Seeks Industry Input on Nickel Disposition Strategy March 23, 2012 - 12:00pm Addthis WASHINGTON, D.C. - The Energy Department's prime contractor, Fluor-B&W Portsmouth (FBP), managing the Portsmouth Gaseous Diffusion Plant (GDP), issued a request for Expressions of Interest (EOI) seeking industry input to support the development of an acquisition strategy for potential disposition of DOE nickel. The EOI requests technical, financial, and product market information to review the feasibility of technologies capable of decontaminating the nickel to a level indistinguishable from what is commercially available, such that it could be safely recycled and reused. The EOI scope is for 6,400 tons of nickel to be recovered from the uranium enrichment process

296

Comparison of wind stress algorithms, datasets and oceanic power input  

E-Print Network (OSTI)

If the ocean is in a statistically steady state, energy balance is a strong constraint, suggesting that the energy input into the world ocean is dissipated simultaneously at the same rate. Energy conservation is one of the ...

Yuan, Shaoyu

2009-01-01T23:59:59.000Z

297

Operation of buck regulator with ultra-low input voltage  

E-Print Network (OSTI)

Based on the LTC3621 and LTC3624, the designed buck regulator proposed in this thesis aims to lower the allowed input voltage and increase efficiency compared to the original part without making significant changes to ...

Harris, Cory Angelo

2014-01-01T23:59:59.000Z

298

Data sheet acquired from Harris Semiconductor Buffered Inputs  

E-Print Network (OSTI)

1 Data sheet acquired from Harris Semiconductor SCHS121D Features · Buffered Inputs · Typical. The suffixes 96 and R denote tape and reel. The suffix T denotes a small-quantity reel of 250. CAUTION

Kretchmar, R. Matthew

299

Automatic testing of software with structurally complex inputs  

E-Print Network (OSTI)

Modern software pervasively uses structurally complex data such as linked data structures. The standard approach to generating test suites for such software, manual generation of the inputs in the suite, is tedious and ...

Marinov, Darko, 1976-

2005-01-01T23:59:59.000Z

300

Face Interface : a methodology for experimental learning of input modalities  

E-Print Network (OSTI)

This thesis demonstrates that creating a system with a visual representation of the face which mirrors the user's facial gestures appears to solve problems in teaching a user to use the new input affordances of face-based ...

Wetzel, Jon William

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Charged-Particle Thermonuclear Reaction Rates: III. Nuclear Physics Input  

E-Print Network (OSTI)

The nuclear physics input used to compute the Monte Carlo reaction rates and probability density functions that are tabulated in the second paper of this series (Paper II) is presented. Specifically, we publish the input files to the Monte Carlo reaction rate code RatesMC, which is based on the formalism presented in the first paper of this series (Paper I). This data base contains overwhelmingly experimental nuclear physics information. The survey of literature for this review was concluded in November 2009.

Christian Iliadis; Richard Longland; Art Champagne; Alain Coc

2010-04-23T23:59:59.000Z

302

Navy Technology Validation (Techval)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Technology Validation (Techval) FUPWG Spring Meeting 2008 April 15, 2008 Destin, FL Paul Kistler, PE CEM NAVFAC Engineering Service Center Port Hueneme CA Navy Techval CURRENT PROJECTS * Cool Roof reflective roof coating  NS Pearl Harbor HI * Thermal Destratifiers  NAS Oceana VA * Boiler Combustion Controls  USNA Annapolis MD * Sand Filters  NAS Lemoore CA * Spectrally Enhanced Lighting  Navy Yard Washington DC * Desuperheater  NS Norfolk VA  NAS North Island CA * HVAC CO2 Controls  NAB Little Creek VA  NAVSUPPACT Mid-South TN  NB Kitsap Bremerton WA *HVAC Occupancy Controls NAS Oceana VA *Electromagnetic Pulse Water Treatment NADEP San Diego CA NSY Puget Sound WA *LED Parking Lot Lighting NBVC Port Hueneme CA Techval

303

Estimation of input parameters in complex simulation using a Gaussian process metamodel  

Science Journals Connector (OSTI)

The unknown input parameters of a simulation code are usually adjusted by the nonlinear least squares estimation (NLSE) method which minimizes the sum of differences between computer responses and real observations. However, when a simulation program is very complex and takes several hours for one execution, the NLSE method may not be computationally feasible. In this case, one may build a statistical metamodel which approximates the complex simulation code. Then this metamodel is used as if it is the true simulation code in the NLSE method, which makes the problem computationally feasible. This ‘approximated’ NLSE method is described in this article. A Gaussian process model is used as a metamodel of complex simulation code. The proposed method is validated through a toy-model study where the true parameters are known a priori. An application to nuclear fusion device is presented.

Jeong-Soo Park; Jongwoo Jeon

2002-01-01T23:59:59.000Z

304

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

305

Washington Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Washington Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 15 13 15 11 11 9 10 21 79 154 1990's 181 154 180 4 0 0 0 0 0 0 2000's 0 0 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Washington Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

306

Minnesota Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Minnesota Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 48 106 337 1 3 11 2 1 385 315 1990's 56 49 52 78 289 194 709 172 50 64 2000's 101 118 13 42 71 154 13 54 46 47 2010's 12 20 9 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Minnesota Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

307

District of Columbia Natural Gas Input Supplemental Fuels (Million Cubic  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) District of Columbia Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 2 1 46 0 0 0 0 0 0 0 1990's 0 0 0 0 0 0 0 0 0 0 2000's 0 0 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas District of Columbia Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition)

308

Maryland Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Maryland Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 484 498 984 352 332 373 155 136 743 899 1990's 24 72 126 418 987 609 882 178 80 498 2000's 319 186 48 160 124 382 41 245 181 170 2010's 115 89 116 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Maryland Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

309

Iowa Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Iowa Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 57 64 68 23 53 45 44 40 34 82 1990's 81 46 45 84 123 96 301 137 17 12 2000's 44 39 23 143 30 31 46 40 27 3 2010's 2 1 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Iowa Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

310

Pennsylvania Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Pennsylvania Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 3,127 10,532 5,621 3,844 82 221 196 247 254 305 1990's 220 222 132 110 252 75 266 135 80 119 2000's 261 107 103 126 131 132 124 145 123 205 2010's 4 2 2 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Pennsylvania Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

311

Possible Magmatic Input to the Dixie Valley Geothermal Field, and  

Open Energy Info (EERE)

Possible Magmatic Input to the Dixie Valley Geothermal Field, and Possible Magmatic Input to the Dixie Valley Geothermal Field, and Implications for District-Scale Resource Exploration, Inferred from Magnetotelluric (MT) Resistivity Surveying Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: Possible Magmatic Input to the Dixie Valley Geothermal Field, and Implications for District-Scale Resource Exploration, Inferred from Magnetotelluric (MT) Resistivity Surveying Abstract Magnetotelluric (MT) profiling in northwestern Nevadais used to test hypotheses on the main sources of heat andhydrothermal fluid for the Dixie Valley-Central NevadaSeismic Belt area. The transect reveals families of resistivitystructures commonly dominated by steeply-dipping features,some of which may be of key geothermal significance. Mostnotably, 2-D inversion

312

Missouri Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Missouri Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 65 60 2,129 1,278 326 351 1 1 2 1,875 1990's 0 0 0 0 371 4 785 719 40 207 2000's 972 31 62 1,056 917 15 78 66 6 10 2010's 18 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Missouri Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

313

Rhode Island Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Rhode Island Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 257 951 718 594 102 130 182 109 391 219 1990's 51 92 155 126 0 27 42 18 1 1 2000's 0 0 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Rhode Island Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

314

DOE Seeks Input On Addressing Contractor Pension and Medical Benefits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Input On Addressing Contractor Pension and Medical Input On Addressing Contractor Pension and Medical Benefits Liabilities DOE Seeks Input On Addressing Contractor Pension and Medical Benefits Liabilities March 27, 2007 - 12:10pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced in the Federal Register that it is seeking public comment on how to address the increasing costs and liabilities of contractor employee pension and medical benefits. Under the Department of Energy's unique Management and Operating and other site management contracts, DOE reimburses its contractors for allowable costs incurred in providing contractor employee pension and medical benefits to current employees and retirees. In FY2006, these costs reached approximately $1.1 billion - a more than 226 percent increase since FY2000 - and are expected to grow in future years.

315

Georgia Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Georgia Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 24 57 151 84 28 121 124 248 241 292 1990's 209 185 166 199 123 130 94 14 16 12 2000's 73 51 7 14 5 0 3 2 52 2010's 732 701 660 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Georgia Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

316

Delaware Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Delaware Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 55 135 56 20 13 12 9 0 2 18 1990's 4,410 4,262 3,665 3,597 3,032 1 1 2 0 0 2000's 6 0 0 7 17 0 W 5 2 2 2010's 1 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Delaware Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

317

South Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) South Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9 24 50 1 0 0 0 0 10 16 1990's 10 3 10 9 61 37 87 30 4 5 2000's 13 5 3 57 5 4 0 1 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas South Dakota Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

318

New Hampshire Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) New Hampshire Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 774 720 582 328 681 509 362 464 492 592 1990's 205 128 96 154 160 90 147 102 103 111 2000's 180 86 66 58 91 84 92 9 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas New Hampshire Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

319

OECD Input-Output Tables | Open Energy Information  

Open Energy Info (EERE)

OECD Input-Output Tables OECD Input-Output Tables Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Input-Output Tables Agency/Company /Organization: Organisation for Economic Co-Operation and Development Topics: Co-benefits assessment, Market analysis, Co-benefits assessment, Pathways analysis Resource Type: Dataset Website: www.oecd.org/document/3/0,3343,en_2649_34445_38071427_1_1_1_1,00.html Country: Sweden, Finland, Japan, South Korea, Argentina, Australia, China, Israel, United Kingdom, Portugal, Romania, Greece, Poland, Slovakia, Chile, India, Canada, New Zealand, United States, Denmark, Norway, Spain, Austria, Italy, Netherlands, Ireland, France, Belgium, Brazil, Czech Republic, Estonia, Germany, Hungary, Luxembourg, Mexico, Slovenia, South Africa, Turkey, Indonesia, Switzerland, Taiwan, Russia

320

Formalization of computer input and output: the Hadley model  

Science Journals Connector (OSTI)

Current digital evidence acquisition tools are effective, but are tested rather than formally proven correct. We assert that the forensics community will benefit in evidentiary ways and the scientific community will benefit in practical ways by moving beyond simple testing of systems to a formal model. To this end, we present a hierarchical model of peripheral input to and output from von Neumann computers, patterned after the Open Systems Interconnection model of networking. The Hadley model categorizes all components of peripheral input and output in terms of data flow; with constructive aspects concentrated in the data flow between primary memory and the computer sides of peripherals' interfaces. The constructive domain of Hadley is eventually expandable to all areas of the I/O hierarchy, allowing for a full view of peripheral input and output and enhancing the forensics community's capabilities to analyze, obtain, and give evidentiary force to data.

Matthew Gerber; John Leeson

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Connecticut Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Connecticut Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 144 1,584 1,077 291 239 343 298 180 245 251 1990's 111 146 40 94 29 68 48 37 33 31 2000's 20 6 6 57 191 273 91 0 0 1 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Connecticut Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

322

South Carolina Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) South Carolina Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 74 184 63 73 62 87 31 22 191 201 1990's 17 47 26 34 154 62 178 10 0 18 2000's 63 6 3 15 2 86 75 0 2010's 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas South Carolina Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

323

Tennessee Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Tennessee Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 12 42 90 39 25 36 13 26 36 78 1990's 3 8 12 13 84 33 73 19 4 11 2000's 13 0 1 1 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Tennessee Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

324

Development and validation of a real-time SAFT-UT (synthetic aperture focusing technique for ultrasonic testing) system for the inspection of light water reactor components: Annual report, October 1985-September 1986  

SciTech Connect

The Pacific Northwest Laboratory is working to design, fabricate, and evaluate a real-time flaw detection and characterization system based on the synthetic aperture focusing technique for ultrasonic testing (SAFT-UT). The system is designed to perform inservice inspection of light-water reactor components. Included objectives of this program for the Nuclear Regulatory Commission are to develop procedures for system calibration and field operation, to validate the system through laboratory and field inspections, and to generate an engineering data base to support ASME Code acceptance of the technology. This progress report covers the programmatic work from October 1985 through September 1986. 45 figs., 8 tabs.

Doctor, S.R.; Hall, T.E.; Reid, L.D.; Mart, G.A.

1987-07-01T23:59:59.000Z

325

Table 3. U.S. Inputs to Biodiesel Production  

U.S. Energy Information Administration (EIA) Indexed Site

U.S. Inputs to Biodiesel Production U.S. Inputs to Biodiesel Production (million pounds) 2011 January 8 17 - W 150 W 14 11 February 26 13 - W 150 W 14 11 March 68 14 - W 190 W 19 27 April 88 20 - W 236 W 15 47 May 113 21 - W 264 W 16 36 June 75 34 - W 311 W 23 49 July 77 35 - W 367 W 26 64 August 84 37 W W 398 W 34 38 September 84 27 W W 430 W

326

Prototype Validation Exercise (PROVE) Project  

NLE Websites -- All DOE Office Websites (Extended Search)

Validation > PROVE Validation > PROVE The Prototype Validation Exercise (PROVE) Project Overview The Prototype Validation Exercise (PROVE) was a mini field campaign conducted at the Jornada Experimental Range in the Chihuahuan Desert, near Las Cruces, New Mexico in May 1997. The goals of PROVE were to: Gain experience in the collection and use of field data for EOS product validation Develop protocols for coordination, measurement, and data archival Compile a synoptic land and atmospheric data set for testing algorithms The remote-sensing portion of PROVE involved investigators from three NASA Earth Observing System (EOS) instrument teams: MODIS (Moderate-Resolution Imaging Spectrometer) ASTER (Advanced Space-borne Thermal Emission and Reflectance Radiometer) MISR (Multi-Angle Imaging Spectro Radiometer)

327

FULL FUEL CYCLE ASSESSMENT WELL TO TANK ENERGY INPUTS,  

E-Print Network (OSTI)

FULL FUEL CYCLE ASSESSMENT WELL TO TANK ENERGY INPUTS, EMISSIONS, AND WATER IMPACTS Prepared For be divided into two parts: · Well-to-Tank (WTT) Feedstock extraction, transport, storage, processing, distribution, transport, and storage · Tank-to-Wheels (TTW) Refueling, consumption and evaporation The full

328

"Why Are Some Firms More Innovative? Knowledge Inputs, Knowledge Stocks,  

E-Print Network (OSTI)

"Why Are Some Firms More Innovative? Knowledge Inputs, Knowledge Stocks, and the Role of Global, Exporting, Knowledge and Technological Change Abstract Why do some firms create more knowledge than others stock of knowledge. But there is very little empirical evidence on production functions for new ideas

Sadoulet, Elisabeth

329

Fast RNA Structure Alignment for Crossing Input Rolf Backofena  

E-Print Network (OSTI)

is to predict for every input sequence the minimum free-energy non-crossing structure (in O(n3 ) time function. Since the structure of RNA is evolu- tionarily more conserved than its sequence, predicting a folding with minimal free energy [5, 6, 7, 8, 9]. Albeit this so-named thermodynamic approach is a success

Tsur, Dekel

330

Input to review of STFC UK Nuclear Physics Community  

E-Print Network (OSTI)

Input to review of STFC UK Nuclear Physics Community Introduction STFC covers essentially and project funding for Astronomy, Nuclear Physics, Particle Physics and Space Science Since STFC was formed programme. Grant funding Nuclear Physics grant funding was in EPSRC until 2007 and then moved to STFC

Crowther, Paul

331

Global sensitivity analysis of computer models with functional inputs  

E-Print Network (OSTI)

function. Lastly, the new methodology is applied to an industrial computer code that simulates the nuclear with scalar input variables. For example, in the nuclear engineering domain, global SA tools have been applied (Helton et al. [7]), environmental model of dose calculations (Iooss et al. [10]), reactor dosimetry

Boyer, Edmond

332

The Matrix Converter Drive Performance Under Abnormal Input Voltage Conditions  

E-Print Network (OSTI)

that generates variable magnitude variable frequency output voltage from the ac utility line. It has high power voltage disturbance related performance issues of the MC drive. Since the MC is a direct frequencyThe Matrix Converter Drive Performance Under Abnormal Input Voltage Conditions Jun-Koo Kang

Hava, Ahmet

333

Advanced Supply System Validation Workshop  

Energy.gov (U.S. Department of Energy (DOE))

The Bioenergy Technologies Office (BETO) is hosting the Advanced Supply System Validation Workshop on February 3-4, 2015, in Golden, Colorado. The purpose of the workshop is to bring together a...

334

A fast, simple, and naturally machine-precision algorithm for calculating both symmetric and asymmetric MT2, for any physical inputs  

E-Print Network (OSTI)

This document describes a stransverse-mass calculation algorithm that has better numerical stability, and therefore accuracy, than the fastest existing implementations. The new algorithm naturally permits computation of MT2 to machine-precision for any valid set of inputs. In addition to being more accurate than existing fast calculators, the new implementation is arguably simpler to understand, comprises fewer lines of active code, and provides the first fast machine-precision asymmetric-MT2 calculator known to the authors.

Christopher G. Lester; Benjamin Nachman

2014-11-16T23:59:59.000Z

335

Total Refinery Net Input of Crude Oil and Petroleum Products  

U.S. Energy Information Administration (EIA) Indexed Site

Input Input Product: Total Crude Oil & Petroleum Products Crude Oil Natural Gas Plant Liquids Pentanes Plus Liquefied Petroleum Gases Normal Butane Isobutane Other Liquids Hydrogen/Oxygenates/Renewables/Other Hydrocarbons Hydrogen Oxygenates (excl. Fuel Ethanol) Methyl Tertiary Butyl Ether (MTBE) All Other Oxygenates Renewable Fuels (incl. Fuel Ethanol) Fuel Ethanol Renewable Diesel Fuel Other Renewable Fuels Other Hydrocarbons Unfinished Oils (net) Unfinished Oils, Naphthas and Lighter Unfinished Oils, Kerosene and Light Gas Oils Unfinished Oils, Heavy Gas Oils Residuum Motor Gasoline Blending Components (MGBC) (net) MGBC - Reformulated MGBC - Reformulated - RBOB MGBC - Reformulated, RBOB for Blending w/ Alcohol MGBC - Reformulated, RBOB for Blending w/ Ether MGBC - Conventional MGBC - CBOB MGBC - Conventional, GTAB MGBC - Other Conventional Aviation Gasoline Blending Components (net) Alaskan Crude Oil Receipts Period-Unit: Monthly-Thousand Barrels Monthly-Thousand Barrels per Day Annual-Thousand Barrels Annual-Thousand Barrels per Day

336

Refinery & Blenders Net Input of Crude Oil  

U.S. Energy Information Administration (EIA) Indexed Site

Input Input Product: Total Crude Oil & Petroleum Products Crude Oil Natural Gas Plant Liquids and Liquefied Refinery Gases Pentanes Plus Liquefied Petroleum Gases Ethane Normal Butane Isobutane Other Liquids Hydrogen/Oxygenates/Renewables/Other Hydrocarbons Hydrogen Oxygenates (excl. Fuel Ethanol) Methyl Tertiary Butyl Ether (MTBE) All Other Oxygenates Renewable Fuels (incl. Fuel Ethanol) Fuel Ethanol Renewable Diesel Fuel Other Renewable Fuels Other Hydrocarbons Unfinished Oils (net) Unfinished Oils, Naphthas and Lighter Unfinished Oils, Kerosene and Light Gas Oils Unfinished Oils, Heavy Gas Oils Residuum Motor Gasoline Blending Components (MGBC) (net) MGBC - Reformulated MGBC - Reformulated - RBOB MGBC - Reformulated, RBOB for Blending w/ Alcohol MGBC - Reformulated, RBOB for Blending w/ Ether MGBC - Reformulated, GTAB MGBC - Conventional MGBC - CBOB MGBC - Conventional, GTAB MGBC - Other Conventional Aviation Gasoline Blending Components (net) Period-Unit: Monthly-Thousand Barrels Monthly-Thousand Barrels per Day Annual-Thousand Barrels Annual-Thousand Barrels per Day

337

Documentation of Calculation Methodology, Input Data, and Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation of Calculation Methodology, Input Data, and Infrastructure Documentation of Calculation Methodology, Input Data, and Infrastructure for the Home Energy Saver Web Site Title Documentation of Calculation Methodology, Input Data, and Infrastructure for the Home Energy Saver Web Site Publication Type Report LBNL Report Number LBNL-51938 Year of Publication 2005 Authors Pinckard, Margaret J., Richard E. Brown, Evan Mills, James D. Lutz, Mithra M. Moezzi, Celina S. Atkinson, Christopher A. Bolduc, Gregory K. Homan, and Katie Coughlin Document Number LBNL-51938 Pagination 108 Date Published July 13 Publisher Lawrence Berkeley National Laboratory City Berkeley Abstract The Home Energy Saver (HES, http://HomeEnergySaver.lbl.gov) is an interactive web site designed to help residential consumers make decisions about energy use in their homes. This report describes the underlying methods and data for estimating energy consumption. Using engineering models, the site estimates energy consumption for six major categories (end uses); heating, cooling, water heating, major appliances, lighting, and miscellaneous equipment. The approach taken by the Home Energy Saver is to provide users with initial results based on a minimum of user input, allowing progressively greater control in specifying the characteristics of the house and energy consuming appliances. Outputs include energy consumption (by fuel and end use), energy-related emissions (carbon dioxide), energy bills (total and by fuel and end use), and energy saving recommendations. Real-world electricity tariffs are used for many locations, making the bill estimates even more accurate. Where information about the house is not available from the user, default values are used based on end-use surveys and engineering studies. An extensive body of qualitative decision-support information augments the analytical results.

338

Environmental Transport Input Parameters for the Biosphere Model  

SciTech Connect

This analysis report is one of the technical reports documenting the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the total system performance assessment for the license application (TSPA-LA) for the geologic repository at Yucca Mountain. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows relationships among the reports developed for biosphere modeling and biosphere abstraction products for the TSPA-LA, as identified in the ''Technical Work Plan for Biosphere Modeling and Expert Support'' (BSC 2004 [DIRS 169573]) (TWP). This figure provides an understanding of how this report contributes to biosphere modeling in support of the license application (LA). This report is one of the five reports that develop input parameter values for the biosphere model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes the conceptual model and the mathematical model. The input parameter reports, shown to the right of the Biosphere Model Report in Figure 1-1, contain detailed description of the model input parameters. The output of this report is used as direct input in the ''Nominal Performance Biosphere Dose Conversion Factor Analysis'' and in the ''Disruptive Event Biosphere Dose Conversion Factor Analysis'' that calculate the values of biosphere dose conversion factors (BDCFs) for the groundwater and volcanic ash exposure scenarios, respectively. The purpose of this analysis was to develop biosphere model parameter values related to radionuclide transport and accumulation in the environment. These parameters support calculations of radionuclide concentrations in the environmental media (e.g., soil, crops, animal products, and air) resulting from a given radionuclide concentration at the source of contamination (i.e., either in groundwater or in volcanic ash). The analysis was performed in accordance with the TWP (BSC 2004 [DIRS 169573]).

M. Wasiolek

2004-09-10T23:59:59.000Z

339

Inhalation Exposure Input Parameters for the Biosphere Model  

SciTech Connect

This analysis is one of 10 reports that support the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN) biosphere model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the conceptual model as well as the mathematical model and its input parameters. This report documents development of input parameters for the biosphere model that are related to atmospheric mass loading and supports the use of the model to develop biosphere dose conversion factors (BDCFs). The biosphere model is one of a series of process models supporting the total system performance assessment (TSPA) for a Yucca Mountain repository. Inhalation Exposure Input Parameters for the Biosphere Model is one of five reports that develop input parameters for the biosphere model. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling, and the plan for development of the biosphere abstraction products for TSPA, as identified in the Technical Work Plan for Biosphere Modeling and Expert Support (BSC 2004 [DIRS 169573]). This analysis report defines and justifies values of mass loading for the biosphere model. Mass loading is the total mass concentration of resuspended particles (e.g., dust, ash) in a volume of air. Mass loading values are used in the air submodel of ERMYN to calculate concentrations of radionuclides in air inhaled by a receptor and concentrations in air surrounding crops. Concentrations in air to which the receptor is exposed are then used in the inhalation submodel to calculate the dose contribution to the receptor from inhalation of contaminated airborne particles. Concentrations in air surrounding plants are used in the plant submodel to calculate the concentrations of radionuclides in foodstuffs contributed from uptake by foliar interception.

K. Rautenstrauch

2004-09-10T23:59:59.000Z

340

New Jersey Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) New Jersey Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9,574 11,504 9,786 9,896 8,616 13,421 12,099 13,774 14,846 14,539 1990's 9,962 14,789 14,362 14,950 7,737 7,291 6,778 6,464 9,082 5,761 2000's 8,296 12,330 3,526 473 530 435 175 379 489 454 2010's 457 392 139 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas New Jersey Supplemental Supplies of Natural Gas

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Nebraska Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Nebraska Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9 1,838 63 2,006 2,470 2,689 2,142 2,199 1,948 2,088 1990's 2,361 2,032 1,437 791 890 15 315 134 11 4 2000's 339 6 1 13 39 16 19 33 28 18 2010's 12 9 4 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Nebraska Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

342

Michigan Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Michigan Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 3 3,038 2,473 2,956 2,773 2,789 2,754 2,483 2,402 2,402 1990's 19,106 15,016 14,694 12,795 13,688 21,378 21,848 22,238 21,967 20,896 2000's 12,423 4,054 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Michigan Supplemental Supplies of Natural Gas

343

Colorado Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Colorado Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9,868 9,133 8,877 7,927 9,137 8,934 8,095 8,612 10,322 9,190 1990's 15,379 6,778 7,158 8,456 8,168 7,170 6,787 6,314 5,292 4,526 2000's 4,772 5,625 5,771 5,409 5,308 5,285 6,149 6,869 6,258 7,527 2010's 5,148 4,268 4,412 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Colorado Supplemental Supplies of Natural Gas

344

Ohio Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Ohio Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 69,169 69,850 64,812 62,032 43,866 24,444 5,182 18 44 348 1990's 849 891 1,051 992 1,432 904 1,828 1,423 1,194 1,200 2000's 1,442 1,149 79 1,002 492 579 423 608 460 522 2010's 353 296 366 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Ohio Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

345

Hawaii Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Hawaii Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1980's 3,190 2,993 2,899 2,775 2,449 2,655 2,630 2,461 2,801 2,844 1990's 2,817 2,725 2,711 2,705 2,831 2,793 2,761 2,617 2,715 2,752 2000's 2,769 2,689 2,602 2,602 2,626 2,606 2,613 2,683 2,559 2,447 2010's 2,472 2,467 2,510 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Hawaii Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

346

Massachusetts Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Massachusetts Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 15,366 21,828 17,586 10,732 6,545 3,668 2,379 1,404 876 692 1990's 317 120 105 61 154 420 426 147 68 134 2000's 26 16 137 324 80 46 51 15 13 10 2010's 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Massachusetts Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

347

Indiana Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Indiana Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 1,602 5,056 3,496 4,142 4,027 2,711 2,351 3,890 4,243 3,512 1990's 3,015 3,077 3,507 3,232 2,457 3,199 3,194 3,580 3,149 5,442 2000's 5,583 5,219 1,748 2,376 2,164 1,988 1,642 635 30 1 2010's 1 5 1 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Indiana Supplemental Supplies of Natural Gas

348

North Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) North Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 196 417 102 0 8,335 40,370 49,847 51,543 49,014 54,408 1990's 53,144 52,557 58,496 57,680 57,127 57,393 55,867 53,179 54,672 53,185 2000's 49,190 51,004 53,184 53,192 47,362 51,329 54,361 51,103 50,536 53,495 2010's 54,813 51,303 52,541 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas

349

Illinois Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Illinois Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 36,713 29,509 19,005 19,734 17,308 19,805 22,980 12,514 9,803 9,477 1990's 8,140 6,869 8,042 9,760 7,871 6,256 3,912 4,165 2,736 2,527 2000's 1,955 763 456 52 14 15 13 11 15 20 2010's 17 1 1 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Illinois Supplemental Supplies of Natural Gas

350

Technology Validation: Fuel Cell Bus Evaluations | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Technology Validation: Fuel Cell Bus Evaluations Technology Validation: Fuel Cell Bus Evaluations 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and...

351

Accelerated Testing Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Accelerated Testing Validation Accelerated Testing Validation Presented at the Department of Energy Fuel Cell Projects Kickoff Meeting, September 1 - October 1, 2009...

352

Life Validation Testing Protocol Development | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Validation Testing Protocol Development Life Validation Testing Protocol Development Presentation from the U.S. DOE Office of Vehicle Technologies "Mega" Merit Review 2008 on...

353

Hydrogen Vehicle and Infrastructure Demonstration and Validation...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Vehicle and Infrastructure Demonstration and Validation Hydrogen Vehicle and Infrastructure Demonstration and Validation 2009 DOE Hydrogen Program and Vehicle Technologies Program...

354

Verification and Validation of Simulation Model  

E-Print Network (OSTI)

Verification and Validation of Simulation Model 1 Verification and Validation 2 #12;Verification · Examples ­ simulation model: open networks with exponential interarrival time distribution and uniform

Shihada, Basem

355

Technical Demonstration and Economic Validation of Geothermal...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Economic Validation of Geothermal-Produced Electricity from Coproduced Water at Existing OilGas Wells in Texas Technical Demonstration and Economic Validation of...

356

Using Whole-House Field Tests to Empirically Derive Moisture Buffering Model Inputs  

SciTech Connect

Building energy simulations can be used to predict a building's interior conditions, along with the energy use associated with keeping these conditions comfortable. These models simulate the loads on the building (e.g., internal gains, envelope heat transfer), determine the operation of the space conditioning equipment, and then calculate the building's temperature and humidity throughout the year. The indoor temperature and humidity are affected not only by the loads and the space conditioning equipment, but also by the capacitance of the building materials, which buffer changes in temperature and humidity. This research developed an empirical method to extract whole-house model inputs for use with a more accurate moisture capacitance model (the effective moisture penetration depth model). The experimental approach was to subject the materials in the house to a square-wave relative humidity profile, measure all of the moisture transfer terms (e.g., infiltration, air conditioner condensate) and calculate the only unmeasured term: the moisture absorption into the materials. After validating the method with laboratory measurements, we performed the tests in a field house. A least-squares fit of an analytical solution to the measured moisture absorption curves was used to determine the three independent model parameters representing the moisture buffering potential of this house and its furnishings. Follow on tests with realistic latent and sensible loads showed good agreement with the derived parameters, especially compared to the commonly-used effective capacitance approach. These results show that the EMPD model, once the inputs are known, is an accurate moisture buffering model.

Woods, J.; Winkler, J.; Christensen, D.; Hancock, E.

2014-08-01T23:59:59.000Z

357

MARMOT Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Validation Validation MARMOT Validation January 29, 2013 - 10:35am Addthis The composition-dependent mobility in the formulism of the phase-field modeling is implemented into the MARMOT phase-field algorithm. Benchmarking was done for the MARMOT, finite element (FE)-based phase-field framework that utilizes the new implementation of the variable splitting algorithm. The results indicate that while the variable splitting algorithm executes about eight times faster, the use of higher-order Hermite elements offers faster convergence. A manuscript summarizing these results has been submitted for publication. Work is also continuing on implementing a J2 von-Mises' time-dependent and independent plasticity into the Marmot phase-field algorithm. The current studies do not include adoptive meshing,

358

Advanced Supply System Validation Workshop  

Energy.gov (U.S. Department of Energy (DOE))

The Bioenergy Technologies Office (BETO) is hosting the Advanced Supply System Validation Workshop on February 3-4, 2015, in Golden, Colorado. The purpose of the workshop is to bring together a diverse group of stakeholders to examine, discuss, and validate analysis assumptions used to move beyond current feedstock supply systems designed to support the agriculture and forestry industries. Participants will discuss assumptions relating to volume and transportation logistics, biomass quality, and operational risks. The outcome of the workshop will include a report summarizing the expert opinions shared during the workshop.

359

Validation of Criticality Safety Calculations with SCALE 6.2  

SciTech Connect

SCALE 6.2 provides numerous updates in nuclear data, nuclear data processing, and computational tools utilized in the criticality safety calculational sequences relative to SCALE 6.1. A new 252-group ENDF/B-VII.0 multigroup neutron library, improved ENDF/B-VII.0 continuous energy data, as well as the previously deployed 238-group ENDF/B-VII.0 neutron library are included in SCALE 6.2 for criticality safety analysis. The performance of all three libraries for keff calculations is examined with a broad sampling of critical experiment models covering a range of fuels and moderators. Critical experiments from the International Handbook of Evaluated Criticality Safety Benchmark Experiments (IHECSBE) that are available in the SCALE Verified, Archived Library of Inputs and Data (VALID) are used in this validation effort. Over 300 cases are used in the validation of KENO V.a, and a more limited set of approximately 50 configurations are used for KENO-VI validation. Additionally, some KENO V.a cases are converted to KENO-VI models so that an equivalent set of experiments can be used to validate both codes. For continuous-energy calculations, SCALE 6.2 provides improved performance relative to SCALE 6.1 in most areas with notable improvements in fuel pin lattice cases, particularly those with mixed oxide fuel. Multigroup calculations with the 252-group library also demonstrate improved performance for fuel lattices, uranium (high and intermediate enrichment) and plutonium metal experiments, and plutonium solution systems. Overall, SCALE 6.2 provides equivalent or smaller biases than SCALE 6.1, and the two versions of KENO provide similar results on the same suite of problems.

Marshall, William BJ J [ORNL] [ORNL; Wiarda, Dorothea [ORNL] [ORNL; Celik, Cihangir [ORNL] [ORNL; Rearden, Bradley T [ORNL] [ORNL

2013-01-01T23:59:59.000Z

360

Characterization of industrial process waste heat and input heat streams  

SciTech Connect

The nature and extent of industrial waste heat associated with the manufacturing sector of the US economy are identified. Industry energy information is reviewed and the energy content in waste heat streams emanating from 108 energy-intensive industrial processes is estimated. Generic types of process equipment are identified and the energy content in gaseous, liquid, and steam waste streams emanating from this equipment is evaluated. Matchups between the energy content of waste heat streams and candidate uses are identified. The resultant matrix identifies 256 source/sink (waste heat/candidate input heat) temperature combinations. (MHR)

Wilfert, G.L.; Huber, H.B.; Dodge, R.E.; Garrett-Price, B.A.; Fassbender, L.L.; Griffin, E.A.; Brown, D.R.; Moore, N.L.

1984-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A comparative study of avionics control input methods  

E-Print Network (OSTI)

Standardization of avionics locations in early models of small general aviation aircraft was almost non-existent, due largely to limited panel space and lack of human engineering considerations. Aircraft were typically purchased with a limited avionics package... Major Subject: Industrial Engineering A COMPARATIVE STUDY OF AVIONICS CONTROL INPUT METHODS A Thesis by JOHN ROBERT BARBER, JR. Approved as to style and content by: C airman of C ittee Dr. R. Dale H ingson Co-ch i n Dr. Rodger J. Koppa Member...

Barber, John Robert

1984-01-01T23:59:59.000Z

362

Inhalation Exposure Input Parameters for the Biosphere Model  

SciTech Connect

This analysis is one of the technical reports that support the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), referred to in this report as the biosphere model. ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the conceptual model as well as the mathematical model and its input parameters. This report documents development of input parameters for the biosphere model that are related to atmospheric mass loading and supports the use of the model to develop biosphere dose conversion factors (BDCFs). The biosphere model is one of a series of process models supporting the total system performance assessment (TSPA) for a Yucca Mountain repository. ''Inhalation Exposure Input Parameters for the Biosphere Model'' is one of five reports that develop input parameters for the biosphere model. A graphical representation of the documentation hierarchy for the biosphere model is presented in Figure 1-1 (based on BSC 2006 [DIRS 176938]). This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and how this analysis report contributes to biosphere modeling. This analysis report defines and justifies values of atmospheric mass loading for the biosphere model. Mass loading is the total mass concentration of resuspended particles (e.g., dust, ash) in a volume of air. Mass loading values are used in the air submodel of the biosphere model to calculate concentrations of radionuclides in air inhaled by a receptor and concentrations in air surrounding crops. Concentrations in air to which the receptor is exposed are then used in the inhalation submodel to calculate the dose contribution to the receptor from inhalation of contaminated airborne particles. Concentrations in air surrounding plants are used in the plant submodel to calculate the concentrations of radionuclides in foodstuffs contributed from uptake by foliar interception. This report is concerned primarily with the physical attributes of airborne particulate matter, such as the airborne concentrations of particles and their sizes. The conditions of receptor exposure (duration of exposure in various microenvironments), breathing rates, and dosimetry of inhaled particulates are discussed in more detail in ''Characteristics of the Receptor for the Biosphere Model'' (BSC 2005 [DIRS 172827]).

M. Wasiolek

2006-06-05T23:59:59.000Z

363

SunShot Initiative: Technology Validation  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Validation to someone Technology Validation to someone by E-mail Share SunShot Initiative: Technology Validation on Facebook Tweet about SunShot Initiative: Technology Validation on Twitter Bookmark SunShot Initiative: Technology Validation on Google Bookmark SunShot Initiative: Technology Validation on Delicious Rank SunShot Initiative: Technology Validation on Digg Find More places to share SunShot Initiative: Technology Validation on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Research, Development, & Demonstration Distribution Grid Integration Transmission Grid Integration Solar Resource Assessment Technology Validation Power Electronics & Balance of System Hardware Technologies Competitive Awards Balance of Systems Technology Validation To reduce solar technology risks, DOE and its partners evaluate the

364

US Nuclear Regulatory Commission Input to DOE Request for Information Smart  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Nuclear Regulatory Commission Input to DOE Request for US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input. Comments relevant to the following two sections of the RFI: "Long Term Issues: Managing a Grid with High Penetration of New Technologies" and "Reliability and Cyber-Security," US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input More Documents & Publications Comments of DRSG to DOE Smart Grid RFI: Addressing Policy and Logistical Challenges Reply Comments of Entergy Services, Inc. Progress Energy draft regarding Smart Grid RFI: Addressing Policy and

365

Residential oil burners with low input and two stages firing  

SciTech Connect

The residential oil burner market is currently dominated by the pressure-atomized, retention head burner. At low firing rates pressure atomizing nozzles suffer rapid fouling of the small internal passages, leading to bad spray patterns and poor combustion performance. To overcome the low input limitations of conventional burners, a low pressure air-atomized burner has been developed watch can operate at fining rates as low as 0.25 gallons of oil per hour (10 kW). In addition, the burner can be operated in a high/low fining rate mode. Field tests with this burner have been conducted at a fixed input rate of 0.35 gph (14 kW) with a side-wall vented boiler/water storage tank combination. At the test home, instrumentation was installed to measure fuel and energy flows and record trends in system temperatures. Laboratory efficiency testing with water heaters and boilers has been completed using standard single purpose and combined appliance test procedures. The tests quantify benefits due to low firing rates and other burner features. A two stage oil burner gains a strong advantage in rated efficiency while maintaining capacity for high domestic hot water and space heating loads.

Butcher, T.; Krajewski, R.; Leigh, R. [and others

1997-12-31T23:59:59.000Z

366

Heat transfer analysis in Stirling engine heat input system  

SciTech Connect

One of the major factor in commercialization of Stirling engine is mass productivity, and the heat input system including tubular heater is one of the obstacles to mass production because of its complexity in shape and difficulty in manufacturing, which resulted from using oxidation-resistant, low-creep alloys which are not easy to machine and weld. Therefore a heater heat exchanger which is very simple in shape and easy to make has been devised, and a burner system appropriate to this heater also has been developed. In this paper specially devised heat input system which includes a heater shell shaped like U-cup and a flame tube located in the heater shell is analyzed in point of heat transfer processes to find optimum heat transfer. To enhance the heat transfer from the flame tube to the heater shell wall, it is required that the flame tube diameter be enlarged as close to the heater shell diameter as possible, and the flame tube temperature be raised as high as possible. But the enlargement of the flame tube diameter should be restricted by the state of combustion affected by hydraulic resistance of combustion gas, and the boost of the flame tube temperature should be considered carefully in the aspects of the flame tube`s service life.

Chung, W.; Kim, S. [LG Electronics Inc., Seoul (Korea, Republic of). Living System Lab.

1995-12-31T23:59:59.000Z

367

Methodology for Validating Building Energy Analysis Simulations  

SciTech Connect

The objective of this report was to develop a validation methodology for building energy analysis simulations, collect high-quality, unambiguous empirical data for validation, and apply the validation methodology to the DOE-2.1, BLAST-2MRT, BLAST-3.0, DEROB-3, DEROB-4, and SUNCAT 2.4 computer programs. This report covers background information, literature survey, validation methodology, comparative studies, analytical verification, empirical validation, comparative evaluation of codes, and conclusions.

Judkoff, R.; Wortman, D.; O'Doherty, B.; Burch, J.

2008-04-01T23:59:59.000Z

368

Validation  

NLE Websites -- All DOE Office Websites (Extended Search)

complimentary copy. Redistribution subject to AIP license or copyright, see http:php.aip.orgphpcopyright.jsp and geometry. For example, the dynamics of fusion plasmas is...

369

Model validation and uncertainty analysis -- An example using a nitrate percolation model  

SciTech Connect

Model validation and uncertainty analysis are demonstrated using a model previously developed for estimating nitrate-nitrogen (nitrate) concentrations in percolation water from land application of sewage sludge. The objectives are to demonstrate alternate validation techniques and to analyze uncertainty associated with model use following validation. Field data from three published sludge application studies and two separate methods are used for the validation. The first method, point validation, is accomplished by inserting mean values into the model to make point predictions. Model accuracy is then assessed by calculating coefficient of determination (r{sup 2}), relative error and standard error. Statistical accuracy is tested using the Wilcoxon Signed Rank Test. The second method, statistical validation, uses Monte Carlo simulation to obtain distributions of model predictions. The hypothesis that field data represent reasonable samples from the distribution of model predictions is tested by checking whether observed values are within a range bounded by the 5 and 95% quantities of the distribution. Both validation methods demonstrate that the land application model generally overestimates nitrate concentrations. Monte Carlo simulation is used to identify which model input parameters are the largest contributors to the uncertainty in model predictions.

Mummert, M.C. [R.E. Wright Environmental, Inc., Middletown, PA (United States)

1996-12-31T23:59:59.000Z

370

Criticality Safety Validation of SCALE 6.1 with ENDF/B-VII.0 Libraries  

SciTech Connect

ANSI/ANS-8.1-1998;2007, Nuclear Criticality Safety in Operations with Fissionable Material Outside Reactors, and ANSI/ANS-8.24-2007, Validation of Neutron Transport Methods for Nuclear Criticality Safety Calculations, require validation of a computer code and the associated data through benchmark evaluations based on physical experiments. The performance of the code and data are validated by comparing the calculated and the benchmark results. A SCALE procedure has been established to generate a Verified, Archived Library of Inputs and Data (VALID). This procedure provides a framework for preparing, peer reviewing, and controlling models and data sets derived from benchmark definitions so that the models and data can be used with confidence. The procedure ensures that the models and data were correctly generated using appropriate references with documented checks and reviews. Configuration management is implemented to prevent inadvertent modification of the models and data or inclusion of models that have not been subjected to the rigorous review process. VALID entries for criticality safety are based on critical experiments documented in the International Handbook of Evaluated Criticality Safety Benchmark Experiments (IHECSBE). The findings of a criticality safety validation of SCALE 6.1 utilizing the benchmark models vetted in the VALID library at Oak Ridge National Laboratory are summarized here.

Marshall, William BJ J [ORNL] [ORNL; Rearden, Bradley T [ORNL] [ORNL

2012-01-01T23:59:59.000Z

371

Soil-related Input Parameters for the Biosphere Model  

SciTech Connect

This analysis is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain Nevada (ERMYN), a biosphere model supporting the Total System Performance Assessment (TSPA) for the geologic repository at Yucca Mountain. The biosphere model is one of a series of process models supporting the Total System Performance Assessment (TSPA) for the Yucca Mountain repository. A graphical representation of the documentation hierarchy for the ERMYN biosphere model is presented in Figure 1-1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling, and the plan for development of the biosphere abstraction products for TSPA, as identified in the ''Technical Work Plan: for Biosphere Modeling and Expert Support'' (BSC 2003 [163602]). It should be noted that some documents identified in Figure 1-1 may be under development at the time this report is issued and therefore not available. This figure is included to provide an understanding of how this analysis report contributes to biosphere modeling in support of the license application, and is not intended to imply that access to the listed documents is required to understand the contents of this report. This report, ''Soil Related Input Parameters for the Biosphere Model'', is one of the five analysis reports that develop input parameters for use in the ERMYN model. This report is the source documentation for the six biosphere parameters identified in Table 1-1. ''The Biosphere Model Report'' (BSC 2003 [160699]) describes in detail the conceptual model as well as the mathematical model and its input parameters. The purpose of this analysis was to develop the biosphere model parameters needed to evaluate doses from pathways associated with the accumulation and depletion of radionuclides in the soil. These parameters support the calculation of radionuclide concentrations in soil from on-going irrigation and ash deposition and, as a direct consequence, radionuclide concentration in resuspended particulate matter in the atmosphere. The analysis was performed in accordance with the technical work plan for the biosphere modeling and expert support (TWP) (BSC 2003 [163602]). This analysis revises the previous one titled ''Evaluate Soil/Radionuclide Removal by Erosion and Leaching'' (CRWMS M&O 2001 [152517]). In REV 00 of this report, the data generated were fixed (i.e., taking no account of uncertainty and variability) values. This revision incorporates uncertainty and variability into the values for the bulk density, elemental partition coefficients, average annual loss of soil from erosion, resuspension enhancement factor, and field capacity water content.

A. J. Smith

2003-07-02T23:59:59.000Z

372

Chernobyl: errors and design flaws  

Science Journals Connector (OSTI)

...own mechanical inertia. This residual energy may be required to run...ofthese broke out on the roofof a turbine room next to the unit III reactor...products were carried aloft in the gases produced by the burning graphite...cesium, which has a half-life of 30 years. On the basis of...

C Norman

1986-09-05T23:59:59.000Z

373

Chernobyl: errors and design flaws  

Science Journals Connector (OSTI)

...ofthese broke out on the roofof a turbine room next to the unit III reactor...sharply as decay heat in the remaining fuel drove up the temperature...products were carried aloft in the gases produced by the burning graphite...cesium, which has a half-life of 30 years. On the basis...

C Norman

1986-09-05T23:59:59.000Z

374

Flawed drawings caused spacecraft crash  

Science Journals Connector (OSTI)

... finish its work, and may yet find other problems with Genesis. A battery that overheated during the early days of the mission, and was an early suspect for the ... attention," says Ryschkewitsch. The Genesis mission was designed to provide clues about how the Solar System formed by capturing a few grains of material from the ...

Nicola Jones

2004-10-18T23:59:59.000Z

375

Model Validation with Hybrid Dynamic Simulation  

SciTech Connect

Abstract—Model validation has been one of the central topics in power engineering studies for years. As model validation aims at obtaining reasonable models to represent actual behavior of power system components, it has been essential to validate models against actual measurements or known benchmark behavior. System-wide model simulation results can be compared with actual recordings. However, it is difficult to construct a simulation case for a large power system such as the WECC system and to narrow down to problematic models in a large system. Hybrid dynamic simulation with its capability of injecting external signals into dynamic simulation enables rigorous comparison of measurements and simulation in a small subsystem of interest. This paper presents such a model validation methodology with hybrid dynamic simulation. Two application examples on generator and load model validation are presented to show the validity of this model validation methodology. This methodology is further extended for automatic model validation and dichotomous subsystem model validation.

Huang, Zhenyu; Kosterev, Dmitry; Guttromson, Ross T.; Nguyen, Tony B.

2006-06-18T23:59:59.000Z

376

Soil-Related Input Parameters for the Biosphere Model  

SciTech Connect

This report presents one of the analyses that support the Environmental Radiation Model for Yucca Mountain Nevada (ERMYN). The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes the details of the conceptual model as well as the mathematical model and the required input parameters. The biosphere model is one of a series of process models supporting the postclosure Total System Performance Assessment (TSPA) for the Yucca Mountain repository. A schematic representation of the documentation flow for the Biosphere input to TSPA is presented in Figure 1-1. This figure shows the evolutionary relationships among the products (i.e., analysis and model reports) developed for biosphere modeling, and the biosphere abstraction products for TSPA, as identified in the ''Technical Work Plan for Biosphere Modeling and Expert Support'' (TWP) (BSC 2004 [DIRS 169573]). This figure is included to provide an understanding of how this analysis report contributes to biosphere modeling in support of the license application, and is not intended to imply that access to the listed documents is required to understand the contents of this report. This report, ''Soil-Related Input Parameters for the Biosphere Model'', is one of the five analysis reports that develop input parameters for use in the ERMYN model. This report is the source documentation for the six biosphere parameters identified in Table 1-1. The purpose of this analysis was to develop the biosphere model parameters associated with the accumulation and depletion of radionuclides in the soil. These parameters support the calculation of radionuclide concentrations in soil from on-going irrigation or ash deposition and, as a direct consequence, radionuclide concentration in other environmental media that are affected by radionuclide concentrations in soil. The analysis was performed in accordance with the TWP (BSC 2004 [DIRS 169573]) where the governing procedure was defined as AP-SIII.9Q, ''Scientific Analyses''. This analysis revises the previous version with the same name (BSC 2003 [DIRS 161239]), which was itself a revision of one titled ''Evaluate Soil/Radionuclide Removal by Erosion and Leaching'' (CRWMS M&O 2001 [DIRS 152517]). In Revision 00 of this report, the data generated were fixed values (i.e., taking no account of uncertainty and variability). Revision 01 (BSC 2003 [DIRS 161239]) incorporated uncertainty and variability into the values for the bulk density, elemental partition coefficients, average annual loss of soil from erosion, resuspension enhancement factor, and field capacity water content. The current revision of this document improves the transparency and traceability of the products without changing the details of the analysis. This analysis report supports the treatment of six of the features, events, and processes (FEPs) applicable to the Yucca Mountain reference biosphere (DTN: MO0407SEPFEPLA.000 [DIRS 170760]). The use of the more recent FEP list in DTN: MO0407SEPFEPLA.000 [DIRS 170760] represents a deviation from the detail provided in the TWP (BSC 2004 [DIRS 169573]), which referenced a previous version of the FEP list. The parameters developed in this report support treatment of these six FEPs addressed in the biosphere model that are listed in Table 1-1. Inclusion and treatment of FEPs in the biosphere model is described in the ''Biosphere Model Report'' (BSC 2004 [DIRS 169460], Section 6.2).

A. J. Smith

2004-09-09T23:59:59.000Z

377

E-Print Network 3.0 - ac input power Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

factor with high total harmonic... input cur- rent shape at near unity power factor. Advantages of the proposed topology are: no dc... as well as input supply variations. Matrix...

378

Integrating surprisal and uncertain-input models in online sentence comprehension: formal techniques and empirical results  

Science Journals Connector (OSTI)

A system making optimal use of available information in incremental language comprehension might be expected to use linguistic knowledge together with current input to revise beliefs about previous input. Under some circumstances, such an error-correction ...

Roger Levy

2011-06-01T23:59:59.000Z

379

Time-lag of record inputs to the international nuclear information system bibliographic database  

Science Journals Connector (OSTI)

This paper discusses the timeliness in inputting bibliographical records to international databases with a case study of the international nuclear information system bibliographic database from the inception (1970) to the year 2008. The authors have attempted to calculate the overall and average inputting time-lag of the database. The time-lags of inputting countries and international organisations are analysed separately. The study also tries to identify the nature of inputs that are responsible for this delayed response.

E.R. Prakasan; Nita Bhaskar; K. Bhanumurthy

2011-01-01T23:59:59.000Z

380

Full-Scale Structural and NDI Validation Tests of Bonded Composite Doublers for Commercial Aircraft Applications  

SciTech Connect

Composite doublers, or repair patches, provide an innovative repair technique which can enhance the way aircraft are maintained. Instead of riveting multiple steel or aluminum plates to facilitate an aircraft repair, it is possible to bond a single Boron-Epoxy composite doubler to the damaged structure. Most of the concerns surrounding composite doubler technology pertain to long-term survivability, especially in the presence of non-optimum installations, and the validation of appropriate inspection procedures. This report focuses on a series of full-scale structural and nondestructive inspection (NDI) tests that were conducted to investigate the performance of Boron-Epoxy composite doublers. Full-scale tests were conducted on fuselage panels cut from retired aircraft. These full-scale tests studied stress reductions, crack mitigation, and load transfer capabilities of composite doublers using simulated flight conditions of cabin pressure and axial stress. Also, structures which modeled key aspects of aircraft structure repairs were subjected to extreme tension, shear and bending loads to examine the composite laminate's resistance to disbond and delamination flaws. Several of the structures were loaded to failure in order to determine doubler design margins. Nondestructive inspections were conducted throughout the test series in order to validate appropriate techniques on actual aircraft structure. The test results showed that a properly designed and installed composite doubler is able to enhance fatigue life, transfer load away from damaged structure, and avoid the introduction of new stress risers (i.e. eliminate global reduction in the fatigue life of the structure). Comparisons with test data obtained prior to the doubler installation revealed that stresses in the parent material can be reduced 30%--60% through the use of the composite doubler. Tests to failure demonstrated that the bondline is able to transfer plastic strains into the doubler and that the parent aluminum skin must experience significant yield strains before any damage to the doubler will occur.

Roach, D.; Walkington, P.

1999-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Environmental Transport Input Parameters for the Biosphere Model  

SciTech Connect

This analysis report is one of the technical reports documenting the Environmental Radiation Model for Yucca Mountain Nevada (ERMYN), a biosphere model supporting the total system performance assessment (TSPA) for the geologic repository at Yucca Mountain. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows relationships among the reports developed for biosphere modeling and biosphere abstraction products for the TSPA, as identified in the ''Technical Work Plan: for Biosphere Modeling and Expert Support'' (TWP) (BSC 2003 [163602]). Some documents in Figure 1-1 may be under development and not available when this report is issued. This figure provides an understanding of how this report contributes to biosphere modeling in support of the license application (LA), but access to the listed documents is not required to understand the contents of this report. This report is one of the reports that develops input parameter values for the biosphere model. The ''Biosphere Model Report'' (BSC 2003 [160699]) describes the conceptual model, the mathematical model, and the input parameters. The purpose of this analysis is to develop biosphere model parameter values related to radionuclide transport and accumulation in the environment. These parameters support calculations of radionuclide concentrations in the environmental media (e.g., soil, crops, animal products, and air) resulting from a given radionuclide concentration at the source of contamination (i.e., either in groundwater or volcanic ash). The analysis was performed in accordance with the TWP (BSC 2003 [163602]). This analysis develops values of parameters associated with many features, events, and processes (FEPs) applicable to the reference biosphere (DTN: M00303SEPFEPS2.000 [162452]), which are addressed in the biosphere model (BSC 2003 [160699]). The treatment of these FEPs is described in BSC (2003 [160699], Section 6.2). Parameter values developed in this report, and the related FEPs, are listed in Table 1-1. The relationship between the parameters and FEPs was based on a comparison of the parameter definition and the FEP descriptions as presented in BSC (2003 [160699], Section 6.2). The parameter values developed in this report support the biosphere model and are reflected in the TSPA through the biosphere dose conversion factors (BDCFs). Biosphere modeling focuses on radionuclides screened for the TSPA-LA (BSC 2002 [160059]). The same list of radionuclides is used in this analysis (Section 6.1.4). The analysis considers two human exposure scenarios (groundwater and volcanic ash) and climate change (Section 6.1.5). This analysis combines and revises two previous reports, ''Transfer Coefficient Analysis'' (CRWMS M&O 2000 [152435]) and ''Environmental Transport Parameter Analysis'' (CRWMS M&O 2001 [152434]), because the new ERMYN biosphere model requires a redefined set of input parameters. The scope of this analysis includes providing a technical basis for the selection of radionuclide- and element-specific biosphere parameters (except for Kd) that are important for calculating BDCFs based on the available radionuclide inventory abstraction data. The environmental transport parameter values were developed specifically for use in the biosphere model and may not be appropriate for other applications.

M. A. Wasiolek

2003-06-27T23:59:59.000Z

382

We have developed a software system that takes standard electro-cardiogram (ECG) input and interprets this input along with user-  

E-Print Network (OSTI)

a software system that takes standard electro- cardiogram (ECG) input and interprets this input along months 30 patients were monitored using a digital ECG system and this information was used to test that T wave inversions are sometimes seen on normal ECGs. Control ECGs of normal hearts were also taken

O'Sullivan, Carol

383

WORKPLACE HEALTH: State criminal prosecution ruled valid  

Science Journals Connector (OSTI)

WORKPLACE HEALTH: State criminal prosecution ruled valid ... Company officials, Daley argued, knew of the dangerous conditions but failed ... ...

1989-02-13T23:59:59.000Z

384

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 28590 of 31,917 results. 81 - 28590 of 31,917 results. Article U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). http://energy.gov/cio/articles/u-229-hp-network-node-manager-i-input-validation-flaw-permits-cross-site-scripting Article Passive Housing for an Aggressive Region A telling perspective of Washingtonian's connection with their energy consumption, architecture and ambition in their professional and personal lives. http://energy.gov/energysaver/articles/passive-housing-aggressive-region Article U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary

385

ALEGRA-HEDP validation strategy.  

SciTech Connect

This report presents a initial validation strategy for specific SNL pulsed power program applications of the ALEGRA-HEDP radiation-magnetohydrodynamics computer code. The strategy is written to be (1) broadened and deepened with future evolution of particular specifications given in this version; (2) broadly applicable to computational capabilities other than ALEGRA-HEDP directed at the same pulsed power applications. The content and applicability of the document are highly constrained by the R&D thrust of the SNL pulsed power program. This means that the strategy has significant gaps, indicative of the flexibility required to respond to an ongoing experimental program that is heavily engaged in phenomena discovery.

Garasi, Christopher Joseph; Mehlhorn, Thomas Alan; Trucano, Timothy Guy

2006-01-01T23:59:59.000Z

386

,"U.S. Blender Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

Monthly","9/2013","1/15/2005" Monthly","9/2013","1/15/2005" ,"Release Date:","11/27/2013" ,"Next Release Date:","Last Week of December 2013" ,"Excel File Name:","pet_pnp_inpt3_dc_nus_mbbl_m.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_inpt3_dc_nus_mbbl_m.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.gov" ,,"(202) 586-8800",,,"11/25/2013 11:22:43 AM" "Back to Contents","Data 1: U.S. Blender Net Input" "Sourcekey","MTXRB_NUS_1","M_EPL0_YIB_NUS_MBBL","MPPRB_NUS_1","M_EPLL_YIB_NUS_MBBL","MBNRB_NUS_1","MBIRB_NUS_1","M_EPOL_YIB_NUS_MBBL","M_EPOOXR_YIB_NUS_MBBL","MMTRB_NUS_1","M_EPOOR_YIB_NUS_MBBL","MFERB_NUS_1","M_EPOORD_YIB_NUS_MBBL","M_EPOORO_YIB_NUS_MBBL","M_EPPU_YIB_NUS_MBBL","M_EPOUN_YIB_NUS_MBBL","M_EPOUK_YIB_NUS_MBBL","M_EPOUH_YIB_NUS_MBBL","M_EPOUR_YIB_NUS_MBBL","MBCRB_NUS_1","MO1RB_NUS_1","M_EPOBGRR_YIB_NUS_MBBL","MO3RB_NUS_1","MO4RB_NUS_1","MO2RB_NUS_1","MO5RB_NUS_1","MO6RB_NUS_1","MO7RB_NUS_1","MO9RB_NUS_1"

387

Gross Input to Atmospheric Crude Oil Distillation Units  

U.S. Energy Information Administration (EIA) Indexed Site

Day) Day) Process: Gross Input to Atmospheric Crude Oil Dist. Units Operable Capacity (Calendar Day) Operating Capacity Idle Operable Capacity Operable Utilization Rate Period: Monthly Annual Download Series History Download Series History Definitions, Sources & Notes Definitions, Sources & Notes Show Data By: Process Area Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 View History U.S. 15,283 15,709 16,327 16,490 16,306 16,162 1985-2013 PADD 1 1,134 1,188 1,178 1,142 1,122 1,130 1985-2013 East Coast 1,077 1,103 1,080 1,058 1,031 1,032 1985-2013 Appalachian No. 1 57 85 98 84 90 97 1985-2013 PADD 2 3,151 3,087 3,336 3,572 3,538 3,420 1985-2013 Ind., Ill. and Ky. 2,044 1,947 2,069 2,299 2,330 2,266 1985-2013

388

Interface module for transverse energy input to dye laser modules  

DOE Patents (OSTI)

An interface module (10) for transverse energy input to dye laser modules is provided particularly for the purpose of delivering enhancing transverse energy beams (36) in the form of illumination bar (54) to the lasing zone (18) of a dye laser device, in particular to a dye laser amplifier (12). The preferred interface module (10) includes an optical fiber array (30) having a plurality of optical fibers (38) arrayed in a co-planar fashion with their distal ends (44) receiving coherent laser energy from an enhancing laser source (46), and their proximal ends (4) delivered into a relay structure (3). The proximal ends (42) of the optical fibers (38) are arrayed so as to be coplanar and to be aimed generally at a common point. The transverse energy beam array (36) delivered from the optical fiber array (30) is acted upon by an optical element array (34) to produce an illumination bar (54) which has a cross section in the form of a elongated rectangle at the position of the lasing window (18). The illumination bar (54) is selected to have substantially uniform intensity throughout.

English, Jr., Ronald E. (Tracy, CA); Johnson, Steve A. (Tracy, CA)

1994-01-01T23:59:59.000Z

389

Benchmarks for GADRAS performance validation.  

SciTech Connect

The performance of the Gamma Detector Response and Analysis Software (GADRAS) was validated by comparing GADRAS model results to experimental measurements for a series of benchmark sources. Sources for the benchmark include a plutonium metal sphere, bare and shielded in polyethylene, plutonium oxide in cans, a highly enriched uranium sphere, bare and shielded in polyethylene, a depleted uranium shell and spheres, and a natural uranium sphere. The benchmark experimental data were previously acquired and consist of careful collection of background and calibration source spectra along with the source spectra. The calibration data were fit with GADRAS to determine response functions for the detector in each experiment. A one-dimensional model (pie chart) was constructed for each source based on the dimensions of the benchmark source. The GADRAS code made a forward calculation from each model to predict the radiation spectrum for the detector used in the benchmark experiment. The comparisons between the GADRAS calculation and the experimental measurements are excellent, validating that GADRAS can correctly predict the radiation spectra for these well-defined benchmark sources.

Mattingly, John K.; Mitchell, Dean James; Rhykerd, Charles L., Jr.

2009-09-01T23:59:59.000Z

390

,"U.S. Refinery Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

3,"Monthly","9/2013","1/15/2005" 3,"Monthly","9/2013","1/15/2005" ,"Data 2","Alaskan Crude Oil Receipts",1,"Monthly","9/2013","1/15/1986" ,"Release Date:","11/27/2013" ,"Next Release Date:","Last Week of December 2013" ,"Excel File Name:","pet_pnp_inpt2_dc_nus_mbbl_m.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_inpt2_dc_nus_mbbl_m.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.gov" ,,"(202) 586-8800",,,"11/25/2013 11:21:05 AM" "Back to Contents","Data 1: Refinery Net Input" "Sourcekey","MTTRO_NUS_1","MCRRO_NUS_1","MNGRO_NUS_1","MPPRO_NUS_1","MLPRO_NUS_1","MBNRO_NUS_1","MBIRO_NUS_1","MOLRO_NUS_1","MOHRO_NUS_1","M_EPOOOH_YIY_NUS_MBBL","M_EPOOXXFE_YIY_NUS_MBBL","MMTRO_NUS_1","MOORO_NUS_1","M_EPOOR_YIY_NUS_MBBL","MFERO_NUS_1","M_EPOORD_YIY_NUS_MBBL","M_EPOORO_YIY_NUS_MBBL","M_EPOOOXH_YIY_NUS_MBBL","MUORO_NUS_1","MNLRO_NUS_1","MKORO_NUS_1","MH1RO_NUS_1","MRURO_NUS_1","MBCRO_NUS_1","MO1RO_NUS_1","M_EPOBGRR_YIY_NUS_MBBL","MO3RO_NUS_1","MO4RO_NUS_1","MO5RO_NUS_1","MO6RO_NUS_1","MO7RO_NUS_1","MO9RO_NUS_1","MBARO_NUS_1"

391

,"U.S. Refinery Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

2,"Annual",2012,"6/30/2005" 2,"Annual",2012,"6/30/2005" ,"Data 2","Alaskan Crude Oil Receipts",1,"Annual",2012,"6/30/1986" ,"Release Date:","9/27/2013" ,"Next Release Date:","9/26/2014" ,"Excel File Name:","pet_pnp_inpt2_dc_nus_mbbl_a.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_inpt2_dc_nus_mbbl_a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.gov" ,,"(202) 586-8800",,,"11/25/2013 11:21:04 AM" "Back to Contents","Data 1: Refinery Net Input" "Sourcekey","MTTRO_NUS_1","MCRRO_NUS_1","MNGRO_NUS_1","MPPRO_NUS_1","MLPRO_NUS_1","MBNRO_NUS_1","MBIRO_NUS_1","MOLRO_NUS_1","MOHRO_NUS_1","M_EPOOOH_YIY_NUS_MBBL","M_EPOOXXFE_YIY_NUS_MBBL","MMTRO_NUS_1","MOORO_NUS_1","M_EPOOR_YIY_NUS_MBBL","MFERO_NUS_1","M_EPOORD_YIY_NUS_MBBL","M_EPOOOXH_YIY_NUS_MBBL","MUORO_NUS_1","MNLRO_NUS_1","MKORO_NUS_1","MH1RO_NUS_1","MRURO_NUS_1","MBCRO_NUS_1","MO1RO_NUS_1","M_EPOBGRR_YIY_NUS_MBBL","MO3RO_NUS_1","MO4RO_NUS_1","MO5RO_NUS_1","MO6RO_NUS_1","MO7RO_NUS_1","MO9RO_NUS_1","MBARO_NUS_1"

392

Validation of an Integrated Hydrogen Energy Station  

SciTech Connect

This report presents the results of a 10-year project conducted by Air Products and Chemicals, Inc. (Air Products) to determine the feasibility of coproducing hydrogen with electricity. The primary objective was to demonstrate the technical and economic viability of a hydrogen energy station using a high-temperature fuel cell designed to produce power and hydrogen. This four-phase project had intermediate go/no-go decisions and the following specific goals: �¢���¢ Complete a technical assessment and economic analysis of the use of high-temperature fuel cells, including solid oxide and molten carbonate, for the co-production of power and hydrogen (energy park concept). �¢���¢ Build on the experience gained at the Las Vegas H2 Energy Station and compare/contrast the two approaches for co-production. �¢���¢ Determine the applicability of co-production from a high-temperature fuel cell for the existing merchant hydrogen market and for the emerging hydrogen economy. �¢���¢ Demonstrate the concept on natural gas for six months at a suitable site with demand for both hydrogen and electricity. �¢���¢ Maintain safety as the top priority in the system design and operation. �¢���¢ Obtain adequate operational data to provide the basis for future commercial activities, including hydrogen fueling stations. Work began with the execution of the cooperative agreement with DOE on 30 September 2001. During Phase 1, Air Products identified high-temperature fuel cells as having the potential to meet the coproduction targets, and the molten carbonate fuel cell system from FuelCell Energy, Inc. (FuelCell Energy) was selected by Air Products and DOE following the feasibility assessment performed during Phase 2. Detailed design, construction and shop validation testing of a system to produce 250 kW of electricity and 100 kilograms per day of hydrogen, along with site selection to include a renewable feedstock for the fuel cell, were completed in Phase 3. The system also completed six months of demonstration operation at the wastewater treatment facility operated by Orange County Sanitation District (OCSD, Fountain Valley, CA). As part of achieving the objective of operating on a renewable feedstock, Air Products secured additional funding via an award from the California Air Resources Board. The South Coast Air Quality Management District also provided cost share which supported the objectives of this project. System operation at OCSD confirmed the results from shop validation testing performed during Phase 3. Hydrogen was produced at rates and purity that met the targets from the system design basis, and coproduction efficiency exceeded the 50% target set in conjunction with input from the DOE. Hydrogen production economics, updated from the Phase 2 analysis, showed pricing of $5 to $6 per kilogram of hydrogen using current gas purification systems. Hydrogen costs under $3 per kilogram are achievable if next-generation electrochemical separation technologies become available.

Edward C. Heydorn

2012-10-26T23:59:59.000Z

393

High Flux Isotope Reactor system RELAP5 input model  

SciTech Connect

A thermal-hydraulic computational model of the High Flux Isotope Reactor (HFIR) has been developed using the RELAP5 program. The purpose of the model is to provide a state-of-the art thermal-hydraulic simulation tool for analyzing selected hypothetical accident scenarios for a revised HFIR Safety Analysis Report (SAR). The model includes (1) a detailed representation of the reactor core and other vessel components, (2) three heat exchanger/pump cells, (3) pressurizing pumps and letdown valves, and (4) secondary coolant system (with less detail than the primary system). Data from HFIR operation, component tests, tests in facility mockups and the HFIR, HFIR specific experiments, and other pertinent experiments performed independent of HFIR were used to construct the model and validate it to the extent permitted by the data. The detailed version of the model has been used to simulate loss-of-coolant accidents (LOCAs), while the abbreviated version has been developed for the operational transients that allow use of a less detailed nodalization. Analysis of station blackout with core long-term decay heat removal via natural convection has been performed using the core and vessel portions of the detailed model.

Morris, D.G.; Wendel, M.W.

1993-01-01T23:59:59.000Z

394

Model Validation with Hybrid Dynamic Simulation  

SciTech Connect

Abstract—Model validation has been one of the central topics in power engineering studies for years. As model validation aims at obtaining reasonable models to represent actual behavior of power system components, it has been essential to validate models against actual measurements or known benchmark behavior. System-wide model simulation results can be compared with actual recordings. However, it is difficult to construct a simulation case for a large power system such as the WECC system and to narrow down to problematic models in a large system. Hybrid dynamic simulation with its capability of injecting external signals into dynamic simulation enables rigorous comparison of measurements and simulation in a small subsystem of interest. This paper presents such a model validation methodology with hybrid dynamic simulation. Two application examples on generator and load model validation are presented to show the validity of this model validation methodology. This methodology is further extended for automatic model validation and dichotomous subsystem model validation. A few methods to define model quality indices have been proposed to quantify model error for model validation criteria development.

Huang, Zhenyu; Kosterev, Dmitry; Guttromson, Ross T.; Nguyen, Tony B.

2006-06-22T23:59:59.000Z

395

Evaluation of Indian input to the international nuclear information system database  

Science Journals Connector (OSTI)

The study is aimed at analysing the INIS bibliographic records of publications in India during the period 2000-2008. The analysis includes the inputting trend, time-lag, contributing journals, country collaboration, content analysis through the classification and keywords. India has a total number of 14,697 records input to the database with an yearly average of 1631 records. The timeliness of input is very noteworthy as 29.15% of all articles are input in the same publication year, 52.57% articles are of only one year delay in inputting. Pramana, Journal of Medical Physics, Radiation Protection and Environment are found as the most contributed Indian journals. Scientists from USA, Germany, Japan, etc., are the main contributors. Nuclear physics and radiation physics, specific nuclear reactors and associated plants, particle accelerators, inorganic, organic, physical and analytical chemistry, etc., are main areas of the Indian input.

Anil Kumar; E.R. Prakasan; Sandeep Kadam; Nita Bhaskar

2011-01-01T23:59:59.000Z

396

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 20600 of 28,905 results. 91 - 20600 of 28,905 results. Page Plans, Implementation, and Results Contacts If you have questions about information contained in the Plans, Implementation, and Results section of the EERE Web site, please fill out and submit the form below: http://energy.gov/eere/plans-implementation-and-results-contacts Contributor Elizabeth Spencer Elizabeth Spencer is a communicator at DOE's National Renewable Energy Laboratory, which assists EERE in providing technical content for many of its Web sites. http://energy.gov/contributors/elizabeth-spencer Article U-147:Red Hat Enterprise MRG Grid Input Validation Flaw The MRG Management Console (Cumin) does not properly filter HTML code from user-supplied input before displaying the input. http://energy.gov/cio/articles/u-147red-hat-enterprise-mrg-grid-input-validation-flaw-0

397

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 10340 of 28,905 results. 31 - 10340 of 28,905 results. Download NEPA Contracting Reform Guidance http://energy.gov/nepa/downloads/nepa-contracting-reform-guidance Article U-139: IBM Tivoli Directory Server Input Validation Flaw The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. http://energy.gov/cio/articles/u-139-ibm-tivoli-directory-server-input-validation-flaw Page EIS-0355: Remediation of the Moab Uranium Mill Tailings, Grand and San Juan Counties, Utah The Remediation of the Moab Uranium Mill Tailings, Grand and San Juan Counties, Utah, Environmental Impact Statement and associated supplements and amendments provides information on the environmental impacts of the U.S. Department of Energy's (DOE's) proposal to (1) remediate

398

FIMS Data Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Systems » FIMS Data Information Systems » FIMS Data Validation FIMS Data Validation FIMS Data Validation The Facility Information Management System (FIMS) is the Department's official repository of real property data. The Department relies on the FIMS data for real property decision-making and accounting of its $86B in assets. Maintaining accurate and credible data in FIMS is critical to efficient operations and resource planning. Department of Energy Order 430.1B Real Property Asset Management requires FIMS data be accurately populated and validated once each fiscal year between December 15th and June 30th. The desired outcome of the validation program is to demonstrate, at a 90% confidence level, that the validated FIMS data elements are being maintained without material variance when compared to known accurate source

399

FIMS Data Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operational Management » Facilities and Infrastructure » FIMS Operational Management » Facilities and Infrastructure » FIMS Data Validation FIMS Data Validation FIMS Data Validation The Facility Information Management System (FIMS) is the Department's official repository of real property data. The Department relies on the FIMS data for real property decision-making and accounting of its $86B in assets. Maintaining accurate and credible data in FIMS is critical to efficient operations and resource planning. Department of Energy Order 430.1B Real Property Asset Management requires FIMS data be accurately populated and validated once each fiscal year between December 15th and June 30th. The desired outcome of the validation program is to demonstrate, at a 90% confidence level, that the validated FIMS data elements are being

400

Summary of Input to DOE Request for Information DE-FOA-0000225  

Energy.gov (U.S. Department of Energy (DOE))

Presentation on Sumary of Input to DOE Request for Information DE-FOA-0000225 - U.S. DOE Fuel Cells Technology Program

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Fossil energy use in conventional and low-external-input cropping systems.  

E-Print Network (OSTI)

??The production of fossil fuels will crest within the next decade and with reliance of modern conventional agriculture on fossil fuel energy inputs, food production… (more)

Cruse, Michael James

2009-01-01T23:59:59.000Z

402

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network (OSTI)

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains · Neural coding · Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

403

E-Print Network 3.0 - alpha motoneurone input Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

such as input resistance (Ri,), membrane time constant (T... Spinalization on Ankle Extensor Motoneurons II. Motoneuron Electrical Properties S. HOCHMAN AND D. A. Mc......

404

A CSP Timed Input-Output Relation and a Strategy for Mechanised Conformance Verification  

Science Journals Connector (OSTI)

Here we propose a timed input-output conformance relation (named CSPTIO) based on the process algebra CSP. In contrast to other relations, CSPTIO...

Gustavo Carvalho; Augusto Sampaio…

2013-01-01T23:59:59.000Z

405

Factors Controlling the Input of Electrical Energy into a Fish in an ...  

Science Journals Connector (OSTI)

In order to determine the electrical energy - input into a fish, both voltage and resistance, as applied to the fish itself, should be known. Neither of these quantities ...

1999-12-13T23:59:59.000Z

406

Table A10. Total Inputs of Energy for Heat, Power, and Electricity...  

U.S. Energy Information Administration (EIA) Indexed Site

0. Total Inputs of Energy for Heat, Power, and Electricity Generation" " by Fuel Type, Industry Group, Selected Industries, and End Use, 1994:" " Part 2" " (Estimates in Trillion...

407

FORMALIZATION OF INPUT AND OUTPUT IN MODERN OPERATING SYSTEMS: THE HADLEY MODEL.  

E-Print Network (OSTI)

??We present the Hadley model, a formal descriptive model of input and output for modern computer operating systems. Our model is intentionally inspired by the… (more)

Gerber, Matthew

2005-01-01T23:59:59.000Z

408

OSHPD Postpartum Maternal Outcomes Validation Study  

E-Print Network (OSTI)

may far exceed that of birth certificate data for severalAdams M. Validity of birth certificate data for the outcomemedical record and birth certificate data. Health Services

2006-01-01T23:59:59.000Z

409

HEV, PHEV, BEV Test Standard Validation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BEV Test Standard Validation 2011 DOE Hydrogen Program and Vehicle Technologies Annual Merit Review May 10, 2011 Michael Duoba Argonne National Laboratory Sponsored by Lee Slezak...

410

Fuel Cell Backup Power Technology Validation (Presentation)  

SciTech Connect

Presentation about fuel cell backup power technology validation activities at the U.S. Department of Energy's National Renewable Energy Laboratory.

Kurtz, J.; Sprik, S.; Ramsden, T.; Saur, G.

2012-10-01T23:59:59.000Z

411

Technology Validation: Fuel Cell Bus Evaluations  

Energy.gov (U.S. Department of Energy (DOE))

Presented at the DOE Hydrogen Program 2007 Annual Merit Review held May 15-18, 2007 in Arlington, Virginia under the Technology Validation - Systems Analysis section.

412

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network (OSTI)

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

413

April 3-4, 2007/ARR Engineering Input to System Code and  

E-Print Network (OSTI)

with providing input to system code - Assessing high-leverage engineering parameters to guide integrated trade 3-4, 2007/ARR 2 Schematic of ARIES Next Step Study as I Understand It (TBD) Design Requirements to Demonstrate Those System Code Development and Integration (ARIES-AT as starting point) Translating Input to

Raffray, A. René

414

Polar study of ionospheric ion outflow versus energy input Yihua Zheng,1  

E-Print Network (OSTI)

versus energy input is performed by using multi- instrument data (TIDE, EFI, MFI, HYDRA) from PolarPolar study of ionospheric ion outflow versus energy input Yihua Zheng,1 Thomas E. Moore,2 Forrest/6 Hz), the electron density, temperature, and the electron energy flux. The perturbation fields used

California at Berkeley, University of

415

Pinch-drag-flick vs. spatial input: rethinking zoom & pan on mobile displays  

Science Journals Connector (OSTI)

The multi-touch-based pinch to zoom, drag and flick to pan metaphor has gained wide popularity on mobile displays, where it is the paradigm of choice for navigating 2D documents. But is finger-based navigation really the gold standard' In this paper, ... Keywords: mobile displays, multi-touch input, spatial input, spatially aware displays, user study

Martin Spindler; Martin Schuessler; Marcel Martsch; Raimund Dachselt

2014-04-01T23:59:59.000Z

416

Feeling Music: Integration of Auditory and Tactile Inputs in Musical Meter Perception  

E-Print Network (OSTI)

Feeling Music: Integration of Auditory and Tactile Inputs in Musical Meter Perception Juan Huang1 are integrated in humans performing a musical meter recognition task. Subjects discriminated between two types coherent meter percepts, and 3) Simultaneously presented bimodal inputs where the two channels contained

Wang, Xiaoqin

417

Estimation of input energy in rocket-triggered lightning Vinod Jayakumar,1  

E-Print Network (OSTI)

the input power and energy, each per unit channel length and as a function of time, associated with return- lightning first stroke, based on the conversion of measured optical energy to total energy using energy., 2002] and measured current, I(t), at the channel base to estimate the input power per unit length, P

Florida, University of

418

Asynchronous Gate-Diffusion----Input (GDI) Circuits Arkadiy Morgenshtein, Michael Moreinis and Ran Ginosar  

E-Print Network (OSTI)

1 Asynchronous Gate-Diffusion----Input (GDI) Circuits Arkadiy Morgenshtein, Michael Moreinis, Israel [ran@ee.technion.ac.il] Abstract: Novel Gate-Diffusion Input (GDI) circuits are applied to asynchronous design. A variety of GDI implementations are compared with typical CMOS asynchronous circuits

Ginosar, Ran

419

Lean and Steering Motorcycle Dynamics Reconstruction : An Unknown Input HOSMO Approach  

E-Print Network (OSTI)

Lean and Steering Motorcycle Dynamics Reconstruction : An Unknown Input HOSMO Approach L. Nehaoua1. For this purpose, we consider a unknown input high order sliding mode observer (UIHOSMO). First, a motorcycle- flected by an important increase of motorcycle's fatalities. Recent statistics confirm this fact

Paris-Sud XI, Université de

420

How Knowledge Validation Processes Affect Knowledge Contribution  

Science Journals Connector (OSTI)

To ensure that knowledge repositories contain high-quality knowledge, knowledge management research recommends that contributions to a repository undergo stringent validation processes. To date, however, no research has studied the impact of such processes ... Keywords: Knowledge Contribution Processes, Knowledge Management, Knowledge Repositories, Knowledge Sharing, Knowledge Sourcing, Reinforcement Theory, Signaling Theory, Validation Processes

Alexandra Durcikova; Peter Gray

2009-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Verification, Validation and Testing OSMAN BALCI  

E-Print Network (OSTI)

1 CHAPTER 10 Verification, Validation and Testing OSMAN BALCI Virginia Tech 10.1 INTRODUCTION involves the measurement and assessment of a variety of quality char- acteristics such as accuracy is assessed by conducting verification, validation and testing (VV&T). #12;2 Model Verification

Tesfatsion, Leigh

422

Oak Ridge's EM Program Seeks Public Input on Cleanup | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Public Input on Cleanup Seeks Public Input on Cleanup Oak Ridge's EM Program Seeks Public Input on Cleanup April 25, 2013 - 12:00pm Addthis Oak Ridge’s EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Oak Ridge's EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Oak Ridge EM Manager Mark Whitney addresses participants on EM’s mission and priorities.

423

How are basement walls input in REScheck? | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

basement walls input in REScheck? basement walls input in REScheck? After selecting a basement wall type, a basement wall illustration will appear with input boxes for the basement wall height, depth below grade, and depth of insulation. The illustration helps identify the dimensions being requested. You may enter basement wall dimensions directly into this illustration and select the OK button to have them transferred to the corresponding row in the table on the Envelope screen. If you prefer to enter the dimensions directly into the table on the Envelope screen, you can select Cancel to remove the illustration without entering dimensions. To view the basement wall illustration and inputs at a later time, click the right-mouse button anywhere on the basement row and select Edit Basement Inputs from the popup menu.

424

Oak Ridge's EM Program Seeks Public Input on Cleanup | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oak Ridge's EM Program Seeks Public Input on Cleanup Oak Ridge's EM Program Seeks Public Input on Cleanup Oak Ridge's EM Program Seeks Public Input on Cleanup April 25, 2013 - 12:00pm Addthis Oak Ridge’s EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Oak Ridge's EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Oak Ridge EM Manager Mark Whitney addresses participants on EM’s mission and priorities.

425

DOE Seeking Input on Alternative Uses of Nickel Inventory | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Input on Alternative Uses of Nickel Inventory Seeking Input on Alternative Uses of Nickel Inventory DOE Seeking Input on Alternative Uses of Nickel Inventory March 9, 2007 - 10:28am Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) is seeking input from industry representatives on the safe disposition of approximately 15,300 tons of nickel scrap recovered from uranium enrichment process equipment at the Department's Oak Ridge, TN, and Paducah, KY, facilities. The Expression of Interest (EOI), released today, will assist in DOE's evaluation of restricted uses of its nickel material for controlled radiological applications. These restricted uses could include use in commercial nuclear power plants, DOE nuclear facilities, or by the U.S. Navy. The Department will solicit input through May 8, 2007.

426

DOE Seeking Input on Alternative Uses of Nickel Inventory | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Seeking Input on Alternative Uses of Nickel Inventory DOE Seeking Input on Alternative Uses of Nickel Inventory DOE Seeking Input on Alternative Uses of Nickel Inventory March 9, 2007 - 10:28am Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) is seeking input from industry representatives on the safe disposition of approximately 15,300 tons of nickel scrap recovered from uranium enrichment process equipment at the Department's Oak Ridge, TN, and Paducah, KY, facilities. The Expression of Interest (EOI), released today, will assist in DOE's evaluation of restricted uses of its nickel material for controlled radiological applications. These restricted uses could include use in commercial nuclear power plants, DOE nuclear facilities, or by the U.S. Navy. The Department will solicit input through May 8, 2007.

427

Validation experiment of a numerically processed millimeter-wave interferometer in a laboratory  

SciTech Connect

We propose a new interferometer system for density profile measurements. This system produces multiple measurement chords by a leaky-wave antenna driven by multiple frequency inputs. The proposed system was validated in laboratory evaluation experiments. We confirmed that the interferometer generates a clear image of a Teflon plate as well as the phase shift corresponding to the plate thickness. In another experiment, we confirmed that quasi-optical mirrors can produce multiple measurement chords; however, the finite spot size of the probe beam degrades the sharpness of the resulting image.

Kogi, Y., E-mail: kogi@fit.ac.jp; Higashi, T.; Matsukawa, S. [Department of Information Electronics, Fukuoka Institute of Technology, Fukuoka 811-0295 (Japan); Mase, A. [Art, Science and Technology Center for Cooperative Research, Kyushu University, Kasuga, Fukuoka 816-0811 (Japan); Kohagura, J.; Yoshikawa, M. [Plasma Research Center, University of Tsukuba, Tsukuba, Ibaraki 305-8577 (Japan); Nagayama, Y.; Kawahata, K. [National Institute for Fusion Science, Toki, Gifu 509-5202 (Japan); Kuwahara, D. [Tokyo University of Agriculture and Technology, Koganei, Tokyo 184-8588 (Japan)

2014-11-15T23:59:59.000Z

428

Data Validation & Conditioning Kenneth Martin  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Validation & Conditioning Validation & Conditioning Kenneth Martin martin@electricpowergroup.com June 27-28, 2013 Washington, DC DOE/OE Transmission Reliability Program 2 The Problem  Phasors are well known to engineers ... but synchrophasors are not  Synchrophasor value dependencies - Precise timing source, algorithms, & hardware  Systems dependent on real-time communications - Delay (latency), bandwidth, errors, & dropouts  Need comparability with established systems (SCADA)  Wide area, high-speed - faster actions Need assurance measurements are correct and... Detect and fix data problems 3 Introduction  Data Validation and Conditioning Project - RFP issued in June 2012 - Awarded to EPG in December 2012 - Completion by October 2014

429

,"Maryland Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Maryland Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_smd_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_smd_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

430

,"New Jersey Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","New Jersey Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snj_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snj_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

431

,"Hawaii Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Hawaii Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_shi_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_shi_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

432

,"Rhode Island Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Rhode Island Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sri_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sri_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:55 AM"

433

,"Louisiana Natural Gas Input Supplemental Fuels (Million Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet)" Input Supplemental Fuels (Million Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Louisiana Natural Gas Input Supplemental Fuels (Million Cubic Feet)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","nga_epg0_ovi_sla_mmcfa.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/nga_epg0_ovi_sla_mmcfa.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov"

434

,"North Carolina Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","North Carolina Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snc_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snc_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

435

,"Alaska Natural Gas Input Supplemental Fuels (Million Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet)" Input Supplemental Fuels (Million Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alaska Natural Gas Input Supplemental Fuels (Million Cubic Feet)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na_epg0_ovi_sak_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na_epg0_ovi_sak_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov"

436

,"Connecticut Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Connecticut Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sct_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sct_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

437

,"Minnesota Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Minnesota Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_smn_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_smn_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

438

,"New Mexico Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","New Mexico Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snm_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snm_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

439

,"Wyoming Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Wyoming Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_swy_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_swy_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

440

,"Washington Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Washington Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_swa_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_swa_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

,"Wisconsin Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Wisconsin Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_swi_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_swi_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

442

,"New Hampshire Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","New Hampshire Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snh_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snh_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

443

,"Kentucky Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Kentucky Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sky_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sky_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

444

,"Tennessee Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Tennessee Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_stn_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_stn_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

445

,"Indiana Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Indiana Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sin_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sin_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

446

,"Michigan Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Michigan Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_smi_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_smi_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

447

,"Virginia Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Virginia Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sva_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sva_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

448

,"Georgia Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Georgia Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sga_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sga_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

449

,"South Dakota Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","South Dakota Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_ssd_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_ssd_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

450

,"Nebraska Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Nebraska Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sne_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sne_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

451

,"Delaware Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Delaware Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sde_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sde_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

452

,"Arkansas Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Arkansas Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sar_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sar_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:49 AM"

453

,"Illinois Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Illinois Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sil_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sil_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

454

,"Catalytic Reforming Downstream Processing of Fresh Feed Input"  

U.S. Energy Information Administration (EIA) Indexed Site

Catalytic Reforming Downstream Processing of Fresh Feed Input" Catalytic Reforming Downstream Processing of Fresh Feed Input" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Catalytic Reforming Downstream Processing of Fresh Feed Input",16,"Monthly","9/2013","1/15/2010" ,"Release Date:","11/27/2013" ,"Next Release Date:","Last Week of December 2013" ,"Excel File Name:","pet_pnp_dwns_a_(na)_ydr_mbblpd_m.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_dwns_a_(na)_ydr_mbblpd_m.htm" ,"Source:","Energy Information Administration"

455

,"Pennsylvania Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Pennsylvania Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_spa_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_spa_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:55 AM"

456

,"Iowa Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Iowa Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sia_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sia_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

457

,"Alabama Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alabama Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sal_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sal_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:49 AM"

458

All-optical routing of single photons with multiple input and output ports by interferences  

E-Print Network (OSTI)

We propose a waveguide-cavity coupled system to achieve the routing of photons by the phases of other photons. Our router has four input ports and four output ports. The transport of the coherent-state photons injected through any input port can be controlled by the phases of the coherent-state photons injected through other input ports. This control can be achieved when the mean numbers of the routed and control photons are small enough and require no additional control fields. Therefore, the all-optical routing of photons can be achieved at the single-photon level.

Wei-Bin Yan; Bao Liu; Ling Zhou; Heng Fan

2014-09-23T23:59:59.000Z

459

,"North Dakota Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","North Dakota Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snd_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snd_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

460

,"South Carolina Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","South Carolina Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_ssc_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_ssc_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

,"Massachusetts Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Massachusetts Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sma_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sma_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

462

,"Nevada Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Nevada Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snv_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snv_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

463

,"Texas Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Texas Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_stx_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_stx_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

464

,"U.S. Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","U.S. Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","n9090us2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/n9090us2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:57:08 AM"

465

,"Colorado Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Colorado Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sco_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sco_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:49 AM"

466

,"Oregon Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Oregon Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sor_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sor_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:55 AM"

467

,"Florida Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Florida Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sfl_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sfl_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

468

,"Vermont Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Vermont Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_svt_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_svt_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

469

,"Maine Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Maine Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sme_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sme_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

470

A VALIDATION INDEX FOR ARTIFICIAL NEURAL NETWORKS  

E-Print Network (OSTI)

A VALIDATION INDEX FOR ARTIFICIAL NEURAL NETWORKS Stephen Roberts, Lionel Tarassenko, James Pardey and estimation properties of artificial neural networks. Like many `traditional' statistical techniques & David Siegwart Neural Network Research Group Department of Engineering Science University of Oxford, UK

Roberts, Stephen

471

Navy Technology Validation (Techval) Monitoring Results  

Energy.gov (U.S. Department of Energy (DOE))

Presentation covers the Navy Technology Validation (Techval) Monitoring Results and is given at the Federal Utility Partnership Working Group (FUPWG) 2006 Spring meeting, held on May 3-4, 2006 in Atlanta, Georgia.

472

GIVS: Integrity Validation for Grid Security  

Science Journals Connector (OSTI)

In this paper we address the problem of granting the correctness of Grid computations. We introduce a Grid Integrity Validation Scheme (GIVS) that may reveal the presence of malicious hosts by statistical samp...

Giuliano Casale; Stefano Zanero

2005-01-01T23:59:59.000Z

473

Vehicle Technologies Office: Integration and Validation  

Energy.gov (U.S. Department of Energy (DOE))

Once vehicle components and subsystems prove out in the initial modeling and simulation research phases, it is time to build, integrate, and validate prototypes of those components and subsystems....

474

Validation of Gene Therapy Manufacturing Processes  

Science Journals Connector (OSTI)

Specific issues of concern in the validation of gene therapy viral vector manufacturing processes include quality of raw materials, safety testing of cell and viral banks, production and purification of the ve...

Dominick Vacante; Gail Sofer; Stephen Morris…

2002-01-01T23:59:59.000Z

475

Validation procedures used in the Background Soil Characterization Project on the Oak Ridge Reservation, Oak Ridge, Tennessee. Environmental Restoration Program  

SciTech Connect

The purpose of this report is (1) to document the data validation process developed for the Background Soil Characterization Project (BSCP); (2) to offer members of other project teams and potential data users the benefit of the experience gained in the BSCP in the area of developing project-specific data validation criteria and procedures based on best available guidance and technical information; and (3) to provide input and guidance to the efforts under way within Martin Marietta Energy Systems, Inc., to develop standard operating procedures to streamline and optimize the analytical laboratory data validation process for general use by making it more technically rigorous, consistent, and cost effective. Lessons learned from the BSCP are also provided to meet this end (Sect. 1.3).

Not Available

1993-12-01T23:59:59.000Z

476

DOE Seeks Additional Input on Next Generation Nuclear Plant | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Additional Input on Next Generation Nuclear Plant Seeks Additional Input on Next Generation Nuclear Plant DOE Seeks Additional Input on Next Generation Nuclear Plant April 17, 2008 - 10:49am Addthis WASHINGTON, DC -The U.S. Department of Energy (DOE) today announced it is seeking public and industry input on how to best achieve the goals and meet the requirements for the Next Generation Nuclear Plant (NGNP) demonstration project work at DOE's Idaho National Laboratory. DOE today issued a Request for Information and Expressions of Interest from prospective participants and interested parties on utilizing cutting-edge high temperature gas reactor technology in the effort to reduce greenhouse gas emissions by enabling nuclear energy to replace fossil fuels used by industry for process heat. "This is an opportunity to advance the development of safe, reliable, and

477

DOE Seeks Public Input on an Integrated, Interagency Pre-Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Public Input on an Integrated, Interagency Seeks Public Input on an Integrated, Interagency Pre-Application Process for Transmission Authorizations DOE Seeks Public Input on an Integrated, Interagency Pre-Application Process for Transmission Authorizations August 29, 2013 - 9:09am Addthis A Request for Information (RFI) seeking public input for a draft Integrated, Interagency Pre-application (IIP) Process was published in the Federal Register on August 29, 2013. The Federal Register Notice is available now for downloading. Comments must be received on or before September 30, 2013. As comments are received, they will be posted online. The proposed IIP Process is intended to improve interagency and intergovernmental coordination focused on ensuring that project proponents develop and submit accurate and complete information early in the project

478

BPO Inputs to ITER Design Review on Pellet Pacing, RMP and RWM Coils,  

E-Print Network (OSTI)

Is a Pressing Issue for ITER Loarte et al., Nuclear Fusion, ITER Physics Basis,Chapter 4 Recent results reducedBPO Inputs to ITER Design Review on Pellet Pacing, RMP and RWM Coils, and Disruption Mitigation

479

On the Patterns of Wind-Power Input to the Ocean Circulation  

E-Print Network (OSTI)

Pathways of wind-power input into the ocean general circulation are analyzed using Ekman theory. Direct rates of wind work can be calculated through the wind stress acting on the surface geostrophic flow. However, because ...

Roquet, Fabien

480

SEMILAR: A Semantic Similarity Toolkit For Assessing Students' Natural Language Inputs  

E-Print Network (OSTI)

SEMILAR: A Semantic Similarity Toolkit For Assessing Students' Natural Language Inputs Vasile Rus to understand students' natural language responses. Accurate assessment of students' responses enables, & Graesser, in press). There are at least two different types of natural language assessments

Rus, Vasile

Note: This page contains sample records for the topic "input validation flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

A study of the effects of natural fertility, weather and productive inputs in Chinese agriculture  

E-Print Network (OSTI)

This paper presents an investigation of the relations in China between farm output, the natural fertility of agricultural land, and the use of anthropogenic farm inputs. The methodology is presented as a potential increment ...

Eckaus, Richard S.; Tso, Katherine Kit-Yan.

482

Code design for multiple-input multiple-output broadcast channels  

E-Print Network (OSTI)

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

483

Estimating production functions with damage control inputs: an application to Korean vegetable production  

E-Print Network (OSTI)

This thesis focuses on the use of chemicals for pest control in Korean cucumber production. The empirical issue addressed is whether estimating crop production functions consistent with the economic theory of damage control inputs makes significant...

Park, Pil Ja

2002-01-01T23:59:59.000Z

484

A Survey of Inputs to the North Sea Resulting from Oil and Gas Developments [and Discussion  

Science Journals Connector (OSTI)

...annual inputs from the offshore oil and gas exploration and...of fresh, unweathered oil rapidly enters otherwise uncontaminated offshore sediments, producing...remain little affected by offshore oil and gas developments...

1987-01-01T23:59:59.000Z

485

Weathering rates in catchments calculated by different methods and their relationship to acidic inputs  

Science Journals Connector (OSTI)

The sensitivity of catchments to acidification is often assessed by calculation of weathering rates for comparison of the rates of release of base cations with the measured acidic inputs. Methods of calculatio...

D. C. Bain; S. J. Langan

486

E-Print Network 3.0 - additional power input Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

W to 50 W. A closed-system efficiency of 65% at 50 ... RF and wind power sources operating over a 10:1 input power range from 500 W to 50 W. The...

487

Lessons Learned in Optimizing Workers' and Worker Representatives' Input to Work Planning and Control  

Energy.gov (U.S. Department of Energy (DOE))

Slide Presentation by Tom McQuiston, Dr. P.H., United Steelworkers - Tony Mazzocchi Center for Health, Safety and Environmental Education. Lessons Learned in Optimizing Workers’ and Worker Representatives’ Input in Work Planning and Control.

488

Factors Controlling the Input of Electrical Energy into a Fish in an ...  

Science Journals Connector (OSTI)

of these conditions may cause changes in energy-input t,o the fish by ... errors during measurement owing to elcctrol- .... drop per unit length in the water immedi-.

1999-12-13T23:59:59.000Z

489

Stabilizability of the linear algebro-differential one-input control systems  

Science Journals Connector (OSTI)

Consideration was given to the controllable system of ordinary linear differential equations with the matrix at the derivative of the desired vector function that is identically degenerate in the domain of definition. For the one-input systems, the questions ...

A. A. Shcheglova

2010-09-01T23:59:59.000Z

490

Gate-diffusion input (GDI): a power-efficient method for digital combinatorial circuits  

Science Journals Connector (OSTI)

Gate diffusion input (GDI) - a new technique of low-power digital combinatorial circuit design - is described. This technique allows reducing power consumption, propagation delay, and area of digital circuits while maintaining low complexity of logic ...

A. Morgenshtein; A. Fish; I. A. Wagner

2002-10-01T23:59:59.000Z

491

A reduced-basis method for input-output uncertainty propagation in stochastic PDEs  

E-Print Network (OSTI)

Recently there has been a growing interest in quantifying the effects of random inputs in the solution of partial differential equations that arise in a number of areas, including fluid mechanics, elasticity, and wave ...

Vidal Codina, Ferran

2013-01-01T23:59:59.000Z

492

U.S. Crude Input Rising -- Still Need +1 MMB/D Through Mid-Summer  

Gasoline and Diesel Fuel Update (EIA)

5 5 Notes: Refineries in fourth quarter 1999 and first quarter 2000 were running at fairly low input rates compared to prior years, despite higher demand. U.S. refineries typically increase their crude inputs during the second quarter over the first quarter as they return from maintenance and turnaround schedules to ramp up for the high demand gasoline season. The year began with low refining margins and a low level of crude inputs in January and February. This created a lower base than last year from which to grow into the summer gasoline season, when inputs will need to peak at higher levels than in 1998 or 1999. The good news is that crude runs have been increasing strongly as expected during March the first quarter. Keep in mind that they still need an additional 1 million barrels per day of crude oil between now and mid

493

DOE Seeks Public Input on an Integrated, Interagency Pre-Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Seeks Public Input on an Integrated, Interagency DOE Seeks Public Input on an Integrated, Interagency Pre-Application Process for Transmission Authorizations DOE Seeks Public Input on an Integrated, Interagency Pre-Application Process for Transmission Authorizations August 29, 2013 - 9:09am Addthis A Request for Information (RFI) seeking public input for a draft Integrated, Interagency Pre-application (IIP) Process was published in the Federal Register on August 29, 2013. The Federal Register Notice is available now for downloading. Comments must be received on or before September 30, 2013. As comments are received, they will be posted online. The proposed IIP Process is intended to improve interagency and intergovernmental coordination focused on ensuring that project proponents develop and submit accurate and complete information early in the project