National Library of Energy BETA

Sample records for intrusive assemblage sichuan

  1. Sichuan University | Open Energy Information

    Open Energy Info (EERE)

    Sichuan University Place: Chengdu, Sichuan Province, China Zip: 610065 Product: A comprehensive university in south-west China. Coordinates: 30.67, 104.071022 Show Map Loading...

  2. Tianwei Sichuan Silicon Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    search Name: Tianwei Sichuan Silicon Co Ltd Place: Sichuan Province, China Product: A Chinese polysilicon manufacturer developing a 3000t silicon plant in Xinjin of Sichuan...

  3. Sichuan Apollo Solar Science Technology Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Sichuan Apollo Solar Science Technology Co Ltd Jump to: navigation, search Name: Sichuan Apollo Solar Science & Technology Co Ltd Place: Chengdu, Sichuan Province, China Zip:...

  4. Sichuan Jiulong Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Jiulong Hydropower Co Ltd Jump to: navigation, search Name: Sichuan Jiulong Hydropower Co., Ltd. Place: Chengdu City, Sichuan Province, China Zip: 610072 Sector: Hydro Product:...

  5. Sichuan Minjiang Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Hydropower Co Ltd Jump to: navigation, search Name: Sichuan Minjiang Hydropower Co Ltd Place: Sichuan Province, China Zip: 623007 Sector: Hydro Product: A hydropower developer in...

  6. Sichuan Yuantong Baixi Hydropower Development Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Yuantong Baixi Hydropower Development Co Ltd Jump to: navigation, search Name: Sichuan Yuantong Baixi Hydropower Development Co., Ltd. Place: Sichuan Province, China Zip: 623200...

  7. Sichuan Ebian Jinguang Baxi Electricity Development Co Ltd |...

    Open Energy Info (EERE)

    Jinguang Baxi Electricity Development Co Ltd Jump to: navigation, search Name: Sichuan Ebian Jinguang Baxi Electricity Development Co. Ltd Place: Sichuan Province, China Zip:...

  8. Sichuan Bahe Hydroelectric Development Co Ltd | Open Energy Informatio...

    Open Energy Info (EERE)

    Bahe Hydroelectric Development Co Ltd Jump to: navigation, search Name: Sichuan Bahe Hydroelectric Development Co. Ltd. Place: Bazhong, Sichuan Province, China Zip: 635400 Sector:...

  9. Sichuan Tianquan Xiacun Hydro Generation Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Xiacun Hydro Generation Co Ltd Jump to: navigation, search Name: Sichuan Tianquan Xiacun Hydro Generation Co. Ltd Place: Ya'an, Sichuan Province, China Zip: 625500 Sector: Hydro...

  10. Sichuan Tianquan Qieshan Hydro Generation Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Qieshan Hydro Generation Co Ltd Jump to: navigation, search Name: Sichuan Tianquan Qieshan Hydro Generation Co.,Ltd. Place: Ya(tm)an, Sichuan Province, China Zip: 625500...

  11. Sichuan Minjiang Electrolyte Management Hydro Power Co Ltd |...

    Open Energy Info (EERE)

    Electrolyte Management Hydro Power Co Ltd Jump to: navigation, search Name: Sichuan Minjiang Electrolyte Management Hydro Power Co., Ltd. Place: Mianyang, Sichuan Province, China...

  12. Sichuan Weiyuan Investment Development Co Ltd | Open Energy Informatio...

    Open Energy Info (EERE)

    Weiyuan Investment Development Co Ltd Jump to: navigation, search Name: Sichuan Weiyuan Investment Development Co. Ltd. Place: Chengdu, Sichuan Province, China Zip: 610031 Sector:...

  13. Sichuan Provincial Hydro Power Investment Operation Group Co...

    Open Energy Info (EERE)

    Hydro Power Investment Operation Group Co ltd Jump to: navigation, search Name: Sichuan Provincial Hydro Power Investment & Operation (Group) Co. ltd Place: Chengdu City, Sichuan...

  14. Sichuan Xingchen Hydro Investment Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Xingchen Hydro Investment Co Ltd Jump to: navigation, search Name: Sichuan Xingchen Hydro Investment Co., Ltd. Place: Mianyang, Sichuan Province, China Zip: 617067 Sector: Hydro...

  15. Sichuan Gongga Electric Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd. Place: Chengdu City, Sichuan Province, China Zip: 610015 Sector: Hydro Product: Chinese developer of small hydro plants. References: Sichuan Gongga Electric Power Co.,...

  16. Sichuan Baoxing Fengtongzhai Hydropower Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Place: Ya(tm)an City, Sichuan Province, China Zip: 625700 Sector: Hydro Product: Chinese developer of a small hydro CDM project. References: Sichuan Baoxing Fengtongzhai...

  17. Sichuan Dachuan Power Generation Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Co., Ltd. Place: Chengdu, Sichuan Province, China Zip: 610072 Sector: Hydro Product: Chinese developer of CDM small hydro plants in Sichuan Province. Coordinates: 30.67,...

  18. Sichuan Xinguang Silicon Business Science Technology Co Ltd ...

    Open Energy Info (EERE)

    Xinguang Silicon Business Science Technology Co Ltd Jump to: navigation, search Name: Sichuan Xinguang Silicon Business Science & Technology Co Ltd Place: Leshan, Sichuan Province,...

  19. A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...

    Open Energy Info (EERE)

    and Cr-spinel, and intercumulus pyroxenes, hornblende, phlogopite and plagioclase. Ni-Cu ore (pyrrhotite + pentlandite + chalcopyrite) is hosted in the ultramafic zones....

  20. Interior intrusion detection systems

    SciTech Connect (OSTI)

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  1. Sichuan Yongxiang Polysilicon Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Province, China Zip: 614800 Product: A Chinese polysilicon manufacturer planning to build a 10,000-tonne per year polysilicon plant in Leshan of Sichuan Province. Coordinates:...

  2. Sichuan Chaolei Industry Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Chaolei Industry Co Ltd Place: Chengdu, Sichuan Province, China Zip: 610041 Product: A Chinese company with plans to become partially-integrated PV products, ranging from silica...

  3. Bro Intrusion Detection System

    Energy Science and Technology Software Center (OSTI)

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  4. Acid fracturing of carbonate gas reservoirs in Sichuan

    SciTech Connect (OSTI)

    Meng, M.

    1982-01-01

    The paper presents the geological characteristics of Sinian-furassic carbonate gas reservoirs in the Sichuan basin, China. Based on these characteristics, a mechanism of acid fracturing is proposed for such reservoirs. Included are the results of a research in acid fracturing fluids and field operation conditions for matrix acidizing and acid fracturing in Sichuan. The acid fracturing method is shown to be an effective stimulation technique for the carbonate strata in this area.

  5. Acoustic emission intrusion detector

    DOE Patents [OSTI]

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  6. Sichuan Ya an City Qingyuan Hydro energy Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Qingyuan Hydro energy Co Ltd Jump to: navigation, search Name: Sichuan Ya'an City Qingyuan Hydro energy Co., Ltd. Place: Ya(tm)an, Sichuan Province, China Zip: 625000 Sector:...

  7. Sichuan province scores in antipollution efforts

    SciTech Connect (OSTI)

    Not Available

    1983-09-07

    According to State Council regulations, Sichuan Province has begun charging entrepreneurial units fees for discharging waste water, waste gas and waste residue in excess of state standards, and using the money to treat environmental pollution. Results have been notable. Charging fees for discharging wastes is a major economic measure which the state has adopted to promote environmental protection. So far over 120 cities and counties in the province have adopted this measure. From April 1980 to the end of 1982, the province collected a total of 68 million yuan to fund 1,200 waste treatment projects. As a spinoff of the measure, the enterprises began raising funds on their own to treat pollution. Before 1979, the province spent an average of 3 million yuan annually on treatment of pollution. Last year the figure reached 28 million yuan. Since effluent fees came into effect, Leshan City has invested more money on more pollution-treatment projects every year. Chengdu City invested 14 million yuan in 1982 on 514 projects, completing 292 projects the very same year. The completed projects treat 25,000 tons of effluent a day. Waste water containing disease germs discharged from the army-system hospitals in the province is by and large treated. Effluent fees have spurred the enterprises to strengthen management, conserve and comprehensively utilize resources and energy, thus improving the economic results of the enterprises.

  8. Evaluation of Sichuan Basin in China

    SciTech Connect (OSTI)

    Zhou, J.G.

    1996-06-01

    Sichuan basin lies in the central-south China, in a compression tectonic regime, with an area of approximately 180,000 km{sup 2}. It is a prolific basin with a upside resource potential of gas 5045.38 billion m{sup 3}, and oil 3.56 billion tons. By year-end 1993, the possible geological reserve of gas was 676.136 billion m{sup 3}, and oil 0.14 billion tons; totally about 140 billion m{sup 3} of gas and about 3.5 million tons of oil have been produced to date; thus, there will be 4,229 billion m{sup 3} gas yet to find. During about 40 years` exploration (1950 to 1990), 81 gas/oil fields, including 245 gas pools and 15 oil pools, had been discovered through 2357 wells (total footage 5,804,094 m). 257 surface structures and 189 buried structures (by 91,136 km seismic) had been found in the basin, of which 172 structures had been drilled. The basin contains 21 gas/oil reservoirs of commercial value, distributed from Sinian to Jurassic, in the depths ranging from 7,157 m (well-Guanji) to hundreds of meters. It is evident that the gas and water distribution is not controlled by regional structures or local anticlinal structure but depends on the local development of permeability and fracture porosity in reservoir objectives. Each local occurrence of permeability and porosity functions as a trap for both gas and water, and new gas reservoirs are continuously being found on anticlinal gas fields that have been on production for years.

  9. Gas intrusion into SPR caverns

    SciTech Connect (OSTI)

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T.; Giles, H.N.

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  10. Collection, transmission of low-pressure Sichuan gas detailed

    SciTech Connect (OSTI)

    Runcang, C.

    1983-09-28

    As a result of fairly long-term exploitation, the gas fields in the Sichuan Basin which were opened quite early now have reduced output and lower wellhead pressures. The wellhead pressure in some gas wells is now lower than the pressure of the collection and transmission pipelines. The technologies for collecting and transmitting low-pressure gas in gas fields are discussed.

  11. The petroleum geologic characteristics of Sichuan basin, central China

    SciTech Connect (OSTI)

    Sheng, Li De )

    1991-03-01

    Sichuan basin is the main gas producer of China. It covers an area of 230,000 km{sup 2}. The evolution of this basin since Meso-Cenozoic was influenced by both trans-Eurasia Tethys tectonism from the west and the circum-Pacific tectonism from the east. So it has dual characteristics, compressional and tensional. The northward-moving Indian Plate resulted in a series of thrust fault zones along the Longmenshan western margin of Sichuan basin. Jurassic oil pools and Triassic, Permian, Carboniferous, and Sinian gas pools are present, where a series of box-like anticlines, comblike anticlines, and gentle slope dome anticlines, and gentle slope dome anticline, carbonate reef buildups are the main trap types. Significant role of fractures and caves of carbonate reservoir formations in Sichuan basin affects the production capacity of gas/oil wells and abundances of gas/oil reserves. Three-dimensional seismic methods are used to predict the unconformities and the paleokarst and fracture zones. Acidizing treatments were used for well completions.

  12. Adaptive Intrusion Data System (AIDS)

    SciTech Connect (OSTI)

    Corlis, N. E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems.

  13. Intrusion detection using secure signatures

    SciTech Connect (OSTI)

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  14. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service ...

  15. Episodic dike intrusions in the northwestern Sierra Nevada, California...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Episodic dike intrusions in the northwestern Sierra Nevada, California: ... Title: Episodic dike intrusions in the northwestern Sierra Nevada, California: ...

  16. Monitoring CO2 intrusion and associated geochemical transformations...

    Office of Scientific and Technical Information (OSTI)

    Monitoring CO2 intrusion and associated geochemical transformations in a shallow ... Citation Details In-Document Search Title: Monitoring CO2 intrusion and associated ...

  17. Potential for radionuclide redistribution due to biotic intrusion...

    Office of Scientific and Technical Information (OSTI)

    Potential for radionuclide redistribution due to biotic intrusion: Aboveground biomass ... due to biotic intrusion: Aboveground biomass study at the Los Alamos National ...

  18. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect (OSTI)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  19. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect (OSTI)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  20. Distributed fiber optic moisture intrusion sensing system

    DOE Patents [OSTI]

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  1. Non-intrusive refrigerant charge indicator

    DOE Patents [OSTI]

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  2. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  3. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  4. Characterizing and Improving Distributed Intrusion Detection Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  5. Cybersecurity Intrusion Detection and Security Monitoring for Field Area Networks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Intrusion Detection and Security Monitoring for Field Area Networks Continuous security validation, intrusion detection, and situational awareness for advanced metering infrastructure and distribution automation Background Advanced metering infrastructure (AMI) and distribution automation (DA) field area networks (FANs) are among the largest, possibly most complex, networks operated by utilities in the United States. Exploitable vulnerabilities in AMI and DA systems may arise from weaknesses in

  6. CV-1b: Magmatic - Intrusive | Open Energy Information

    Open Energy Info (EERE)

    Zone in New Zealand. A cross section view of the Taupo Volcanic Zone in New Zealand (ref: Book: North New Zealand) According to Moeck and Beardsmore, magmatic-intrusive...

  7. Relationship Between Heat Flows and Geological Structures in the Sichuan Basin, P.R. China

    SciTech Connect (OSTI)

    Zeng, Y.; Yu, H.; Wang, X.

    1995-01-01

    Based on an extensive data collection and analysis, this research has provided reliable representations of the features of the geothermal fields, their heat flow, and relationships with geological structures in the Sichuan Basin. The isotherms below a depth of 1,000 m show high values in the Central Uplift and the Southwest Uplift, and low values in the Northwest and Southeast Depressions. These features probably indicate undulation of crystalline basement and structural depression. At depths greater than 3,000 m, the isotherms tend to become simpler and regionalized. The mean heat flow in the basin is 69.1 mW/m{sup 2}. In the Central Uplift, the Northwest Depression and the East of the basin, heat-flow values range from 58.6 to 71.2 mW/m{sup 2}, with a mean value of 66.1 mWE/m{sup 2}. In the south and southwest, it varies from 76.6 to 100.5 mW/m{sup 2}, with a mean value of 86.2 mW/m{sup 2}. High heat-flow values occur within the uplift of the crystalline basement in the southwest Sichuan, and the heat flow decreases from the south, through the central area, to the northwest.

  8. Intrusion Detecting Using Secure Signatures - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electricity Transmission Electricity Transmission Find More Like This Return to Search Intrusion Detecting Using Secure Signatures DOE Grant Recipients Idaho National Laboratory Contact GRANT About This Technology Technology Marketing Summary U.S. patent 8,850,583 issued on an invention from Idaho National Laboratory (INL) entitled, "Intrusion Detecting Using Secure Signatures ", which will reduce cyber security risks to our nation's energy infrastructure. The patent describes a novel

  9. Configurable Middleware-Level Intrusion Detection for Embedded Systems

    SciTech Connect (OSTI)

    Naess, Eivind; Frincke, Deborah A.; McKinnon, A. D.; Bakken, David E.

    2005-06-20

    Embedded systems have become integral parts of a diverse range of systems from automobiles to critical infrastructure applications such as gas and electric power distribution. Unfortunately, research on computer security in general and intrusion detection in particular, has not kept pace. Furthermore, embedded systems, by their very nature, are application specific and therefore frameworks for developing application-specific intrusion detection systems for distributed embedded systems must be researched, designed, and implemented. In this paper, we present a configurable middleware-based intrusion detection framework. In particular, this paper presents a system model and a concrete implementation of a highly configurable intrusion detection framework that is integrated into MicroQoSCORBA, a highly configurable middleware framework developed for embedded systems. By exploiting the application-specific logic available to a middleware framework (e.g., object interfaces and method signatures), our integrated framework is able to autogenerate application-specific intrusion detection systems. Next, a set of configurable intrusion detection mechanisms suitable for embedded systems is presented. A performance evaluation of these mechanisms, run on two hardware platforms, is presented at the end of the paper.

  10. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Service Vulnerability | Department of Energy 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the

  11. Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion

    SciTech Connect (OSTI)

    Feero, Amie J.; Washenfelder, Dennis J.; Johnson, Jeremy M.; Schofield, John S.

    2013-11-14

    Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

  12. Sandia Network Intrusion Detection Assessment Version 1.0

    Energy Science and Technology Software Center (OSTI)

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusionmore » detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a

  13. August 18, 2015 Webinar- Probabilistic Analysis of Inadvertent Intrusion and the International Atomic Energy Agency Human Intrusion in the Context of Disposal of Radioactive Waste (HIDRA) Project

    Broader source: Energy.gov [DOE]

    P&RA CoP Webinar - August 18, 2015 - Probabilistic Analysis of Inadvertent Intrusion and the International Atomic Energy Agency Human Intrusion in the Context of Disposal of Radioactive Waste (HIDRA) Project, by Dr. Paul Black (Neptune) and Mr. Roger Seitz (Savannah River National Laboratory), August 18, 2015, 1:30 – 3:00 pm Eastern Daylight Time.

  14. Nuclear-power-plant perimeter-intrusion alarm systems

    SciTech Connect (OSTI)

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  15. Cyber-Intrusion Auto-Response Policy and Management System (CAPMS)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber-Intrusion Auto-Response Policy and Management System (CAPMS) A managed security system that integrates advanced cybersecurity algorithms with energy delivery systems to respond autonomously to cyber intrusions while sustaining critical energy delivery functions Background Cyber attacks are becoming more sophisticated every day. Electric utilities are faced with the challenge of detecting, analyzing, and responding to cyber incidents to protect public safety and preserve the integrity of

  16. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  17. Simulation of sedimentary fill of Sichuan basin by upper Permian coals and carbonate sequences - an example of use of SEDPAK

    SciTech Connect (OSTI)

    Tang, J; Kendall, C.G.S.C.; Strobel, J.; Cannon, R.; Moore, P.; Bezdek, J.; Biswas, G.

    1989-03-01

    The Upper Permian sediments of Sichuan and western Hubei provinces of China, in ascending order, are (1) the basal Ermi basaltic volcanic sequence which exceeds 800-m thickness to the west but is only a few centimeters thick in the east; (2) the overlying coal-bearing Longtan Formation which onlaps as continental coal sequences to the west but downlaps and thins to a few meters of marine shales to the east where it is interbedded with and overlain by thick shelfal carbonates of the Wujiaping Formation; and (3) a thick wedge of carbonates of the Changxing Formation which onlaps the lower coals and interfingers with a thin upper coal sequence to the west. The post-volcanic sedimentary fill can be considered as two supercycles responding to two major sea level changes. The SEDPAK simulation captures deposition of the two supersequences. The first sequence is modeled as onlapping lowstand clastics and coals which, interfingering with ramp carbonates, deepen upward and begin to give up as sea level rise exceeds carbonate growth. The second is modeled as a sequence of ramp to platform carbonates which initially catches up and then keeps up while interfingering westward with coast marine coal sequences. SEDPAK highgrades the hydrocarbon potential of the carbonate buildups in the second sequence.

  18. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect (OSTI)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  19. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  20. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOE Patents [OSTI]

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  1. Abundance, diversity, and resource use in an assemblage of Conus species in Enewetak lagoon

    SciTech Connect (OSTI)

    Kohn, A.J.

    1980-10-01

    Eight species of the gastropod genus Conus co-occur in sand substrate and an adjacent meadow of Halimeda stuposa in Enewetak lagoon, an unusually diverse assemblage for this type of habitat. Population density is high, and large species predominate; they represent all major feeding groups in the genus: predators on polychaetes, enteropneusts, gastropods, and fishes. Although the two most common Conus species eat primarily the same prey species, they mainly take prey of different sizes in different microhabitats. The results suggest that sufficient microhabitat heterogeneity and prey diversity exist to permit spatial segregation and specialization on different prey resources by the different Conus species present. Between-species dissimilarity in resource use thus agrees with previous observations on more diverse Conus assemblages of subtidal coral reef platforms. Prey species diversity is inversely related to body size, confirming and extending a previously identified pattern among Conus species that prey on sedentary polychaetes.

  2. Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant

    SciTech Connect (OSTI)

    Trauth, K.M.; Hora, S.C.; Guzowski, R.V.

    1993-11-01

    The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

  3. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application

    DOE Patents [OSTI]

    Piper, T.C.

    1980-09-24

    An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  4. Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes

    DOE Patents [OSTI]

    Piper, Thomas C.

    1982-01-01

    An arrangement for deleting liquid in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.072 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

  5. Calculation notes that support accident scenario and consequence development for the steam intrusion from interfacing systems accident

    SciTech Connect (OSTI)

    Ryan, G.W., Westinghouse Hanford

    1996-07-25

    This document supports the development and presentation of the following accident scenario in the TWRS Final Safety Analysis Report: Steam Intrusion from Interfacing Systems. The calculations needed to quantify the risk associated with this accident scenario are included within.

  6. Phylogenetic beta diversity in bacterial assemblages across ecosystems: deterministic versus stochastic processes

    SciTech Connect (OSTI)

    Wang, Jianjun; Shen, Jianhaua; Wu, Yucheng; Tu, Chen; Soininen , Janne; Stegen, James C.; He, Jizheng; Liu, Xingqi; Zhang, Lu; Zhang, Enlou

    2013-02-28

    Increasing evidence emerged for non-random spatial distributions for microbes, but the underlying processes resulting in microbial assemblage variation among and within Earths ecosystems is still lacking. For instance, some studies showed that the deterministic processes by habitat specialization are important, while other studies hold that bacterial communities are assembled by neutral forces. Here we examine the relative importance of deterministic and stochastic processes for bacterial communities from subsurface environments, as well as stream biofilm, lake water, lake sediment and soil using pyrosequencing of 16S rRNA gene. We show that there is a general pattern in phylogenetic signal in species niches across recent evolutionary time for all studied habitats, enabling us to infer the influences of community assembly processes from patterns of phylogenetic turnover in community composition. The phylogenetic dissimilarities among habitat types were significantly higher than within them, and the communities were clustered according to their original habitat types. For communities within habitat types, the highest phylogenetic turnover rate through space was observed in subsurface environments, followed by stream biofilm on mountainsides, whereas the sediment assemblages across regional scales showed the lowest turnover rate. Quantifying phylogenetic turnover as the deviation from a null expectation suggested that measured environmental variables imposed strong selection on bacterial communities for nearly all sample groups, and for three sample groups, that spatial distance reflects unmeasured environmental variables that impose selection, as opposed to spatial isolation. Such characterization of spatial and environmental variables proved essential for proper interpretation of partial mantel results based on observed beta diversity metrics. In summary, our results clearly indicate a dominant role of deterministic processes on bacterial assemblages and highlight

  7. Age and environmental interpretation of Middle Cretaceous Dinoflagellate Assemblages from central Belt Franciscan and Great Valley Sequence Outliers, northern California coast ranges

    SciTech Connect (OSTI)

    Lucas-Clark, J.

    1986-04-01

    Calcareous nodules and concretions from Franciscan melange matrix and parts of the Great Valley sequence outliers of northern California yielded well-preserved, diverse assemblages of fossil dinoflagellate cysts of late Albian age. Age interpretation of the samples is based on worldwide ranges of known dinoflagellate species. The melange samples are younger than most previously reported Franciscan melange matrix. Impagidinium-type gonyaulacoid cysts are dominant as opposed to spiniferites types, and species apparently related to shallow-water environments are scarce, which suggests that these assemblages represent an open-ocean environment. Assemblages have few species in common with assemblages of the same age from the Mid-Continent of North America, and more species in common with assemblages of the same age from the eastern Atlantic. Paleoenvironmental considerations probably account for this pattern, rather than paleogeography. Assemblages contain numerous previously undescribed species. Thirteen new species are presented.

  8. Analysis and Evaluation of the Operability and Reliability of the Intrusion Detection and Assessment Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SENSITIVE DOE STD-1219-2016 May 2016 DOE STANDARD Analysis and Evaluation of the Operability and Reliability of the Intrusion Detection and Assessment Systems U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited DOE STD-1219-2016 This document has been reproduced directly from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy,

  9. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  10. Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars

    SciTech Connect (OSTI)

    Villa, Andrea; Mussi, Valerio; Strano, Matteo

    2011-05-04

    The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

  11. Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West

    SciTech Connect (OSTI)

    Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

    1997-02-03

    Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

  12. Assessment of thermal evolution stages and oil-gas migration of carbonate source rocks of early tertiary in eastern Sichuan, China, by organic inclusion analysis

    SciTech Connect (OSTI)

    Shi Jixi; Li Benchao; Fu Jiamo

    1989-03-01

    The Jialinjiang Formation of early Tertiary in Sichuan, China, is a series of limestone and dolomite sediments deposited in a platform shoal environment. The diagenetic sequence and organic inclusions trapped in minerals of 95 samples from 20 drillings have been studied. At the late diagenetic stage, pale yellow organic inclusions consisted of liquid hydrocarbons disseminated in pore-infiltrating dolomite, and the homogeneous temperature of contemporaneous saline liquid inclusions possessing a low gas-liquid ratio was 86/degree/C. This indicates the evolution of the organic matter had gone over the oil generating threshold and oil formation had initiated. In the limestone formed at the late diagenetic stage, more brown-yellow organic inclusions were scattered and/or developed along with fissures, comprising 60-70% liquid hydrocarbons and 30-40% gaseous hydrocarbons. Contemporaneous saline liquid inclusions with gas-liquid ratios of 5-10% had homogeneous temperatures of 90/degree/-130/degree/C. These findings show that the organic material had entered a high evolution stage and oil migration had taken place on a large scale.

  13. Non intrusive sensors -- An answer to annulus pressure monitoring in subsea wellhead equipment

    SciTech Connect (OSTI)

    Adamek, F.C.; Jennings, C.; Aarskog, A.

    1995-12-01

    On offshore platform and jackup surface wellhead completions, there is the potential for leakage from the high pressure production tubing and casing strings into the low pressure outer casing string, or from poor cementing jobs. Historically, these completions maintain the capability of regularly monitoring wellhead annulus pressure so that appropriate action can be taken should a leak be detected. In the past, subsea completions have been oil producers, however, gas production, extreme reservoir pressures, and deeper waters are becoming common place. Although subsea wellhead technology and reliability have significantly improved with the introduction of the metal-to-metal sealing system, the potential for annulus pressure buildup still exists. Up to the present, the ability to monitor pressure beyond the first casing string has been virtually non-existent. This paper describes the design, development, testing, and application of non intrusive sensor technology for pressure measurement in subsea wellheads and production trees. The data and test results define and describe the phenomenon of ``inverse magnetostriction``. This phenomenon allows magnetic sensors to non intrusively penetrate three to four inches of steel in a subsea wellhead housing and measure annulus pressure from less than 30 psi to more than 15,000 psi. In addition, test data, charts, and graphs illustrate the sensor`s capability of differentiating between pressure, tension, compression, and bending stress imposed on the wellhead. The electronic interface description details how the data is obtained from the sensors, stored, and later transmitted to existing control systems or to the user interface at the surface via an ROV.

  14. Fluid-evaporation records preserved in salt assemblages in Meridiani rocks

    SciTech Connect (OSTI)

    Rao, M.N.; Nyquist, L.E.; Sutton, S.R.; Dreibus, G.; Garrison, D.H.; Herrin, J.

    2009-09-25

    We studied the inter-relationships between the major anions (SO{sub 3}, Cl, and Br) and cations (FeO, CaO and MgO) using elemental abundances determined by APXS in salt assemblages of RATted (abraded) rocks at Meridiani to characterize the behavior of fluids that infiltrated into this region on Mars. A plot of SO{sub 3} versus Cl for the abraded rocks yielded an unusual pattern, whereas the SO{sub 3}/Cl ratios versus Cl for the same rocks showed a monotonically decreasing trend represented by a hyperbola. The systematic behavior of the SO{sub 3} and Cl data in the documented rocks at Meridiani suggests that these anions behaved conservatively during fluid-rock interactions. These results further indicate that two kinds of fluids, referred to as SOL-I and SOL-II, infiltrated into Endurance/Eagle/Fram craters, where they underwent progressive evaporative concentration. SOL-I is a low pH fluid consisting of high SO{sub 3} and low Cl and high Br, (this fluid infiltrated all the way to the crater-top region), whereas SOL-II fluid of high pH with low SO{sub 3} and high Cl and low Br reached only an intermediary level known as the Whatanga contact at Endurance. Based on the FeO/MgO as well as CaO/MgO versus SO{sub 3}/Cl diagram for rocks above the Whatanga contact, the cation and anion relationships in this system suggest that the Fe{sup 2+}/SO{sub 4} and Ca{sup 2+}/SO{sub 4} ratios in SOL-I fluids at Meridiani were > 1 before the onset of evaporation based on the 'chemical divide' considerations. Below the Whatanga contact, relatively dilute SOL-II fluids seem to have infiltrated and dissolved/flushed away the easily soluble Mg-sulfate/chloride phases (along with Br) without significantly altering the SO{sub 3}/Cl ratios in the residual salt assemblages. Further, Cl/Br versus Br in rocks above the Whatanga contact show a hyperbolic trend suggesting that Cl and Br behaved conservatively similar to SO{sub 3} and Cl in the SOL-1 fluids at Meridiani. Our results are

  15. Non-Intrusive Load Monitoring of HVAC Components using Signal Unmixing

    SciTech Connect (OSTI)

    Rahimpour, Alireza; Qi, Hairong; Fugate, David L; Kuruganti, Teja

    2015-01-01

    Heating, Ventilating and Air Conditioning units (HVAC) are a major electrical energy consumer in buildings. Monitoring of the operation and energy consumption of HVAC would increase the awareness of building owners and maintenance service providers of the condition and quality of performance of these units, enabling conditioned-based maintenance which would help achieving higher energy efficiency. In this paper, a novel non-intrusive load monitoring method based on group constrained non-negative matrix factorization is proposed for monitoring the different components of HVAC unit by only measuring the whole building aggregated power signal. At the first level of this hierarchical approach, power consumption of the building is decomposed to energy consumption of the HVAC unit and all the other electrical devices operating in the building such as lighting and plug loads. Then, the estimated power signal of the HVAC is used for estimating the power consumption profile of the HVAC major electrical loads such as compressors, condenser fans and indoor blower. Experiments conducted on real data collected from a building testbed maintained at the Oak Ridge National Laboratory (ORNL) demonstrate high accuracy on the disaggregation task.

  16. Electrical signature analysis applications for non-intrusive automotive alternator diagnostics

    SciTech Connect (OSTI)

    Ayers, C.W.

    1996-03-01

    Automotive alternators are designed to supply power for automobile engine ignition systems as well as charge the storage battery. This product is used in a large market where consumers are concerned with acoustic noise and vibration that comes from the unit. as well as overall quality and dependability. Alternators and generators in general are used in industries other than automotive, such as transportation and airline industries and in military applications. Their manufacturers are interested in pursuing state-of-the-art methods to achieve higher quality and reduced costs. Preliminary investigations of non-intrusive diagnostic techniques utilizing the inherent voltage signals of alternators have been performed with promising results. These techniques are based on time and frequency domain analyses of specially conditioned signals taken from several alternators under various test conditions. This paper discusses investigations that show correlations of the alternator output voltage to airborne noise production. In addition these signals provide insight into internal magnetic characteristics that relate to design and/or assembly problems.

  17. Intraplate-type magmatism in a continent-island-arc collision zone: Porgera intrusive complex, Papua New Guinea

    SciTech Connect (OSTI)

    Richards, J.P.; Chappell, B.W.; McCulloch, M.T. )

    1990-10-01

    Cogenetic volatile-rich alkali basalts and gabbros, hawaiites, and mugearites occur in the late Miocene age epizonal Porgera intrusive complex, which is temporally and spatially associated with rich gold-silver mineralization. The least evolved rocks show enrichments in light rare earth elements ((La/Yb){sub cn} = 15-19) and other incompatible elements (e.g., Ba/La {approx} 8-10, La/Nb {approx} 0.6-0.7, Sr/Nd {approx} 25) characteristic of intraplate alkalic basalts and have isotopic compositions ({sup 87}Sr/{sup 86}Sr {approx} 0.7035, {epsilon}{sub Nd} {approx} +6, {sup 206}Pb/{sup 204}Pb {approx} 18.66, {sup 207}Pb/{sup 204}Pb {approx} 15.56, {sup 298}Pb/{sup 204}Pb {approx} 38.55) consistent with derivation from a time-averaged depleted mantle source. The Porgera intrusive complex was emplaced at 6 Ma in Jurassic-Cretaceous shelf-facies sedimentary rocks near the edge of the Australasian plate. Intrusion appears to have occurred in a back-arc environment during subduction of an oceanic microplate segment on two sides, beneath the continental margin and an island arc. We suggest that this unusual tectonic setting promoted partial melting of asthenospheric source materials that were perhaps modified by deep (>150 km) subduction processes to form alkalic magmas with intraplate character.

  18. iSSH v. Auditd: Intrusion Detection in High Performance Computing

    SciTech Connect (OSTI)

    Karns, David M.; Protin, Kathryn S.; Wolf, Justin G.

    2012-07-30

    The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks

  19. Uniaxial creep as a control on mercury intrusion capillary pressure in consolidating rock salt

    SciTech Connect (OSTI)

    Dewers, Thomas; Heath, Jason E.; Leigh, Christi D.

    2015-09-01

    The nature of geologic disposal of nuclear waste in salt formations requires validated and verified two - phase flow models of transport of brine and gas through intact, damaged, and consolidating crushed salt. Such models exist in oth er realms of subsurface engineering for other lithologic classes (oil and gas, carbon sequestration etc. for clastics and carbonates) but have never been experimentally validated and parameterized for salt repository scenarios or performance assessment. Mo dels for waste release scenarios in salt back - fill require phenomenological expressions for capillary pressure and relative permeability that are expected to change with degree of consolidation, and require experimental measurement to parameterize and vali date. This report describes a preliminary assessment of the influence of consolidation (i.e. volume strain or porosity) on capillary entry pressure in two phase systems using mercury injection capillary pressure (MICP). This is to both determine the potent ial usefulness of the mercury intrusion porosimetry method, but also to enable a better experimental design for these tests. Salt consolidation experiments are performed using novel titanium oedometers, or uniaxial compression cells often used in soil mech anics, using sieved run - of - mine salt from the Waste Isolation Pilot Plant (WIPP) as starting material. Twelve tests are performed with various starting amounts of brine pore saturation, with axial stresses up to 6.2 MPa (%7E900 psi) and temperatures to 90 o C. This corresponds to UFD Work Package 15SN08180211 milestone "FY:15 Transport Properties of Run - of - Mine Salt Backfill - Unconsolidated to Consolidated". Samples exposed to uniaxial compression undergo time - dependent consolidation, or creep, to various deg rees. Creep volume strain - time relations obey simple log - time behavior through the range of porosities (%7E50 to 2% as measured); creep strain rate increases with temperature and applied stress as

  20. Calculation notes that support accident scenario and consequence development for the steam intrusion from interfacing systems accident

    SciTech Connect (OSTI)

    Van Vleet, R.J.; Ryan, G.W.; Crowe, R.D.; Lindberg, S.E., Fluor Daniel Hanford

    1997-03-04

    This document supports the development and presentation of the following accident scenario in the TWRS Final Safety Analysis Report (FSAR): Steam Intrusion From Interfacing Systems. The calculations needed to quantify the risk associated with this accident scenario are included in the following sections to aid in the understanding of this accident scenario. Information validation forms citing assumptions that were approved for use specifically in this analysis are included in Appendix A. Copies of these forms are also on file with TWRS Project Files. Calculations performed in this document, in general, are expressed in traditional (English) units to aid understanding of the accident scenario and related parameters.

  1. Final work plan : supplemental upward vapor intrusion investigation at the former CCC/USDA grain storage facility in Hanover, Kansas.

    SciTech Connect (OSTI)

    LaFreniere, L. M.; Environmental Science Division

    2008-12-15

    The Commodity Credit Corporation (CCC), an agency of the U.S. Department of Agriculture (USDA), operated a grain storage facility at the northeastern edge of the city of Hanover, Kansas, from 1950 until the early 1970s. During this time, commercial grain fumigants containing carbon tetrachloride were in common use by the grain storage industry to preserve grain in their facilities. In February 1998, trace to low levels of carbon tetrachloride (below the maximum contaminant level [MCL] of 5.0 {micro}g/L) were detected in two private wells near the former grain storage facility at Hanover, as part of a statewide USDA private well sampling program that was implemented by the Kansas Department of Health and Environment (KDHE) near former CCC/USDA facilities. In 2007, the CCC/USDA conducted near-surface soil sampling at 61 locations and also sampled indoor air at nine residences on or adjacent to its former Hanover facility to address the residents concerns regarding vapor intrusion. Low levels of carbon tetrachloride were detected at four of the nine homes. The results were submitted to the KDHE in October 2007 (Argonne 2007). On the basis of the results, the KDHE requested sub-slab sampling and/or indoor air sampling (KDHE 2007). This Work Plan describes, in detail, the proposed additional scope of work requested by the KDHE and has been developed as a supplement to the comprehensive site investigation work plan that is pending (Argonne 2008). Indoor air samples collected previously from four homes at Hanover were shown to contain the carbon tetrachloride at low concentrations (Table 2.1). It cannot be concluded from these previous data that the source of the detected carbon tetrachloride is vapor intrusion attributable to former grain storage operations of the CCC/USDA at Hanover. The technical objective of the vapor intrusion investigation described here is to assess the risk to human health due to the potential for upward migration of carbon tetrachloride and

  2. Four-dimensional electrical conductivity monitoring of stage-driven river water intrusion: Accounting for water table effects using a transient mesh boundary and conditional inversion constraints

    SciTech Connect (OSTI)

    Johnson, Tim; Versteeg, Roelof; Thomle, Jon; Hammond, Glenn; Chen, Xingyuan; Zachara, John

    2015-08-01

    Our paper describes and demonstrates two methods of providing a priori information to the surface-based time-lapse three-dimensional electrical resistivity tomography (ERT) problem for monitoring stage-driven or tide-driven surface water intrusion into aquifers. First, a mesh boundary is implemented that conforms to the known location of the water table through time, thereby enabling the inversion to place a sharp bulk conductivity contrast at that boundary without penalty. Moreover, a nonlinear inequality constraint is used to allow only positive or negative transient changes in EC to occur within the saturated zone, dependent on the relative contrast in fluid electrical conductivity between surface water and groundwater. A 3-D field experiment demonstrates that time-lapse imaging results using traditional smoothness constraints are unable to delineate river water intrusion. The water table and inequality constraints provide the inversion with the additional information necessary to resolve the spatial extent of river water intrusion through time.

  3. Standard terminal panel and UPS (uninterruptible power supply) design for exterior intrusion detectors and data collection applications

    SciTech Connect (OSTI)

    Wolfenbarger, F.M.

    1989-01-01

    Need for standardization has been discussed for years by many government agencies. In the past, every perimeter site upgrade resulted in the design, specification, procurement, and fabrication of a unique power and signal junction box. To save design and specification cost, a standard terminal panel and uninterruptible power supply (UPS) design for an exterior intrusion sensor detection system was developed for a security system within the Sandia National Laboratories complex at Albuquerque, New Mexico. In facilitating this requirement a design was sought that could easily be modified for other government or commercial applications and one that could easily be fabricated in the shop. Also of primary importance was the need for lightning protection for both the communications and voltage sources. A 12V dc UPS with a current capacity of up to 4 amperes complements the standard terminal design and allows uninterrupted sensor operation for a number of hours should the primary ac source be interrupted. This report encompasses the features of the designs. The designs are also being used and continuously evaluated in Sandia's Area III exterior test field. 7 figs.

  4. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

    2011-09-01

    Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

  5. Four-dimensional electrical conductivity monitoring of stage-driven river water intrusion: Accounting for water table effects using a transient mesh boundary and conditional inversion constraints

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Johnson, Tim; Versteeg, Roelof; Thomle, Jon; Hammond, Glenn; Chen, Xingyuan; Zachara, John

    2015-08-01

    Our paper describes and demonstrates two methods of providing a priori information to the surface-based time-lapse three-dimensional electrical resistivity tomography (ERT) problem for monitoring stage-driven or tide-driven surface water intrusion into aquifers. First, a mesh boundary is implemented that conforms to the known location of the water table through time, thereby enabling the inversion to place a sharp bulk conductivity contrast at that boundary without penalty. Moreover, a nonlinear inequality constraint is used to allow only positive or negative transient changes in EC to occur within the saturated zone, dependent on the relative contrast in fluid electrical conductivity between surfacemore » water and groundwater. A 3-D field experiment demonstrates that time-lapse imaging results using traditional smoothness constraints are unable to delineate river water intrusion. The water table and inequality constraints provide the inversion with the additional information necessary to resolve the spatial extent of river water intrusion through time.« less

  6. The nature of Martian fluids based on mobile element studies in salt-assemblages from Martian meteorites

    SciTech Connect (OSTI)

    Rao, M.N.; Nyquist, L.E.; Wentworth, S.J.; Sutton, S.R.; Garrison, D.H.

    2008-08-04

    The S, Cl, and Br abundances determined in salt assemblages in Nakhla and Lafayette olivine fracture fillings and in gas-rich impact-melt (GRIM) glasses from Shergotty and EET79001 Lithologies A & B using EMPA/EDS/APS X-ray Microprobe techniques are compared with the S and Cl abundances determined by Gooding and coworkers in similar samples using quadrupole mass-spectrometric techniques. All the analytical methods yield relatively high Cl and low SO{sub 3} abundances in Nakhla indicating a SO{sub 3}/Cl ratio of {approx}0.2. The same ratio in Lafayette secondary salts seems to be {approx}2. In the case of GRIM glasses from Shergotty and EET79001 Lith A & Lith B, the SO{sub 3} abundance is found to be high whereas the Cl abundance is low yielding a SO{sub 3}/Cl ratio of {approx}5--300 (large errors are associated with these ratios because of low Cl signals). The salts found in Nakhla fracturefillings are inferred to have formed from Cl-rich fluids (high pH) near nakhlite source region on Mars, whereas the secondary minerals found in shergottite GRIM glasses seem to be associated with SO{sub 3}-rich fluids (low pH) near shergottite source region on Mars. The Cl-rich fluids seem to have infiltrated into the nakhlite source region {approx}600 Ma ago, whereas the SO{sub 3}-rich fluids likely percolated into the shergottite source region at {approx}180 Ma (or less) suggesting the possible existence of two types of fluid sources on Mars.

  7. Considerations Related To Human Intrusion In The Context Of Disposal Of Radioactive Waste-The IAEA HIDRA Project

    SciTech Connect (OSTI)

    Seitz, Roger; Kumano, Yumiko; Bailey, Lucy; Markley, Chris; Andersson, Eva; Beuth, Thomas

    2014-01-09

    The principal approaches for management of radioactive waste are commonly termed ‘delay and decay’, ‘concentrate and contain’ and ‘dilute and disperse’. Containing the waste and isolating it from the human environment, by burying it, is considered to increase safety and is generally accepted as the preferred approach for managing radioactive waste. However, this approach results in concentrated sources of radioactive waste contained in one location, which can pose hazards should the facility be disrupted by human action in the future. The International Commission on Radiological Protection (ICRP), International Atomic Energy Agency (IAEA), and Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) agree that some form of inadvertent human intrusion (HI) needs to be considered to address the potential consequences in the case of loss of institutional control and loss of memory of the disposal facility. Requirements are reflected in national regulations governing radioactive waste disposal. However, in practice, these requirements are often different from country to country, which is then reflected in the actual implementation of HI as part of a safety case. The IAEA project on HI in the context of Disposal of RadioActive waste (HIDRA) has been started to identify potential areas for improved consistency in consideration of HI. The expected outcome is to provide recommendations on how to address human actions in the safety case in the future, and how the safety case may be used to demonstrate robustness and optimize siting, design and waste acceptance criteria within the context of a safety case.

  8. Renewed petroleum generation related to Tertiary intrusions and increased heat flow, western Permian basin, Texas and New Mexico

    SciTech Connect (OSTI)

    Barker, C.E.; Pawlewicz, M.J.

    1989-03-01

    Higher paleogeothermal gradients, commencing in the Tertiary after maximum burial, have caused renewed petroleum generation in the western Permian basin. Evidence for this reheating is two distinct trends in the mean random vitrinite reflectance (R/sub m/) and depth data compiled from over 40 wells. One group, with a 0.7% R/sub m//km gradient, is from the western edge of the basin; the other, with a 0.5% R/sub m//km gradient, is from the central and eastern portions. Post-Mississippian tilting produced greater subsidence and a thicker, mostly uneroded sedimentary section in the eastern portion of the Permian basin. Continued tilting prior to the Cretaceous caused uplift and erosion that exposed the Upper Permian section in the western part. Potassium-argon ages of igneous intrusions along the western edge of the basin show they were emplaced about 35 Ma, followed by Miocene to Holocene basin-and-range-type block faulting and associated high heat flow. Isopach-reflectance contours confirm this renewed heating is post-tectonic - that is, it occurred after eastward tilting and erosion had reduced burial depth. Maximum temperatures computed from R/sub m/-depth relationships infer that paleogeothermal gradients exceeded 40/degrees/C/km (2.2/degrees/F/100 ft) in the Tertiary. This reheating thermally matured rocks as young as Guadalupian in the western Permian basin and apparently caused a second episode of petroleum generation. By this time, however, the potential reservoir rocks and evaporite seals had been deeply eroded, resulting in poor conditions for trapping the renewed pulse of petroleum.

  9. Seismic intrusion detector system

    DOE Patents [OSTI]

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  10. Four-dimensional electrical conductivity monitoring of stage-driven river water intrusion: Accounting for water table effects using a transient mesh boundary and conditional inversion constraints

    SciTech Connect (OSTI)

    Johnson, Timothy C.; Versteeg, Roelof; Thomle, Jonathan N.; Hammond, Glenn E.; Chen, Xingyuan; Zachara, John M.

    2015-08-01

    This paper describes and demonstrates two methods of providing a-priori information to a surface-based time-lapse three-dimensional electrical resistivity tomography (ERT) problem for monitoring stage-driven river bank storage along the Columbia River in the state of Washington, USA. First, a transient warping mesh boundary is implemented that conforms to the known location of the water table boundary through time, thereby enabling the inversion to place a sharp bulk-conductivity contrast at that boundary without penalty. Second, because river water specific conductance is less than groundwater specific conductance, a non-linear inequality constraint is used to allow only negative transient changes in bulk conductivity to occur within the saturated zone during periods of elevated river stage with respect to baseline conditions. Whereas time-lapse imaging results using traditional smoothness constraints are unable to delineate river bank storage, the water table and inequality constraints provide the inversion with the additional information necessary to resolve the spatial extent of river water intrusion through time. A surface based ERT array of 352 electrodes was used to autonomously produce four images per day of changes in bulk conductivity associated with river water intrusion over an area of approximately 300 m2 from April through October of 2013. Results are validated by comparing changes in bulk conductivity time series with corresponding changes in fluid specific conductance at several inland monitoring wells.

  11. Technology Review of Nondestructive Methods for Examination of Water Intrusion Areas on Hanford’s Double-Shell Waste Tanks

    SciTech Connect (OSTI)

    Watkins, Michael L.; Pardini, Allan F.

    2008-05-09

    necessary to de-rate critical components. There are currently no tools that automatically convert the NDE data to formats compatible with structural analysis programs. While radiographic techniques still provide significant advantages in spatial resolution, non-ionizing techniques are still preferred. Radar imagining in the 1–5 GHz has become the most useful. Unfortunately the algorithms and underlying assumptions used in these reconstructions are proprietary, and it is not possible to assess the quality and limitations of the analytical methods used to generate the derived structural data. The hypothesis that water intrusion may contribute to potential rebar corrosion of the tank domes provided the primary guidance in reviewing and evaluating available NDE technologies. Of primary concern is the need to employ technologies that provide the best opportunity for visualizing the rebar and providing quantitative data that can be integrated into structural analysis efforts to better understand and quantify the structural capacity of the domes. The conclusion is that an imaging system capable of locating and quantifying the distribution and conditions of the cement, aggregate, and rebar will provide the most valuable baseline upon which to build a case for the integrity of the structure. If successful, such a system would fulfill the need to incorporate valuable data into current structural load capacity analysis.

  12. Sichuan Giastar Group | Open Energy Information

    Open Energy Info (EERE)

    610041 Product: A Chinese private company focusing on animal feed, pertrochemicals, and trade. Coordinates: 30.67, 104.071022 Show Map Loading map... "minzoom":false,"mappin...

  13. Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2007-06-01

    In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for

  14. Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography

    SciTech Connect (OSTI)

    Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

    2014-04-01

    Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

  15. Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater

    SciTech Connect (OSTI)

    Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

    2008-10-01

    One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water

  16. Non-intrusive cooling system

    DOE Patents [OSTI]

    Morrison, Edward F.; Bergman, John W.

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  17. Laboratory Enrichment of Radioactive Assemblages and Estimation...

    Office of Scientific and Technical Information (OSTI)

    Volume: 24; Journal Issue: 2; Other Information: Copyright (c) 2015 International Association for Mathematical ... Subject: 54 ENVIRONMENTAL SCIENCES; 58 GEOSCIENCES; ...

  18. Intrusion detection and monitoring for wireless networks.

    SciTech Connect (OSTI)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda; Tabriz, Parisa; Pelon, Kristen; McCoy, Damon (University of Colorado, Boulder); Lodato, Mark; Hemingway, Franklin; Custer, Ryan P.; Averin, Dimitry; Franklin, Jason; Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  19. Cybersecurity Intrusion Detection and Security Monitoring for...

    Energy Savers [EERE]

    ... (R&D) program, which aims to enhance the reliability and resilience of the nation's energy infrastructure by reducing the risk of energy disruptions due to cyber attacks. ...

  20. Mineral assemblage transformation of a metakaolin-based waste...

    Office of Scientific and Technical Information (OSTI)

    Additional Journal Information: Journal Volume: 473; Journal Issue: C; Related Information: CHORUS Timestamp: 2016-05-09 05:46:54; Journal ID: ISSN 0022-3115 Publisher: Elsevier ...

  1. Non-Intrusive Load Monitoring Assessment: Literature Review and...

    Office of Scientific and Technical Information (OSTI)

    Consequently, PNNL developed a testing protocol and metrics to provide the basis for ... Sponsoring Org: USDOE Country of Publication: United States Language: English Subject: ...

  2. Monitoring CO2 intrusion and associated geochemical transformations...

    Office of Scientific and Technical Information (OSTI)

    transformations in a shallow groundwater system using complex electrical methods Citation ... Country of Publication: United States Language: English Subject: 54 ENVIRONMENTAL ...

  3. Low-Intrusion Techniques and Sensitive Information Management...

    Office of Scientific and Technical Information (OSTI)

    Close Cite: Bibtex Format Close 0 pages in this document matching the terms "" Search For Terms: Enter terms in the toolbar above to search the full text of this document for ...

  4. Low-Intrusion Techniques and Sensitive Information Management...

    Office of Scientific and Technical Information (OSTI)

    ... Close Cite: Bibtex Format Close 0 pages in this document matching the terms "" Search For Terms: Enter terms in the toolbar above to search the full text of this document for ...

  5. SAND90-3036 Expert judgement, human intrusion.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

  6. A Proactive Learning Framework for Non-Intrusive Load Monitoring...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NILM systems perform analysis on whole-building data taken at the main power panel to ... learning, an advanced machine learning method that interactively queries the user for ...

  7. Intrusion Margins and Associated Fractures | Open Energy Information

    Open Energy Info (EERE)

    Rim Margins Lithologically Controlled Fractures caused by igneous activity creates permeability, allowing water to circulate deep beneath the surface thus becoming heated in the...

  8. PLC backplane analyzer for field forensics and intrusion detection

    DOE Patents [OSTI]

    Mulder, John; Schwartz, Moses Daniel; Berg, Michael; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Trent, Jason; Depoy, Jennifer M; Jacob, Joshua

    2015-05-12

    The various technologies presented herein relate to the determination of unexpected and/or malicious activity occurring between components communicatively coupled across a backplane. Control data, etc., can be intercepted at a backplane where the backplane facilitates communication between a controller and at least one device in an automation process. During interception of the control data, etc., a copy of the control data can be made, e.g., the original control data can be replicated to generate a copy of the original control data. The original control data can continue on to its destination, while the control data copy can be forwarded to an analyzer system to determine whether the control data contains a data anomaly. The content of the copy of the control data can be compared with a previously captured baseline data content, where the baseline data can be captured for a same operational state as the subsequently captured control data.

  9. Minxing Industry Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Co. Ltd. Place: Sichuan Province, China Zip: 625700 Sector: Hydro Product: Sichuan-based small hydro project developer. References: Minxing Industry Co. Ltd.1 This article is a...

  10. Huili Changquan Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Place: Sichuan Province, China Zip: 615100 Sector: Hydro Product: Sichuan-based small hydro project developer. References: Huili Changquan Power Co., Ltd.1 This article is a...

  11. Leshan Kaiyuan Hydro Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Co Ltd Jump to: navigation, search Name: Leshan Kaiyuan Hydro Power Co., Ltd. Place: Leshan, Sichuan Province, China Zip: 614000 Sector: Hydro Product: Sichuan-based small hydro...

  12. Paleoecologic and biostratigraphic models for pleistocene through miocene foraminiferal assemblages of the Gulf Coast Basin

    SciTech Connect (OSTI)

    Breard, S.Q.; Callender, A.D.; Nault, M.J. )

    1993-09-01

    We have developed operationally oriented paleoecologic models used in hydrocarbon exploration of the Gulf Coast basin for Pleistocene through Miocene foraminifera and an updated, refined biostratigraphic chart. We also present estimated paleoecologic tolerances for major benthic and planktic foraminiferal markers, and discuss a number of rules and problems encountered in oil industry paleoenvironmental reconstruction. Key benthic paleoenvironmental markers for particular depth zones are graphically presented for the Pleistocene through Miocene. Improvements over previous models include greater use of calcareous and arenaceous foraminiferal species not used or recognized in earlier studies. Finer subdivisions of bathyal paleoenvironments are of particular significance due to current Gulf of Mexico deep-water exploration. Operationally, the abyssal environmental is difficult to recognize due to a reliance of faunal abundance to delineate abyssal from bathyal and the lack of abyssal zone markers. A number of genera and species are identified as having changed habitat preference through time. Some forms have moved progressively into deeper water (Ceratobulimina Cyclammina cancellata and Nonion pompiloides). Conversely, the movement of species into progressively shallower occurrences through time (Pullenia bullodies) appears to be less common. The widespread occurrence of known Gulf of Mexico foraminiferal species from countries such as Mexico, Venezuela, Ecuador, Jamaica, Trinidad, and the Dominican Republic, suggest that these; models have direct application to Neogene studies in Central America, South America, the Caribbean, and the U.S. Gulf Coast. We introduce a variety of deep-water benthic marker foraminifera, many for the first time. These taxa help fill gaps for deeper-water sections where standard benthic marker foraminifera do not occur, helping debunk the popular myth that benthic foraminifera are useless as markers in the exploration of deep-water sections.

  13. Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks

    DOE Patents [OSTI]

    Goranson, Craig A.; Burnette, John R.; Greitzer, Frank L.; McMillan, Bryan H.

    2013-10-15

    A method for providing security to a network having a data stream with a plurality of portions of data, each having differing levels of sensitivity. The data stream is interrogated to determine the presence of predetermined characteristics associated with at least one of the portions of data within the data stream. At least one of the portions of data is then characterized, based upon the portion of data exhibiting a predetermined combination of characteristics, wherein the predetermined combination of characteristics is related to the sensitivity of the portion of data. The portions of the data stream are then distributed into a plurality of different channels, each of the channels associated with different level of sensitivity.

  14. Evaluating Impacts of CO2 Gas Intrusion Into a Confined Sandstone aquifer: Experimental Results

    SciTech Connect (OSTI)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  15. Evaluating Impacts of CO2 Intrusion into an Unconsolidated Aquifer: II. Modeling Results

    SciTech Connect (OSTI)

    Zheng, Liange; Qafoku, Nikolla; Lawter, Amanda R.; Wang, Guohui; Shao, Hongbo; Brown, Christopher F.

    2015-08-04

    Large scale deployment of CO2 geological sequestration requires the assessment of the risks. One of the potential risks is the impact of CO2 leakage on shallow groundwater overlying the sequestration site.The understanding of the key chemical processes and parameters are critical for building numerical models for risk assessment. Model interpretation of laboratory and field tests is an effective way to enhance such understanding. Column experiments in which CO2 charged synthetic groundwater flowed through a column packed with material from High Plains aquifer was conducted and concentration of several constituents in the effluent water was analyzed. In this paper, reactive transport model was developed to interpret the observed concentration changes, attempting to shed light on the chemical reactions and key parameters that control the concentration changes of these constituents. The reactive transport model catches the concentration changes of pH, Ca, Mg, Ba, Sr, Cs, As and Pb fairly well. Calcite dissolution and Ca-driven cation exchange reactions are the major drivers for the concentration changes of Ca, Ba, Sr, and Cs. The pH-driven adsorption/desorption reactions lead to a concentration increase of As and Pb. The volume fraction and reactive surface area of calcite, CEC and sorption capacity are key parameters in determining the magnitude of concentration increase. Model results also show that the dissolution of calcite with Ba impurity could be an alternative explanation of the increase in Ba concentration.

  16. Sandia Network Intrusion Detection Q.2931 Sensor Version 1.0

    Energy Science and Technology Software Center (OSTI)

    2002-09-20

    This program was developed to read, plot and translate data taken by another program (Monogrow) and make the data readable for processing by other programs like "EXCEL", or any program which requires ASCII data files.

  17. Evaluating Impacts of CO2 Gas Intrusion Into a Confined Sandstone aquifer: Experimental Results

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnershipmore » Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.« less

  18. NON-INTRUSIVE SENSOR FOR GAS FILL VERIFICATION OF INSULATED GLASS WINDOWS

    SciTech Connect (OSTI)

    Andrew Freedman; Paul L. Kebabian; Richard R. Romano; James Woodroffe

    2003-10-01

    A sensor capable of measuring the amount of oxygen (an unwanted component that is only present because of improper filling or seal failure) within an argon-filled insulated glass window has been designed, built and successfully tested. It operates by using the optical absorption of oxygen in the atmospheric A-band centered at 762 nm. Light emitted by an argon-filled surface glow discharge lamp is Zeeman-tuned on and off an oxygen absorption line using an AC-modulated electromagnet. In the presence of oxygen, the change in the measured intensity of the lamp, obtained using standard demodulation techniques, is proportional to the oxygen column density. Measurements using an industry-standard insulated glass window indicate that the sensor can measure the amount of oxygen in a nominally argon-filled IG window (with a window gap of 10 mm) with a precision of 0.50% oxygen using a 16 second integration time. This level of precision is well within the limits required by the IG window manufacturing industry for proper monitoring of newly manufactured window units.

  19. Animal intrusion studies for protective barriers: Status report for FY 1988

    SciTech Connect (OSTI)

    Cadwell, L.L.; Eberhardt, L.E.; Simmons, M.A.

    1989-05-01

    The objective of the Biointrusion Control Task is to provide technical support to Westinghouse Hanford Company's Protective Barrier Development Program for evaluating and predicting potential impacts of animal burrowing on long-term barrier performance. This document reviews the major accomplishments for FY 1988, which is the initial year of the work. The scope of work includes a literature review, field studies, and modeling to assess burrowing impacts as they may contribute to increased infiltration of surface water through barriers, increased quantities of soil available for erosion because of surface soil disturbance, and direct physical transport of contaminants to the surface. 68 refs., 8 figs., 5 tabs.

  20. Evaluating Impacts of CO2 Intrusion into an Unconsolidated Aquifer. I. Experimental Data

    SciTech Connect (OSTI)

    Lawter, Amanda R.; Qafoku, Nikolla; Wang, Guohui; Shao, Hongbo; Brown, Christopher F.

    2015-08-04

    Capture and deep subsurface sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Batch and column experiments combined with wet chemical extractions were conducted to evaluate these risks to groundwater quality and to understand effects of CO2 leakage on aquifer chemistry and mineralogy. Sediments from the High Plains aquifer in Kansas, a confined sandstone aquifer, were used to study time-dependent release of major, minor and trace elements when exposed to CO2 gas. Results showed that Ca, Ba, Si, Mg, Sr, Na, and K increased either instantaneously or followed nonlinear increasing trends with time, indicating dissolution and/or desorption reactions controlled their release. Other elements, such as Mn and Fe, were also released from all sediments, creating a potential for redox reactions to occur. Results from acid extractions confirmed sediments had appreciable amounts of contaminants that may potentially be released into the aqueous phase. However, results from the batch and column experiments demonstrated that only a few trace elements (e.g., As, Cu, Cr, Pb) were released, indicating the risk of groundwater quality degradation due to exposure to leakage of sequestered CO2 is low. Concentrations of Mo were consistently higher in the control experiments (absence of CO2) and were below detection in the presence of CO2 indicating a possible benefit of CO2 in groundwater aquifers. These investigations will provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  1. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect (OSTI)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  2. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    SciTech Connect (OSTI)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  3. Method for non-intrusively identifying a contained material utilizing uncollided nuclear transmission measurements

    DOE Patents [OSTI]

    Morrison, John L.; Stephens, Alan G.; Grover, S. Blaine

    2001-11-20

    An improved nuclear diagnostic method identifies a contained target material by measuring on-axis, mono-energetic uncollided particle radiation transmitted through a target material for two penetrating radiation beam energies, and applying specially developed algorithms to estimate a ratio of macroscopic neutron cross-sections for the uncollided particle radiation at the two energies, where the penetrating radiation is a neutron beam, or a ratio of linear attenuation coefficients for the uncollided particle radiation at the two energies, where the penetrating radiation is a gamma-ray beam. Alternatively, the measurements are used to derive a minimization formula based on the macroscopic neutron cross-sections for the uncollided particle radiation at the two neutron beam energies, or the linear attenuation coefficients for the uncollided particle radiation at the two gamma-ray beam energies. A candidate target material database, including known macroscopic neutron cross-sections or linear attenuation coefficients for target materials at the selected neutron or gamma-ray beam energies, is used to approximate the estimated ratio or to solve the minimization formula, such that the identity of the contained target material is discovered.

  4. Evaluating impacts of CO2 gas intrusion into a confined sandstone aquifer: Experimental results

    SciTech Connect (OSTI)

    Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

    2014-12-31

    Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

  5. Non-intrusive beam power monitor for high power pulsed or continuous wave lasers

    DOE Patents [OSTI]

    Hawsey, Robert A.; Scudiere, Matthew B.

    1993-01-01

    A system and method for monitoring the output of a laser is provided in which the output of a photodiode disposed in the cavity of the laser is used to provide a correlated indication of the laser power. The photodiode is disposed out of the laser beam to view the extraneous light generated in the laser cavity whose intensity has been found to be a direct correlation of the laser beam output power level. Further, the system provides means for monitoring the phase of the laser output beam relative to a modulated control signal through the photodiode monitor.

  6. Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster- Shafer Theory

    SciTech Connect (OSTI)

    Yu, Dong; Frincke, Deborah A.

    2005-03-01

    Extend Dempster-Shafer Theory of Evidence to include differential weightings of alerts drawn from multiple sources. The intent is to support automated (and manual) response to threat by producing more realistic confidence ratings for IDS alerts than is currently available.

  7. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations- Vulnerability and Intrusion Detection

    Broader source: Energy.gov [DOE]

    National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day...

  8. D1 Oils China Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd Jump to: navigation, search Name: D1 Oils China Ltd Place: Chengdu, Sichuan Province, China Product: Chengdu-based joint venture between D1 Oils and Sichuan Yangtze River...

  9. Huili Hongda Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd Place: Sichuan Province, China Zip: 615100 Sector: Hydro Product: Sichuan-based small hydro project developer. References: Huili Hongda Power Co Ltd1 This article is a stub....

  10. Evaluating Impacts of CO2 and CH4 Gas Intrusion into an Unconsolidated Aquifer: Fate of As and Cd

    SciTech Connect (OSTI)

    Lawter, Amanda R.; Qafoku, Nikolla; Shao, Hongbo; Bacon, Diana H.; Brown, Christopher F.

    2015-07-10

    Abstract The sequestration of carbon dioxide (CO2) in deep underground reservoirs has been identified as an important strategy to decrease atmospheric CO2 levels and mitigate global warming, but potential risks on overlying aquifers currently lack a complete evaluation. In addition to CO2, other gases such as methane (CH4) may be present in storage reservoirs. This paper explores for the first time the combined effect of leaking CO2 and CH4 gasses on the fate of major, minor and trace elements in an aquifer overlying a potential sequestration site. Emphasis is placed on the fate of arsenic (As) and cadmium (Cd) released from the sediments or present as soluble constituents in the leaking brine. Results from macroscopic batch and column experiments show that the presence of CH4 (at a concentration of 1 % in the mixture CO2/CH4) does not have a significant effect on solution pH or the concentrations of most major elements (such as Ca, Ba, and Mg). However, the concentrations of Mn, Mo, Si and Na are inconsistently affected by the presence of CH4 (i.e., in at least one sediment tested in this study). Cd is not released from the sediments and spiked Cd is mostly removed from the aqueous phase most likely via adsorption. The fate of sediment associated As [mainly sorbed arsenite or As(III) in minerals] and spiked As [i.e., As5+] is complex. Possible mechanisms that control the As behavior in this system are discussed in this paper. Results are significant for CO2 sequestration risk evaluation and site selection and demonstrate the importance of evaluating reservoir brine and gas stream composition during site selection to ensure the safest site is being chosen.

  11. Non-intrusive, high-resolution, real-time, two-dimensional imaging of multiphase materials using acoustic array sensors

    SciTech Connect (OSTI)

    Cassiède, M.; Shaw, J. M.

    2015-04-15

    Two parallel multi-element ultrasonic acoustic arrays combined with sets of focal laws for acoustic signal generation and a classical tomographic inversion algorithm are used to generate real-time two-dimensional micro seismic acoustic images of multiphase materials. Proof of concept and calibration measurements were performed for single phase and two phase liquids, uniform polyvinyl chloride (PVC) plates, and aluminum cylinders imbedded in PVC plates. Measurement artefacts, arising from the limited range of viewing angles, and the compromise between data acquisition rate and image quality are discussed. The angle range of scanning and the image resolution were varied, and the effects on the quality of the reproduction of the speed of sound profiles of model solids and liquids with known geometries and compositions were analysed in detail. The best image quality results were obtained for a scanning angle range of [−35°, 35°] at a step size of 2.5° post processed to generate images on a 40 μm square grid. The data acquisition time for high quality images with a 30 mm × 40 mm view field is 10 min. Representation of two-phase solids with large differences in speed of sound between phases and where one phase is dispersed in the form of macroscopic objects (greater than 1 mm in diameter) proved to be the most difficult to image accurately. Liquid-liquid and liquid-vapor phase boundaries, in micro porous solids by contrast, were more readily defined. Displacement of air by water and water by heptane in natural porous limestone provides illustrative kinetic examples. Measurement results with these realistic cases demonstrate the feasibility of the technique to monitor in real time and on the micrometer length scale local composition and flow of organic liquids in inorganic porous media, one of many envisioned engineering applications. Improvement of data acquisition rate is an area for future collaborative study.

  12. Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2012 Annual Report

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; McDonald, Benjamin S.; Robinson, Sean M.; Gilbert, Andrew J.; White, Timothy A.; Pitts, W. Karl; Misner, Alex C.; Seifert, Allen

    2012-11-01

    Progress in the second year of this project is described by the series of technical reports and manuscripts that make up the content of this report. These documents summarize successes in our goals to develop our robust image-hash templating and material-discrimination techniques and apply them to test image data.

  13. Evolution of the Geysers (US) - Data From Fluid-Inclusion Microthermometry and Gas Geochemistry

    SciTech Connect (OSTI)

    Moore, J.N.; Hulen, J.B.; Norman, D.I.

    1995-01-01

    The Geysers, California, is the site of an active hydrothermal system that initially developed between about 1.5 and 2 Ma in response to intrusion of a hypabyssal granitic pluton. Mineralogic and fluid-inclusion data demonstrate that the present vapor-dominated regime evolved from an earlier and more extensive, liquid-dominated hydrothermal system. Circulation of these early fluids produced veins characterized by tourmaline and/or biotite {+-} actinolite {+-} clinopyroxene within the pluton and adjacent biotite-rich hornfels, actinolite {+-} ferroaxinite {+-} epidote, and epidote {+-} chlorite {+-} wairakite within the intermediate parts of the thermal system, and calcite in the outer parts. Potassium feldspar and quartz are present in all assemblages. Maximum pressure-corrected homogenization temperatures and apparent salinities of fluid-inclusions in these veins range from 440 C and 44 weight percent NaCl equivalent within the hornfels (<600 m from the pluton) to 325 C and 5 weight percent NaCl equivalent at approximately 1500 m from the intrusion. We suggest that the shallow, moderate-salinity fluids are crustal waters modified by water-rock interactions and that the high-salinity fluids are magmatic brines. The formation of vapor-dominated conditions is reflected in the abrupt appearance of low salinity (0.0 to 0.4 weight percent NaCl equivalent) fluid inclusions with homogenization temperatures near 265 C. These inclusion fluids are thought to represent steam condensate formed as the liquid-dominated system boiled off.

  14. Single-cell genomics reveal metabolic strategies for microbial growth and survival in an oligotrophic aquifer

    SciTech Connect (OSTI)

    Wilkins, Michael J.; Kennedy, David W.; Castelle, Cindy; Field, Erin; Stepanauskas, Ramunas; Fredrickson, Jim K.; Konopka, Allan

    2014-02-01

    Bacteria from the genus Pedobacter are a major component of microbial assemblages at Hanford Site and have been shown to significantly change in abundance in response to the subsurface intrusion of Columbia River water. Here we employed single cell genomics techniques to shed light on the physiological niche of these microorganisms. Analysis of four Pedobacter single amplified genomes (SAGs) from Hanford Site sediments revealed a chemoheterotrophic lifestyle, with the potential to exist under both aerobic and microaerophilic conditions via expression of both aa3?type and cbb3-type cytochrome c oxidases. These SAGs encoded a wide-range of both intra-and extra-cellular carbohydrate-active enzymes, potentially enabling the degradation of recalcitrant substrates such as xylan and chitin, and the utilization of more labile sugars such as mannose and fucose. Coupled to these enzymes, a diversity of transporters and sugar-binding molecules were involved in the uptake of carbon from the extracellular local environment. The SAGs were enriched in TonB-dependent receptors (TBDRs), which play a key role in uptake of substrates resulting from degradation of recalcitrant carbon. CRISPR-Cas mechanisms for resisting viral infections were identified in all SAGs. These data demonstrate the potential mechanisms utilized for persistence by heterotrophic microorganisms in a carbon-limited aquifer, and hint at potential linkages between observed Pedobacter abundance shifts within the 300 Area subsurface and biogeochemical shifts associated with Columbia River water intrusion.

  15. Chengdu China Photoelectric Apollo | Open Energy Information

    Open Energy Info (EERE)

    Chengdu China Photoelectric Apollo Jump to: navigation, search Name: Chengdu China Photoelectric Apollo Place: Chengdu, Sichuan Province, China Sector: Solar Product: China-based...

  16. Chengda Engineering Corporation of China | Open Energy Information

    Open Energy Info (EERE)

    Chengda Engineering Corporation of China Jump to: navigation, search Name: Chengda Engineering Corporation of China Place: Chengdu, Sichuan Province, China Zip: 610041 Product: A...

  17. Leshan Xintianyuan Solar Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Leshan Xintianyuan Solar Power Co Ltd Place: Leshan, Sichuan Province, China Sector: Solar Product: Producer for wafer, PV cell, modules and related solar PV system....

  18. Tongwei Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Tongwei Co Ltd Place: Chengdu, Sichuan Province, China Zip: 610041 Product: A animal feed maker in China. Coordinates: 30.67, 104.071022 Show Map Loading map......

  19. Mabian Xianjiapuhe Power Generation Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Province, China Zip: 614600 Sector: Hydro Product: Sichuan-based developer of small hydro plants. References: Mabian Xianjiapuhe Power Generation Co., Ltd.1 This article is...

  20. Wenchuan Huaming Power Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Sichuan Province, China Sector: Hydro Product: A project SPV and operator of a mini-hydro power plant. References: Wenchuan Huaming Power Development Co Ltd1 This article...

  1. Jichuan Taiyang River Hydro Power Development Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Jichuan Taiyang River Hydro Power Development Co Ltd Jump to: navigation, search Name: Jichuan Taiyang River Hydro Power Development Co., Ltd. Place: Sichuan Province, China Zip:...

  2. Neijiang Tiangongtang Hydro Power Development Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Neijiang Tiangongtang Hydro Power Development Co Ltd Jump to: navigation, search Name: Neijiang Tiangongtang Hydro Power Development Co., Ltd Place: Neijiang, Sichuan Province,...

  3. Gongqiao Electric Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ltd. Place: Sichuan Province, China Zip: 638001 Sector: Hydro Product: China-based small hydro project developer. References: Gongqiao Electric Power Co., Ltd.1 This article is...

  4. Wanyuan Baiyangxi Hydro electric Power Development Co Ltd | Open...

    Open Energy Info (EERE)

    Wanyuan Baiyangxi Hydro electric Power Development Co Ltd Jump to: navigation, search Name: Wanyuan Baiyangxi Hydro-electric Power Development Co., Ltd Place: Wanyuan, Sichuan...

  5. Heishui Jinyuan Hydropower Development Co Ltd | Open Energy Informatio...

    Open Energy Info (EERE)

    Jinyuan Hydropower Development Co Ltd Jump to: navigation, search Name: Heishui Jinyuan Hydropower Development Co., Ltd. Place: Sichuan Province, China Zip: 623500 Sector: Hydro...

  6. Shimian Dagoutou Hydropower Station | Open Energy Information

    Open Energy Info (EERE)

    Dagoutou Hydropower Station Jump to: navigation, search Name: Shimian Dagoutou Hydropower Station Place: Ya'an, Sichuan Province, China Zip: 625400 Sector: Hydro Product:...

  7. Dazhou Xiangyue Hydropower Development Co Ltd | Open Energy Informatio...

    Open Energy Info (EERE)

    Dazhou Xiangyue Hydropower Development Co Ltd Jump to: navigation, search Name: Dazhou Xiangyue Hydropower Development Co. Ltd. Place: Dazhou, Sichuan Province, China Zip: 635000...

  8. Heishui Shuangyuan Hydropower Exploitation Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Shuangyuan Hydropower Exploitation Co Ltd Jump to: navigation, search Name: Heishui Shuangyuan Hydropower Exploitation Co., Ltd Place: Chengdu City, Sichuan Province, China Zip:...

  9. Tianquan County Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Tianquan County Hydropower Co Ltd Jump to: navigation, search Name: Tianquan County Hydropower Co., Ltd Place: Chengdu, Sichuan Province, China Zip: 610017 Sector: Hydro Product:...

  10. Yanyuan Lujiang Hydropower Development Co Ltd | Open Energy Informatio...

    Open Energy Info (EERE)

    Yanyuan Lujiang Hydropower Development Co Ltd Jump to: navigation, search Name: Yanyuan Lujiang Hydropower Development Co., Ltd. Place: Sichuan Province, China Zip: 615700 Sector:...

  11. Songpan County Songchuan Hydropower Development Co Ltd | Open...

    Open Energy Info (EERE)

    Songchuan Hydropower Development Co Ltd Jump to: navigation, search Name: Songpan County Songchuan Hydropower Development Co., Ltd Place: Chengdu, Sichuan Province, China Zip:...

  12. Erpu Hydropower Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Erpu Hydropower Development Co Ltd Jump to: navigation, search Name: Erpu Hydropower Development Co.Ltd Place: Liangshan Yi Autonomous Prefecture, Sichuan Province, China Zip:...

  13. Jiulong Wanbao Hydropower Corporation | Open Energy Information

    Open Energy Info (EERE)

    Wanbao Hydropower Corporation Jump to: navigation, search Name: Jiulong Wanbao Hydropower Corporation Place: Garze Tibetan Autonomous Prefecture, Sichuan Province, China Zip:...

  14. Pingwu County Yetang Hydropower Development Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Yetang Hydropower Development Co Ltd Jump to: navigation, search Name: Pingwu County Yetang Hydropower Development Co. Ltd. Place: Mianyang, Sichuan Province, China Zip: 622564...

  15. Kangding Jineng Hydropower Exploitation Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Hydropower Exploitation Co Ltd Jump to: navigation, search Name: Kangding Jineng Hydropower Exploitation Co., Ltd. Place: Ganzi Tibetan Autonomous Prefecture, Sichuan Province,...

  16. Songpan Baichuan Hydropower Development Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Songpan Baichuan Hydropower Development Co Ltd Jump to: navigation, search Name: Songpan Baichuan Hydropower Development Co. Ltd. Place: Sichuan Province, China Zip: 623300 Sector:...

  17. Yuexi Liyuan Hydropower Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Yuexi Liyuan Hydropower Development Co Ltd Jump to: navigation, search Name: Yuexi Liyuan Hydropower Development Co. Ltd Place: Banqiao town, Sichuan Province, China Zip: 616650...

  18. Ebian Hydropower Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Ebian Hydropower Co Ltd Jump to: navigation, search Name: Ebian Hydropower Co., Ltd Place: Leshan, Sichuan Province, China Zip: 614300 Sector: Hydro Product: China based small...

  19. Shimian Danihe Hydropower Station | Open Energy Information

    Open Energy Info (EERE)

    Danihe Hydropower Station Jump to: navigation, search Name: Shimian Danihe Hydropower Station Place: Ya'an, Sichuan Province, China Zip: 625400 Sector: Hydro Product: China-based...

  20. Miyi Chengnan Hydropower Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Miyi Chengnan Hydropower Development Co Ltd Jump to: navigation, search Name: Miyi Chengnan Hydropower Development Co.,Ltd Place: Panzhihua, Sichuan Province, China Zip: 323000...

  1. Mabian Huaqiang Electricity Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Huaqiang Electricity Power Co Ltd Jump to: navigation, search Name: Mabian Huaqiang Electricity Power Co.,Ltd. Place: Leshan, Sichuan Province, China Zip: 614600 Sector: Hydro...

  2. Yibin Julang Electricity Power Development Co Ltd | Open Energy...

    Open Energy Info (EERE)

    Yibin Julang Electricity Power Development Co Ltd Jump to: navigation, search Name: Yibin Julang Electricity Power Development Co. Ltd. Place: Sichuan Province, China Zip: 644501...

  3. The Eleventh Design Research Institute of IT Co Ltd EDRI | Open...

    Open Energy Info (EERE)

    Eleventh Design Research Institute of IT Co Ltd EDRI Jump to: navigation, search Name: The Eleventh Design & Research Institute of IT Co Ltd (EDRI) Place: Chengdu, Sichuan...

  4. EMei Semiconductor Materials Plant Research Institute | Open...

    Open Energy Info (EERE)

    EMei Semiconductor Materials Plant Research Institute Jump to: navigation, search Name: EMei Semiconductor Materials Plant & Research Institute Place: Emei, Sichuan Province, China...

  5. Cangxi Jianghe Hydroelectric Power Development Co Ltd | Open...

    Open Energy Info (EERE)

    Cangxi Jianghe Hydroelectric Power Development Co Ltd Jump to: navigation, search Name: Cangxi Jianghe Hydroelectric Power Development Co., Ltd. Place: Guanyuan, Sichuan Province,...

  6. Goal, Practice & Experience : Status Quo and Future for Industrial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sichuan Yunnan Shanxi 120 demonstration projects for pellets heating in the near future Main distribution Pellets production plants: 200 Briquette equipments manufacturers: ...

  7. Interdot Coulomb correlation effects and spin-orbit coupling...

    Office of Scientific and Technical Information (OSTI)

    Institute of Atomic and Molecular Physics, Sichuan University, Chengdu 610065 (China) Publication Date: 2014-01-28 OSTI Identifier: 22275653 Resource Type: Journal Article Resource ...

  8. Miyi County Wantan Water and Electric Power Development Co Ltd...

    Open Energy Info (EERE)

    Wantan Water and Electric Power Development Co Ltd Jump to: navigation, search Name: Miyi County Wantan Water and Electric Power Development Co. Ltd Place: Panzhihua, Sichuan...

  9. Dongqi Leshan Silicon Material Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Dongqi Leshan Silicon Material Co Ltd Jump to: navigation, search Name: Dongqi Leshan Silicon Material Co Ltd Place: Leshan, Sichuan Province, China Product: A Chinese polysilicon...

  10. Dongfang Steam Turbine Works DFSTW | Open Energy Information

    Open Energy Info (EERE)

    Turbine Works DFSTW Jump to: navigation, search Name: Dongfang Steam Turbine Works (DFSTW) Place: Deyang, Sichuan Province, China Zip: 618000 Sector: Wind energy Product:...

  11. Mabian Shichuang Hydropower Investment Co Ltd | Open Energy Informatio...

    Open Energy Info (EERE)

    Shichuang Hydropower Investment Co Ltd Jump to: navigation, search Name: Mabian Shichuang Hydropower Investment Co., Ltd. Place: Leshan, Sichuan Province, China Zip: 614603 Sector:...

  12. Xiaojin County Jitai Electric Power Investment Co Ltd | Open...

    Open Energy Info (EERE)

    Xiaojin County Jitai Electric Power Investment Co Ltd Jump to: navigation, search Name: Xiaojin County Jitai Electric Power Investment Co., Ltd. Place: Xiaojin County, Sichuan...

  13. DFSTW Investment Development Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    DFSTW Investment Development Co Ltd Jump to: navigation, search Name: DFSTW Investment Development Co Ltd Place: Sichuan Province, China Zip: 618201 Sector: Solar, Wind energy...

  14. Dongfang Chengda Silicon Technology Development Co Ltd | Open...

    Open Energy Info (EERE)

    Technology Development Co Ltd Place: Chengdu, Sichuan Province, China Product: A Chinese company mainly engaged in the R&D of silicon production technology. References:...

  15. Chengdu Jiayang Silicon Technology Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Jiayang Silicon Technology Co Ltd Place: Chengdu, Sichuan Province, China Product: Chinese monocrystalline silicon ingots and wafers manufacturer Coordinates: 30.67,...

  16. Chengdu Zhongshun Science Technology Development Co Ltd | Open...

    Open Energy Info (EERE)

    Zhongshun Science Technology Development Co Ltd Jump to: navigation, search Name: Chengdu Zhongshun Science & Technology Development Co Ltd Place: Chengdu, Sichuan Province, China...

  17. Leshan Ledian Tianwei Silicon Science and Technology Co Ltd ...

    Open Energy Info (EERE)

    Ledian Tianwei Silicon Science and Technology Co Ltd Jump to: navigation, search Name: Leshan Ledian Tianwei Silicon Science and Technology Co Ltd Place: Leshan, Sichuan Province,...

  18. Climate-linked mechanisms driving spatial and temporal variation in eelgrass (Zostera marina L.) growth and assemblage structure in Pacific Northwest estuaries, USA

    SciTech Connect (OSTI)

    Thom, Ronald M.; Southard, Susan L.; Borde, Amy B.

    2014-11-01

    Using laboratory experiments on temperature and leaf metabolism, and field data sets from Washington, between 1991 and 2013, we developed lines of evidence showing that variations in water temperature, mean sea level, and desiccation stress appear to drive spatial and temporal variations in eelgrass (Zostera marina).

  19. NUMERICAL MODELING OF THE DISRUPTION OF COMET D/1993 F2 SHOEMAKER-LEVY 9 REPRESENTING THE PROGENITOR BY A GRAVITATIONALLY BOUND ASSEMBLAGE OF RANDOMLY SHAPED POLYHEDRA

    SciTech Connect (OSTI)

    Movshovitz, Naor; Asphaug, Erik; Korycansky, Donald

    2012-11-10

    We advance the modeling of rubble-pile solid bodies by re-examining the tidal breakup of comet Shoemaker-Levy 9, an event that occurred during a 1.33 R encounter with Jupiter in 1992 July. Tidal disruption of the comet nucleus led to a chain of sub-nuclei {approx}100-1000 m diameter; these went on to collide with the planet two years later. They were intensively studied prior to and during the collisions, making SL9 the best natural benchmark for physical models of small-body disruption. For the first time in the study of this event, we use numerical codes treating rubble piles as collections of polyhedra. This introduces forces of dilatation and friction, and inelastic response. As in our previous studies we conclude that the progenitor must have been a rubble pile, and we obtain approximately the same pre-breakup diameter ({approx}1.5 km) in our best fits to the data. We find that the inclusion of realistic fragment shapes leads to grain locking and dilatancy, so that even in the absence of friction or other dissipation we find that disruption is overall more difficult than in our spheres-based simulations. We constrain the comet's bulk density at {rho}{sub bulk} {approx} 300-400 kg m{sup -3}, half that of our spheres-based predictions and consistent with recent estimates derived from spacecraft observations.

  20. Laboratory Enrichment of Radioactive Assemblages and Estimation of Thorium and Uranium Radioactivity in Fractions Separated from Placer Sands in Southeast Bangladesh

    SciTech Connect (OSTI)

    Sasaki, Takayuki; Rajib, Mohammad; Akiyoshi, Masafumi; Kobayashi, Taishi; Takagi, Ikuji; Fujii, Toshiyuki; Zaman, Md. Mashrur

    2015-06-15

    The present study reports the likely first attempt of separating radioactive minerals for estimation of activity concentration in the beach placer sands of Bangladesh. Several sand samples from heavy mineral deposits located at the south-eastern coastal belt of Bangladesh were processed to physically upgrade their radioactivity concentrations using plant and laboratory equipment. Following some modified flow procedure, individual fractions were separated and investigated using gamma-ray spectrometry and powder-XRD analysis. The radioactivity measurements indicated contributions of the thorium and uranium radioactive series and of {sup 40}K. The maximum values of {sup 232}Th and {sup 238}U, estimated from the radioactivity of {sup 208}Tl and {sup 234}Th in secular equilibrium, were found to be 152,000 and 63,300 Bq/kg, respectively. The fraction of the moderately conductive part in electric separation contained thorium predominantly, while that of the non-conductive part was found to be uranium rich. The present arrangement of the pilot plant cascade and the fine tuning of setting parameters were found to be effective and economic separation process of the radioactive minerals from placer sands in Bangladesh. Probable radiological impacts and extraction potentiality of such radioactive materials are also discussed.

  1. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect (OSTI)

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  2. August 18, 2015 Webinar - Probabilistic Analysis of Inadvertent...

    Broader source: Energy.gov (indexed) [DOE]

    the International Atomic Energy Agency Human Intrusion in the Context of Disposal of ... Institutional Control and Inadvertent Human Intrusion for Radioactive Waste Disposal ...

  3. ER-12-1 completion report

    SciTech Connect (OSTI)

    Russell, C.E.; Gillespie, D.; Cole, J.C.; Drellack, S.L.

    1996-12-01

    The objective of drillhole ER-12-1 was to determine the hydrogeology of paleozoic carbonate rocks and of the Eleana Formation, a regional aquitard, in an area potentially downgradient from underground nuclear testing conducted in nearby Rainier Mesa. This objective was addressed through the drilling of well ER-12-1 at N886,640.26 E640,538.85 Nevada Central Coordinates. Drilling of the 1094 m (3588 ft) well began on July 19, 1991 and was completed on October 17, 1991. Drilling problems included hole deviation and hole instability that prevented the timely completion of this borehole. Drilling methods used include rotary tri-cone and rotary hammer drilling with conventional and reverse circulation using air/water, air/foam (Davis mix), and bentonite mud. Geologic cuttings and geophysical logs were obtained from the well. The rocks penetrated by the ER-12-1 drillhole are a complex assemblage of Silurian, Devonian, and Mississippian sedimentary rocks that are bounded by numerous faults that show substantial stratigraphic offset. The final 7.3 m (24 ft) of this hole penetrated an unusual intrusive rock of Cretaceous age. The geology of this borehole was substantially different from that expected, with the Tongue Wash Fault encountered at a much shallower depth, paleozoic rocks shuffled out of stratigraphic sequence, and the presence of an altered biotite-rich microporphyritic igneous rock at the bottom of the borehole. Conodont CAI analyses and rock pyrolysis analyses indicate that the carbonate rocks in ER-12-1, as well as the intervening sheets of Eleana siltstone, have been thermally overprinted following movement on the faults that separate them. The probable source of heat for this thermal disturbance is the microporphyritic intrusion encountered at the bottom of the hole, and its age establishes that the major fault activity must have occurred prior to 102.3+0.5 Ma (middle Cretaceous).

  4. Petrology and geochemistry of Alto Peak, a vapor-cored hydrothermal system, Leyte Province, Philippines

    SciTech Connect (OSTI)

    Reyes, A.G.; Giggenbach, W.F.; Saleras, J.R.M.; Salonga, N.D.; Vergara, M.C.

    1993-10-01

    Based on detailed petrological information on secondary mineral assemblages and the composition of fluids trapped in inclusions and discharged from five wells, the Alto Peak geothermal field was found to represent a combined vapor and liquid-dominated system. A central core or chimney, with a diameter of about 1 km, a height of some 3 km and occupied by a high gas vapor (1.1 to 5.6 molal CO{sub 2}), is surrounded by an envelope of intermediate salinity water (7,000 mg/kg Cl) with temperatures between 250 and 350 C. The transition from purely vapor-dominated to liquid-dominated zones takes place via two-phase zones occupied by fluid mixtures of highly variable compositions. Much of the lower temperature, mature neutral pH Cl water is likely to have formed during an earlier stage in the evolution of the system. High temperatures of > 300 C, and associated alteration, are limited to wells AP-1D and the lower parts of AP-2D and are ascribed to re-heating by recent magmatic intrusions. The isotopic composition of the well discharges suggests that they contain some 40 to 50% of magmatic water. Alto Peak is considered a typical example of hydrothermal systems associated with many dormant volcanoes.

  5. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... ; Liu, Li-Min, E-mail: limin.liu@csrc.ac.cn ; Liu, Hao ; Lau, Woon-Ming ; Chengdu Green Energy and Green Manufacturing Technology R and D Center, Chengdu, Sichuan 610207 ...

  6. Daofu Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Daofu Co., Ltd. Place: Ya'an, China Zip: 626400 Sector: Hydro Product: Sichuan-based small hydro project developer. References: Daofu Co., Ltd.1 This article is a stub. You...

  7. Mabian Yanfeng Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Province, China Zip: 614600 Sector: Hydro Product: Sichuan-based developer of a CDM small hydro plant. References: Mabian Yanfeng Power Co., Ltd.1 This article is a stub. You can...

  8. Pingwu County Guangyao Power Co Ltd | Open Energy Information

    Open Energy Info (EERE)

    Province, China Zip: 621550 Sector: Hydro Product: Sichuan-based developer of a small hydro plant. References: Pingwu County Guangyao Power Co., Ltd.1 This article is a stub....

  9. Kowloon Power Ltd | Open Energy Information

    Open Energy Info (EERE)

    Sichuan Province, China Sector: Hydro Product: China-based company which specializes in water-power and also has businesses in real estate, mining and smelting which through its...

  10. Working testing process

    SciTech Connect (OSTI)

    Sparkman, D.

    1997-11-01

    This report contains viewgraphs on the process of testing security and intrusion detection software.

  11. JPRS report -- Science technology, China: Energy, [January 28, 1992

    SciTech Connect (OSTI)

    1992-01-28

    This report contains translations/transcriptions of articles and/or broadcasts from China regarding energy. Topics include: rural power industry has record year; interview with head of Sichuan`s nuclear industry bureau; Shanghai to use world bank loan for power plant expansion; Fengman Hydropower Station second-phase construction completed; Ningxia`s coal industry continues to grow; Junggar oil, and gas exploitation taking shape.

  12. Solar heat collecting panel assembly and method for covering structures

    SciTech Connect (OSTI)

    Brown, D.P.; Jones, I.R.; Vurpillat, V.V.

    1984-06-19

    Panels are formed and mounted in an exterior structure covering assemblage exteriorly simulating a standard exterior structure covering panel assemblage while simultaneously providing a fluid flow network within the panel assemblage for solar heat collection while not substantially disturbing the standard panel assemblage simulation. Generally, the panels have a relatively thin, freely heat transferring exterior layer portion with directly underlying fluid flow channels interconnected between panels for the overall assemblage fluid flow network without substantially disturbing the exterior standard panel simulation. The panels may be formed to simulate any standard roofing or siding panels and the solar heat collecting assemblage may be integrated with adjacent panel assemblages not including the solar heat collecting features with the overall assemblage still maintaining the same standard panel simulation.

  13. Layered rocks beneath the Phanerozoic platform of the US midcontinent

    SciTech Connect (OSTI)

    Hauser, E.C. (Cornell Univ., Ithaca, NY (United States))

    1991-03-01

    A thick sequence of layered rocks lies hidden beneath the Phanerozoic cover of the central US over large regions. A thick sequence of Precambrian layered rocks in imaged on the COCORP transect across southern Illinois and Indiana. The thickness of this layered sequence varies from 1-3 times the thickness of the overlying Phanerozoic section of the Illinois basin. The layered sequence is observed for close to 200 km in an east-west direction. Similar layered reflections are seen on the COCORP data from Hardeman Co., TX, and neighboring southwest Oklahoma. Both of these known occurrences lie within the region of the middle Proterozoic Granite/Rhyolite province of the US midcontinent, an area within which scattered wells to basement commonly encounter 1.3-1.5 Ga undeformed granite and/or compositionally similar rhyolite. Therefore, these layered assemblages may comprise a thick sequence of silicic volcanic and sedimentary rocks (perhaps also injected by mafic sills) between scattered volcanic-intrusive centers, such as exposed in the St. Francois Mountains of southeast Missouri. However, in places such as Illinois and Indiana, the near absence of deep wells leaves the possibility that the upper portion of these layered rocks may locally be of late Proterozoic or earliest Paleozoic age. The reprocessing of available industry data, analyzed in conjunction with the existing COCORP data, includes extended vibroseis correlation. These industry data are invaluable in the author's effort to expand the known distribution of these layered rocks (e.g., into north-central Illinois) and to map their structures.

  14. Y-12_Front Cover_Summary_Feb2011.ai

    National Nuclear Security Administration (NNSA)

    ... National Laboratory ORR Oak Ridge Reservation PC Performance Category PCB polychlorinated biphenyls PEIS Programmatic Environmental Impact Statement PIDAS Perimeter Intrusion ...

  15. Rehabilitation program eyed for big gas field in China

    SciTech Connect (OSTI)

    Not Available

    1992-06-01

    CER Corp., Las Vegas, has recommended a rehabilitation program it believes could boost deliverability by 20% in a major gas field in China. This paper reports that the recommendations resulted from a 4 year, multimillion dollar study of Weiyuan field in Central China's Sichuan province. Sichuan province is China's major gas producing province, with current flow of about 671 MMcfd and potential recovery pegged at 280 tcf. China's government recently announced a shift in its exploration and development emphasis to natural gas (OGJ, Jan. 6, p. 30). Funded by World Bank, CER's study found that a workover program, infill drilling, and wellbore dewatering program could significantly increase reserves.

  16. China develops natural gas industry

    SciTech Connect (OSTI)

    An, Z.

    1982-09-06

    As of 1981, China was producing some 474.4 billion CF (12.74 billion m/sup 3/)/yr of natural gas from over 60 gas fields, 40 of them in Sichuan Province. The Sichuan gas lies in fractures and solution cavities in limestone and dolomite formations that generally require stimulation. After desulfurization, the gas is used by the steel and chemical industries and for residential heating. Recent discoveries in other areas of China include the Guxinzhuang field in the Bohai-North China basin, where geological conditions favor large gas pools, and the Sebei fields in Qaidam basin, northwest China.

  17. Petroleum geology of principal sedimentary basins in eastern China

    SciTech Connect (OSTI)

    Lee, K.Y.

    1986-05-01

    The principal petroliferous basins in eastern China are the Songliao, Ordos, and Sichuan basins of Mesozoic age, and the North China, Jianghan, Nanxiang, and Subei basins of Cenozoic age. These basins contain mostly continental fluvial and lacustrine detrital sediments. Four different geologic ages are responsible for the oil and gas in this region: (1) Mesozoic in the Songliao, Ordos, and Sichuan basins; (2) Tertiary in the North China, Jianghan, Nanxiang, and Subei basins; (3) Permian-Carboniferous in the southern North China basin and the northwestern Ordos basin; and (4) Sinian in the southern Sichuan basin. The most prolific oil and gas sources are the Mesozoic of the Songliao basin and the Tertiary of the North China basin. Although the major source rocks in these basins are lacustrine mudstone and shale, their tectonic settings and the resultant temperature gradients differ. For example, in the Songliao, North China, and associated basins, trapping conditions commonly are associated with block faulting of an extensional tectonic regime; the extensional tectonics in turn contribute to a high geothermal gradient (40/sup 0/-60/sup 0/C/km), which results in early maturation and migration for relatively shallow deposits. However, the Ordos and Sichuan basins formed under compressional conditions and are cooler. Hence, maturation and migration occurred late, relative to reservoir deposition and burial, the result being a poorer quality reservoir.

  18. A Statistics-Based Method For The Short-Wave Infrared Spectral...

    Open Energy Info (EERE)

    that deduces assemblages of SWIR active minerals. The effectiveness of this methodology is illustrated with a study of the Acoculco Caldera, which is a geothermal...

  19. Petrography Analysis | Open Energy Information

    Open Energy Info (EERE)

    (SEM) to characterize the fracture surfaces from microstructures, doing X-ray diffraction (XRD) to identify exact mineral assemblages of a rock, or some other useful...

  20. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... assemblage (X-ray diffraction and elemental analysis), and microstructure (scanning electron microscopy). less October 2013 , Elsevier Prev Select page number Go to page: 1 ...

  1. Chemical and isotopic characteristics of fluids within the Baca...

    Open Energy Info (EERE)

    by conductive reheating during downward movement. Chemical modeling using the EQ3NR computer code indicates chemical stability with the mineral assemblage quartz, albite, K-mica,...

  2. A Holistic Framework for Environmental Flows Determination in...

    Broader source: Energy.gov (indexed) [DOE]

    ... means to apply a multi-regional hydrologic classification to entire fish assemblages. ... to changes in flow may be highly dependent upon channel morphology and underlying geology. ...

  3. Core Analysis At Lake City Hot Springs Area (Benoit Et Al., 2005...

    Open Energy Info (EERE)

    Rock core analyses and mineral assemblage investigations References Dick Benoit, Joe Moore, Colin Goranson, David Blackwell (2005) Core Hole Drilling And Testing At The Lake...

  4. Alteration Patterns In Volcanic Rocks Within An East-West Traverse...

    Open Energy Info (EERE)

    probably exceeded 100Ckm. There are also (iii) local alteration aureoles around gold-bearing quartz veins. The regional alteration assemblages include minerals that, under...

  5. SREL Reprint #3306

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    College, Davidson, NC 28035 Abstract: Despite the functional importance of isolated wetlands as supporters and sources of diverse assemblages of amphibians and reptiles, they...

  6. Cascades Geothermal Region | Open Energy Information

    Open Energy Info (EERE)

    years) thick mafic lava flows, primarily of andesitic composition are associated with ash flows, tuffs, and silicic intrusive bodies and stocks that decrease in age eastward to...

  7. Moeck-Beardsmore Play Types | Open Energy Information

    Open Energy Info (EERE)

    Magmatic-hydrothermal Circulation --- Extensive Low Permeability Clay-rich Layers Java CV-1b: Intrusive Magmatic Arcs, Mid Oceanic Ridges, Hot Spots Active Volcanism, Shallow...

  8. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan Report of ...

  9. in High Performance Computing Computer System, Cluster, and Networking...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    iSSH v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin,...

  10. Direct-Current Resistivity Survey At Kawaihae Area (Thomas, 1986...

    Open Energy Info (EERE)

    of Puu Loa, was tentatively interpreted to indicate the presence of a dense intrusive body associated with the Puu Loa cinder cone (Kauahikaua and Mattice, 1981). References...

  11. Microsoft PowerPoint - 2010-04-26-Salishan-Cyber-Fisk-Short

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or more of the following observable acts: * Penetration (Intrusion, Explitation) * Remote command & control Remote command & control * Exfiltration of data * Denial of availability...

  12. Magnetic Modeling Of The Phlegraean Volcanic District With Extension...

    Open Energy Info (EERE)

    structures associated with CFc and Ischia, Procida-Vivara, Ventotene and Santo Stefano islands, have been interpreted as igneous bodies that may be solidified intrusions or...

  13. 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A panel representing some of Los - 2 - Alamos' industry partners, including Alion Science ... The minimally intrusive assessment method will increase confidence and reduce accidents ...

  14. Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the corresponding structural response is measured by the same excitation source. These sensoractuators are inexpensive, generally require low power, and are non-intrusive....

  15. Microsoft Word - NRAP_TRS_III_Mobilization_and_Transport_of_Organic...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... titanium sleeve as well as a pressure transducer were installed to closely monitor the ... CO2 intrusion into freshwater aquifers: Current requirements, approaches and limitations ...

  16. Direct-Current Resistivity At Kawaihae Area (Thomas, 1986) |...

    Open Energy Info (EERE)

    to indicate the presence of a dense intrusive body associated with the Puu Loa cinder cone (Kauahikaua and Mattice, 1981). References Donald M. Thomas (1 January 1986)...

  17. Summary of New DOE-STD-1020-2011 NPH Analysis and Design Criteria...

    Office of Environmental Management (EM)

    of SSC failure are to be considered; two primary modes considered are: deformation (or stress) related, and water intrusion related. * Consideration of common-cause failures and...

  18. Airborne Electromagnetic Survey | Open Energy Information

    Open Energy Info (EERE)

    content StratigraphicStructural: Hydrological: can be used to detect changes in density of fluids and indicate if there is salt water intrusion Thermal: Cost Information...

  19. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... States) Office of Economic Impact and Diversity Office of Environmental Management-Consolidated ... Non-Intrusive Load Monitoring Assessment: Literature Review and ...

  20. When one picture is worth a thousand algorithms; Covert smart sensors provide early warning edge

    SciTech Connect (OSTI)

    Anderson, D.C. )

    1991-01-01

    An early intrusion detection and video assessment, well in advance of a perimeter penetration, give personnel critical information and extra time to effectively respond to varied threats. Concealing small numbers of video verified portable intrusion sensor/transmitters observing critical remote assets and distance approaches to facilities immediately gives advanced warning of threats without traditional false alarm problems. By adding image assessment, reliable intrusion detection in environmentally sensitive areas, during temporary construction, along waterfronts, where wildlife are present, and in very remote areas in now practical with portable intrusion sensors. The paper discusses how to effectively integrate radio transmission, sensing, and video into low power systems for early verified detection in nuclear facilities.

  1. Microsoft Word - DOE-ID-INL-15-062.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The inactive Truck Loading station is a significant source for water intrusion. Removal of ... safety and environmental improvements" DOE-ID NEPA CX DETERMINATION Idaho National ...

  2. February | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    ... String searching is at the core of many security and network applications such as search engines, intrusion detection systems, virus scanners and spam filters. PNNL researchers are ...

  3. Search for: All records | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    ... With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacksvirusworms, existing network intrusion ...

  4. Gas-path leakage seal for a gas turbine

    DOE Patents [OSTI]

    Wolfe, Christopher E.; Dinc, Osman S.; Bagepalli, Bharat S.; Correia, Victor H.; Aksit, Mahmut F.

    1996-01-01

    A gas-path leakage seal for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a gas turbine (such as combustor casing segments). The seal includes a generally imperforate foil-layer assemblage which is generally impervious to gas and is located in the leakage-gap. The seal also includes a cloth-layer assemblage generally enclosingly contacting the foil-layer assemblage. In one seal, the first edge of the foil-layer assemblage is left exposed, and the foil-layer assemblage resiliently contacts the first member near the first edge to reduce leakage in the "plane" of the cloth-layer assemblage under conditions which include differential thermal growth of the two members. In another seal, such leakage is reduced by having a first weld-bead which permeates the cloth-layer assemblage, is attached to the metal-foil-layer assemblage near the first edge, and unattachedly contacts the first member.

  5. Gas-path leakage seal for a gas turbine

    DOE Patents [OSTI]

    Wolfe, C.E.; Dinc, O.S.; Bagepalli, B.S.; Correia, V.H.; Aksit, M.F.

    1996-04-23

    A gas-path leakage seal is described for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a gas turbine (such as combustor casing segments). The seal includes a generally imperforate foil-layer assemblage which is generally impervious to gas and is located in the leakage-gap. The seal also includes a cloth-layer assemblage generally enclosingly contacting the foil-layer assemblage. In one seal, the first edge of the foil-layer assemblage is left exposed, and the foil-layer assemblage resiliently contacts the first member near the first edge to reduce leakage in the ``plane`` of the cloth-layer assemblage under conditions which include differential thermal growth of the two members. In another seal, such leakage is reduced by having a first weld-bead which permeates the cloth-layer assemblage, is attached to the metal-foil-layer assemblage near the first edge, and unattachedly contacts the first member. 4 figs.

  6. China develops natural gas industry

    SciTech Connect (OSTI)

    Not Available

    1982-01-01

    As of 1981, more than 60 natural gas fields with a total annual output of 12.74 billion cu m have been discovered in China, placing the country among the top 12 gas producers in the world. In addition, there are prospects for natural gas in the Bohai-North China Basin and the Qaidam Basin, NW. China, providing a base for further expansion of the gas industry. Gas reservoirs have been found in 9 different geologic ages: Sinian, Cambrian, Ordovician, Carboniferous, Permian, Triassic, Jurassic, Tertiary, and Quaternary. Of the 60 gas field now being exploited, there are more than 40 fields in Sichuan. The Sichuan Basin gas industry is described in detail.

  7. Application of water-base mud in deep well drilling

    SciTech Connect (OSTI)

    Li, Y.; Qian, F.; Lo, P.

    1982-01-01

    This paper reports the results of laboratory research and field practice on the application of temperature resistant water-base muds for deep drilling in Sichuan Province, China. The major problems discussed include mud stability; adjustment and control of mud properties under high temperatures and pressures; the effect of pH on the properties of mud systems. Some means of solving these and other problems involved in deep well drilling are proposed.

  8. Coefficient indicates if rod pump can unload water from gas well

    SciTech Connect (OSTI)

    Hu Yongquan; Wu Zhijun

    1995-09-11

    A sucker rod pump can efficiently dewater gas wells if the separation coefficient is sufficiently high. To determine this separation coefficient, it is not sufficient to only know if the system meets the criteria of rod string stress, horsehead load, and crankshaft torque. This paper reviews water production and gas locking problems at the Sichuan gas field and identifies the methodologies used to optimize the pumping efficiency of the area wells.

  9. JPRS report -- Science technology, China: Energy, [December 3, 1992

    SciTech Connect (OSTI)

    1992-12-03

    This report contains translations/transcriptions of articles and/or broadcasts from China on energy. Topics include: Tokyo, Beijing to start environment-friendly coal study; work speeded up to electrify counties; Yunnan grid facing serious power shortage; Asia`s largest plant planned for Sichuan; types of natural gas found in East China Sea; and vice president of China National Nuclear Corporation comments on expansion of nuclear industry.

  10. Gas-path leakage seal for a turbine

    DOE Patents [OSTI]

    Bagepalli, B.S.; Aksit, M.F.; Farrell, T.R.

    1999-08-10

    A gas-path leakage seal for generally sealing a gas-path leakage-gap between spaced-apart first and second members of a turbine (such as combustor casing segments of a gas turbine). The seal includes a flexible and generally imperforate metal sheet assemblage having opposing first and second surfaces and two opposing raised edges extending a generally identical distance above and below the surfaces. A first cloth layer assemblage has a thickness generally equal to the previously-defined identical distance and is superimposed on the first surface between the raised edges. A second cloth layer assemblage is generally identical to the first cloth layer assemblage and is superimposed on the second surface between the raised edges. 5 figs.

  11. Sophia Support Version 12

    SciTech Connect (OSTI)

    2012-08-09

    Sophia Support Version 12 is the assemblage of scripts and files that turn the Sophia tool suite source code into the Sophia Debian installation package that is used by Ubuntu 10.04 LTS.

  12. Monitoring Fine Sediment; Grande Ronde and John Day Rivers, 1999 Annual Report.

    SciTech Connect (OSTI)

    Rhodes, Jonathan J.; Greene, M. Jonas; Purser, Michael D.

    2000-01-01

    This project was initiated to monitor surface fine sediment levels and overwinter intrusion of fine sediment in spring chinook salmon spawning habitat in the North Folk John Day and Grande Ronde Rivers, for five years.

  13. Field Mapping At Marysville Mt Area (Blackwell) | Open Energy...

    Open Energy Info (EERE)

    intrusive (outlined by the magnetic data) and the heat flow anomaly occupy a broad dome in the Precambrian rocks, the stock outcropping in the northwest portion of the dome,...

  14. Smart Grid Solutions That Pay You

    SciTech Connect (OSTI)

    Dizy, Ron

    2011-10-26

    Describes technologies for mature demand-side asset market. Bi-directional DR; less intrusive to customers; challenges: regulatory, ISO and utility focus, engagement of loads, and effective pilots.

  15. maybell.cdr

    Office of Legacy Management (LM)

    ... This final rock layer protects the cell against wind and water erosion and discourages cell intrusion. Maximum cell surface grades are 3 percent on the top slope and 20 percent on ...

  16. CX-009096: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    U.S. Customs and Border Protection Non-Intrusive Inspection Tests CX(s) Applied: B3.10, B3.11 Date: 05/18/2012 Location(s): Washington Offices(s): Pacific Northwest Site Office

  17. Aeromagnetic Survey At Hualalai Northwest Rift Area (Thomas,...

    Open Energy Info (EERE)

    rift zone. It is extremely unlikely that the summit region is underlain by intrusive material old enough (greater than 700,000 years of age) to have been emplaced during a period...

  18. Conceptual Model At Coso Geothermal Area (2005) | Open Energy...

    Open Energy Info (EERE)

    accompanied by shallow igneous intrusions. References F.C. Monastero, A.M. Katzenstein, J.S. Miller, J.R. Unruh, M.C. Adams, Keith Richards-Dinger, F.C. Monastero; Katzenstein,...

  19. Sandia National Laboratories is a multi-program laboratory managed...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The 100-year averaged rate of drilling in the Permian Basin is used in the formula prescribed by regulation to estimate borehole intrusion frequencies into the future. Figure 1 ...

  20. Hydrologic filtering of fish life history strategies across the United States: implications for stream flow alteration

    SciTech Connect (OSTI)

    McManamay, Ryan A.; Frimpong, Emmanuel A.

    2015-01-01

    Lotic fish have developed life history strategies adapted to the natural variation in stream flow regimes. The natural timing, duration, and magnitude of flow events has contributed to the diversity, production, and composition of fish assemblages over time. Studies evaluating the role of hydrology in structuring fish assemblages have been more common at the local or regional scale with very few studies conducted at the continental scale. Furthermore, quantitative linkages between natural hydrologic patterns and fish assemblages are rarely used to make predictions of ecological consequences of hydrologic alterations. We ask two questions: (1) what is the relative role of hydrology in structuring fish assemblages at large scales? and (2) can relationships between fish assemblages and natural hydrology be utilized to predict fish assemblage responses to hydrologic disturbance? We developed models to relate fish life histories and reproductive strategies to landscape and hydrologic variables separately and then combined. Models were then used to predict the ecological consequences of altered hydrology due to dam regulation. Although hydrology plays a considerable role in structuring fish assemblages, the performance of models using only hydrologic variables was lower than that of models constructed using landscape variables. Isolating the relative importance of hydrology in structuring fish assemblages at the continental scale is difficult since hydrology is interrelated to many landscape factors. By applying models to dam-regulated hydrologic data, we observed some consistent predicted responses in fish life history strategies and modes of reproduction. In agreement with existing literature, equilibrium strategists are predicted to increase following dam regulation, whereas opportunistic and periodic species are predicted to decrease. In addition, dam regulation favors the selection of reproductive strategies with extended spawning seasons and preference for stable

  1. Hydrologic filtering of fish life history strategies across the United States: implications for stream flow alteration

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    McManamay, Ryan A.; Frimpong, Emmanuel A.

    2015-01-01

    Lotic fish have developed life history strategies adapted to the natural variation in stream flow regimes. The natural timing, duration, and magnitude of flow events has contributed to the diversity, production, and composition of fish assemblages over time. Studies evaluating the role of hydrology in structuring fish assemblages have been more common at the local or regional scale with very few studies conducted at the continental scale. Furthermore, quantitative linkages between natural hydrologic patterns and fish assemblages are rarely used to make predictions of ecological consequences of hydrologic alterations. We ask two questions: (1) what is the relative role ofmore » hydrology in structuring fish assemblages at large scales? and (2) can relationships between fish assemblages and natural hydrology be utilized to predict fish assemblage responses to hydrologic disturbance? We developed models to relate fish life histories and reproductive strategies to landscape and hydrologic variables separately and then combined. Models were then used to predict the ecological consequences of altered hydrology due to dam regulation. Although hydrology plays a considerable role in structuring fish assemblages, the performance of models using only hydrologic variables was lower than that of models constructed using landscape variables. Isolating the relative importance of hydrology in structuring fish assemblages at the continental scale is difficult since hydrology is interrelated to many landscape factors. By applying models to dam-regulated hydrologic data, we observed some consistent predicted responses in fish life history strategies and modes of reproduction. In agreement with existing literature, equilibrium strategists are predicted to increase following dam regulation, whereas opportunistic and periodic species are predicted to decrease. In addition, dam regulation favors the selection of reproductive strategies with extended spawning seasons and preference for

  2. Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008 Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008 A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis. The two-year DATES project is a groundbreaking effort to develop the first integrated intrusion detection, security incident/event management (SIEM), and large-scale threat analysis capability for the energy

  3. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated Security System (1.49 MB) More Documents & Publications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Impacts of IPv6 on Infrastructure Control

  4. Regional Climate Effects of Aerosols Over China: Modeling and Observation

    SciTech Connect (OSTI)

    Qian, Yun; Leung, Lai R.; Ghan, Steven J.; Giorgi, Filippo

    2003-09-01

    We present regional simulations of aerosol properties, direct radiative forcing and aerosol climatic effects over China, and compare the simulations with observed aerosol characteristics and climatic data over the region. The climate simulations are performed with a regional climate model, which is shown to capture the spatial distribution and seasonal pattern of temperature and precipitation. Aerosol concentrations are obtained from a global tracer-transport model and are provided to the regional model for the calculation of radiative forcing. Different aerosols are included: sulfate, organic carbon, black carbon, mineral dust, and sea salt and MSA particles. Generally, the aerosol optical depth is well simulated in both magnitude and spatial distribution. The direct radiative forcing of the aerosol is in the range of –1 to –14 W m-2 in autumn and summer and -1 to –9 W m-2 in spring and winter, with substantial spatial variability at the regional scale. A strong maximum in aerosol optical depth and negative radiative forcing is found over the Sichuan Basin. The negative radiative forcing of aerosol induces a surface cooling in the range of –0.6 to –1.2oC in autumn and winter, –0.3 to –0.6oC in spring and 0.0 to –0.9oC in summer throughout East China. The aerosol-induced cooling is mainly due to a decrease in day-time maximum temperature. The cooling is maximum and is statistically significant over the Sichuan Basin. The effect of aerosol on precipitation is not evident in our simulations. The temporal and spatial patterns of the temperature trends observed in the second half of the twentieth century, including different trends for daily maximum and minimum temperature, are at least qualitatively consistent with the simulated aerosol-induced cooling over the Sichuan Basin and East China. This result supports the hypothesis that the observed temperature trends during the latter decades of the twentieth century, especially the cooling trends over the

  5. Atmospheric transport and outflow of polycyclic aromatic hydrocarbons from China

    SciTech Connect (OSTI)

    Chang Lang; Shu Tao; Wenxin Liu; Yanxu Zhang; Staci Simonich

    2008-07-15

    A potential receptor influence function (PRIF) model, based on air mass forward trajectory calculations, was applied to simulate the atmospheric transport and outflow of polycyclic aromatic hydrocarbons (PAHs) emitted from China. With a 10 day atmospheric transport time, most neighboring countries and regions, as well as remote regions, were influenced by PAH emissions from China. Of the total annual PAH emission of 114 Gg, 92.7% remained within the boundary of mainland China. The geographic distribution of PRIFs within China was similar to the geographic distribution of the source regions, with high values in the North China Plain, Sichuan Basin, Shanxi, and Guizhou province. The Tarim basin and Sichuan basin had unfavorable meteorological conditions for PAH outflow. Of the PAH outflow from China (8092 tons or 7.1% of the total annual PAH emission), approximately 69.9% (5655 tons) reached no further than the offshore environment of mainland China and the South China Sea. Approximate 227, 71, 746, and 131 tons PAHs reached North Korea, South Korea, Russia-Mongolia region, and Japan, respectively, 2-4 days after the emission. Only 1.4 tons PAHs reached North America after more than 9 days. Interannual variation in the eastward PAH outflow was positively correlated to cold episodes of El Nino/Southern Oscillation. However, trans-Pacific atmospheric transport of PAHs from China was correlated to Pacific North America index (PNA) which is associated with the strength and position of westerly winds. 38 refs., 4 figs.

  6. Development of RAMS-CMAQ to Simulate Aerosol Optical Depth and Aerosol Direct Radiative Forcing and Its Application to East Asia

    SciTech Connect (OSTI)

    Han, Xiao; Zhang, Meigen; Liu, Xiaohong; Ghan, Steven J.; Xin, Jin-Yuan; Wang, Li-Li

    2009-11-16

    The air quality modeling system RAMS (Regional Atmospheric Modeling System)-CMAQ (Models-3 Community Multi-scale Air Quality) is developed to simulate the aerosol optical depth (AOD) and aerosol direct forcing (DF). The aerosol-specific extinction, single scattering albedo, and asymmetry factor are parameterized based on Mie theory taking into account the aerosol size distribution, composition, refractive index, and water uptake of solution particles. A two-stream solar radiative model considers all gaseous molecular absorption, Rayleigh scattering, and aerosols and clouds. RAMSCMAQ is applied to simulate all major aerosol concentrations (e.g., sulfate, nitrate, ammonium, organic carbon, black carbon, fine soil, and sea salt) and AOD and DF over East Asia in 2005. To evaluate its performance, the simulated AOD values were compared with ground-based in situ measurements. The comparison shows that RAMSCMAQ performed well in most of the model domain and generally captured the observed variations. High AOD values (0.2−1.0) mainly appear in the Sichuan Basin as well as in central and southeastern China. The geographic distribution of DF generally follows the AOD distribution patterns, and the DF at the top-of-the-atmosphere is less than −25 and −20 W m−2 in clear-sky and all-sky over the Sichuan Basin. Both AOD and DF exhibit seasonal variations with lower values in July and higher ones in January. The DF could obviously be impacted by high cloud fractions.

  7. Substantial Contribution of Anthropogenic Air Pollution to Catastrophic Floods in Southwest China

    SciTech Connect (OSTI)

    Fan, Jiwen; Rosenfeld, Daniel; Yang, Yan; Zhao, Chun; Leung, Lai-Yung R.; Li, Zhanqing

    2015-07-20

    Extreme events such as heat waves, floods, and droughts, have become more frequent since the 1950s1-2. This is likely caused through changes in greenhouse gases and aerosols that perturb the radiative balance and alter cloud processes3-8. On 8-9 July, 2013 a catastrophic flood devastated several metropolitan areas at the foothills of the Sichuan Basin. Using a high-resolution coupled atmosphere-chemistry model, we show that this disaster was not entirely natural. Ensemble simulations robustly show that the severe anthropogenic pollution in the Sichuan Basin significantly enhanced rainfall intensity over the mountainous area northwest of the basin. The heavy air pollution (mainly black carbon) absorbs solar radiation in the lower atmosphere at the expense of surface cooling, which stabilizes the atmosphere and suppresses convection and precipitation over the basin. The enhanced moisture and moist static energy over the basin are then transported by the prevailing winds towards the mountains during daytime. As the excessive moist air that reaches the foothills at night is orographically lifted, very strong convection develops and produces extremely heavy precipitation. Reducing black carbon (BC) emissions in the basin can effectively mitigate the extreme precipitation in the mountains. Unfortunately, BC emissions have been increasing in many developing countries including China9, making them more vulnerable to enhanced disasters as reported here.

  8. Dike/Drift Interactions

    SciTech Connect (OSTI)

    E. Gaffiney

    2004-11-23

    This report presents and documents the model components and analyses that represent potential processes associated with propagation of a magma-filled crack (dike) migrating upward toward the surface, intersection of the dike with repository drifts, flow of magma in the drifts, and post-magma emplacement effects on repository performance. The processes that describe upward migration of a dike and magma flow down the drift are referred to as the dike intrusion submodel. The post-magma emplacement processes are referred to as the post-intrusion submodel. Collectively, these submodels are referred to as a conceptual model for dike/drift interaction. The model components and analyses of the dike/drift interaction conceptual model provide the technical basis for assessing the potential impacts of an igneous intrusion on repository performance, including those features, events, and processes (FEPs) related to dike/drift interaction (Section 6.1).

  9. Security barriers with automated reconnaissance

    DOE Patents [OSTI]

    McLaughlin, James O; Baird, Adam D; Tullis, Barclay J; Nolte, Roger Allen

    2015-04-07

    An intrusion delaying barrier includes primary and secondary physical structures and can be instrumented with multiple sensors incorporated into an electronic monitoring and alarm system. Such an instrumented intrusion delaying barrier may be used as a perimeter intrusion defense and assessment system (PIDAS). Problems with not providing effective delay to breaches by intentional intruders and/or terrorists who would otherwise evade detection are solved by attaching the secondary structures to the primary structure, and attaching at least some of the sensors to the secondary structures. By having multiple sensors of various types physically interconnected serves to enable sensors on different parts of the overall structure to respond to common disturbances and thereby provide effective corroboration that a disturbance is not merely a nuisance or false alarm. Use of a machine learning network such as a neural network exploits such corroboration.

  10. Robotic guarded motion system and method

    DOE Patents [OSTI]

    Bruemmer, David J.

    2010-02-23

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for repeating, on each iteration through an event timing loop, the acts of defining an event horizon, detecting a range to obstacles around the robot, and testing for an event horizon intrusion. Defining the event horizon includes determining a distance from the robot that is proportional to a current velocity of the robot and testing for the event horizon intrusion includes determining if any range to the obstacles is within the event horizon. Finally, on each iteration through the event timing loop, the method includes reducing the current velocity of the robot in proportion to a loop period of the event timing loop if the event horizon intrusion occurs.