Powered by Deep Web Technologies
Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-558: Oracle Java SE and Java for Business Critical Patch Update...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011...

2

T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Java SE and Java for Business Critical Patch Update 8: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 T-558: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011 February 16, 2011 - 7:00am Addthis PROBLEM: Oracle Java SE and Java for Business Critical Patch Update Advisory - February 2011. PLATFORM: JDK and JRE 6 Update 23 and earlier for Windows, Solaris, and Linux JDK 5.0 Update 27 and earlier for Solaris 9 SDK 1.4.2_29 and earlier for Solaris 8 JDK and JRE 6 Update 23 and earlier for Windows, Solaris and Linux JDK and JRE 5.0 Update 27 and earlier for Windows, Solaris and Linux SDK and JRE 1.4.2_29 and earlier for Windows, Solaris and Linux ABSTRACT: This Critical Patch Update contains 21 new security fixes for Oracle Java SE and Java for Business. 19 of these vulnerabilities may be remotely

3

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2011 1: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

4

T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Oracle Java SE Critical Patch Update Advisory - June 2011 41: Oracle Java SE Critical Patch Update Advisory - June 2011 T-641: Oracle Java SE Critical Patch Update Advisory - June 2011 June 8, 2011 - 12:26pm Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2011 PLATFORM: JDK and JRE 6 Update 25 and earlier, Java SE, JDK 5.0 Update 29 and earlier Java SE, SDK 1.4.2_31 and earlier ABSTRACT: This Critical Patch Update contains 17 new security fixes for Oracle Java SE - 5 apply to client and server deployments of Java SE, 11 apply to client deployments of Java SE only, and 1 applies to server deployments of Java SE only. All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. Oracle CVSS scores assume that a user running a Java applet or Java Web

5

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05:Oracle Java SE Critical Patch Update Advisory 05:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

6

U-105:Oracle Java SE Critical Patch Update Advisory | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5:Oracle Java SE Critical Patch Update Advisory 5:Oracle Java SE Critical Patch Update Advisory U-105:Oracle Java SE Critical Patch Update Advisory February 16, 2012 - 11:45am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory PLATFORM: 1.4.2_35 and prior, 5.0 Update 33 and prior; 6 Update 30 and prior; 7 Update 2 and prior ABSTRACT: Multiple vulnerabilities were reported in Oracle Java SE. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. reference LINKS: Oracle Java SE Critical Patch Critical Patch Security Alerts SecurityTracker Alert ID: 1026688 Secunia Advisory: SA48009 Red Hat advisory IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted data to execute arbitrary code on the target system or cause complete denial of service conditions. The Java

7

V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Java SE Critical Patch Update Advisory - June 2013 1: Oracle Java SE Critical Patch Update Advisory - June 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 June 19, 2013 - 1:06am Addthis PROBLEM: Oracle Java SE Critical Patch Update Advisory - June 2013 PLATFORM: Version(s): 5.0 Update 45, 6 Update 45, 7 Update 21; and prior versions ABSTRACT: Multiple vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Oracle Java SE Critical Patch Update June 2013 SecurityTracker Alert ID: 1028679 CVE-2013-1500, CVE-2013-1571 CVE-2013-2400, CVE-2013-2407 CVE-2013-2412, CVE-2013-2437 CVE-2013-2442, CVE-2013-2443 CVE-2013-2444, CVE-2013-2445 CVE-2013-2446, CVE-2013-2447 CVE-2013-2448, CVE-2013-2449 CVE-2013-2450, CVE-2013-2451 CVE-2013-2452, CVE-2013-2453 CVE-2013-2454, CVE-2013-2455 CVE-2013-2456, CVE-2013-2457

8

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

9

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

10

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

11

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

12

Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME  

Science Conference Proceedings (OSTI)

In their analysis of the use of Java as a first teaching language, the ACM Java Task Force (JTF) identified a number of issues with the Java language and APIs which caused significant pedagogic problems. The focus of their work, and hence of their characterisation ... Keywords: introductory programming, programming languages

Ian Utting

2006-06-01T23:59:59.000Z

13

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

14

Java XMGR  

SciTech Connect

The XMGR5 graphing package [1] for drawing RELAP5 [2] plots is being re-written in Java [3]. Java is a robust programming language that is available at no cost for most computer platforms from Sun Microsystems, Inc. XMGR5 is an extension of an XY plotting tool called ACE/gr extended to plot data from several US Nuclear Regulatory Commission (NRC) applications. It is also the most popular graphing package worldwide for making RELAP5 plots. In Section 1, a short review of XMGR5 is given, followed by a brief overview of Java. In Section 2, shortcomings of both tkXMGR [4] and XMGR5 are discussed and the value of converting to Java is given. Details of the conversion to Java are given in Section 3. The progress to date, some conclusions and future work are given in Section 4. Some screen shots of the Java version are shown.

Dr. George L. Mesina; Steven P. Miller

2004-08-01T23:59:59.000Z

15

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

16

Java fundamentals i and ii (video training), First edition  

Science Conference Proceedings (OSTI)

Java Fundamentals I and II will show you everything you need to know to start building robust, powerful software with Java SE. This collection provides $2,000 (USD) worth of expert Java training! Your instructor, Paul Deitel, has personally taught Java ...

Paul J. Deitel

2008-02-01T23:59:59.000Z

17

Specification and Runtime Verification of Java Card Programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: Compiler, JCML, JML, Java Card, Runtime Verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2009-07-01T23:59:59.000Z

18

The Java memory model  

Science Conference Proceedings (OSTI)

This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations ... Keywords: Java, concurrency, memory model, multithreading

Jeremy Manson; William Pugh; Sarita V. Adve

2005-01-01T23:59:59.000Z

19

Formal Development of Safe and Secure Java Card Applets  

E-Print Network (OSTI)

This thesis is concerned with different aspects of JAVA CARD application development and use of formal methods in the JAVA CARD world. JAVA CARD is a technology that provides means to program smart (chip) cards with (a subset of) the JAVA language. The use of formal methods in the JAVA CARD context is highly justified due to the criticality of JAVA CARD applications. First of all, JAVA CARD applications are usually security critical (e.g., authentication, electronic cash), second, they are cost critical (i.e. they are distributed in large amounts making updates quite difficult) and finally, they can also be legally critical (e.g., when the digital signature law is considered). Thus the robustness and correctness of JAVA CARD applications should be enforced by the best means possible, i.e. by the use of formal verification techniques. At the same time JAVA CARD seems to be a good target for formal verification—due to the relative simplicity of JAVA CARD applications (as compared to full JAVA), formal verification becomes a feasible and manageable task. In this thesis, we touch upon different

Wojciech Mostowski; Wojciech Mostowski; C Wojciech Mostowski

2005-01-01T23:59:59.000Z

20

Java and Numerical Computing  

Science Conference Proceedings (OSTI)

Java represents both a challenge and an opportunity to practitioners of numerical computing. This article analyzes the current state of Java in numerical computing and identifies some directions for the realization of its full potential.

Ronald F. Boisvert; José Moreira; Michael Philippsen; Roldan Pozo

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Java Numerics: Main  

Science Conference Proceedings (OSTI)

... Workshop onJava in High Performance Computing at HPCN Eurpe 2001 Conference, Amsterdam, The Netherlands (June 25 - 27, 2001); ...

2012-11-20T23:59:59.000Z

22

Diffusion Java Applets - TMS  

Science Conference Proceedings (OSTI)

Mar 8, 2007 ... Citation: Glicksman, M.E. and Lupulescu, A. "Java Applets and Additional Presentations." Department of Materials Science and Engineering.

23

JCML: A specification language for the runtime verification of Java Card programs  

Science Conference Proceedings (OSTI)

Java Card is a version of Java developed to run on devices with severe storage and processing restrictions. The applets that run on these devices are frequently intended for use in critical, highly distributed, mobile conditions. They are required to ... Keywords: JCML, JML, Java Card, Runtime verification

Umberto Souza da Costa; Anamaria Martins Moreira; Martin A. Musicante; Plácido A. Souza Neto

2012-04-01T23:59:59.000Z

24

V-143: Fresh Java issues being exploited in the wild | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Fresh Java issues being exploited in the wild 3: Fresh Java issues being exploited in the wild V-143: Fresh Java issues being exploited in the wild April 26, 2013 - 6:00am Addthis PROBLEM: A new Metasploit module for the Java 7u17 sandbox bypass emerged PLATFORM: All versions of Java SE-7 (including the recently released 1.7.0_21-b11) ABSTRACT: Java issues are being exploited in the wild by exploit kits, with Cool and Redkit specifically being known to use these bugs, and others likely to follow shortly. REFERENCE LINKS: SecList SE-2012-01 Security Explorations IMPACT ASSESSMENT: Medium DISCUSSION: It can be used to achieve a complete Java security sandbox bypass on a target system. IMPACT: Manipulation of data System access SOLUTION: Vendor recommends patch systems immediately Addthis Related Articles V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

25

The ENSDF Java Package  

Science Conference Proceedings (OSTI)

A package of computer codes has been developed to process and display nuclear structure and decay data stored in the ENSDF (Evaluated Nuclear Structure Data File) library. The codes were written in an object-oriented fashion using the java language. This allows for an easy implementation across multiple platforms as well as deployment on web pages. The structure of the different java classes that make up the package is discussed as well as several different implementations.

Sonzogni, A.A. [National Nuclear Data Center, Brookhaven National Laboratory, Upton, NY 11973-5000 (United States)

2005-05-24T23:59:59.000Z

26

Specifying java iterators with JML and Esc/Java2  

Science Conference Proceedings (OSTI)

The 2006 SAVCBS Workshop has posed a Challenge Problem on the topic of specifying iterators. This note provides a specification in the Java Modeling Language (JML) [1, 2] for the Java interfaces Iterator and Iterable that captures the interactions ... Keywords: ESC/Java2, JML, specification, static analysis, verification

David R. Cok

2006-11-01T23:59:59.000Z

27

JAVA SCRIPT IS DISABLED  

Office of Scientific and Technical Information (OSTI)

This application needs JavaScript to work correctly but your browser does not have it enabled. How do I enable JavaScript??? - follow the instructions below... If your browser is not listed, please contact your system administrator. Internet Explorer (6.0) Select 'Tools' from the top menu Choose 'Internet Options' Click on the 'Security' tab Click on 'Custom Level' Scroll down until you see section labled 'Scripting' Under 'Active Scripting', select 'Enable' and click OK Internet Explorer (7.0) Select Tools > Internet Options. Click on the Security tab. Click the Custom Level button. Scroll down to the Scripting section. Select Enable for Active Scripting and Scripting of Java Applets. Click OK. Select YES if a box appears to confirm. Click OK. Close window.

28

Java Metadata Facility  

SciTech Connect

The Java Metadata Facility is introduced by Java Specification Request (JSR) 175 [1], and incorporated into the Java language specification [2] in version 1.5 of the language. The specification allows annotations on Java program elements: classes, interfaces, methods, and fields. Annotations give programmers a uniform way to add metadata to program elements that can be used by code checkers, code generators, or other compile-time or runtime components. Annotations are defined by annotation types. These are defined the same way as interfaces, but with the symbol {at} preceding the interface keyword. There are additional restrictions on defining annotation types: (1) They cannot be generic; (2) They cannot extend other annotation types or interfaces; (3) Methods cannot have any parameters; (4) Methods cannot have type parameters; (5) Methods cannot throw exceptions; and (6) The return type of methods of an annotation type must be a primitive, a String, a Class, an annotation type, or an array, where the type of the array is restricted to one of the four allowed types. See [2] for additional restrictions and syntax. The methods of an annotation type define the elements that may be used to parameterize the annotation in code. Annotation types may have default values for any of its elements. For example, an annotation that specifies a defect report could initialize an element defining the defect outcome submitted. Annotations may also have zero elements. This could be used to indicate serializability for a class (as opposed to the current Serializability interface).

Buttler, D J

2008-03-06T23:59:59.000Z

29

A Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit. The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus protocols, allowing the Java CoG Kit to communicate also with the C Globus reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise, and peer-to peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus software. In this paper we also report on the efforts to develop server side Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Globus jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Foster, I.; Gawor, J.; Lane, P.; Mathematics and Computer Science

2001-07-01T23:59:59.000Z

30

Java support on genepool: java6 (jdk1.6) will be removed on 08...  

NLE Websites -- All DOE Office Websites (Extended Search)

Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox security updates Java support on genepool: java6 (jdk1.6) will be removed on 08302013; firefox...

31

Java Vertexing Tools  

SciTech Connect

This document describes the implementation of the topological vertex finding algorithm ZVTOP within the org.lcsim reconstruction and analysis framework. At the present date, Java vertexing tools allow users to perform topological vertexing on tracks that have been obtained from a Fast MC simulation. An implementation that will be able to handle fully reconstructed events is being designed from the ground up for longevity and maintainability.

Strube, Jan; /Oregon U.; Graf, Norman; /SLAC

2006-03-03T23:59:59.000Z

32

Converting java programs to use generic libraries  

Science Conference Proceedings (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ... Keywords: JSR-14, Java 1.5, Java 5, generic types, instantiation types, parameterized types, parametric polymorphism, raw types, type inference

Alan Donovan; Adam Kiežun; Matthew S. Tschantz; Michael D. Ernst

2004-10-01T23:59:59.000Z

33

Practical pluggable types for Java.  

E-Print Network (OSTI)

??This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines… (more)

Papi, Matthew M

2008-01-01T23:59:59.000Z

34

Converting Java Programs to Use Generic Libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practice makes heavy use of ...

Donovan, Alan

2004-03-30T23:59:59.000Z

35

Converting Java programs to use generic libraries  

E-Print Network (OSTI)

Java 1.5 will include a type system (called JSR-14) that supports parametric polymorphism, or generic classes. This will bring many benefits to Java programmers, not least because current Java practise makes heavy use of ...

Donovan, Alan A. A., 1976-

2004-01-01T23:59:59.000Z

36

An improved slicer for Java  

Science Conference Proceedings (OSTI)

We present an improved slicing algorithm for Java. The best algorithm known so far, first presented in [11], is not always precise if nested objects are used as actual parameters. The new algorithm presented in this paper always generates correct and ... Keywords: Java, object trees, static program slicing

Christian Hammer; Gregor Snelting

2004-06-01T23:59:59.000Z

37

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

38

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

39

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

40

Formalizing the safety of Java, the Java virtual machine, and Java card  

Science Conference Proceedings (OSTI)

We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java safety on small footprint devices such as smartcards. The conclusion is that although a lot of good work has been done, a more concerted effort is ... Keywords: Common criteria, programming

Pieter H. Hartel; Luc Moreau

2001-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Template_JavaOne03  

Science Conference Proceedings (OSTI)

... | JavaOne 2003 | Session #1024. 9. S-CSCF. MGCF. MGW. HSS. Application Server. SIP for J2ME. JAIN SIP. SIP for J2ME. JAIN SIP. SIP for J2ME. ...

2009-02-03T23:59:59.000Z

42

Refactoring for parameterizing Java classes  

E-Print Network (OSTI)

Type safety and expressiveness of many existing Java libraries and theirclient applications would improve, if the libraries were upgraded to definegeneric classes. Efficient and accurate tools exist to assist clientapplications ...

Kiezun, Adam

2006-09-05T23:59:59.000Z

43

Mechanisms of Java Rainfall Anomalies  

Science Conference Proceedings (OSTI)

The large-scale circulation departure patterns associated with the interannual variability of (July–June) rainfall in Java are studied on the basis of ship observations (1911–73) in the Indian Ocean and surface station records. Circulation ...

Eric C. Hackert; Stefan Hastenrath

1986-04-01T23:59:59.000Z

44

Practical pluggable types for Java  

E-Print Network (OSTI)

This paper introduces the Checker Framework, which supports adding pluggable type systems to the Java language in a backward-compatible way. A type system designer defines type qualifiers and their semantics, and a compiler ...

Papi, Matthew M

2008-01-01T23:59:59.000Z

45

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java....

46

A Progressive Network Management Architecture Enabled By Java Technology  

E-Print Network (OSTI)

This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks.

Gavalas, Damianos; Ghanbari, Mohammed; O'Mahony, Mike

2010-01-01T23:59:59.000Z

47

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Agrarian Movements in West Java, Indonesia Suraya Afiff Noeron agrarian change in Java in the 1970s and has, moreand agrarian change in Java, West Kalimantan, and other

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

48

V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to a UDK 3.2.7 Java API Reference JavaDoc file having been generated using a vulnerable version of Oracle Java. IMPACT: Apache can be exploited by malicious people to conduct spoofing attacks. SOLUTION: The vendor has issued a fix. Addthis Related Articles

49

Animation projects in CS1 from scheme to Java  

Science Conference Proceedings (OSTI)

Scheme animation projects are transformed into Java projects. Keywords: computer science for liberal arts, introductory programming course, java programming

Mirela Djordjevi?

2011-06-01T23:59:59.000Z

50

Platform Independence Java Virtual Machine (JVM)  

E-Print Network (OSTI)

of User Appliances and Communications Links But completely compatible Because the Market demandsIFace area = new Area(); java.rmi.Naming.bind(url, area) Client: AreaIFace area = (AreaIFace) java.rmi.Naming.lookup

Martin, Jonathan E.

51

Transparent Consistent Replication of Java RMI Objects  

Science Conference Proceedings (OSTI)

The Java Remote Method Invocation (JRMI) specification simplifies the development of distributed Java applications, but provides little support to guarantee reliable, highly available operation. The Aroma System is middleware that transparently enhances ...

N. Narasimhan; L. E. Moser; P. M. Melliar-Smith

2000-09-01T23:59:59.000Z

52

Advanced Transactions in Enterprise JavaBeans  

Science Conference Proceedings (OSTI)

Enterprise JavaBeans (EJB) is a new technology that aims at supporting distributed transactional component-based applications written in Java. In recent years, a lot of new advanced software applications have arisen, which have new requirements for transaction ...

Marek Prochazka

2000-11-01T23:59:59.000Z

53

Remote Invocation in Java G52CON Concepts of Concurrency Remote Invocation in Java  

E-Print Network (OSTI)

.out.println(account.balance()); } catch (Exception e) { // Error handling } } } Remote Invocation in Java G52CON ­ Concepts of Concurrency1 Remote Invocation in Java G52CON ­ Concepts of Concurrency Remote Invocation in Java · Provided by the java.rmi package · Based on a model of remote method invocation (RMI), equivalent to remote procedure

Mills, Steven

54

Symbolic Script Programming for Java  

E-Print Network (OSTI)

Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.

Jolly, Raphael

2009-01-01T23:59:59.000Z

55

JAVA based LCD Reconstruction and Analysis Tools  

Science Conference Proceedings (OSTI)

We summarize the current status and future developments of the North American Group's Java-based system for studying physics and detector design issues at a linear collider. The system is built around Java Analysis Studio (JAS) an experiment-independent Java-based utility for data analysis. Although the system is an integrated package running in JAS, many parts of it are also standalone Java utilities.

Bower, G.

2004-10-11T23:59:59.000Z

56

Features of the Java commodity grid kit.  

SciTech Connect

In this paper we report on the features of the Java Commodity Grid Kit (Java CoG Kit). The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework. Java CoG Kit middleware is general enough to design a variety of advanced Grid applications with quite different user requirements. Access to the Grid is established via Globus Toolkit protocols, allowing the Java CoG Kit to also communicate with the services distributed as part of the C Globus Toolkit reference implementation. Thus, the Java CoG Kit provides Grid developers with the ability to utilize the Grid, as well as numerous additional libraries and frameworks developed by the Java community to enable network, Internet, enterprise and peer-to-peer computing. A variety of projects have successfully used the client libraries of the Java CoG Kit to access Grids driven by the C Globus Toolkit software. In this paper we also report on the efforts to develop serverside Java CoG Kit components. As part of this research we have implemented a prototype pure Java resource management system that enables one to run Grid jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

von Laszewski, G.; Gawor, J.; Lane, P.; Rehn, N.; Russell, M.; Mathematics and Computer Science

2002-11-01T23:59:59.000Z

57

ESC/Java2 Implementation Notes  

E-Print Network (OSTI)

Abstract: ESC/Java2 is a tool for statically checking program specifications. It expands significantly upon ESC/Java, on which it is built. It is consistent with the definition of JML and of Java 1.4. It adds additional static checking to that in ESC/Java; most significantly, it adds support for checking frame conditions and annotations containing method calls. This document describes the status of the final release of ESC/Java2, along with some notes regarding the details of that implementation.

David R. Cok; Joseph R. Kiniry; Dermot Cochran

2008-01-01T23:59:59.000Z

58

Integrating multiple clinical information systems using the Java Message Service framework  

E-Print Network (OSTI)

Information Systems using the Java Message Service FrameworkInformation Systems using the Java Message Service Frameworkusing Sun Microsystems’ Java programming language. The Java

Tellis, W M; Andriole, K P

2004-01-01T23:59:59.000Z

59

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion 61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability February 21, 2011 - 7:00am Addthis PROBLEM: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability. PLATFORM: The following Java products are affected: Java SE: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK 5.0 Update 27 and prior for Solaris 9 Oracle SDK 1.4.2_29 and prior for Solaris 8 IBM JDK 6 Update SR9 and prior IBM JDK 5 Update SR12-FP3 and prior IBM JDK 1.4.2 Update SR13-FP8 and prior Java for Business: Oracle JDK and JRE 6 Update 23 and prior for Windows, Solaris, and Linux Oracle JDK and JRE 5.0 Update 27 and prior for Windows, Solaris, and Linux

60

Identifying Reference Objects by Hierarchical Clustering in Java Environment  

E-Print Network (OSTI)

Recently Java programming environment has become so popular. Java programming language is a language that is designed to be portable enough to be executed in wide range of computers ranging from cell phones to supercomputers. Computer programs written in Java are compiled into Java Byte code instructions that are suitable for execution by a Java Virtual Machine implementation. Java virtual Machine is commonly implemented in software by means of an interpreter for the Java Virtual Machine instruction set. As an object oriented language, Java utilizes the concept of objects. Our idea is to identify the candidate objects' references in a Java environment through hierarchical cluster analysis using reference stack and execution stack.

Saha, Rahul

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Java 1.5.0 API Sun’s Java Tutorial Ed Faulkner’s Java Reference  

E-Print Network (OSTI)

Put these lines in your.environment: add 6.186 add-f java_v1.5.0 setenv JAVA_HOME /mit/java_v1.5.0 setenv CLASSPATH /mit/6.186/2005/maslab.jar:. If you’re Serverphobic, just ask for help. You’ll learn fast, and you’ll be glad you did. Using the Documentation

Yuran Lu Agenda; Threading Java; On Server; Maslab Api

2005-01-01T23:59:59.000Z

62

MESURE Tool to benchmark Java Card platforms  

E-Print Network (OSTI)

The advent of the Java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behavior of these platforms is becoming crucial. To meet this need, we present in this paper a novel benchmarking framework to test and evaluate the performance of Java Card platforms. MESURE tool is the first framework which accuracy and effectiveness are independent from the particular Java Card platform tested and CAD used.

Bouzefrane, Samia; Paradinas, Pierre

2009-01-01T23:59:59.000Z

63

Object and Reference Immutability using Java Generics  

E-Print Network (OSTI)

A compiler-checked immutability guarantee provides useful documentation, facilitates reasoning, and enables optimizations. This paper presents Immutability Generic Java (IGJ), a novel language extension that expresses ...

Zibin, Yoav

2007-03-16T23:59:59.000Z

64

OpenMath JavaBeans - CECM  

E-Print Network (OSTI)

Sep 24, 1998 ... The technology studied in this project uses Java to construct components, ... It is also a general communications standard which supports the ...

65

SystemRequirements java Repository CRAN  

E-Print Network (OSTI)

Description Low-level interface to Java VM very much like.C/.Call and friends. Allows creation of objects, calling methods and accessing fields.

Simon Urbanek; Maintainer Simon Urbanek; Depends R; R Topics Documented

2010-01-01T23:59:59.000Z

66

Emerging Java Technologies for Math Education  

E-Print Network (OSTI)

PIMS-CECM Workshop on Emerging Java Technologies for Math Education. Centre For Experimental and Constructive Mathematics logo. A Workshop at the  ...

67

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

68

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

69

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

70

V-122: IBM Tivoli Application Dependency Discovery Manager Java...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March...

71

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

72

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

73

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August...

74

Recoverable Class Loaders for a Fast Restart of Java Applications  

Science Conference Proceedings (OSTI)

Nov 8, 2008 ... able a fast start-up and recovery of Java applications. This is achieved by snapshooting the static state of Java applications namely the class ...

75

Stability of Java interfaces: a preliminary investigation  

Science Conference Proceedings (OSTI)

The attribute of stability is regarded by some as an important attribute of software. Some claims regarding software design quality imply that what are called interfaces in Java are stable. This paper introduces some new metrics for investigating ... Keywords: java interface, software metrics, stability

Jonathan Chow; Ewan Tempero

2011-05-01T23:59:59.000Z

76

Formalising Java RMI with explicit code mobility  

Science Conference Proceedings (OSTI)

This paper presents an object-oriented, Java-like core language with primitives for distributed programming and explicit code mobility. We apply our formulation to prove the correctness of several optimisations for distributed programs. Our language ... Keywords: Code mobility, Distribution, Java, Optimisation, RMI, Runtime, Types

Alexander Ahern; Nobuko Yoshida

2007-12-01T23:59:59.000Z

77

First International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the First International Workshop on Persistence and Java, which was held in Drymen, Scotland in September 1996. The focus of this workshop was the relationship between the Java languages and long-term data storage, such as databases ...

Malcolm Atkinson; Mick Jordan

1996-11-01T23:59:59.000Z

78

Testing of java web services for robustness  

Science Conference Proceedings (OSTI)

This paper presents a new compile-time analysis that enables a testing methodology for white-box coverage testing of error recovery code (i.e., exception handlers) in Java web services using compiler-directed fault injection. The analysis allows compiler-generated ... Keywords: def-use testing, exceptions, java, test coverage metrics

Chen Fu; Barbara G. Ryder; Ana Milanova; David Wonnacott

2004-07-01T23:59:59.000Z

79

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

80

Sawja: Static Analysis Workshop for Java  

E-Print Network (OSTI)

Static analysis is a powerful technique for automatic verification of programs but raises major engineering challenges when developing a full-fledged analyzer for a realistic language such as Java. This paper describes the Sawja library: a static analysis framework fully compliant with Java 6 which provides OCaml modules for efficiently manipulating Java bytecode programs. We present the main features of the library, including (i) efficient functional data-structures for representing program with implicit sharing and lazy parsing, (ii) an intermediate stack-less representation, and (iii) fast computation and manipulation of complete programs.

Hubert, Laurent; Besson, Frédéric; Demange, Delphine; Jensen, Thomas; Monfort, Vincent; Pichardie, David; Turpin, Tiphaine

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Java persistence with hibernate, Second edition  

Science Conference Proceedings (OSTI)

Persistence -- the ability of data to outlive an instance of a program -- is central to modern applications. Hibernate, the most popular Java persistence tool, provides automatic and transparent object/relational mapping so it's a snap to work with SQL ...

Christian Bauer; Gavin King

2006-11-01T23:59:59.000Z

82

Computer algebra in Java: libraries and scripting  

E-Print Network (OSTI)

We have developed two computer algebra systems (CAS) written in Java [Jolly:2007,Kredel:2006]. The Java libraries can be used as any of the numerous other Java library packages. For the use-case of interactively entering and manipulating mathematical expressions there is a need of a scripting front-end for our libraries. Most other CAS invent and implement their own scripting interface for this purpose. We, however, do not want to reinvent the wheel and propose to use a contemporary scripting language with access to Java code. In this paper we discuss the requirements for a scripting language in computer algebra and check whether the languages Python, Ruby, Groovy and Scala meet these requirements. We conclude, that with minor problems any of these languages is suitable for our purpose.

Jolly, Raphael

2008-01-01T23:59:59.000Z

83

Javarifier : inference of reference immutability in Java  

E-Print Network (OSTI)

Javari is an extension of Java that supports reference immutability constraints. Programmers write Javari type qualifiers, such as the readonly type qualifier, in their programs, and the Javari typechecker detects mutation ...

Quinonez, Jamie

2008-01-01T23:59:59.000Z

84

Verification for Java's Reentrant Multithreading Concept  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. the concurrency model offers coordination via lock-synchronization, and communication by ...

Erika Ábrahám-Mumm; Frank S. de Boer; Willem P. de Roever; Martin Steffen

2002-04-01T23:59:59.000Z

85

JavaScript Error, Brookhaven National Laboratory (BNL)  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Services Web Services Enabling JavaScript or Active Scripting We're Sorry, you don't seem to have JavaScript enabled in your browser. Some functions in this site may not work properly without it enabled or your web browser is running an older version of JavaScript. Please enabled your JavaScript, then go back and try again or upgrade your browser version to view this web page correctly. Press the button below to see if you have JavaScript enabled. If nothing happened, then it is possible that JavaScript is disabled on your browser. The following instructions shown below describes how to enable JavaScript or Active Scripting in your browser. If your browser isn't listed, please consult its online help pages. JavaScript Test ITD Homepage Need Help? How to Enable JavaScript

86

Hyper-Threaded Java: Use the Java Concurrency API to Speed Up Time-Consuming Tasks  

SciTech Connect

This is for a Java World article that was already published on Nov 21, 2006. When I originally submitted the draft, Java World wasn't in the available lists of publications. Now that it is, Hanford Library staff recommended that I resubmit so it would be counted. Original submission ID: PNNL-SA-52490

Scarberry, Randy

2006-11-21T23:59:59.000Z

87

Java Jr.: Fully abstract trace semantics for a core Java language.  

E-Print Network (OSTI)

actions which represent interaction across package boundaries. A detailed example based on the Observer, subset of the Java language which allows for the declaration of classes and interfaces in packages. It includes two extensions of Java: it allows for packages to contain object declarations (rather than

Jeffrey, Alan

88

JR: Flexible Distributed Programming in an Extended Java  

Science Conference Proceedings (OSTI)

Abstract: Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI). The JR programming ...

2001-04-01T23:59:59.000Z

89

Inductive Proof Outlines for Exceptions in Multithreaded Java  

Science Conference Proceedings (OSTI)

In this paper we give an operational semantics and introduce an assertional proof system for exceptions in a multithreaded Java sublanguage. Keywords: Java, exceptions, multi-threading, proof systems

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2006-05-01T23:59:59.000Z

90

JR: Flexible distributed programming in an extended Java  

Science Conference Proceedings (OSTI)

Java provides a clean object-oriented programming model and allows for inherently system-independent programs. Unfortunately, Java has a limited concurrency model, providing only threads and remote method invocation (RMI).The JR programming language ... Keywords: Concurrency, Java, SR, concurrent object-oriented programming

Aaron W. Keen; Tingjian Ge; Justin T. Maris; Ronald A. Olsson

2004-05-01T23:59:59.000Z

91

Discrete-event simulation in Java: a practitioner's experience  

Science Conference Proceedings (OSTI)

The experience of a simulation practitioner with development of a new Java simulation engine and its application to a large simulation model is described. Our simulation engine is implemented as a simple extension of the Java programming language and ... Keywords: Java, discrete-event simulation, parallel processing, practitioner, supply chain

D. H. King; Harvey S. Harrison

2010-07-01T23:59:59.000Z

92

Enterprise JavaBeans 3.1  

Science Conference Proceedings (OSTI)

Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container ...

Andrew Lee Rubinger; Bill Burke

2010-09-01T23:59:59.000Z

93

Enforcing Secure Object Initialization in Java  

E-Print Network (OSTI)

Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally specify the initialization policy of libraries or programs and a type checker to statically check at load time that all loaded classes respect the policy. This allows to prove the absence of bugs which have allowed some famous privilege escalations in Java. Our experimental results show that our safe default policy allows to prove 91% of classes of java.lang, java.security and javax.security safe without any annotation and by adding 57 simple annotations we proved all classes but four safe. The type system and its soundness theorem have been formalized and machine checked using Coq.

Hubert, Laurent; Monfort, Vincent; Pichardie, David

2010-01-01T23:59:59.000Z

94

JAVA & Parallelism/Real-time systems  

E-Print Network (OSTI)

Windowing Toolkit (AWT) in a memory-efficient way. JAVA Application Environment (JAE) Support enables the same applets and applications to run on other servers or platforms running the JAVA Virtual Machine. CHAPTER 2 Embedded and Real-Time JAVA According to the designers at Sun Microsystems, is JAVA also suitable for Embedded or Real-Time systems. Before proceeding further it is worth trying to define the phrase `real-time system' more precisely. 2.1 Definition of a real-time system There are many interpretations of the exact nature of a real-time system; however, they all have in common the notion of response time, the time taken for the system to generate output from some associated input. The Oxford Dictionary of Computing [48] gives the following definition of a real-time system. A real-time system is... Any system in which the time at which output is produced is significant. This is usually because the input corresponds to some movement in the physical world, and the output ha...

D. F. Nooren

1998-01-01T23:59:59.000Z

95

Automatic translation from Circus to Java  

Science Conference Proceedings (OSTI)

Circus is a combination of Z and CSP that supports the development of state-rich reactive systems based on refinement. In this paper we present JCircus, a tool that automatically translates Circus programs into Java, for the purpose of animation and ...

Angela Freitas; Ana Cavalcanti

2006-08-01T23:59:59.000Z

96

IDebug: An Advanced Debugging Framework for Java  

E-Print Network (OSTI)

IDebug, the Infospheres debugging framework, is an advanced debugging framework for Java. This framework provides the standard core debugging and specification constructs such as assertions, debug levels and categories, stack traces, and specialized exceptions. Debugging functionality can be fine-tuned to a per-thread and/or a per-class basis, debugging contexts can be stored to and recovered from persistent storage, and several aspects of the debugging run-time are configurable at the meta-level. Additionally, the framework is designed for extensibility. Planned improvements include support for debugging distributed object systems via currying call stacks across virtual machine contexts and debug information logging with a variety of networking media including unicast, multicast, RMI, distributed events, and JavaSpaces. Finally, we are adding support for debugging mobile agent systems by providing mobile debug logs. 1 Introduction Programming technologies have evolved greatly over th...

Joseph R. Kiniry

1998-01-01T23:59:59.000Z

97

The New Sundanese Peasants' Union: Peasant Movements, Changes in Land Control, and Agrarian Questions in Garut, West Java  

E-Print Network (OSTI)

of the Association of West Java Plantations; and Ir. H.Questions in Garut, West Java *) Noer Fauzi Berkeleyorganization in West Java, Indonesia, was extraordinarily

Fauzi, Noer

2005-01-01T23:59:59.000Z

98

S Se  

NLE Websites -- All DOE Office Websites (Extended Search)

Se Se er rp pe en nt ti in ne e S St ty yl le e C Co oi il l W Wi in nd di in ng gs s f fo or r B BE EP PC C- -I II I I IR R M Ma ag gn ne et t P Pr ro od du uc ct ti io on n V Viid de eo oc co on nffe er re en nc ce e B Be ettw we ee en n IIH HE EP P a an nd d B BN NL L S Sc ch he ed du ulle ed d ffo or r M Ma ar rc ch h 3 3,, 2 20 00 04 4 o on n B BE EP PC C- -IIII S SC C M Ma ag gn ne ett P Pr ro od du uc cttiio on n.. Presented by Brett Parker/BNL - SMD First SCQ Production Coil Winding 7 0 0 Z (mm) 300 200 100 θ (deg.) 5 0 0 Z (mm) θ (deg.) O Or ri ig gi in na al l D Do ou ub bl le e- -L La ay ye er r B BE EP PC C- -I II I C Co oi il l W Wi in nd di in ng g P Pa at tt te er rn ns s f fo or r S SC CB B a an nd d S SC CQ Q. . The plan had been to wind one coil pole and then stop winding to fill in gaps with G10 before adding new substrate and then continue winding the same pole in the second layer. This was maybe not so bad for SCB where we would have had to stop/start twice but for the four double-layer SCQ we would have had sixteen stop/starts

99

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

100

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

102

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

103

Redefining Agrarian Power: Resurgent Agrarian Movements in West Java, Indonesia  

E-Print Network (OSTI)

Movements in West Java, Indonesia Suraya Afiff Noer Fauzienvironmental change in Indonesia since 1985. She receivedenvironmental change in Indonesia since the 1990s. In Fall

Afiff, Suraya; Fauzi, Noer; Hart, Gillian; Ntsebeza, Lungisile; Peluso, Nancy

2005-01-01T23:59:59.000Z

104

OpenMath and Java for Math Education - CECM  

E-Print Network (OSTI)

The intent of this web page is to organize resources and information related to the development of OpenMath compliant Java based web applications for math ...

105

Main-Memory Management to Support Orthogonal Persistence for Java  

E-Print Network (OSTI)

Daynes,L. Atkinson,M.P. Proceedings of the Second International Workshop on Persistence and Java pp 37-60

Daynes, L.

106

Instructional JAVA modules based on molecular simulation - TMS  

Science Conference Proceedings (OSTI)

Nov 9, 2007 ... This website contains a selection of instructional JAVA modules designed to increase understanding of molecular simulations and molecular ...

107

RTZen: Highly Predictable, Real-time Java Middleware for Distributed and Embedded Systems  

E-Print Network (OSTI)

Real-Time Speci?cation for Java. Addison-Wesley (2000) 8.Vitek, J. : Real-time java scoped memory: Design patternsof the jRate Real-Time Java Implementation. In Meersman,

Raman, Krishna; Zhang, Yue; Panahi, Mark; Colmenares, Juan A; Klefstad, Raymond; Harmon, Trevor

2005-01-01T23:59:59.000Z

108

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

de Leeuw, Jan

2005-01-01T23:59:59.000Z

109

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

110

Review of Correspondence Analysis and Data Coding with Java and R  

E-Print Network (OSTI)

and Data Coding with Java and R Fionn Murtagh Chapman &Analysis and Data Coding with Java and R The book is modernexamples done in both R and Java. But again, in this respect

Jan de Leeuw

2011-01-01T23:59:59.000Z

111

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

112

Another step towards a smart compilation manager for Java  

Science Conference Proceedings (OSTI)

In a recent work we have proposed a compilation strategy (that is, a way to decide which unchanged sources have to be recompiled) for a substantial subset of Java which has been shown to be sound and minimal. That is, an unchanged source ... Keywords: Java, separate compilation

G. Lagorio

2004-03-01T23:59:59.000Z

113

Object Oriented Verification Kernels for Secure Java Applications  

Science Conference Proceedings (OSTI)

This paper presents an approach to the verification of large Java programs. The focus lies on programs that implement a distributed communicating system e.g. in a Mor E-Commerce scenario. When trying to verify such programs, thousands of Java classes ...

Holger Grandy; Kurt Stenzel; Wolfgang Reif

2005-09-01T23:59:59.000Z

114

Proceedings of the Second International Workshop on Persistence and Java  

Science Conference Proceedings (OSTI)

These proceedings record the Second International Workshop on Persistence and Java, that was held in Half Moon Bay in the San Francisco Bay Area, in August 1997. The focus of the workshop series is the relationship between the Java platform and longterm ...

Malcolm Atkinson; Mick Jordan

1997-12-01T23:59:59.000Z

115

RTVR: a flexible java library for interactive volume rendering  

Science Conference Proceedings (OSTI)

This paper presents several distinguishing design features of RTVR - a Java-based library for real-time volume rendering. We describe, how the careful design of data structures, which in our case are based on voxel enumeration, and an intelligent use ... Keywords: interactive volume visualization, internet-based visualization, java

Lukas Mroz; Helwig Hauser

2001-10-01T23:59:59.000Z

116

JAVA SWING-BASED PLOTTING PACKAGE RESIDING WITHIN XAL  

Science Conference Proceedings (OSTI)

A data plotting package residing in the XAL tools set is presented. This package is based on Java SWING, and therefore it has the same portability as Java itself. The data types for charts, bar-charts, and color-surface plots are described. The algorithms, performance, interactive capabilities, limitations, and the best usage practices of this plotting package are discussed.

Shishlo, Andrei P [ORNL; Chu, Paul [Stanford University; Pelaia II, Tom [ORNL

2007-01-01T23:59:59.000Z

117

Groebner bases in Java with applications in computer graphics  

E-Print Network (OSTI)

In this paper we present a Java implementation of the algorithm that computes Buchbereger's and reduced Groebner's basis step by step. The Java application enables graphical representation of the intersection of two surfaces in 3-dimensional space and determines conditions of existence and planarity of the intersection.

Malesevic, Branko; Campara, Milan

2010-01-01T23:59:59.000Z

118

Towards a program logic for JavaScript  

Science Conference Proceedings (OSTI)

JavaScript has become the most widely used language for client-side web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading to buggy programs and a lack of adequate static-analysis tools. We believe ... Keywords: javascript, separation logic, web

Philippa Anne Gardner; Sergio Maffeis; Gareth David Smith

2012-01-01T23:59:59.000Z

119

CS1, arcade games and the free Java book  

Science Conference Proceedings (OSTI)

Computer game programming has been adopted by some instructors and schools in an effort to motivate students and make the learning more relevant to the student's world than the console programs many of their instructors learned with. This paper describes ... Keywords: acm java, cs1, free java book, games

Daniel L. Schuster

2010-03-01T23:59:59.000Z

120

Reflexes: Abstractions for integrating highly responsive tasks into Java applications  

Science Conference Proceedings (OSTI)

Achieving submillisecond response times in a managed language environment such as Java or C# requires overcoming significant challenges. In this article, we propose Reflexes, a programming model and runtime system infrastructure that lets developers ... Keywords: Java virtual machine, Real-time systems, memory management

Jesper Honig Spring; Filip Pizlo; Jean Privat; Rachid Guerraoui; Jan Vitek

2010-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Software application implement in java for electrical lines dimensioning  

Science Conference Proceedings (OSTI)

In this paper it was present a software package implemented in java useful for dimensioning of low voltage lines mono phase and three phases (AC and DC). The modeled networks are tree type. This software with graphical user interface allows the estimation ... Keywords: computer software, electrical lines, java, optimal dimensioning

Cristian Abrudean; Manuela Panoiu

2008-11-01T23:59:59.000Z

122

Java-Applet For Radio Spectra Analysis  

E-Print Network (OSTI)

New services for Clusters of Galaxies Database created in the Astronomical Institute of SPbU have been constructed. The detailed description of database and its content is available at http://www.astro.spbu.ru/CLUSTERS/. The information contained in the database can be used for solution of the specific astronomical problems. One of these problems is the researches of radio emission spectra of clusters' objects. The researches can give help in solution of the problems of origin and evolution of extragalactic radio sources. Spectra of radio galaxies contain important information about radio power in the processes responsible for their activity. This report presents the software for the database that provides work with radio spectra of extragalactic sources. This client-application has been released as the Java-applet and thus provides a Web based interface that is supported on many operating systems. The facilities of the applet such as approximations of spectra measurement points and calculation of spectral parameters are illustrated in the report. Also we demonstrate new version of the application that realized on Java2 and gave access to additional functions such as printing.

A. S. Trushkina; A. G. Gubanov

2000-12-29T23:59:59.000Z

123

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

124

T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 8: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 T-658: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 June 30, 2011 - 3:22pm Addthis PROBLEM: Java for Mac OS X 10.6 Update 5 & Java for Mac OS X 10.5 Update 10 PLATFORM: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6.6 and later, Mac OS X Server v10.6.6 and later ABSTRACT: Multiple vulnerabilities exist in Java 1.6.0_24, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. Visiting a web page containing a maliciously crafted untrusted Java applet may lead to arbitrary code execution with the privileges of the current user. These issues are addressed by updating to Java version 1.6.0_26. Further information is available via the Java

125

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

126

Object-Oriented Programming 2CSE 1325: Object-Oriented Programming in Java  

E-Print Network (OSTI)

1 Object-Oriented Programming in Java 2CSE 1325: Object-Oriented Programming in Java Take control, practice! #12;2 3CSE 1325: Object-Oriented Programming in Java Course Contents · Introduction to object-oriented large, high-quality software systems. 4CSE 1325: Object-Oriented Programming in Java Buzzwords

Lei, Jeff Yu

127

FAMIX Java language plugin 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x ­> 1.2.x: ­ Addition of a new keyword (strictfp) #12; 3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

128

RTJBench: A RealTime Java Benchmarking Framework  

E-Print Network (OSTI)

Abstract. The paper gives an overview of RTJBench, a framework designed to assist in the task of benchmarking programs written in the Real-Time Specification for Java, but with potentially more general applicability. RTJBench extends the JUnit framework for unit testing of Java applications with tools for real-time environment configuration, simple data processing and configurable graphical presentation services. We present design principles of RTJBench and give an example of a benchmarking suite we have been using for daily regression benchmarking of the Open Virtual Machine. Keywords: Benchmarking, regression benchmarking, Real-Time Specification for Java

Marek Prochazka; Andrey Madan; Jan Vitek; Wenchang Liu

2004-01-01T23:59:59.000Z

129

Prototyping Faithful Execution in a Java virtual machine.  

SciTech Connect

This report presents the implementation of a stateless scheme for Faithful Execution, the design for which is presented in a companion report, ''Principles of Faithful Execution in the Implementation of Trusted Objects'' (SAND 2003-2328). We added a simple cryptographic capability to an already simplified class loader and its associated Java Virtual Machine (JVM) to provide a byte-level implementation of Faithful Execution. The extended class loader and JVM we refer to collectively as the Sandia Faithfully Executing Java architecture (or JavaFE for short). This prototype is intended to enable exploration of more sophisticated techniques which we intend to implement in hardware.

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

130

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

131

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

132

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-07-01T23:59:59.000Z

133

Visualising Memory Graphs: Interactive Debugging using Java3D  

E-Print Network (OSTI)

that three dimensional visualisation cau be a useful tool for debugging, program analysis, and a viable - 3D Modelling in Java 6 3 Requirements 9 4 Design 10 4.1 Preliminaries 10 4.1.1 Creating

Oxford, University of

134

A Deductive Proof System for Multithreaded Java with Exceptions  

Science Conference Proceedings (OSTI)

Besides the features of a class-based object-oriented language, Java integrates concurrency via its thread-classes, allowing for a multithreaded flow of control. Besides that, the language offers a flexible exception mechanism for handling errors or ...

Erika Ábrahám; Frank S. de Boer; Willem-Paul de Roever; Martin Steffen

2008-12-01T23:59:59.000Z

135

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

136

Pointer analysis for Java programs : novel techniques and applications  

E-Print Network (OSTI)

This dissertation presents a pointer analysis for Java programs, together with several practical analysis applications. For each program point, the analysis is able to construct a points-to graph that describes how local ...

S?lcianu, Alexandru D. (Alexandru Doru), 1975-

2006-01-01T23:59:59.000Z

137

Implementing fast javaTM monitors with relaxed-locks  

Science Conference Proceedings (OSTI)

The JavaTM Programming Language permits synchronization operations (lock, unlock, wait, notify) on any object. Synchronization is very common in applications and is endemic in the library code upon which applications depend. It is therefore ...

David Dice

2001-04-01T23:59:59.000Z

138

Automatic certification of Java source code in rewriting logic  

Science Conference Proceedings (OSTI)

In this paper we propose an abstract certification techniquefor Java which is based on rewriting logic, a very general logical and semanticframework efficiently implemented in the functional programminglanguage Maude. Starting from a specification of ...

Mauricio Alba-Castro; María Alpuente; Santiago Escobar

2007-07-01T23:59:59.000Z

139

Predictability of Java Monsoon Rainfall Anomalies: A Case Study  

Science Conference Proceedings (OSTI)

A substantial portion of the interannual variability of rainfall at Jakarta, Java, can be predicted from antecedent pressure anomalies at Darwin, northern Australia; the pressure persistence, the concurrent correlation of pressure and rainfall, ...

Stefan Hastenrath

1987-01-01T23:59:59.000Z

140

Swizzle barrier optimizations for orthogonal persistence in Java  

E-Print Network (OSTI)

Brahnmath,K. Nystrom,N. Hosking,A.L. Cutts,Q.I. Proceedings of the Third International Workshop on Persistence and Java (Tiburon, California, September 1998), Advances in Persistent Object Systems pp 268-278 Morgan Kaufmann

Brahnmath, K.; Nystrom, N.; Hosking, A.L.; Cutts, Q.I.

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Refactoring Sequential Java Code for Concurrency via Concurrent Libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 packagejava.util.concurrent (j.u.c.) supports writing concurrent programs: much of the complexity of writing threads-safe and ...

Ernst, Michael D.

2008-09-30T23:59:59.000Z

142

Analysing, Profiling and Optimising Orthogonal Persistence for Java  

E-Print Network (OSTI)

Cutts,Q.I. Hosking,A. Proceedings of the Second International Workshop on Persistence and Java (PJW2), Half Moon Bay, CA, USA (Atkinson, M., Jordan, M. Eds) pp 107-115 Sun Microsystems Inc.

Cutts, Q.I.

143

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

144

Java Automation Controller and Real-Time Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Java Automation Controller and Real-Time Systems Java Automation Controller and Real-Time Systems Speaker(s): Greg Bollella Date: June 29, 2009 - 12:00pm Location: 90-3122 Java has always been a disruptive technology and now it is breaking the mold in industrial, process, building, and transportation automation systems. For many years, programmable logic controllers (PLCs), the digital versions of old relay-based control systems (such as that used in the NYC Subway system in the late 1800s) have primarily controlled these systems. PLCs are the workhorses of the controls industry but the market is characterized by proprietary, closed, expensive, special-purpose solutions. A Java-based automation controller breaks the mold by allowing control algorithms, which require strict real-time capabilities, to run on

145

Midea: Order (2010-SE-0110, 2012-SE-1402, 2012-SE-1404, 2013-SE-1401) |  

NLE Websites -- All DOE Office Websites (Extended Search)

Midea: Order (2010-SE-0110, 2012-SE-1402, 2012-SE-1404, Midea: Order (2010-SE-0110, 2012-SE-1402, 2012-SE-1404, 2013-SE-1401) Midea: Order (2010-SE-0110, 2012-SE-1402, 2012-SE-1404, 2013-SE-1401) November 26, 2012 DOE ordered Midea America Corp., Hefei Hualing Co., Ltd., and China Refrigeration Industry Co., Ltd., to pay a $4,579,949 ($4,562,838 plus one percent interest) civil penalty after finding Midea had manufactured and distributed in commerce in the U.S. a large quantity of basic models HD-l46F, HS-390C, UL-WD145-D, and UL-WD195-D of noncompliant refrigerator-freezers and freezers. The Order adopted a Compromise Agreement, which reflected settlement terms between DOE and Midea. Midea: Order (2010-SE-0110, 2012-SE-1402, 2012-SE-1404, 2013-SE-1401) More Documents & Publications Midea: Proposed Penalty (2010-SE-0110, 2012-SE-1402, 2012-SE-1404)

146

Java Performance for Scientific Applications on LLNL Computer Systems  

Science Conference Proceedings (OSTI)

Languages in use for high performance computing at the laboratory--Fortran (f77 and f90), C, and C++--have many years of development behind them and are generally considered the fastest available. However, Fortran and C do not readily extend to object-oriented programming models, limiting their capability for very complex simulation software. C++ facilitates object-oriented programming but is a very complex and error-prone language. Java offers a number of capabilities that these other languages do not. For instance it implements cleaner (i.e., easier to use and less prone to errors) object-oriented models than C++. It also offers networking and security as part of the language standard, and cross-platform executables that make it architecture neutral, to name a few. These features have made Java very popular for industrial computing applications. The aim of this paper is to explain the trade-offs in using Java for large-scale scientific applications at LLNL. Despite its advantages, the computational science community has been reluctant to write large-scale computationally intensive applications in Java due to concerns over its poor performance. However, considerable progress has been made over the last several years. The Java Grande Forum [1] has been promoting the use of Java for large-scale computing. Members have introduced efficient array libraries, developed fast just-in-time (JIT) compilers, and built links to existing packages used in high performance parallel computing.

Kapfer, C; Wissink, A

2002-05-10T23:59:59.000Z

147

Org.Lcsim: Event Reconstruction in Java  

SciTech Connect

Maximizing the physics performance of detectors being designed for the International Linear Collider, while remaining sensitive to cost constraints, requires a powerful, efficient, and flexible simulation, reconstruction and analysis environment to study the capabilities of a large number of different detector designs. The preparation of Letters Of Intent for the International Linear Collider involved the detailed study of dozens of detector options, layouts and readout technologies; the final physics benchmarking studies required the reconstruction and analysis of hundreds of millions of events. We describe the Java-based software toolkit (org.lcsim) which was used for full event reconstruction and analysis. The components are fully modular and are available for tasks from digitization of tracking detector signals through to cluster finding, pattern recognition, track-fitting, calorimeter clustering, individual particle reconstruction, jet-finding, and analysis. The detector is defined by the same xml input files used for the detector response simulation, ensuring the simulation and reconstruction geometries are always commensurate by construction. We discuss the architecture as well as the performance.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

148

A Political Ecology of the Citarum River Basin: Exploring "Integrated Water Resources Management" in West Java, Indonesia  

E-Print Network (OSTI)

Management” in West Java, Indonesia By Jenna CavelleBandung in the province of West Java 1 . From here the rivermakes its exodus at the Java Sea slightly east of Indonesia’

Cavelle, Jenna

2013-01-01T23:59:59.000Z

149

Power, Labor, and Livelihood: Processes of Change in Rural Java: Notes and Reflections on a Village Revisited  

E-Print Network (OSTI)

two upland villages in Central Java. We returned to one ofDevelopment in Rural Java: A Study of the OrganizationalKecamatan Cibadak, West Java, and Kecamatan Kendal, Central

Hart, Gillian

2004-01-01T23:59:59.000Z

150

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

151

Translating Nondeterministic Functional Language based on Attribute Grammars into Java  

E-Print Network (OSTI)

Knowledge-based systems are suitable for realizing advanced functions that require domain-specific expert knowledge, while knowledge representation languages and their supporting environments are essential for realizing such systems. Although Prolog is useful and effective in realizing such a supporting environment, the language interoperability with other implementation languages, such as Java, is often an important issue in practical application development. This paper describes the techniques for translating a knowledge representation language that is a nondeterministic functional language based on attribute grammars into Java. The translation is based on binarization and the techniques proposed for Prolog to Java translation although the semantics are different from those of Prolog. A continuation unit is introduced to handle continuation efficiently, while the variable and register management on backtracking is simplified by using the single and unidirectional assignment features of variables. An experim...

Umeda, Masanobu; Sone, Hiroaki; Katamine, Keiichi

2011-01-01T23:59:59.000Z

152

Jeannie: Granting Java native interface developers their wishes  

E-Print Network (OSTI)

Higher-level languages interface with lower-level languages such as C to access platform functionality, reuse legacy libraries, or improve performance. This raises the issue of how to best integrate different languages while also reconciling productivity, safety, portability, and efficiency. This paper presents Jeannie, a new language design for integrating Java with C. In Jeannie, both Java and C code are nested within each other in the same file and compile down to JNI, the Java platform’s standard foreign function interface. By combining the two languages ’ syntax and semantics, Jeannie eliminates verbose boiler-plate code, enables static error detection across the language boundary, and simplifies dynamic resource management. We describe the Jeannie language and its compiler, while also highlighting lessons from composing two mature programming languages.

Martin Hirzel; Robert Grimm

2007-01-01T23:59:59.000Z

153

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

154

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

155

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

156

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

157

T-561: IBM and Oracle Java Binary Floating-Point Number Conversion...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service...

158

JACK: a tool for validation of security and behaviour of Java applications  

Science Conference Proceedings (OSTI)

We describe the main features of JACK (Java Applet Correctness Kit), a tool for the validation of Java applications, annotated with JML specifications. JACK has been especially designed to improve the quality of trusted personal device applications. ...

Gilles Barthe; Lilian Burdy; Julien Charles; Benjamin Grégoire; Marieke Huisman; Jean-Louis Lanet; Mariela Pavlova; Antoine Requet

2006-11-01T23:59:59.000Z

159

V-072: Red Hat update for java-1.7.0-openjdk | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for...

160

Concurrencer: a tool for retrofitting concurrency into sequential Java applications via concurrent libraries  

E-Print Network (OSTI)

Parallelizing existing sequential programs to run efficiently on multicores is hard. The Java 5 package java.util.concurrent (j.u.c.) supports writing concurrent programs. To use this package, programmers still need to ...

Dig, Danny

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

6.092 Introduction to Software Engineering in Java, January (IAP) 2009  

E-Print Network (OSTI)

This course is an introduction to Java programming and software engineering. It is designed for those who have little or no programming experience in Java and covers concepts useful to 6.005. The focus is on developing ...

Jones, Evan

162

Add Java extensions to your wiki: Java applets can bring dynamic functionality to your wiki pages  

SciTech Connect

Virtually everyone familiar with today’s world wide web has encountered the free online encyclopedia Wikipedia many times. What you may not know is that Wikipedia is driven by an excellent open-source product called MediaWiki which is available to anyone for free. This has led to a proliferation of wiki sites devoted to just about any topic one can imagine. Users of a wiki can add content -- all that is required of them is that they type in their additions into their web browsers using the simple markup language called wikitext. Even better, the developers of wikitext made it extensible. With a little server-side development of your own, you can add your own custom syntax. Users aware of your extensions can then utilize them on their wiki pages with a few simple keystrokes. These extensions can be custom decorations, formatting, web applications, and even instances of the venerable old Java applet. One example of a Java applet extension is the Jmol extension (REF), used to embed a 3-D molecular viewer. This article will walk you through the deployment of a fairly elaborate applet via a MediaWiki extension. By no means exhaustive -- an entire book would be required for that -- it will demonstrate how to give the applet resize handles using using a little Javascript and CSS coding and some popular Javascript libraries. It even describes how a user may customize the extension somewhat using a wiki template. Finally, it explains a rudimentary persistence mechanism which allows applets to save data directly to the wiki pages on which they reside.

Scarberry, Randall E.

2008-08-12T23:59:59.000Z

163

Implementing the Gaia Astrometric Global Iterative Solution (AGIS) in Java  

E-Print Network (OSTI)

This paper provides a description of the Java software framework which has been constructed to run the Astrometric Global Iterative Solution for the Gaia mission. This is the mathematical framework to provide the rigid reference frame for Gaia observations from the Gaia data itself. This process makes Gaia a self calibrated, and input catalogue independent, mission. The framework is highly distributed typically running on a cluster of machines with a database back end. All code is written in the Java language. We describe the overall architecture and some of the details of the implementation.

O'Mullane, William; Lindegren, Lennart; Hernandez, Jose; Hobbs, David

2011-01-01T23:59:59.000Z

164

Object-oriented Programming Laws for Annotated Java Programs  

E-Print Network (OSTI)

Object-oriented programming laws have been proposed in the context of languages that are not combined with a behavioral interface specification language (BISL). The strong dependence between source-code and interface specifications may cause a number of difficulties when transforming programs. In this paper we introduce a set of programming laws for object-oriented languages like Java combined with the Java Modeling Language (JML). The set of laws deals with object-oriented features taking into account their specifications. Some laws deal only with features of the specification language. These laws constitute a set of small transformations for the development of more elaborate ones like refactorings.

Freitas, Gabriel Falconieri; Massoni, Tiago; Gheyi, Rohit; 10.4204/EPTCS.21.6

2010-01-01T23:59:59.000Z

165

A Non-Null Annotation Inferencer for Java Bytecode  

E-Print Network (OSTI)

We present a non-null annotations inferencer for the Java bytecode language. We previously proposed an analysis to infer non-null annotations and proved it soundness and completeness with respect to a state of the art type system. This paper proposes extensions to our former analysis in order to deal with the Java bytecode language. We have implemented both analyses and compared their behaviour on several benchmarks. The results show a substantial improvement in the precision and, despite being a whole-program analysis, production applications can be analyzed within minutes.

Hubert, Laurent

2010-01-01T23:59:59.000Z

166

Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics  

Science Conference Proceedings (OSTI)

Java+ITP is an experimental tool for the verification of properties of a sequential imperative subset of the Java language. It is based on an algebraic continuation passing style (CPS) semantics of this fragment as an equational theory in Maude. It supports ... Keywords: Hoare logic, Java, algebraic semantics, program verification

Ralf Sasse; José Meseguer

2007-07-01T23:59:59.000Z

167

Development of Java multi-threaded simulation for chemical reacting flow of ethanol  

Science Conference Proceedings (OSTI)

Multi-threading in Java enhances computational performance and facilitates the development of parallel software. To obtain high performance on multi-core systems, this study develops a multi-threaded simulation code using Java for the chemical reacting ... Keywords: Benchmark, Chemical reaction, Computational fluid dynamics, Ethanol detonation, Java, Multi-thread

E. Yamada; T. Shimada; A. K. Hayashi

2012-12-01T23:59:59.000Z

168

The Use of Java in High Performance Computing: A Data Mining Example  

E-Print Network (OSTI)

The Use of Java in High Performance Computing: A Data Mining Example David Walker and Omer Rana in high performance computing is discussed with particular reference to the efforts of the Java Grande Java, Parallel Computing, Neu­ ral Networks, Distributed Objects 1 Introduction High performance

Walker, David W.

169

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

170

Poplar: Java composition with labels and AI planning  

Science Conference Proceedings (OSTI)

Class evolution in object-oriented programming often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which ... Keywords: adaptation, ai planning, code synthesis, components, composition, evolution, object-oriented programming, protocols

Johan T. Nyström Persson; Shinichi Honiden

2011-10-01T23:59:59.000Z

171

Expanding and extending the security features of java  

Science Conference Proceedings (OSTI)

The popularity of the web has had several significant impacts, two of note here: (1) increasing sophistication of web pages, including more regular use of Java and other mobile code, and (2) decreasing average level of sophistication as the user population ...

Nimisha V. Mehta; Karen R. Sollins

1998-01-01T23:59:59.000Z

172

Java^TM RemoteMethod Invocation Specification  

E-Print Network (OSTI)

2.7 Exception Handling in Remote Method Invocation. . . . . 11 2.8 Object Methods Overridden Handling in Remote Method Invocation . Object Methods Overridden by the RemoteObject Class . The Semantics.7 Exception Handling in Remote Method Invocation Since remote methods include java.rmi.Remote

Demurjian, Steven A.

173

A provenly correct translation of Fickle into Java  

Science Conference Proceedings (OSTI)

We present a translation from Fickle, a small object-oriented language allowing objects to change their class at runtime, into Java. The translation is provenly correct in the sense that it preserves the static and dynamic semantics. Moreover, ... Keywords: Type and effect systems, semantics preserving translation

D. Ancona; C. Anderson; F. Damiani; S. Drossopoulou; P. Giannini; E. Zucca

2007-04-01T23:59:59.000Z

174

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S

2008-01-01T23:59:59.000Z

175

A Combined Pointer and Purity Analysis for Java Programs  

E-Print Network (OSTI)

We present a new method purity analysis for Java programs.A method is pure if it does not mutate any location that exists in the program state right before method invocation.Our analysis is built on top of a combined pointer ...

Salcianu, Alexandru

2004-05-17T23:59:59.000Z

176

HEP data analysis using jHepWork and Java  

E-Print Network (OSTI)

A role of Java in high-energy physics and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

S. Chekanov

2008-09-04T23:59:59.000Z

177

jYang : A YANG parser in java  

E-Print Network (OSTI)

The NETCONF con?guration protocol of the IETF Network Work- ing Group provides mechanisms to manipulate the con?guration of network devices. YANG is the language currently under consideration within the IETF to specify the data models to be used in NETCONF . This report describes the design and development of a syntax and semantics parser for YANG in java.

Nataf, Emmanuel

2009-01-01T23:59:59.000Z

178

Refactoring Composite to Visitor and Inverse Transformation in Java  

E-Print Network (OSTI)

We describe how to use refactoring tools to transform a Java program conforming to the Composite design pattern into a program conforming to the Visitor design pattern with the same external behavior. We also describe the inverse transformation. We use the refactoring tools provided by IntelliJ IDEA and Eclipse.

Ajouli, Akram

2011-01-01T23:59:59.000Z

179

HEP data analysis using jHepWork and Java.  

SciTech Connect

A role of Java in high-energy physics (HEP) and recent progress in development of a platform-independent data-analysis framework, jHepWork, is discussed. The framework produces professional graphics and has many libraries for data manipulation.

Chekanov, S.; High Energy Physics

2009-03-23T23:59:59.000Z

180

Supplement V.F: Packages For Introduction to Java Programming  

E-Print Network (OSTI)

. · To protect classes. Packages provide protection so that the protected members of the classes are accessible of the package name and the file system directory structure. For the package named com.prenhall.mypackage, youSupplement V.F: Packages For Introduction to Java Programming By Y. Daniel Liang 1 Introduction

Liang, Y. Daniel

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Nested parallelism for multi-core HPC systems using Java  

Science Conference Proceedings (OSTI)

Since its introduction in 1993, the Message Passing Interface (MPI) has become a de facto standard for writing High Performance Computing (HPC) applications on clusters and Massively Parallel Processors (MPPs). The recent emergence of multi-core processor ... Keywords: Java MPI, MPJ, MPJ express, Multi-core messaging

Aamir Shafi; Bryan Carpenter; Mark Baker

2009-06-01T23:59:59.000Z

182

FAMIX Java language plug-in 1.0 Author Sander Tichelaar (tichel@iam.unibe.ch)  

E-Print Network (OSTI)

packages in Java map directly to the directory structure of source code, i.e. the source code for a certain parameters and local variables 1.1.x -> 1.2.x: - Addition of a new keyword (strictfp) #12;3.2 Package (interpreted) Package Figure 2: Package A Package maps in Java to the Java package construct. Packages in Java

Nierstrasz, Oscar

183

Poplar: A Java Extension for Evolvable Component Integration  

E-Print Network (OSTI)

The Java programming language contains many features that aid component-based software development (CBSD), such as interfaces, visibility levels, and strong support for encapsulation. However, component evolution often causes so-called breaking changes, largely because of the rigidity of component interconnections in the form of explicit method calls and field accesses. We present a Java extension, Poplar, which we are currently developing. In Poplar, inter-component dependencies are expressed using declarative queries; concrete linking code, generated using a planning algorithm, replaces these at compile time. Poplar includes a minimal specification language based on typestate-like protocols and labels, and a lightweight effect system, which ensures the absence of unwanted interference between hand-written code and generated code. We give several examples of fully automatic component integration using Poplar, and demonstrate its potential to simplify object-oriented software development greatly through evolv...

Nyström-Persson, Johan

2011-01-01T23:59:59.000Z

184

Java Technology : a Strategic Solution for Interactive Distributed Applications  

E-Print Network (OSTI)

In a world demanding the best performance from financial investments, distributed applications occupy the first place among the proposed solutions. This particularity is due to their distributed architecture which is able to acheives high performance. Currently, many research works aim to develop tools that facilitate the implementation of such applications. The urgent need for such applications in all areas pushes researchers to accelerate this process. However, the lack of standardization results in the absence of strategic decisions taken by computer science community. In this article, we argue that Java technology represents an elegant compromise ahead of the list of the currently available solutions. In fact, by promoting the independence of hardware and software, Java technology makes it possible to overcome pitfalls that are inherent to the creation of distributed applications.

Alustwani, Husam; Mostefaoui, Ahmed; Salomon, Michel

2009-01-01T23:59:59.000Z

185

Creating A Model HTTP Server Program Using java  

E-Print Network (OSTI)

HTTP Server is a computer programs that serves webpage content to clients. A webpage is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen. This information is usually in HTML format, and may provide navigation to other webpage's via hypertext links. WebPages may be retrieved from a local computer or from a remote HTTP Server. WebPages are requested and served from HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of files of static or dynamic text stored within the HTTP Server's file system. Client-side scripting can make WebPages more responsive to user input once in the client browser. This paper encompasses the creation of HTTP server program using java language, which is basically supporting for HTML and JavaScript.

Veerasamy, Bala Dhandayuthapani

2010-01-01T23:59:59.000Z

186

GIS on the fly » to realize wireless GIS network by Java mobile phone  

E-Print Network (OSTI)

Java cellular phone has arrived in the marketplace as the latest device of a mobile gear. The gear is very compact, allowing 10KB for Java program size and 5KB for data size. Although small in size, it features innovative computer system architecture. Java program can be sent dynamically to the gear in a streaming manner over wireless network. In addition, compared to conventional mobile computers, Java cell phone is very cheap both in hardware price and in communication cost. Java cell phone has an enormous potential as a mobile gear. In this paper, we discuss our trial of constructing a extensive wireless GIS network by utilizing Java cell phone as a GIS terminal. 1.

Shuichi Takino

2001-01-01T23:59:59.000Z

187

Using Java for distributed computing in the Gaia satellite data processing  

E-Print Network (OSTI)

In recent years Java has matured to a stable easy-to-use language with the flexibility of an interpreter (for reflection etc.) but the performance and type checking of a compiled language. When we started using Java for astronomical applications around 1999 they were the first of their kind in astronomy. Now a great deal of astronomy software is written in Java as are many business applications. We discuss the current environment and trends concerning the language and present an actual example of scientific use of Java for high-performance distributed computing: ESA's mission Gaia. The Gaia scanning satellite will perform a galactic census of about 1000 million objects in our galaxy. The Gaia community has chosen to write its processing software in Java. We explore the manifold reasons for choosing Java for this large science collaboration. Gaia processing is numerically complex but highly distributable, some parts being embarrassingly parallel. We describe the Gaia processing architecture and its realisation...

O'Mullane, William; Parsons, Paul; Lammers, Uwe; Hoar, John; Hernandez, Jose

2011-01-01T23:59:59.000Z

188

Java on the MScIT Course at the University of Glasgow  

E-Print Network (OSTI)

Poet,R.R. Belhadj-Mostefa,K. Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University)

Poet, R.R.; Belhadj-Mostefa, K.; Proceedings of the 4th Java in the Computing Curriculum Conference (South Bank University) [More Details

189

Integrating multiple clinical information systems using the Java message service framework to enable the delivery of urgent exam results at the point of care  

E-Print Network (OSTI)

Systems using the Java Message Service Framework. J DigitInformation Systems using the Java Message Service FrameworkED) physician. A web and Java Message Service (JMS) based

Tellis, W M; Andriole, K P

2005-01-01T23:59:59.000Z

190

Grain - A Java Analysis Framework for Total Data Readout  

E-Print Network (OSTI)

Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

P. Rahkila

2007-11-21T23:59:59.000Z

191

Exploiting static application knowledge in a Java compiler for embedded systems: a case study  

Science Conference Proceedings (OSTI)

Offering many benefits in terms of productivity and reliability, Java is becoming an attractive choice for the field of embedded computing. However, its programming model that relies on the capabilities of just-in-time compilation limits the opportunities ... Keywords: Java, KESO, embedded systems

Christoph Erhardt; Michael Stilkerich; Daniel Lohmann; Wolfgang Schröder-Preikschat

2011-09-01T23:59:59.000Z

192

Managing programmed instruction and collaborative peer tutoring in the classroom: Applications in teaching JavaTM  

Science Conference Proceedings (OSTI)

To fulfill part of the course requirements, 34 undergraduate students in two courses completed an online programmed instruction tutor as the first technical training exercise in a Java(TM) programming course designed for information systems majors. The ... Keywords: Collaborative peer tutoring, Interteaching, Java training, Programmed instruction

Henry H. Emurian; Heather K. Holden; Rachel A. Abarbanel

2008-03-01T23:59:59.000Z

193

Use of XML and Java for collaborative petroleum reservoir modeling on the Internet  

Science Conference Proceedings (OSTI)

The GEMINI (Geo-Engineering Modeling through INternet Informatics) is a public-domain, web-based freeware that is made up of an integrated suite of 14 Java-based software tools to accomplish on-line, real-time geologic and engineering reservoir modeling. ... Keywords: GEMINI, Java, Petroleum web-based software, Reservoir modeling, Web start, XML

John Victorine; W. Lynn Watney; Saibal Bhattacharya

2005-11-01T23:59:59.000Z

194

Sound-colour synaesthesia, chromatic representation of sounds waves in Java applets  

Science Conference Proceedings (OSTI)

The paper herein presents a way in which sound waves are chromatically represented in Java language. It intends to be, as its' title reveals, an instructional material providing help in developing interactive tools for efficient education in sciences, ... Keywords: RGB light, education, java applets, music, sounds waves

Stela Dragulin; Livia Sangeorzan; Mircea Parpalea

2010-09-01T23:59:59.000Z

195

Using You Tube to enhance student class preparation in an introductory Java course  

Science Conference Proceedings (OSTI)

We provided 21 short YouTube videos for an Introduction to Programming in Java course. Students were surveyed on how often they watched the videos and did the readings, and how much these activites contributed to their learning. When professors ... Keywords: java, videos, youtube

Martin C. Carlisle

2010-03-01T23:59:59.000Z

196

SableVM: a research framework for the efficient execution of java bytecode  

Science Conference Proceedings (OSTI)

SableVM is an open-source virtual machine for Java intended as a research framework for efficient execution of Java bytecode. The framework is essentially composed of an extensible bytecode interpreter using state-of-the-art and innovative techniques. ...

Etienne M. Gagnon; Laurie J. Hendren

2001-04-01T23:59:59.000Z

197

9 Modelling the CoCoME with the JAVA/A Component Model  

E-Print Network (OSTI)

-founded and coherent modelling and programming concepts for components: based on sound theoretical foundations it en and a Java-based architectural programming language. 9.1.1 Goals and Scope of the Component Model The JAVA is the representation of software architecture entities in a programming language. For this purpose we introduced

Gilmore, Stephen

198

An evaluation of Java's I/O capabilities for high-performance computing.  

SciTech Connect

Java is quickly becoming the preferred language for writing distributed applications because of its inherent support for programming on distributed platforms. In particular, Java provides compile-time and run-time security, automatic garbage collection, inherent support for multithreading, support for persistent objects and object migration, and portability. Given these significant advantages of Java, there is a growing interest in using Java for high-performance computing applications. To be successful in the high-performance computing domain, however, Java must have the capability to efficiently handle the significant I/O requirements commonly found in high-performance computing applications. While there has been significant research in high-performance I/O using languages such as C, C++, and Fortran, there has been relatively little research into the I/O capabilities of Java. In this paper, we evaluate the I/O capabilities of Java for high-performance computing. We examine several approaches that attempt to provide high-performance I/O--many of which are not obvious at first glance--and investigate their performance in both parallel and multithreaded environments. We also provide suggestions for expanding the I/O capabilities of Java to better support the needs of high-performance computing applications.

Dickens, P. M.; Thakur, R.

2000-11-10T23:59:59.000Z

199

Mechanisms for Secure Modular Programming in Java Lujo Bauer Andrew W. Appel Edward W. Felten  

E-Print Network (OSTI)

structure the interaction between different parts of a program. They must do this not only to protect Java packages, however, is the ability to structure modules so as to provide different views, protected, package-scope, or public) aren't expressive enough, so Java resorts to using a security manager

Appel, Andrew W.

200

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics  

E-Print Network (OSTI)

Reconstructed streamflow for Citarum River, Java, Indonesia: linkages to tropical climate dynamics Abstract The Citarum river basin of western Java, Indonesia, which supplies water to 10 million residents in drought and flood prone regions of the globe (e.g. Boer 2007). In Indonesia, integrated action is needed

Ummenhofer, Caroline C.

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1  

E-Print Network (OSTI)

Monsoon drought over Java, Indonesia, during the past two centuries Rosanne D'Arrigo,1 Rob Wilson,2 reconstruct the boreal autumn (October­November) Palmer Drought Severity Index (PDSI) for Java, Indonesia between the climate of Indonesia and the large scale tropical Indo-Pacific climate system. Citation: D

202

The Java-Sumatra Aerial Mega-Tramway  

E-Print Network (OSTI)

A mega-tramway based on the Indonesian islands of Sumatra and Java is proposed to span Sunda Strait. The Java-Sumatra Aerial Mega-Tramway (JSAMT) will be self-elevating and will regularly and cheaply launch passengers and cargoes via two conveyor belt-like facilities using standard winged shipping containers like those currently used by international trucking and ocean shipping industries that are volplaned across the Sunda Strait. The JSAMT will be a self-sustaining toll facility free of any requirement for international loans or funding guarantees for its construction. Its existence will remove any immediate need for an expensive to dig/maintain Nusantara Tunnel. We offer the formative basic technical specifications for the JSAMT and indicate some of the physical and cultural geographical facts underpinning our macro-engineering proposal; offshoots of a perfected and tested JSAMT may be installed at Palk Strait between India and Sri Lanka, the Gibraltar Strait and the Bering Strait by mid-21st Century.

Alexander Bolonkin; Richard Cathcart

2007-01-09T23:59:59.000Z

203

Event Reconstruction for Many-core Architectures using Java  

SciTech Connect

Although Moore's Law remains technically valid, the performance enhancements in computing which traditionally resulted from increased CPU speeds ended years ago. Chip manufacturers have chosen to increase the number of core CPUs per chip instead of increasing clock speed. Unfortunately, these extra CPUs do not automatically result in improvements in simulation or reconstruction times. To take advantage of this extra computing power requires changing how software is written. Event reconstruction is globally serial, in the sense that raw data has to be unpacked first, channels have to be clustered to produce hits before those hits are identified as belonging to a track or shower, tracks have to be found and fit before they are vertexed, etc. However, many of the individual procedures along the reconstruction chain are intrinsically independent and are perfect candidates for optimization using multi-core architecture. Threading is perhaps the simplest approach to parallelizing a program and Java includes a powerful threading facility built into the language. We have developed a fast and flexible reconstruction package (org.lcsim) written in Java that has been used for numerous physics and detector optimization studies. In this paper we present the results of our studies on optimizing the performance of this toolkit using multiple threads on many-core architectures.

Graf, Norman A.; /SLAC

2012-04-19T23:59:59.000Z

204

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

205

T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

686: IBM Tivoli Integrated Portal Java Double Literal Denial of 686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability August 8, 2011 - 3:00pm Addthis PROBLEM: A vulnerability in the Java Runtime Environment allows unauthenticated network attacks ( i.e. it may be exploited over a network without the need for a username and password) PLATFORM: Tivoli versions prior to 1.1.1.15. ABSTRACT: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. reference LINKS: IBM ID: 1508061 Secunia Advisory: SA45556 CVE-2010-4476 IMPACT ASSESSMENT: Medium Discussion: IBM has acknowledged a vulnerability in IBM Tivoli Integrated Portal, which can be exploited by malicious people to cause a DoS (Denial of Service).

206

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

207

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

208

V-120: EMC Smarts Network Configuration Manager Java RMI Access Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access 0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control March 27, 2013 - 12:51am Addthis PROBLEM: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control PLATFORM: Version(s): prior to 9.2 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028342 www.emc.com CVE-2013-0935 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can access some Java Remote Method Invocation methods without authenticating to gain control of the target system. A user can exploit unspecified flaws in the NCM System Management

209

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

210

V-072: Red Hat update for java-1.7.0-openjdk | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Red Hat update for java-1.7.0-openjdk 2: Red Hat update for java-1.7.0-openjdk V-072: Red Hat update for java-1.7.0-openjdk January 18, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for java-1.7.0-openjdk. PLATFORM: The vulnerabilities are reported in Red Hat Enterprise Linux 5 and 6 ABSTRACT: Red Hat has issued an update for java-1.7.0-openjdk. REFERENCE LINKS: Secunia Advisory SA51858 RHSA-2013:0165-1 CVE-2012-3174 CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. IMPACT: Two improper permission check issues were discovered in the reflection API in OpenJDK. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. SOLUTION: Vendor advises to upgrade to these updated packages, which resolve these

211

Modular Workflow Engine for Distributed Services using Lightweight Java Clients  

E-Print Network (OSTI)

In this article we introduce the concept and the first implementation of a lightweight client-server-framework as middleware for distributed computing. On the client side an installation without administrative rights or privileged ports can turn any computer into a worker node. Only a Java runtime environment and the JAR files comprising the workflow client are needed. To connect all clients to the engine one open server port is sufficient. The engine submits data to the clients and orchestrates their work by workflow descriptions from a central database. Clients request new task descriptions periodically, thus the system is robust against network failures. In the basic set-up, data up- and downloads are handled via HTTP communication with the server. The performance of the modular system could additionally be improved using dedicated file servers or distributed network file systems. We demonstrate the design features of the proposed engine in real-world applications from mechanical engineering. We have used ...

Vetter, R -M; Peetz, J -V

2009-01-01T23:59:59.000Z

212

Criticality Model  

Science Conference Proceedings (OSTI)

The ''Disposal Criticality Analysis Methodology Topical Report'' (YMP 2003) presents the methodology for evaluating potential criticality situations in the monitored geologic repository. As stated in the referenced Topical Report, the detailed methodology for performing the disposal criticality analyses will be documented in model reports. Many of the models developed in support of the Topical Report differ from the definition of models as given in the Office of Civilian Radioactive Waste Management procedure AP-SIII.10Q, ''Models'', in that they are procedural, rather than mathematical. These model reports document the detailed methodology necessary to implement the approach presented in the Disposal Criticality Analysis Methodology Topical Report and provide calculations utilizing the methodology. Thus, the governing procedure for this type of report is AP-3.12Q, ''Design Calculations and Analyses''. The ''Criticality Model'' is of this latter type, providing a process evaluating the criticality potential of in-package and external configurations. The purpose of this analysis is to layout the process for calculating the criticality potential for various in-package and external configurations and to calculate lower-bound tolerance limit (LBTL) values and determine range of applicability (ROA) parameters. The LBTL calculations and the ROA determinations are performed using selected benchmark experiments that are applicable to various waste forms and various in-package and external configurations. The waste forms considered in this calculation are pressurized water reactor (PWR), boiling water reactor (BWR), Fast Flux Test Facility (FFTF), Training Research Isotope General Atomic (TRIGA), Enrico Fermi, Shippingport pressurized water reactor, Shippingport light water breeder reactor (LWBR), N-Reactor, Melt and Dilute, and Fort Saint Vrain Reactor spent nuclear fuel (SNF). The scope of this analysis is to document the criticality computational method. The criticality computational method will be used for evaluating the criticality potential of configurations of fissionable materials (in-package and external to the waste package) within the repository at Yucca Mountain, Nevada for all waste packages/waste forms. The criticality computational method is also applicable to preclosure configurations. The criticality computational method is a component of the methodology presented in ''Disposal Criticality Analysis Methodology Topical Report'' (YMP 2003). How the criticality computational method fits in the overall disposal criticality analysis methodology is illustrated in Figure 1 (YMP 2003, Figure 3). This calculation will not provide direct input to the total system performance assessment for license application. It is to be used as necessary to determine the criticality potential of configuration classes as determined by the configuration probability analysis of the configuration generator model (BSC 2003a).

A. Alsaed

2004-09-14T23:59:59.000Z

213

Cs-Se (Cesium - Selenium)  

Science Conference Proceedings (OSTI)

Cs-Se crystallographic data...Cs-Se crystallographic data Phase Composition, wt% Se Pearson symbol Space group (Cs) 0 cI 2 Im m Cs 2 Se 22.9 oP 12 Pnma Cs 3 Se 2 28 â?¦ â?¦ Cs 5 Se 4 32.2 â?¦ â?¦ CsSe 37.3 â?¦ â?¦ Cs 2 Se 3 47 oC 20 Cmc 2 1 Cs 2 Se 5 59.7 oP 28 P 2 1 2 1 2 1 (Se) 100 hP 3 P 3 1 2 1 High-pressure phase Cs 2 Se 22.9 oF 24 Fdd 2...

214

Midea: Proposed Penalty (2010-SE-0110, 2012-SE-1402, 2012-SE-1404) |  

NLE Websites -- All DOE Office Websites (Extended Search)

Proposed Penalty (2010-SE-0110, 2012-SE-1402, 2012-SE-1404) Proposed Penalty (2010-SE-0110, 2012-SE-1402, 2012-SE-1404) Midea: Proposed Penalty (2010-SE-0110, 2012-SE-1402, 2012-SE-1404) November 20, 2012 DOE alleged in a Notice of Proposed Civil Penalty that Midea America Corp., Hefei Hualing Co., Ltd., and China Refrigeration Industry Co., Ltd. manufactured and distributed noncompliant refrigerator-freezers and freezers in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Midea: Proposed Penalty (2010-SE-0110, 2012-SE-1402, 2012-SE-1404)

215

U-087: HP-UX update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP-UX update for Java 7: HP-UX update for Java U-087: HP-UX update for Java January 24, 2012 - 7:00am Addthis PROBLEM: HP issued an update for Java in HP-UX to address multiple vulnerabilities. PLATFORM: HP-UX 11.x ABSTRACT: Multiple vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information. reference LINKS: Secunia Advisory 47709 Secunia Advisory 46512 HP Support Document IMPACT ASSESSMENT: High Discussion: The vulnerabilities are reported in versions B.11.11, B.11.23, and B.11.31 running HP JDK and JRE 6.0.12 and prior. Vulnerabilities inlcude the ability to hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a

216

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-214: HP Network Node Manager Java JDK / JRE Multiple U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

217

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

218

U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager Java JDK / JRE Multiple 4: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities July 17, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in version 9.0x running on HP-UX, Linux, Solaris, and Windows. ABSTRACT: Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS). reference LINKS: HP Support document ID: c03405642 Secunia Advisory SA49966 IMPACT ASSESSMENT: High Discussion: HP has acknowledged some vulnerabilities in HP Network Node Manager, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially

219

Dynamic Information Flow Analysis for JavaScript in a Web Browser  

E-Print Network (OSTI)

Flow Analysis for JavaScript in a Web Browser by Thomas H.a central technology of the web, but it is also the sourceinformation flows in javascript web applications. In ACM

Austin, Thomas Howard

2013-01-01T23:59:59.000Z

220

Kopitiam: modular incremental interactive full functional static verification of java code  

Science Conference Proceedings (OSTI)

We are developing Kopitiam, a tool to interactively prove full functional correctness of Java programs using separation logic by interacting with the interactive theorem prover Coq. Kopitiam is an Eclipse plugin, enabling seamless integration into the ...

Hannes Mehnert

2011-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Interannual Variability of Sea Surface Temperature off Java and Sumatra in a Global GCM  

Science Conference Proceedings (OSTI)

Using results from the Simple Ocean Data Assimilation (SODA), this study assesses the mixed layer heat budget to identify the mechanisms that control the interannual variation of sea surface temperature (SST) off Java and Sumatra. The analysis ...

Yan Du; Tangdong Qu; Gary Meyers

2008-06-01T23:59:59.000Z

222

Code for Java Libraries for Accessing the Princeton Wordnet: Comparison and Evaluation  

E-Print Network (OSTI)

This archive contains the code and data for running the evaluations described in: Finlayson, Mark Alan (2014) "Java Libraries for Accessing the Princeton Wordnet: comparison and Evaluation" in Proceedings of the 7th Global ...

Finlayson, Mark Alan

2013-11-01T23:59:59.000Z

223

Comparison between CPBPV, ESC/Java, CBMC, Blast, EUREKA and Why for Bounded Program Verification  

E-Print Network (OSTI)

This report describes experimental results for a set of benchmarks on program verification. It compares the capabilities of CPBVP "Constraint Programming framework for Bounded Program Verification" [4] with the following frameworks: ESC/Java, CBMC, Blast, EUREKA and Why.

Collavizza, Hélène; Van Hentenryck, Pascal

2008-01-01T23:59:59.000Z

224

JConstHide: A Framework for Java Source Code Constant Hiding  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called byte codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks . But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. We in this paper are proposing a framework named JConstHide for hiding constants, especially integers in the java source codes, to defeat reverse en...

Sivadasan, Praveen

2009-01-01T23:59:59.000Z

225

InterProlog: Towards a declarative embedding of logic programming in Java  

E-Print Network (OSTI)

Abstract. InterProlog is the first Prolog-Java interface to support multiple Prolog systems through the same API; currently XSB and SWI Prolog, with GNU Prolog and YAP under development – on Windows, Linux and Mac OS X. It promotes coarse-grained integration between logic and object-oriented layers, by providing the ability to bidirectionally map any class data structure to a Prolog term; integration is done either through the Java Native Interface or TCP/IP sockets. It is proposed as a first step towards a common standard Java + Prolog API, gifting the Java developer with the best inference engines, and the logic programmer with simple access to the mainstream object-oriented platform. 1

Miguel Calejo

2004-01-01T23:59:59.000Z

226

Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University  

E-Print Network (OSTI)

The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming Self-Efficacy Scale were used in collecting relevant information from the subjects. The resulting data were analyzed using Pearson product correlation and Multiple regression analysis. Findings revealed that Java Programming self-efficacy has no significant relationship with each of the computing and programming background factors. It was additionally obtained that the number of programming courses offered and programming courses weighed scores were the only predictors of Java self-efficacy.

Jegede, Philip Olu

2009-01-01T23:59:59.000Z

227

Nues ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab  

E-Print Network (OSTI)

Nuées ardentes of 22 November 1994 at Merapi volcano, Java, Indonesia E.K Abdurachmanab J Volcanological Survey of Indonesia, Jl. Diponegoro 57, Bandung 40122, Indonesia c Centre de Recherches

Paris-Sud XI, Université de

228

6.092 Introduction to Software Engineering in Java, January (IAP) 2008  

E-Print Network (OSTI)

This course is an introduction to software engineering, using the Java™ programming language; it covers concepts useful to 6.005. The focus is on developing high quality, working software that solves real problems. Students ...

Akeju, Usman O.

229

Searching for the biofuel energy crisis in rural Java  

SciTech Connect

Biofuel shortage in peasant economies is often reported to reach crisis proportions in conditions of high population density. As a group, peasants are portrayed as engaging in irrational biofuel resource abuse. At times this abuse is treated as the inevitable outcome of excess biofuel demand. Otherwise, an explanation is often given in terms of resource-use problems inherent in common property. An alternative explanation is proposed in this dissertation. Rather than the effect of common property (a structure), such crises are more likely the result of capitalist expansion (a process). Systems of common foraging are prone to ownership conflict during transitions to private property. This conflict provides a more cogent explanation for biofuel shortage than any structural flaw in common-use systems. Contemporary rural Java contradicts mechanistic applications of supply/demand models of biofuel shortage. Despite high population pressure, biofuel is not inordinately scarce. There is little basis for the crisis predictions. While assessments of biofuel demand and supply can provide scarcity indicators, they ought not be used to predict overuse. The traditional crisis predictions of supply/demand balancing and common property analysis must be replaced by a more skeptical multi-disciplinary approach.

McGranahan, G.

1986-01-01T23:59:59.000Z

230

High-performance file I/O in Java : existing approaches and bulk I/O extensions.  

Science Conference Proceedings (OSTI)

There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

2001-07-01T23:59:59.000Z

231

Gain Time Reclaiming in High Performance Real-Time Java Systems  

E-Print Network (OSTI)

The run-time characteristics of Java, such as high frequency of method invocation, dynamic dispatching and dynamic loading, make Java more difficult than other object-oriented programming languages, such as C++, for conducting Worst-Case Execution Time (WCET) analysis. To offer a more flexible way to develop object-oriented real-time applications in the realtime Java environment without loss of predicability and performance, we propose a novel gain time reclaiming framework integrated with WCET analysis. This paper demonstrates how to improve the utilisation and performance of the whole system by reclaiming gain time at run-time. Our approach shows that integrating WCET with gain time reclaiming can not only provide a more flexible environment, but it also does not necessarily result in unsafe or unpredictable timing behaviour.

Erik Yu-Shing Hu; Andy Wellings; Guillem Bernat

2003-01-01T23:59:59.000Z

232

JDATATRANS for Array Obfuscation in Java Source Code to Defeat Reverse Engineering from Decompiled Codes  

E-Print Network (OSTI)

Software obfuscation or obscuring a software is an approach to defeat the practice of reverse engineering a software for using its functionality illegally in the development of another software. Java applications are more amenable to reverse engineering and re-engineering attacks through methods such as decompilation because Java class files store the program in a semi complied form called 'byte' codes. The existing obfuscation systems obfuscate the Java class files. Obfuscated source code produce obfuscated byte codes and hence two level obfuscation (source code and byte code level) of the program makes it more resilient to reverse engineering attacks. But source code obfuscation is much more difficult due to richer set of programming constructs and the scope of the different variables used in the program and only very little progress has been made on this front. Hence programmers resort to adhoc manual ways of obscuring their program which makes it difficult for its maintenance and usability. To address thi...

Sivadasan, Praveen; Sivadasan, Naveen

2008-01-01T23:59:59.000Z

233

Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid  

E-Print Network (OSTI)

This article introduces Object-Oriented Intensional Programming (OO-IP), a new hybrid language between Object-Oriented and Intensional Programming Languages in the sense of the latest evolutions of Lucid. This new hybrid language combines the essential characteristics of Lucid and Java, and introduces the notion of object streams which makes it is possible that each element in a Lucid stream to be an object with embedded intensional properties. Interestingly, this hybrid language also brings to Java objects the power to explicitly express and manipulate the notion of context, creating the novel concept of intensional object, i.e. objects whose evaluation is context-dependent, which are here demonstrated to be translatable into standard objects. By this new approach, we extend the use and meaning of the notion of intensional objects and enrich the meaning of object streams in Lucid and semantics of intensional objects in Java.

Wu, Aihua; Mokhov, Serguei A

2009-01-01T23:59:59.000Z

234

Midea: Amended Noncompliance Determination (2010-SE-0110, 2012-SE-1402) |  

NLE Websites -- All DOE Office Websites (Extended Search)

Amended Noncompliance Determination (2010-SE-0110, Amended Noncompliance Determination (2010-SE-0110, 2012-SE-1402) Midea: Amended Noncompliance Determination (2010-SE-0110, 2012-SE-1402) November 26, 2012 DOE issued an Amended Notice of Noncompliance Determination to Midea America Corp., Hefei Hualing Co., Ltd., and China Refrigeration Industry Co., Ltd. finding that basic model HD-146F, a refrigerator-freezer, and basic model HS-390C, a freezer, do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. Midea must immediately notify each person (or company) to whom Midea distributed the noncompliant products that the product does not meet Federal standards. In addition, Midea must provide to DOE documents and records showing the number of units Midea distributed

235

Solon SE | Open Energy Information  

Open Energy Info (EERE)

Berlin, Germany Zip D-12489 Sector Solar Product Manufacturer of PV modules and tracking systems, and integrator of solar systems. References Solon SE1 LinkedIn Connections...

236

Measuring Sulphur Dioxide (SO2) Emissions in October, 2010 Catastrophic Eruption from Merapi Volcano in Java, Indonesia  

E-Print Network (OSTI)

Volcano in Java, Indonesia with Ozone Monitoring Instrument (OMI) José A. Morales-Collazo Geology This paper discusses sulfur dioxide (SO2) cloud emissions from Merapi Volcano in Java, Indonesia during, Indonesia. In October 26th , 2010, a catastrophic eruption was reported from Merapi causing nearly 386

Gilbes, Fernando

237

Array Based Java Source Code Obfuscation Using Classes with Restructured Arrays  

E-Print Network (OSTI)

Array restructuring operations obscure arrays. Our work aims on java source code obfuscation containing arrays. Our main proposal is Classes with restructured array members and obscured member methods for setting, getting array elements and to get the length of arrays. The class method definition codes are obscured through index transformation and constant hiding. The instantiated objects of these classes are used for source code writing. A tool named JDATATRANS is developed for generating classes and to the best of our knowledge this is the first tool available for array restructuring, on java source codes.

Sivadasan, Praveen

2008-01-01T23:59:59.000Z

238

Migrating legacy data structures based on variable overlay to Java  

Science Conference Proceedings (OSTI)

Legacy information systems, such as banking systems, are usually organized around their data model. Hence, when these systems are migrated to modern environments, translation of the data model involves the most critical decisions, having strong implications ... Keywords: legacy systems migration, object-oriented data model, reverse engineering

Mariano Ceccato; Thomas Roy Dean; Paolo Tonella; Davide Marchignoli

2010-04-01T23:59:59.000Z

239

jContractor: Introducing Design-by-Contract to Java Using Reflective Bytecode Instrumentation  

Science Conference Proceedings (OSTI)

Design by Contract is a software engineering practice that allows semantic information to be added to a class or interface to precisely specify the conditions that are required for its correct operation. The basic constructs of Design by Contract are ... Keywords: Design by Contract, Java, bytecode instrumentation, jContractor

Murat Karaorman; Parker Abercrombie

2005-11-01T23:59:59.000Z

240

DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH  

E-Print Network (OSTI)

for incoming calls to the exported remote object. The others are worker threads for handling each accepted-time worker threads for handling incoming calls to exported remote objects. We have modified the run() methodDESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH Sangig Rho Samsung

Choi, Byung K.

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Hard Real-Time Garbage Collection for a Java Chip Multi-Processor  

E-Print Network (OSTI)

or hard copies of all or part of this work for personal or classroom use is granted without fee provided, these approaches implement substantial parts or all of the garbage collector in hard- ware. In contrast, ourHard Real-Time Garbage Collection for a Java Chip Multi-Processor Wolfgang Puffitsch Institute

242

CSY3019 -Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 3D graphics software: Java 2D (50 and/or strip lights). · User defined or loaded geometry (i.e. not primitive shapes). · The room & Title Page · Table of contents · Introduction · Analysis · Design · Implementation · Testing

Hill, Gary

243

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Tucci, Robert R

2008-01-01T23:59:59.000Z

244

Java Application that Outputs Quantum Circuit for Some NAND Formula Evaluators  

E-Print Network (OSTI)

This paper introduces QuanFruit v1.1, a Java application available for free. (Source code included in the distribution.) Recently, Farhi-Goldstone-Gutmann (FGG) wrote a paper arXiv:quant-ph/0702144 that proposes a quantum algorithm for evaluating NAND formulas. QuanFruit outputs a quantum circuit for the FFG algorithm.

Robert R. Tucci

2008-02-17T23:59:59.000Z

245

A High Integrity Profile for Memory Safe Programming in Real-time Java  

E-Print Network (OSTI)

the structure of Real-time Java programs. By giving an additional mean- ing to the package construct, we, de be allocated within any package ­ but will be prevented from abstract class ScopeGate { protected Scope, we moved classes amongst packages so that Scoped Zen's package structure matched the scope structure

Zhao, Tian

246

Real-time remote control of a robot manipulator using Java and client-server architecture  

Science Conference Proceedings (OSTI)

The control of complex systems through PC networks is becoming increasingly important nowadays, both in the industries and in R&D centers. In this paper, a novel architecture is described which provides 24-h-a-day access to a remote system for remote ... Keywords: RS232, client, communication protocol, internet, java, planar manipulator, real-time, remote control, server

F. M. Raimondi; L. S. Ciancimino; M. Melluso

2005-03-01T23:59:59.000Z

247

Proceedings of the 3rd international symposium on Principles and practice of programming in Java  

Science Conference Proceedings (OSTI)

It gives me great pleasure to welcome you to Las Vegas, Nevada for the 3rd International Conference on Principles and Practice of Programming in Java.Forty one papers were submitted and a total of twenty four (58%) have been selected for presentation ...

John Waldron

2004-06-01T23:59:59.000Z

248

A Time-Lagged Ensemble Simulation on the Modulation of Precipitation over West Java in January–February 2007  

Science Conference Proceedings (OSTI)

A numerical experiment using a regional nonhydrostatic model is performed to investigate the synoptic condition related to the heavy precipitation event that occurred at Jakarta in West Java, Indonesia, in January–February 2007. A time-lagged ...

Nurjanna J. Trilaksono; Shigenori Otsuka; Shigeo Yoden

2012-02-01T23:59:59.000Z

249

A Java Library for the Generation and Scheduling of PTX Assembly  

SciTech Connect

This paper discusses an ongoing progress regarding the development of a Java-based library for rapid kernel prototyping in NVIDIA PTX and PTX instruction scheduling. It is aimed at developers seeking total control of emitted PTX, highly parametric emission of, and tunable instruction reordering. It is primarily used for code development at ICHEC but is also hoped that NVIDIA GPU community will also find it beneficial.

Kartsaklis, Christos [ORNL; Civario, G [Irish Centre for High-End Computing

2010-01-01T23:59:59.000Z

250

SoapRMI C++/Java 1.1: Design and Implementation  

E-Print Network (OSTI)

Java RMI provides a simple and elegant paradigm for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed systems that are written in different languages and optimized to run in disparate environments. XML [10] has emerged as a promising standard for language-independent data representation, and HTTP as a widely-used firewall-friendly network protocol. It is now possible to design and develop a communication system that combines the elegance and strength of Java RMI with the ubiquity of HTTP and platform and language independence of XML. SOAP [12] defines XML based communication and SOAP RPC precisely states the protocol for using XML as the data format and HTTP as the network protocol. This paper presents the design issues in layering a C++ and Java based RMI system on top of SOAP RPC along with an efficient XML Pull Parser that we designed to parse SOAP calls. We explain the various features of the resulting SoapRMI system: dynamic proxies, stub-skeleton generation from XML specification, interoperability, exception handling and different "Naming" services. Key Words: RMI, Distributed Systems, XML, SOAP, Naming 1

Aleksander Slominski; Madhusudhan Govindaraju; Dennis Gannon; Randall Bramley

2001-01-01T23:59:59.000Z

251

Anisotropy in CdSe quantum rods  

E-Print Network (OSTI)

in synthesizing monodisperse CdSe nanorods has allowed us toout the phase diagram of the CdSe nanorod solution in order2. Controlled Synthesis of CdSe Nanorods 2.1 Introduction In

Li, Liang-shi

2003-01-01T23:59:59.000Z

252

Nuclear criticality safety guide  

Science Conference Proceedings (OSTI)

This technical reference document cites information related to nuclear criticality safety principles, experience, and practice. The document also provides general guidance for criticality safety personnel and regulators.

Pruvost, N.L.; Paxton, H.C. [eds.] [eds.

1996-09-01T23:59:59.000Z

253

THERMODYNAMIC PROPERTIES OF SeS  

E-Print Network (OSTI)

Korenev, et al. used the CdS-CdSe and ZnS-ZnSe systemsto measure. For the CdS-CdSe system, Korenev, et al. wereVapor pressures for CdS and CdSe are better established. A

Huang, M.-D.

2011-01-01T23:59:59.000Z

254

A Java Math.BigDecimal Implementation of Core Mathematical Functions  

E-Print Network (OSTI)

The mathematical functions log(x), exp(x), root[n]x, sin(x), cos(x), tan(x), arcsin(x), arctan(x), x^y, sinh(x), cosh(x), tanh(x) and Gamma(x) have been implemented for arguments x in the real domain in a native Java library on top of the multi-precision BigDecimal representation of floating point numbers. This supports scientific applications where more than the double precision accuracy of the library of the Standard Edition is desired. The full source code is made available.

Mathar, Richard J

2009-01-01T23:59:59.000Z

255

Nuclear criticality accidents  

SciTech Connect

Criticality occurs when a sufficient quantity of fissionable material is accumulated, and it results in the liberation of nuclear energy. All process accidents have involved plutonium or highly enriched uranium, as have most of the critical experiment accidents. Slightly enriched uranium systems require much larger quantities of material to achieve criticality. An appreciation of criticality accidents should be based on an understanding of factors that influence criticality, which are discussed in this article. 11 references.

Smith, D.R. (Los Alamos National Laboratory, New Mexico (Unites States))

1991-10-01T23:59:59.000Z

256

Secretary Chu to Lead Delegation to SE4All, CEM Conferences in London |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secretary Chu to Lead Delegation to SE4All, CEM Conferences in Secretary Chu to Lead Delegation to SE4All, CEM Conferences in London Secretary Chu to Lead Delegation to SE4All, CEM Conferences in London April 9, 2012 - 10:13am Addthis WASHINGTON, DC - Later this month, U.S. Energy Secretary Steven Chu will join Energy Ministers from the world's leading economies in London for the UN Sustainable Energy for All (SE4All) conference and the Clean Energy Ministerial (CEM3). CEM3 and SE4All will hold a joint press conference on April 26, 2012, to announce outcomes from the ministerial and release the SE4All Action Agenda. The High Level Group of SE4All will work to accelerate progress on critical clean energy priorities. SE4All's objectives are to double the global rate of improvement in energy efficiency, double the share of renewable

257

Secretary Chu to Lead Delegation to SE4All, CEM Conferences in London |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SE4All, CEM Conferences in SE4All, CEM Conferences in London Secretary Chu to Lead Delegation to SE4All, CEM Conferences in London April 9, 2012 - 10:13am Addthis WASHINGTON, DC - Later this month, U.S. Energy Secretary Steven Chu will join Energy Ministers from the world's leading economies in London for the UN Sustainable Energy for All (SE4All) conference and the Clean Energy Ministerial (CEM3). CEM3 and SE4All will hold a joint press conference on April 26, 2012, to announce outcomes from the ministerial and release the SE4All Action Agenda. The High Level Group of SE4All will work to accelerate progress on critical clean energy priorities. SE4All's objectives are to double the global rate of improvement in energy efficiency, double the share of renewable energy in the global energy mix, and ensure universal access to modern

258

In Proceedings of the Internet Society Symp. on Network and Distributed System Security, San Diego, CA, March 1988 Implementing Protection Domains in the Java TM Development Kit 1.2  

E-Print Network (OSTI)

­ pals. The new class java.security.ProtectionDomain is package­private, and is transparent to most Java.security package. #12; From within Java code, the protection domain of a given class is obtained by invoking the static method getProtectionDomain(CodeSource), again a private method within the package. For each class

Krintz, Chandra

259

THERMODYNAMIC PROPERTIES OF SeS  

E-Print Network (OSTI)

rights . ;, a 9 U (t,) -iii- THERMODYNAMIC PROPERTIES OF SeSSeS gas. only estimated thermodynamic data are Since groupinterest to study the thermodynamic properties of SeS in

Huang, M.-D.

2011-01-01T23:59:59.000Z

260

CRITICALITY SAFETY (CS)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OBJECTIVE CS.1 The LANL criticality safety program provides the required technical guidance and oversight capabilities to ensure a comprehensive criticality safety program for the storage of nuclear materials in SSTs. (Core Requirements 3, 4, 8) Criteria * The Criticality Safety Program is an administrative TSR and meets the General and * Specific Requirements of DOE O 420.1A, Section 4.3 Nuclear Criticality Safety. * All processes and operations involving significant quantities of fissile materials are * described in current procedures approved by line management. * Procedures contain approved criticality controls and limits, based on HSR-6 evaluations and recommendations. * Supervisors, operations personnel, and criticality safety officers have received

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Design of an XML based Interoperable RMI System: SoapRMI C++/Java 1.1  

E-Print Network (OSTI)

and remote exception handling between the C++ and Java implementations of SoapRMI. The paper explores JVM as the remote object and handles communication with the stub. The registry is used to manage for communication with objects in remote address spaces. RMI is a de facto standard for communication in distributed

262

CSY3019 -Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50%)  

E-Print Network (OSTI)

CSY3019 - Graphics Programming Assignment 2: Development of 2D/3D graphics software: Java 3D (50, directional, point and spot lighting (to model windows and/or strip lights). · User defined or loaded geometry. Front Sheet & Title Page · Table of contents · Introduction · Analysis · Design · Implementation

Hill, Gary

263

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

, the structure of classes in a unit's imported and exported packages can be described using package signatures structure of classes in a Java package. In Figure 2, the package signature ui s describes a UI library Program. In the package signature the structure of a class is described using a class signature. The class

Hsieh, Wilson

264

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated, and Buffered Indices  

E-Print Network (OSTI)

NEUStore (version 1.4): A Simple Java Package for the Construction of Disk-based, Paginated structures. This could happen if you want the students in your database class to implement some basic index structures such as the B+-tree and the linear hashing. Alternatively, you may want your Ph.D. students

Zhang, Donghui

265

Jiazzi: New-Age Components for Old-Fashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi- ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Flatt, Matthew

266

Jiazzi: NewAge Components for OldFashioned Java Sean McDirmid, Matthew Flatt, Wilson C. Hsieh  

E-Print Network (OSTI)

this language, the structure of classes in a unit's imported and exported packages can be described using that are used to describe the visi­ ble structure of classes in a Java package. In Figure 2, the package applet s describes an application with class Program. In the package signature the structure of a class

Utah, University of

267

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James M. Russell a  

E-Print Network (OSTI)

A severe drought during the last millennium in East Java, Indonesia Jessica R. Rodysill a, *, James of Mining and Petroleum Engineering, Institut Teknologi Bandung, Bandung 40132, Indonesia d Department Available online Keywords: Drought Indonesia Indo-Pacific Warm Pool El Niño-Southern Oscillation Little Ice

Vuille, Mathias

268

Fluid transport properties and estimation of overpressure at the Lusi mud volcano, East Java Basin (Tanikawa et al., 2010)  

E-Print Network (OSTI)

Java Basin (Tanikawa et al., 2010) Richard Daviesa, , Michael Mangab , Mark Tingayc , Richard was caused by drilling of the Banjar Panji 1 gas exploration well (Davies et al., 2007; Manga, 2007; Davies et al., 2008; Tingay et al., 2008) or due to the Yogyakarta earthquake that occurred at 05:54 am

Manga, Michael

269

Engineered Products: Noncompliance Determination (2012-SE-5401) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2012-SE-5401) Noncompliance Determination (2012-SE-5401) Engineered Products: Noncompliance Determination (2012-SE-5401) July 26, 2012 DOE issued a Notice of Noncompliance Determination to Engineered Products Company (EPCO) finding that basic model 15701 of metal halide lamp fixture does not comport with the energy conservation standards. DOE determined the product was noncompliant based on the company's own testing. EPCO must immediately notify each person (or company) to whom EPCO distributed the noncompliant product that the product does not meet Federal standards. Engineered Products: Noncompliance Determination (2012-SE-5401) More Documents & Publications Engineered Products: Proposed Penalty (2012-SE-5401) Engineered Products: Order (2012-SE-5401) Teddico: Noncompliance Determination (2012-SE-5409

270

Elastic and surface energies: Two key parameters for CdSe quantum dot formation  

SciTech Connect

The two-dimensional-three-dimensional transition of a strained CdSe layer on (001) ZnSe induced by the use of amorphous selenium is studied. To precisely control the thickness of the CdSe layer, atomic layer epitaxy growth mode is used. Atomic force microscopy and reflection high-energy electron diffraction measurements reveal the formation of CdSe islands when 3 ML (monolayers) of CdSe, corresponding to the critical thickness, are deposited. When only 2.5 ML of CdSe are deposited another relaxation mechanism is observed, leading to the appearance of strong undulations on the surface. For a 3 ML thick CdSe layer, transmission electron microscopy images indicate that the formation of the islands occurs only after the amorphous selenium desorption.

Robin, Ivan-Christophe; Andre, Regis; Bougerol, Catherine; Aichele, Thomas; Tatarenko, Serge [Laboratoire de Spectrometrie Physique/CNRS UMR5588, Universite Joseph Fourier, Grenoble, BP87, 38402 St. Martin d'Heres (France)

2006-06-05T23:59:59.000Z

271

LinguisticBelief: a java application for linguistic evaluation using belief, fuzzy sets, and approximate reasoning.  

Science Conference Proceedings (OSTI)

LinguisticBelief is a Java computer code that evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised of fuzzy sets, and a rule base describes the reasoning on combinations of variables fuzzy sets. Uncertainty is considered and propagated through the rule base using the belief/plausibility measure. The mathematics of fuzzy sets, approximate reasoning, and belief/ plausibility are complex. Without an automated tool, this complexity precludes their application to all but the simplest of problems. LinguisticBelief automates the use of these techniques, allowing complex problems to be evaluated easily. LinguisticBelief can be used free of charge on any Windows XP machine. This report documents the use and structure of the LinguisticBelief code, and the deployment package for installation client machines.

Darby, John L.

2007-03-01T23:59:59.000Z

272

Java Tool Framework for Automation of Hardware Commissioning and Maintenance Procedures  

Science Conference Proceedings (OSTI)

The National Ignition Facility (NIF) is a 192-beam laser system designed to study high energy density physics. Each beam line contains a variety of line replaceable units (LRUs) that contain optics, stepping motors, sensors and other devices to control and diagnose the laser. During commissioning and subsequent maintenance of the laser, LRUs undergo a qualification process using the Integrated Computer Control System (ICCS) to verify and calibrate the equipment. The commissioning processes are both repetitive and tedious when we use remote manual computer controls, making them ideal candidates for software automation. Maintenance and Commissioning Tool (MCT) software was developed to improve the efficiency of the qualification process. The tools are implemented in Java, leveraging ICCS services and CORBA to communicate with the control devices. The framework provides easy-to-use mechanisms for handling configuration data, task execution, task progress reporting, and generation of commissioning test reports. The tool framework design and application examples will be discussed.

Ho, J C; Fisher, J M; Gordon, J B; Lagin, L J; West, S L

2007-10-02T23:59:59.000Z

273

A distributed hard real-time Java system for high mobility components  

E-Print Network (OSTI)

In this work we propose a methodology for providing real-time capabilities to component-based, on-the-fly recon?gurable, distributed systems. In such systems, software components migrate across computational resources at run-time to allow applications to adapt to changes in user requirements or to external events. We describe how we achieve run-time recon?guration in distributed Java applications by appropriately migrating servers. Guaranteed-rate schedulers at the servers provide the necessary temporal protection and so simplify remote method invocation management. We describe how we manage overhead and resource utilization by controlling the parameters of the server schedulers. According to our measurements, this methodology provides real-time capability to component-based recon?gurable distributed systems in an effcient and effective way. In addition, we propose a new resource discovery protocol, REALTOR, which is based on a combination of pull-based and push-based resource information dissemination. REALTOR has been designed for real-time component-based distributed applications in very dynamic or adverse environments. REALTOR supports survivability and information assurance by allowing the migration of components to safe locations under emergencies suchas externalattack, malfunction, or lackofresources. Simulation studies show that under normal and heavy load conditions REALTOR remains very effective in finding available resources, and does so with a reasonably low communication overhead.REALTOR 1)effectively locates resources under highly dynamic conditions, 2) has an overhead that is system-size independent, and 3) works well in highlyadverse environments.We evaluate the effectiveness of a REALTOR implementation as part of Agile Objects, an infrastructure for real-time capable, highly mobile Java components.

Rho, Sangig

2004-12-01T23:59:59.000Z

274

CRITICALITY SAFETY (CS)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Objective CS.1 - A criticality safety program is established, sufficient numbers of qualified personnel are provided, and adequate facilities and equipment are available to ensure criticality safety support services are adequate for safe operations. (Core Requirements 1, 2, and 6) Criteria * Functions, assignments, responsibilities, and reporting relationships are clearly defined, understood, and effectively implemented. * Operations support personnel for the criticality safety area are adequately staffed and trained. Approach Record Review: Review the documentation that establishes the Criticality Safety Requirements (CSRs) for appropriateness and completeness. Review for adequacy and completion the criticality safety personnel training records that indicate training on facility procedures and systems under

275

Nuclear criticality safety  

SciTech Connect

Important facts of the nuclear criticality safety field are covered in this volume. Both theoretical and practical aspects of the subject are included, based on insights provided by criticality experts and published information from many sources. An overview of nuclear criticality safety theory and a variety of practical in-plant operation applications are presented. Underlying principles of nuclear criticality safety are introduced and the state of the art of this technical discipline is reviewed. Criticality safety theoretical concepts, accident experience, standards, experiments computer calculations, integration of safety methods into individual practices, and overall facility operations are all included.

Knief, R.A.

1985-01-01T23:59:59.000Z

276

Estimation of selenium (Se) intake from Se in serum, whole blood, toenails, or urine  

SciTech Connect

Because Se content of food varies widely, estimates of intake based on Se status are more accurate than those based on food composition tables. 77 free-living subjects from South Dakota and Wyoming, where the range of Se intake was large, provided blood, toenails, and 24-hour urines. Se intake, measured by chemical analysis of 4-8 days of duplicate-plate food composites from each subject, was estimated on the basis of the Se indices. To predict the natural logarithm of Se intake from serum Se the best fit was provided by : {minus}0.465 + 0.568{asterisk}SSe. Addition of lean body mass (LBM (kg)) and energy intake (EI (MJ)) to the model markedly improved the fit. Models based on Se in blood or urine gave slightly better estimates than those based on toenail Se. Consideration of data in addition to indices of Se status resulted in improved estimates of intake.

Longnecker, M.P.; Taylor, P.R.; Levander, O.A.; Flack, V.; Veillon, C.; McAdam, P.A.; Patterson, K.Y.; Holden, J.; Stampfer, M.J.; Morris, J.S.; Willett, W.C. (Univ. of California, Los Angeles (United States) NCI, Rockville, MD (United States) USDA, Beltsville, MD (United States) Harvard Univ., Boston, MA (United States) Univ. of Missouri, Columbia (United States))

1991-03-11T23:59:59.000Z

277

Criticality Model Report  

Science Conference Proceedings (OSTI)

The purpose of the ''Criticality Model Report'' is to validate the MCNP (CRWMS M&O 1998h) code's ability to accurately predict the effective neutron multiplication factor (k{sub eff}) for a range of conditions spanned by various critical configurations representative of the potential configurations commercial reactor assemblies stored in a waste package may take. Results of this work are an indication of the accuracy of MCNP for calculating eigenvalues, which will be used as input for criticality analyses for spent nuclear fuel (SNF) storage at the proposed Monitored Geologic Repository. The scope of this report is to document the development and validation of the criticality model. The scope of the criticality model is only applicable to commercial pressurized water reactor fuel. Valid ranges are established as part of the validation of the criticality model. This model activity follows the description in BSC (2002a).

J.M. Scaglione

2003-03-12T23:59:59.000Z

278

SeWave | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » SeWave Jump to: navigation, search Name SeWave Place Denmark Zip FO-110 Product Denmark-based 50:50 JV between UK's Wavegen and Faroese electricity company SEV to to design and build a tunnelled demonstration wave power plant in the Faroes Islands. References SeWave[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This company is listed in the Marine and Hydrokinetic Technology Database. This article is a stub. You can help OpenEI by expanding it. SeWave is a company located in Denmark . References ↑ "SeWave"

279

Reference handbook: Nuclear criticality  

SciTech Connect

The purpose for this handbook is to provide Rocky Flats personnel with the information necessary to understand the basic principles underlying a nuclear criticality.

1991-12-06T23:59:59.000Z

280

One dimensional P wave velocity structure of the crust beneath west Java and accurate hypocentre locations from local earthquake inversion  

SciTech Connect

A one-dimensional (1-D) velocity model and station corrections for the West Java zone were computed by inverting P-wave arrival times recorded on a local seismic network of 14 stations. A total of 61 local events with a minimum of 6 P-phases, rms 0.56 s and a maximum gap of 299 Degree-Sign were selected. Comparison with previous earthquake locations shows an improvement for the relocated earthquakes. Tests were carried out to verify the robustness of inversion results in order to corroborate the conclusions drawn out from our reasearch. The obtained minimum 1-D velocity model can be used to improve routine earthquake locations and represents a further step toward more detailed seismotectonic studies in this area of West Java.

Supardiyono; Santosa, Bagus Jaya [Physics Department, Faculty of Mathematics and Natural Sciences, State University of Surabaya, Surabaya (Indonesia) and Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia); Physics Department, Faculty of Mathematics and Natural Sciences, Sepuluh Nopember Institute of Technology, Surabaya (Indonesia)

2012-06-20T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Defending Critical Infrastructure  

Science Conference Proceedings (OSTI)

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions ... Keywords: bilevel program, critical infrastructure protection, homeland defense, homeland security, mixed-integer program, trilevel program

Gerald Brown; Matthew Carlyle; Javier Salmerón; Kevin Wood

2006-11-01T23:59:59.000Z

282

ZnSe light?emitting diodes  

Science Conference Proceedings (OSTI)

We report the successful fabrication of ZnSe p?n junction light?emitting diodes in which Li and Cl are used as p?type and n?type dopants

J. Ren; K. A. Bowers; B. Sneed; D. L. Dreifus; J. W. Cook Jr.; J. F. Schetzina; R. M. Kolbas

1990-01-01T23:59:59.000Z

283

Lutron Electronics: Noncompliance Determination (2012-SE-3796...  

NLE Websites -- All DOE Office Websites (Extended Search)

(2012-SE-3796) June 5, 2013 DOE issued a Notice of Noncompliance Determination to Lutron Electronics Co., Inc. finding that a variety of Class A external power supply basic models...

284

Exciton spectroscopy on single CdSe/ZnSe quantum dot photodiodes  

Science Conference Proceedings (OSTI)

We have investigated the properties of neutral and charged excitons in single CdSe/ZnSe QD photodiodes by @m-photoluminescence spectroscopy. By applying a bias voltage, we have been able to control the number of electrons in a single QD by shifting the ... Keywords: CdSe quantum dots, Photodiode, Stark effect

S. Michaelis de Vasconcellos; A. Pawlis; C. Arens; M. Panfilova; A. Zrenner; D. Schikora; K. Lischka

2009-02-01T23:59:59.000Z

285

StrBioLib: a Java library for development of custom computationalstructural biology applications  

SciTech Connect

Summary: StrBioLib is a library of Java classes useful fordeveloping software for computational structural biology research.StrBioLib contains classes to represent and manipulate proteinstructures, biopolymer sequences, sets of biopolymer sequences, andalignments between biopolymers based on either sequence or structure.Interfaces are provided to interact with commonly used bioinformaticsapplications, including (PSI)-BLAST, MODELLER, MUSCLE, and Primer3, andtools are provided to read and write many file formats used to representbioinformatic data. The library includes a general-purpose neural networkobject with multiple training algorithms, the Hooke and Jeeves nonlinearoptimization algorithm, and tools for efficient C-style string parsingand formatting. StrBioLib is the basis for the Pred2ary secondarystructure prediction program, is used to build the ASTRAL compendium forsequence and structure analysis, and has been extensively tested throughuse in many smaller projects. Examples and documentation are available atthe site below.Availability: StrBioLib may be obtained under the terms ofthe GNU LGPL license from http://strbio.sourceforge.net/Contact:JMChandonia@lbl.gov

Chandonia, John-Marc

2007-05-14T23:59:59.000Z

286

Chemical Weathering of New Pyroclastic Deposits from Mt. Merapi (Java), Indonesia  

SciTech Connect

Java Island, Indonesia with abundant amount of pyroclastic deposits is located in the very active and dynamic Pacific Ring of Fires. Studying the geochemical weathering indices of these pyroclastic deposits is important to get a clear picture about weathering profiles on deposits resulting from the eruption of Mt. Merapi. Immediately after the first phase of the eruption (March to June 2006), moist and leached pyroclastic deposits were collected. These pyroclastic deposits were found to be composed of volcanic glass, plagioclase feldspar in various proportions, orthopyroxene, clinopyroxene, olivine, amphibole, and titanomagnetite. Total elemental composition of the bulk samples (including trace elements and heavy metals) were determined by wet chemical methods and X-ray fluorescence (XRF) analyses. Weathering of the pyroclastic deposits was studied using various weathering indices. The Ruxton ratio, weathering index of Parker, Vought resudual index and chemical index of weathering of moist pyroclastic are lower than the leached sample but the alteration indices (chemical and plagioclase) are slightly higher in the moist compared to the leached pyroclastic deposits.

Fiantis, Dian; Nelson, Malik; Van Ranst, Eric; Shamshudin, Josup; Qafoku, Nikolla

2009-09-01T23:59:59.000Z

287

A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode  

E-Print Network (OSTI)

We propose a light-weight approach for certification of monitor inlining for sequential Java bytecode using proof-carrying code. The goal is to enable the use of monitoring for quality assurance at development time, while minimizing the need for post-shipping code rewrites as well as changes to the end-host TCB. Standard automaton-based security policies express constraints on allowed API call/return sequences. Proofs are represented as JML-style program annotations. This is adequate in our case as all proofs generated in our framework are recognized in time polynomial in the size of the program. Policy adherence is proved by comparing the transitions of an inlined monitor with those of a trusted "ghost" monitor represented using JML-style annotations. At time of receiving a program with proof annotations, it is sufficient for the receiver to plug in its own trusted ghost monitor and check the resulting verification conditions, to verify that inlining has been performed correctly, of the correct policy. We ha...

Dam, Mads

2010-01-01T23:59:59.000Z

288

Mission Critical Networking  

SciTech Connect

Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario; Giordano, Silvia; Gouda, Mohamed; Schulzrinne, Henning; Youssef, Moustafa

2010-06-01T23:59:59.000Z

289

Evaluating Rail Transit Criticism  

E-Print Network (OSTI)

This report evaluates criticism of rail transit systems. It examines claims that rail transit is ineffective at increasing public transit ridership and improving transportation system performance, that rail transit investments are not cost effective, and that transit is an outdated form of transportation. It finds that critics often misrepresent issues and use biased and inaccurate analysis. This is a companion to the report Rail Transit in

Todd Litman

2010-01-01T23:59:59.000Z

290

Geochemistry of the Yutangba Se deposit in western Hubei, China  

Science Conference Proceedings (OSTI)

In the Se ores and abandoned stone coal pile at the Yutangba Se deposit there ... of Se minerals due to secondary enrichment of selenium in the stone coal ...

291

I2SE | Open Energy Information  

Open Energy Info (EERE)

I2SE I2SE Jump to: navigation, search Name I2SE Place Leipzig, Germany Zip 4103 Sector Efficiency Product IT company providing solutions for energy efficiency and data transmission. Coordinates 51.3452°, 12.38594° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":51.3452,"lon":12.38594,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

292

Goodman Manufacturing: Noncompliance Determination (2011-SE-4301) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2011-SE-4301) Noncompliance Determination (2011-SE-4301) Goodman Manufacturing: Noncompliance Determination (2011-SE-4301) October 17, 2011 DOE issued a Notice of Noncompliance Determination to Goodman Manufacturing finding that model CPC180XXX3BXXXAA (CPC180*) of commercial package air conditioner does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing . Goodman must immediately notify each person (or company) to whom Goodmany distributed the noncompliant products that the product does not meet Federal standards. In addition, Goodman must provide to DOE documents and records showing the number of units Goodman distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil

293

Summit Manufacturing: Noncompliance Determination (2010-SE-0303) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summit Manufacturing: Noncompliance Determination (2010-SE-0303) Summit Manufacturing: Noncompliance Determination (2010-SE-0303) Summit Manufacturing: Noncompliance Determination (2010-SE-0303) May 28, 2010 DOE issued a Notice of Noncompliance Determination to Summit Manufacturing, Inc. finding that 4SHP13LE136P + 15001+CA042A964+TDR basic model, a split-system air conditioning heat pump with a heat pump coil, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on the company's own testing. Summit must immediately notify each person (or company) to whom Summit distributed the noncompliant products that the product does not meet Federal standards. In addition, Summit must provide to DOE documents and records showing the number of units Summit distributed and to whom. The manufacturer and/or

294

Nuclear criticality information system  

SciTech Connect

The nuclear criticality safety program at LLNL began in the 1950's with a critical measurements program which produced benchmark data until the late 1960's. This same time period saw the rapid development of computer technology useful for both computer modeling of fissile systems and for computer-aided management and display of the computational benchmark data. Database management grew in importance as the amount of information increased and as experimental programs were terminated. Within the criticality safety program at LLNL we began at that time to develop a computer library of benchmark data for validation of computer codes and cross sections. As part of this effort, we prepared a computer-based bibliography of criticality measurements on relatively simple systems. However, it is only now that some of these computer-based resources can be made available to the nuclear criticality safety community at large. This technology transfer is being accomplished by the DOE Technology Information System (TIS), a dedicated, advanced information system. The NCIS database is described.

Koponen, B.L.; Hampel, V.E.

1981-11-30T23:59:59.000Z

295

KTH Mechanics SE-100 44 Stockholm, Sweden  

E-Print Network (OSTI)

KTH Mechanics SE-100 44 Stockholm, Sweden Activity Report 2006 Contents 1. Introduction 2. 3 Publications and conference presentations during 2006 5. 4 Seminars at Mechanics, KTH 1 #12 of Mechanics, KTH during the year of 2006. More information may be found at the department web site http

Haviland, David

296

KTH Mechanics SE-100 44 Stockholm, Sweden  

E-Print Network (OSTI)

KTH Mechanics SE-100 44 Stockholm, Sweden Activity Report 2005 Contents 1. Introduction 2. 3 Publications and conference presentations during 2005 5. 4 Seminars at Mechanics, KTH 1 #12 of Mechanics, KTH during the year of 2005. More information may be found at the department web site http

Haviland, David

297

KTH Mechanics SE-100 44 Stockholm, Sweden  

E-Print Network (OSTI)

KTH Mechanics SE-100 44 Stockholm, Sweden Activity Report 2009 Contents 1. Introduction 2 a short overview of the structure and activities at the depart- ment of Mechanics, KTH during the year courses in mechanics, fluid mechanics and structural mechanics given for students and programmes from

Haviland, David

298

Bright CdSe quantum dot inserted in single ZnSe nanowires  

Science Conference Proceedings (OSTI)

We report the evidence of CdSe quantum dot (QD) insertion in single defect-free ZnSe nanowire. These nanowires have been grown by molecular beam epitaxy in vapour-liquid-solid growth mode catalysed with gold particles. We developed a two-step process ... Keywords: µPL, Antibunching, CdSe, Correlation measurement, Micro photoluminescence, Polarisation, Single NW, Single QD, Single nanowire, Single nanowire heterostructures, Single quantum dot, TRPL, Time-resolved photoluminescence, Two-step process, ZnSe

A. Tribu; G. Sallen; T. Aichele; C. Bougerol; R. André; J. P. Poizat; S. Tatarenko; K. Kheng

2009-02-01T23:59:59.000Z

299

Celestijnenlaan 200A – B-3001 Heverlee (Belgium) Verification of data-race-freedom of a Java chat server with VeriFast  

E-Print Network (OSTI)

Even now, when computers have become a vital part of our society, software errors are still common, and their effects can be devastating. From the recent rise of multicores emerged the need for multi-threading software and a way to cope with its typical software errors such as data-races and deadlocks. This paper shows how Veri-Fast can be used to verify the data-race-freedom of a multi-threaded Java application, by means of a simple Java chat server example. We will cover the verification of jar files in general, how to deal with Java core classes and interfaces such as ArrayList and the specifics of verifying a multi-threaded Java application, using Thread, Runnable and Semaphore as building blocks. To achieve this, we need to take a closer look at VeriFast elements such as predicate families, predicate constructors and fractional permissions. This paper is intended as an experience report. We will conclude with some suggested improvements and possible future work. Verification of data-race-freedom of a Java chat server with

Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens; Cedric Cuypers; Bart Jacobs; Frank Piessens

2009-01-01T23:59:59.000Z

300

Nuclear multifragmentation critical exponents  

SciTech Connect

In a recent Letter, cited in a reference, the EoS collaboration presented data of fragmentation of 1 A GeV gold nuclei incident on carbon. By analyzing moments of the fragment charge distribution, the authors claim to determine the values of the critical exponents {gamma}, {beta}, and {tau} for finite nuclei. These data represent a crucial step forward in the understanding of the physics of nuclear fragmentation. However, as shown in this paper, the analysis presented in the cited reference is not sufficient to support the claim that the critical exponents for nuclear fragmentation have been unambiguously determined.

Bauer, W. [Washington Univ., Seattle, WA (United States). Inst. for Nuclear Theory]|[National Superconducting Cyclotron Lab., East Lansing, MI (United States); Friedman, W.A. [Washington Univ., Seattle, WA (United States). Inst. for Nuclear Theory]|[Univ. of Wisconsin, Madison, WI (United States). Dept. of Physics

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Glossary of nuclear criticality terms  

SciTech Connect

This is a glossary of terms generally encountered in the literature of nuclear criticality and criticality safety. Terms sometimes misused are emphasized. 7 refs.

Paxton, H.C.

1989-10-01T23:59:59.000Z

302

Phase transition on CdSe thin films by changing the volume concentration of Se  

Science Conference Proceedings (OSTI)

In this work CdSe thin films were grown by chemical bath deposition (CBD)6 onto glass substrate with approximately 2000 Å thickness. The samples have been prepared by changing the volume concentration of the solution in the range of 5-45 ... Keywords: CdSe, thin films, chemical bath, phase transitions, semiconductors

M. Rubín; J. I. Cortez; H. Juárez; E. Rosendo; T. Díaz; G. García Salgado; I. Villaverde; R. Lozada-Morales; O. Portillo-Moreno; O. Zelaya-Ngel

2007-07-01T23:59:59.000Z

303

Critical Foundations: Protecting America's Infrastructures  

Science Conference Proceedings (OSTI)

Page 1. CRITICAL FOUNDATIONS PROTECTING AMERICA'S INFRASTRUCTURES The Report of the President's Commission ...

304

Only critical information was scanned  

Office of Legacy Management (LM)

Only critical information was scanned. Entire document is available upon request - Click here to email a...

305

Critical dynamics and decoherence  

SciTech Connect

We study dynamics of decoherence in a generic model where the environment is driven and undergoes a quantum phase transition. We model the environment by the Ising chain in the transverse field, and assume that the decohering system is a central spin-1/2. We found that when the environment is quenched slowly through the critical point, the decoherence factor of the central spin undergoes rapid decay that encodes the critical exponents of the environment. We also found that decoherence in a non-equilibrated, kink-contaminated, environment can be stronger than in a vacuum one. We derived a remarkably simple analytical expression that describes post-transition decoherence and predicts periodicities involving all system parameters. This research connects the fields of decoherence, quantum phase transitions, and Kibble-Zurek non-equilibrium dynamics.

Damski, Bogdan [Los Alamos National Laboratory; Quan, Haitao T [Los Alamos National Laboratory; Zurek, Wojciech H [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

306

Applicability of ZPR critical experiment data to criticality safety  

SciTech Connect

More than a hundred zero power reactor (ZPR) critical assemblies were constructed, over a period of about three decades, at the Argonne National Laboratory ZPR-3, ZPR-6, ZPR-9 and ZPPR fast critical assembly facilities. To be sure, the original reason for performing these critical experiments was to support fast reactor development. Nevertheless, data from some of the assemblies are well suited to form the basis for valuable, new criticality safety benchmarks. The purpose of this paper is to describe the ZPR data that would be of benefit to the criticality safety community and to explain how these data could be developed into practical criticality safety benchmarks.

Schaefer, R.W.; Aumeier, S.E.; McFarlane, H.F.

1995-12-31T23:59:59.000Z

307

Whirlpool: Data Request (2010-SE-0103) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2010-SE-0103) Whirlpool: Data Request (2010-SE-0103) April 5, 2010 DOE received information that a model of refrigerator-freezer manufactured by Whirlpool Corporation...

308

SeQuential Pacific Biodiesel LLC | Open Energy Information  

Open Energy Info (EERE)

Pacific Biodiesel LLC Jump to: navigation, search Name SeQuential-Pacific Biodiesel LLC Place Oregon Sector Biofuels Product JV between SeQuential Biofuels, Pacific Biodiesel, and...

309

Critical Skills Master's Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Skills Master's Program Skills Master's Program (CSMP): The Critical Skills Master's Program (CSMP) provides exceptional bachelor's-level candidates with the opportunity to pursue a fully funded Master's of Science degree. Successful applicants will become regular full-time Sandia employees and join multidisciplinary teams that are advancing the frontiers of science and technology to solve the world's greatest challenges. Program Requirements: * Apply to a minimum of 3 nationally accredited universities. * Successfully complete the GRE as required by the universities of interest. * Complete a master's degree within:

310

2011-SE-1418 Sears_NND  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sears, Roebuck & Co. Sears, Roebuck & Co. (freezers) Issued: June 26, 2012 BEFORE THE U.S. DEPARTMENT OF ENERGY Washington, D.C. 20585 ) ) ) ) ) Case Number: 2011-SE-1418 NOTICE OF NONCOMPLIANCE DETERMINATION Manufacturers and private labelers are prohibited from distributing covered products that do not comply with applicable federal energy conservation standards. 10 C.F.R. § 429.102; 42 U.S.C. § 6302. On September 22, 2011, DOE completed testing of one compact chest freezer, Kenmore-brand model number 255.19702010 ("19702"), privately labeled and distributed in commerce in the U.S. by Sears, Roebuck & Co. ("Sears") and manufactured in China. In December 2011 and January 2012, DOE completed testing oftln·ee additional units of 19702. DOE's testing was

311

Summit Manufacturing: Noncompliance Determination (2010-SE-0303)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the the Matter of: Summit Manufacturing, Inc. Case Number 2010-SE-0303 NOTICE OF NONCOMPLIANCE DETERMINATION CERTIFICATION Manufacturers of certain covered products are required to certify compliance with the applicable energy conservation standards through submission of a compliance statement and a certification report. 10 CFR § 430.62. See 42 U.S.C. 6296 . The compliance statement is a legal statement by the manufacturer that the information provided in its certification reports is true , accurate and complete, that the basic models certified meet the applicable energy conservation standard, that the energy efficiency information report is the result of testing performed in conformance with the applicable test requirements in 10 CFR part 430, subpart B; and that the manufacturer is

312

Plant critical concept  

SciTech Connect

The achievement of operation and maintenance (O&M) cost reductions is a prime concern for plant operators. Initiatives by the nuclear industry to address this concern are under way and/or in development. These efforts include plant reliability studies, reliability-centered maintenance, risk ranking and testing philosophies, performance-based testing philosophies, graded quality assurance, and so forth. This paper presents the results of an effort to develop a methodology that integrates and applies the common data and analysis requirements for a number of risk-based and performance-based initiatives. This initial phase of the effort applied the methodology and its results to two initiatives. These were the procurement function and the preventive maintenance function. This effort integrated multiple programs and functions to identify those components that are truly critical from an integrated plant performance perspective. The paper describes the scope of the effort, the development of a methodology to identify plant critical components, and the application of these results to the maintenance rule compliance, preventive maintenance, and procurement functions at the candidate plant.

O`Regan, P.J. [Yankee Atomic Electric Co., Bolton, MA (United States)

1995-12-31T23:59:59.000Z

313

Metabolism of selenium (Se) in rats chronically poisoned with D- or L-selenomethionine (SeMet), selenite or selenate  

SciTech Connect

L-SeMet is a potential cancer chemoprevention agent for humans. Little difference was seen in the acute toxicity of L vs. D-SeMet in rats. To study chronic toxicity, weanling male rats were fed purified diets containing 2.5, 5.0 or 10 ppm Se as L-SeMet, D-SeMet, Na/sub 2/SeO/sub 3/ or Na/sub 2/SeO/sub 4/ for 6 weeks. Controls received 0.1 ppm Se as selenite. All rats fed 10 ppm Se died within 29 days. Se fed as D-SeMet was retained in the tissues as strongly as L-SeMet. Rats fed D or L-SeMet deposited large amounts of Se in muscle not reflected by proportionate increases in either plasma or RBC Se. Therefore, attempts to follow increases in Se body burden in individuals supplemented with large doses of L-SeMet by monitoring plasma or whole blood Se levels should be interpreted with caution.

McAdam, P.A.; Levander, O.A.

1986-03-01T23:59:59.000Z

314

Temperature dependent band offsets in PbSe/PbEuSe quantum well heterostructures  

Science Conference Proceedings (OSTI)

The band offsets of PbSe/Pb{sub 1-x}Eu{sub x}Se multi-quantum wells grown by molecular beam epitaxy are determined as a function of temperature and europium content using temperature-modulated differential transmission spectroscopy. The confined quantum well states in the valence and conduction bands are analyzed using a k{center_dot}p model with envelope function approximation. From the fit of the experimental data, the normalized conduction band offset is determined as 0.45{+-}0.15 of the band gap difference, independently of Eu content up to 14% and temperature from 20 to 300 K.

Simma, M.; Bauer, G.; Springholz, G. [Institut fuer Halbleiter und Festkoerperphysik, Johannes Kepler Universitaet, A-4040 Linz (Austria)

2012-10-22T23:59:59.000Z

315

Critical infrastructure security curriculum modules  

Science Conference Proceedings (OSTI)

Critical infrastructures have succumbed to the demands of greater connectivity. Although the scheme of connecting these critical equipment and devices to cyberspace has brought us tremendous convenience, it also enabled certain unimaginable risks and ... Keywords: SCADA, control systems, course modules, critical infrastructures, cybersecurity, programmable logic controllers, security, vulnerability

Guillermo A. Francia, III

2011-09-01T23:59:59.000Z

316

Critical CRBR core pressure  

Science Conference Proceedings (OSTI)

The conditions are detailed under which gas pressure will cause or initiate failure in the structural containment of the fuel core. The Clinch River Breeder Reactor Plant is the prototype structure. Two general classes of problems have been studied, representing two entirely distinct configurations of containment failure. The first model determines the minimum pressure to lift a portion or the entire core from its containment. The second model estimates the critical pressure above which the fuel rods interior to the hexagonal fuel can warp, leading to blockage of the gas passages. Such blockage might cause further buildup of the gas pressure to a level causing the failure of the fuel rod containment in the hexagonal fuel container.

Ju, F.D.

1980-06-01T23:59:59.000Z

317

LgCOOleS, Se*&,,  

Office of Legacy Management (LM)

; "Ofice Mem ; "Ofice Mem . m *" ' ' *IilCl:t Consists of & " ' / Of LgCOOleS, Se*&,, es * UNITED STATES G-OVERNM NT <;$)~~ 3i;t-j /Lj ' , ~~~' jCjC;O c) TO I LT. :s. Clnr!te, ,;or,~~~,~' , -.,,..:-:-Y"' r~-;i~.L.-Z.:r DATE: uL"C!.,?r 6, 1' ?L9 A meting mj: !1:1d in i:1CG bet,. _ ^ .- ',cel representatives 51 ;.2rshz:i sr.3 the A;.35 to nwotiztc .the prices for producing FY-1: (brow oxise), _1 I%-; (green salt and .?T-12 (he::.-iZluoriic) fcr the sc2or.d 3,uarter of fisc21 1950, (Cctober, Z:ove-r.ber, 2c?Ce.:lxr l?L?). Th-: foll;:~:i;.E xttcndcd the mztin:: "-Tsh-:, -.,q ..__ _id.l - 1;. 2. 9till;Iell

318

Unique Challenges Accompany Thick-Shell CdSe/nCdS (n > 10) Nanocrystal Synthesis  

SciTech Connect

Thick-shell CdSe/nCdS (n {ge} 10) nanocrystals were recently reported that show remarkably suppressed fluorescence intermittency or 'blinking' at the single-particle level as well as slow rates of Auger decay. Unfortunately, whereas CdSe/nCdS nanocrystal synthesis is well-developed up to n {le} 6 CdS monolayers (MLs), reproducible syntheses for n {ge} 10 MLs are less understood. Known procedures sometimes result in homogeneous CdS nucleation instead of heterogeneous, epitaxial CdS nucleation on CdSe, leading to broad and multimodal particle size distributions. Critically, obtained core/shell sizes are often below those desired. This article describes synthetic conditions specific to thick-shell growth (n {ge} 10 and n {ge} 20 MLs) on both small (sub2 nm) and large (>4.5 nm) CdSe cores. We find added secondary amine and low concentration of CdSe cores and molecular precursors give desired core/shell sizes. Amine-induced, partial etching of CdSe cores results in apparent shell-thicknesses slightly beyond those desired, especially for very-thick shells (n {ge} 20 MLs). Thermal ripening and fast precursor injection lead to undesired homogeneous CdS nucleation and incomplete shell growth. Core/shells derived from small CdSe (1.9 nm) have longer PL lifetimes and more pronounced blinking at single-particle level compared with those derived from large CdSe (4.7 nm). We expect our new synthetic approach will lead to a larger throughput of these materials, increasing their availability for fundamental studies and applications.

Guo, Y; Marchuk, K; Abraham, R; Sampat, S; Abraham, R.; Fang, N; Malko, AV; Vela, J

2011-12-23T23:59:59.000Z

319

Thermoelectric figure of merit of Ag{sub 2}Se with Ag and Se excess  

Science Conference Proceedings (OSTI)

In the temperature range of 100-300 K, the electric ({sigma}) and thermoelectric ({alpha}{sub 0}) properties of Ag{sub 2}Se with an excess of Ag as high as {approx}0.1 at. % and Se as high as {approx}1.0 at. %, respectively, are investigated. From the data on {sigma}, {alpha}{sub 0}, and {chi}{sub tot} (thermal conductivities), the thermoelectric power {alpha}{sub 0}{sup 2}{sigma} and the figure of merit Z are calculated. It is found that {alpha}{sub 0}{sup 2}{sigma} and Z attain the peak values at room temperature and the electron concentration n {approx} 6.5 x 10{sup 18} cm{sup -3}.

Aliev, F. F., E-mail: farzali@physics.ab.az; Jafarov, M. B.; Eminova, V. I. [Azerbaijan National Academy of Sciences, Institute of Physics (Azerbaijan)

2009-08-15T23:59:59.000Z

320

Procedure for separation of Se and determination of Se-79 by liquid scintillation  

Science Conference Proceedings (OSTI)

This report describes the development work and demonstration of a technique for separation of selenium suitable for determination of Se-79 by liquid scintillation counting. The technique has been demonstrated on actual DWPF (Defense Waste Processing Facility) sludge samples which contain very large loads of Sr-90 activity. The separation required a decontamination of selenium from Sr by a factor of over 10{sup 6}, from Co and Cs by factor of 10{sup 4}, and from Tc-99 by a factor of 100, while still maintaining a selenium recovery of about 50%. Using this technique the author has determined Se-79 in five actual DWPF samples with a precision of about 70% relative standard deviation. This separation has not been demonstrated on actual DWPF samples which have the largest Cs-137 loads. He does not anticipate that these untested samples will present a difficult problem.

Dewberry, R.A.

1991-08-11T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

MCNP/KENO criticality benchmarks  

SciTech Connect

In the past, criticality safety analyses related to the handling and storage of fissile materials were obtained from critical experiments, nuclear safety guides, and handbooks. As a result of rising costs and time delays associated with critical experiments, most experimental facilities have been closed, triggering an increased reliance on computational methods. With this reliance comes the need and requirement for redundant validation by independent criticality codes. Currently, the KENO Monte Carlo transport code is the most widely used tool for criticality safety calculations. For other transport codes, such as MCNP, to be accepted by the criticality safety community as a redundant validation tool they must be able to reproduce experimental results at least as well as KENO. The Monte Carlo neutron, photon, and electron transport code MCNP, has an extensive list of attractive features, including continuous energy cross sections, generalized 3-D geometry, time dependent transport, criticality k{sub eff} calculations, and comprehensive source and tally capabilities. It is widely used for nuclear criticality analysis, nuclear reactor shielding, oil well logging, and medical dosimetry calculations. This report specifically addresses criticality and benchmarks the KENO 25 problem test set. These sample problems constitute the KENO standard benchmark set and represent a relatively wide variety of criticality problems. The KENO Monte Carlo code was chosen because of its extensive benchmarking against analytical and experimental criticality results. Whereas the uncertainty in experimental parameters generally prohibits code validation to better than about 1% in k{sub eff}, the value of k{sub eff} for criticality is considered unacceptable if it deviates more than a few percent from measurements.

McKinney, G.W. [Los Alamos National Lab., NM (United States); Wagner, J.C. [Pennsylvania State Univ., University Park, PA (United States); Sisolak, J.E. [Wisconsin Univ., Madison, WI (United States)

1993-04-01T23:59:59.000Z

322

Nuclear Criticality Safety - Nuclear Engineering Division (Argonne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Criticality Safety Nuclear Criticality Safety Overview Experience Analysis Tools Current NCS Activities Current R&D Activities DOE Criticality Safety Support Group (CSSG) Other...

323

Time-critical information services  

Science Conference Proceedings (OSTI)

Emergency medical services have never been more ready for the implementation of time-critical interorganizational information services for the public good.

Thomas A. Horan; Benjamin L. Schooley

2007-03-01T23:59:59.000Z

324

FAQS Reference Guide – Criticality Safety  

Energy.gov (U.S. Department of Energy (DOE))

This reference guide addresses the competency statements in the April 2009 edition of DOE-STD-1173-2009, Criticality Safety Functional Area Qualification Standard.

325

Software: SE2-ANL - Nuclear Engineering Division (Argonne)  

NLE Websites -- All DOE Office Websites (Extended Search)

OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Software SE2-ANL (Thermal-Hydraulic Codes) Bookmark and Share Standard Code Description SE2-ANL is a modified version of...

326

GE Lighting Solutions: Order (2013-SE-4901) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Order (2013-SE-4901) GE Lighting Solutions: Order (2013-SE-4901) April 4, 2013 DOE ordered General Electric Lighting Solutions, LLC to pay a 5,360 civil penalty after finding GE...

327

Asset Management of Critical Infrastructure ur critical infrastructure--  

E-Print Network (OSTI)

Asset Management of Critical Infrastructure O ur critical infrastructure-- roads, bridges, transit-of-the-art approach to asset management of public infrastructure. ORNL's Capabilities · Simulation-based, optimization. · Innovative optimization tools to assess tradeoffs between construction, maintenance, and demolition over

328

Deformation potentials of CdSe quantum dots  

E-Print Network (OSTI)

a v (in eV) of zinc-blende CdSe. SEPM PW PW+d a a LAPW Expt>4: The size dependence of — a of C B M state of CdSe QDs. vDeformation potentials of CdSe quantum dots Jingbo L i and L

Li, Jingbo; Wang, Lin-Wang

2004-01-01T23:59:59.000Z

329

Local Structure of CuIn3Se5  

DOE Green Energy (OSTI)

The results of a detailed EXAFS study of the Cu-K, In-K, and Se-K edges CuIn3Se5 are reported. The Cu and In first nearest neighbor local structures were found to be almost identical to those in CuInSe2.

Chang, C. H.; Wei, S. H.; Leyarovska, N.; Johnson, J. W.; Zhang, S. B.; Stanbery, B. J.; Anderson, T. J.

2000-01-01T23:59:59.000Z

330

Guide to Critical Infrastructure Protection Cyber Vulnerability...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

331

Wireless System Considerations When Implementing NERC Critical...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Wireless System Considerations When Implementing NERC Critical Infrastructure...

332

Leader Electronics: Data Request (2010-SE-2301) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Data Request (2010-SE-2301) Data Request (2010-SE-2301) Leader Electronics: Data Request (2010-SE-2301) August 19, 2010 DOE requested test data from Leader Electronics Inc. for various models of external power supplies after Leader Electronics certified energy values that did not meet federal energy conservation standards. Leader Electronics was required to provide test data, including complete test reports, for external power supply models "NU50-2093400-I3(NU50-21090-300F)" and "MU03-F050040-AI(MU03-F1050-AKOS)." Leader Electronics: Data Request (2010-SE-2301) More Documents & Publications Leader Electronics: Noncompliance Determination (2010-SE-2301) Leader Electronics: Notice of Allowance (2010-SE-2301) Lutron Electronics: Noncompliance Determination (2012-SE-3796

333

Photoluminescence studies of type-II CdSe/CdTe superlattices  

SciTech Connect

CdSe/CdTe type-II superlattices grown on GaSb substrates by molecular beam epitaxy are studied using time-resolved and steady-state photoluminescence (PL) spectroscopy at 10 K. The relatively long carrier lifetime of 188 ns observed in time-resolved PL measurements shows good material quality. The steady-state PL peak position exhibits a blue shift with increasing excess carrier concentration. Self-consistent solutions of the Schroedinger and Poisson equations show that this effect can be explained by band bending as a result of the spatial separation of electrons and holes, which is critical confirmation of a strong type-II band edge alignment between CdSe and CdTe.

Li Jingjing; Johnson, Shane R.; Wang Shumin; Ding Ding; Ning Cunzheng; Zhang Yonghang [Center for Photonics Innovation, Arizona State University, Tempe, Arizona 85287-5706 (United States); School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, Arizona 85287-5706 (United States); Yin Leijun [Center for Photonics Innovation, Arizona State University, Tempe, Arizona 85287-5706 (United States); Department of Physics, Arizona State University, Tempe, Arizona 85287-1504 (United States); Skromme, B. J. [School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, Arizona 85287-5706 (United States); Liu Xinyu; Furdyna, Jacek K. [Department of Physics, University of Notre Dame, Notre Dame, Indiana 46556 (United States)

2012-08-06T23:59:59.000Z

334

Hicon: Proposed Penalty (2013-SE-1426) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Hicon: Proposed Penalty (2013-SE-1426) Hicon: Proposed Penalty (2013-SE-1426) Hicon: Proposed Penalty (2013-SE-1426) July 8, 2013 DOE alleged in a Notice of Proposed Civil Penalty that Ningbo Hicon International Industry Company, Ltd. manufactured and distributed noncompliant freezer basic model BD-200 in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Hicon: Proposed Penalty (2013-SE-1426) More Documents & Publications Hicon: Noncompliance Determination (2013-SE-1426) Hicon: Order (2013-SE-1426) Haier: Proposed Penalty

335

Philips: Proposed Penalty (2012-SE-2605) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Penalty (2012-SE-2605) Proposed Penalty (2012-SE-2605) Philips: Proposed Penalty (2012-SE-2605) November 29, 2012 DOE alleged in a Notice of Proposed Civil Penalty that Philips Lighting Electronics N. A. manufactured and distributed noncompliant fluorescent lamp ballast basic model VEL-1S40-SC in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Philips: Proposed Penalty (2012-SE-2605) More Documents & Publications Philips: Noncompliance Determination (2012-SE-2605) Philips: Order (2012-SE-2605)

336

Simkar: Proposed Penalty (2012-SE-5408) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Simkar: Proposed Penalty (2012-SE-5408) Simkar: Proposed Penalty (2012-SE-5408) Simkar: Proposed Penalty (2012-SE-5408) November 21, 2012 DOE alleged in a Notice of Proposed Civil Penalty that Simkar Corporation manufactured and distributed noncompliant probe-start and pulse-start basic model metal halide lamp fixtures in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Simkar: Proposed Penalty (2012-SE-5408) More Documents & Publications Simkar: Noncompliance Determination (2012-SE-5408) Simkar: Order (2012-SE-5408)

337

Central Moloney: Proposed Penalty (2013-SE-4702) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Penalty (2013-SE-4702) Proposed Penalty (2013-SE-4702) Central Moloney: Proposed Penalty (2013-SE-4702) March 20, 2013 DOE alleged in a Notice of Proposed Civil Penalty that Central Moloney, Inc. manufactured and distributed a variety of noncompliant liquid-immersed distribution transformers in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Central Moloney: Proposed Penalty (2013-SE-4702) More Documents & Publications Central Moloney: Noncompliance Determination (2013-SE-4702) Central Moloney: Order (2013-SE-4702)

338

CNA: Proposed Penalty (2013-SE-1430) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CNA: Proposed Penalty (2013-SE-1430) CNA: Proposed Penalty (2013-SE-1430) CNA: Proposed Penalty (2013-SE-1430) September 24, 2013 DOE alleged in a Notice of Proposed Civil Penalty that CNA International, Inc., d/b/a MC Appliance Corp. privately labeled and distributed noncompliant freezer Magic Chef model number HMCF7W in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. CNA: Proposed Penalty (2013-SE-1430) More Documents & Publications CNA: Noncompliance Determination (2013-SE-1430) CNA: Compromise Agreement (2013-SE-1430)

339

Incremental criticality and yield gradients  

Science Conference Proceedings (OSTI)

Criticality and yield gradients are two crucial diagnostic metrics obtained from Statistical Static Timing Analysis (SSTA). They provide valuable information to guide timing optimization and timing-driven physical synthesis. Existing work in the literature, ...

Jinjun Xiong; Vladimir Zolotov; Chandu Visweswariah

2008-03-01T23:59:59.000Z

340

The Critical Materials Research Alliance  

NLE Websites -- All DOE Office Websites (Extended Search)

NOVEMBER 2012 NOVEMBER 2012 The Critical Materials Research Alliance About the Critical Materials Research Alliance The recent surge of interest in critical materials, including rare earth elements (REEs), stems from supply shortages and escalating prices of some REEs. In 2010, the United States' sole REE supplier was China-previously responsible for 97% of global REE production-but the Chinese government curtailed their export. Because REEs and other critical elements are used in renewable energy resources, energy storage, energy efficiency technologies, and national defense, a shortage in their supply impedes development of energy technologies and hinders U.S. defense industries. To address the challenges faced in revitalizing the rare earth industry, the National Energy Technology

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Approach to criticality in sandpiles  

E-Print Network (OSTI)

A popular theory of self-organized criticality predicts that the stationary density of the Abelian sandpile model equals the threshold density of the corresponding fixed-energy sandpile. We recently announced that this ...

Levine, Lionel

342

A Critical Point for Science?  

E-Print Network (OSTI)

, taboo ideas become arespectable part of science? Occult Sciences Tripos? CU Institute of Astrology? Telepathy, ‘memory of water’, ‘cold fusion’?Scientific theology, intelligent design? Mar. 5, 2008/CUPS A Critical Point for Science / Brian Josephson 32...

Josephson, B D

2008-03-05T23:59:59.000Z

343

Lecture notes for criticality safety  

Science Conference Proceedings (OSTI)

These lecture notes for criticality safety are prepared for the training of Department of Energy supervisory, project management, and administrative staff. Technical training and basic mathematics are assumed. The notes are designed for a two-day course, taught by two lecturers. Video tapes may be used at the options of the instructors. The notes provide all the materials that are necessary but outside reading will assist in the fullest understanding. The course begins with a nuclear physics overview. The reader is led from the macroscopic world into the microscopic world of atoms and the elementary particles that constitute atoms. The particles, their masses and sizes and properties associated with radioactive decay and fission are introduced along with Einstein's mass-energy equivalence. Radioactive decay, nuclear reactions, radiation penetration, shielding and health-effects are discussed to understand protection in case of a criticality accident. Fission, the fission products, particles and energy released are presented to appreciate the dangers of criticality. Nuclear cross sections are introduced to understand the effectiveness of slow neutrons to produce fission. Chain reactors are presented as an economy; effective use of the neutrons from fission leads to more fission resulting in a power reactor or a criticality excursion. The six-factor formula is presented for managing the neutron budget. This leads to concepts of material and geometric buckling which are used in simple calculations to assure safety from criticality. Experimental measurements and computer code calculations of criticality are discussed. To emphasize the reality, historical criticality accidents are presented in a table with major ones discussed to provide lessons-learned. Finally, standards, NRC guides and regulations, and DOE orders relating to criticality protection are presented.

Fullwood, R.

1992-03-01T23:59:59.000Z

344

White Paper Sun Java Workstation W1100z and W2100z Architecture On the Web sun.com Sun Java TM Workstation W1100z and W2100z Architecture  

E-Print Network (OSTI)

All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. Sun, Sun Microsystems, the Sun logo, Java, Solaris, Solaris JumpStart, Sun N1, Sun Ray, and Net Beans are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun ™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.

unknown authors

2004-01-01T23:59:59.000Z

345

Se-based Positive Electrode Material for Rechargeable Battery ...  

Science Conference Proceedings (OSTI)

This series of matrials could be used in both Li and Na battery system. It is found that Se-containing materials showed better electrochemical performace in terms

346

ASKO Appliances: Compliance Determination (2010-SE-0601) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(2010-SE-0601) Septemer 8, 2010 DOE tested four units of the model D5122XXLB dishwasher manufactured by ASKO Appliances, Inc. Applying statistical analysis, DOE found that...

347

Lutron Electronics: Proposed Penalty (2012-SE-3796) | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

(2012-SE-3796) May 2, 2013 DOE alleged in a Notice of Proposed Civil Penalty that Lutron Electronics Co., Inc. manufactured and distributed noncompliant class A external power...

348

Rethinking regulations for disposal criticality  

SciTech Connect

This paper provides the basis for the position that the current U.S. Nuclear Regulatory Commission (NRC) criticality regulation is in need of revision to address problems in implementing it for the postclosure period in a geologic high-level waste repository. The authors believe that the applicant for such a facility should be able to demonstrate that postulated postclosure criticality events will not cause unacceptable risk of deleterious effects on public health and safety. In addition, the applicant should be expected to take practical and feasible measures to reduce the probability of a criticality occurring, even if (as expected) the consequences of such a criticality for repository performance and public health and safety would be negligible. This approach, while recognizing the probabilistic nature of analyses of events and conditions in the distant future, is also arguably consistent with the defense in depth concept that has been successfully applied to nuclear reactor regulation. The authors believe regulations for postclosure criticality control should support this dual approach, rather than require a deterministic prohibition of criticality as does the current rule. The existing rule seems appropriate for the preclosure period, as long as it is clearly specified to apply only to that period.

Scott, M. [Duke Engineering and Services, Inc., Las Vegas, NV (United States); Doering, T. [Framatome Cogema Fuels, Las Vegas, NV (United States)

1997-08-01T23:59:59.000Z

349

Seismic facies and growth history of Miocene carbonate platforms, Wonocolo Formation, North Madura area, East Java Basin, Indonesia  

E-Print Network (OSTI)

The Miocene Wonocolo Formation in the North Madura area, East Java Basin, contains numerous isolated carbonate platforms that are broadly distributed across a ~3000 sq km area of the Indonesian back-arc region. The Wonocolo platforms provide an interesting test for comparing the different growth histories of closely spaced individual platforms, where eustatic history was the same for all the platforms, but where subtle differences in other extrinsic factors influenced their growth. A grid of 2D seismic data and information from several wells across the region were used to map all Wonocolo platforms across the study area. Five growth phases are recognizable in the platforms, based on seismic facies analysis and internal seismic-stratigraphic relationships. Platforms from the western part of the study area are larger in plan view than age-equivalent platforms to the east and record a complex history of platform initiation, backstepping, progradation, coalescence into larger composite platforms, and termination. Although all five growth phases are also recognizable in some Wonocolo platforms from the eastern part of the study area, the eastern platforms are different in that they: 1) are much smaller in plan view, 2) are spaced farther apart, 3) tend to have steeper platform margins, 4) have largely aggradational stratal geometries, 5) are slightly thicker overall than the western platforms, and 6) the tops of the platforms are at greater burial depths than the tops of the western platforms. Most of these differences in platform morphology and growth history can be attributed to slightly faster subsidence rates in the eastern part of the study area. Faster subsidence rates in the eastern part of the study area from 12 - 6 Ma (the age range for the Wonocolo platforms) are probably related to differential surface loading by the Indonesian volcanic arc.

Adhyaksawan, Rahadian

2002-01-01T23:59:59.000Z

350

APS/DPP 111207-se 1 University Fusion Association Meeting  

E-Print Network (OSTI)

greater interaction between the Office of Science researchers and the NNSA scientists and provide greater has been included in the NNSA program. #12;APS/DPP 111207-se 6 FY2008 CR · The Department is operating Interest May 2007 SC/NNSA Joint Program in HEDLP #12;APS/DPP 111207-se 12 HEDP-Research Topics & Related

351

Mackle Company: Proposed Penalty (2010-SE-0106) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mackle Company: Proposed Penalty (2010-SE-0106) Mackle Company: Proposed Penalty (2010-SE-0106) Mackle Company: Proposed Penalty (2010-SE-0106) June 14, 2010 DOE alleged in a Notice of Proposed Civil Penalty that The Mackle Company, Inc., sold and/or distributed noncompliant refrigerators, refrigerator-freezers, and freezers in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. The Mackle Company: Proposed Penalty (2010-SE-0106) More Documents & Publications Mackle Company: Proposed Penalty (2011-CE-2102) Mackle Company: Order (2010-SE-0106)

352

Neptun Light: Proposed Penalty (2012-SE-3504) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Neptun Light: Proposed Penalty (2012-SE-3504) Neptun Light: Proposed Penalty (2012-SE-3504) Neptun Light: Proposed Penalty (2012-SE-3504) May 2, 2013 DOE alleged in a Notice of Proposed Civil Penalty that Neptun Light, Inc. failed to certify a variety of medium base compact fluorescent lamps as compliant with the applicable energy conservation standards. DOE regulations require a manufacturer (which includes importers) to submit reports certifying that its products have been tested and meet the applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Neptun Light: Proposed Penalty (2012-SE-3504) More Documents & Publications Neptun Light: Order (2012-SE-3504) Excellence Opto: Proposed Penalty (2013-CE-49002)

353

Teddico: Proposed Penalty (2012-SE-5409) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Penalty (2012-SE-5409) Proposed Penalty (2012-SE-5409) Teddico: Proposed Penalty (2012-SE-5409) November 21, 2012 DOE alleged in a Notice of Proposed Civil Penalty that The Electrical Design, Development and Implementation Company d/b/a Teddico manufactured and distributed noncompliant metal halide lamp fixtures with magnetic probe-start ballasts in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Teddico: Proposed Penalty (2012-SE-5409) More Documents & Publications Teddico: Noncompliance Determination (2012-SE-5409)

354

Mackle Company: Proposed Penalty (2010-SE-0106) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Mackle Company: Proposed Penalty (2010-SE-0106) Mackle Company: Proposed Penalty (2010-SE-0106) Mackle Company: Proposed Penalty (2010-SE-0106) June 14, 2010 DOE alleged in a Notice of Proposed Civil Penalty that The Mackle Company, Inc., sold and/or distributed noncompliant refrigerators, refrigerator-freezers, and freezers in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. The Mackle Company: Proposed Penalty (2010-SE-0106) More Documents & Publications Mackle Company: Proposed Penalty (2011-CE-2102) Mackle Company: Order (2010-SE-0106)

355

Goodman Manufacturing: Proposed Penalty (2011-SE-4301) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Penalty (2011-SE-4301) Proposed Penalty (2011-SE-4301) Goodman Manufacturing: Proposed Penalty (2011-SE-4301) December 2, 2011 DOE alleged in a Notice of Proposed Civil Penalty that Goodman Manufacturing manufactured and distributed noncompliant basic model CPC180* commercial package air conditioners in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Goodman Manufacturing: Proposed Penalty (2011-SE-4301) More Documents & Publications Goodman Manufacturing: Noncompliance Determination (2011-SE-4301)

356

Pax Global: Noncompliance Determination (2013-SE-1413) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pax Global: Noncompliance Determination (2013-SE-1413) Pax Global: Noncompliance Determination (2013-SE-1413) Pax Global: Noncompliance Determination (2013-SE-1413) April 2, 2013 DOE issued a Notice of Noncompliance Determination to Pax Global, Inc. finding that freezer basic models (1) Crosley CCF51; (2) Crosley CCF69; (3) Crosley CCF106; and (4) Daewoo DCF-106W do not comport with the energy conservation standards. DOE determined the products were noncompliant based on DOE testing. Pax Global must immediately notify each person (or company) to whom Pax Global distributed the noncompliant products that the products do not meet Federal standards. Pax Global: Noncompliance Determination (2013-SE-1413) More Documents & Publications Pax Global: Compromise Agreement (2013-SE-1413) Daewoo: Proposed Penalty (2010-CE-0410)

357

Thermoelectric properties of n-type PbSe revisited  

Science Conference Proceedings (OSTI)

It was recently predicted \\cite{parker} and experimentally confirmed \\cite{sny_PbSe} that $p$-type PbSe would be a good thermoelectric material. Recent experimental work \\cite{pers2} now suggests that $n$-type PbSe can also be a good thermoelectric material. We now re-examine the thermoelectric performance of PbSe with a revised approximation which improves band gap accuracy. We now find that $n$-type PbSe {\\it can} be a high performance material, with thermopowers as high in magnitude as 250 $\\mu$V/K at 1000 K and 300 $\\mu$V/K at 800 K. Optimal 1000 K $n$-type doping ranges are between 2 $\\times 10^{19}$cm$^{-3}$ and 8 $\\times 10^{19}$cm$^{-3}$, while at 800 K the corresponding range is from 7 $\\times$10$^{18}$ to 4 $\\times $10$^{19}$ cm$^{-3}$.

Parker, David S [ORNL; Singh, David J [ORNL; Ren, Zhifeng [Boston College, Chestnut Hill; Zhang, Qinyong [Xihua University

2012-01-01T23:59:59.000Z

358

Critical Gravity in Four Dimensions  

SciTech Connect

We study four-dimensional gravity theories that are rendered renormalizable by the inclusion of curvature-squared terms to the usual Einstein action with a cosmological constant. By choosing the parameters appropriately, the massive scalar mode can be eliminated and the massive spin-2 mode can become massless. This ''critical'' theory may be viewed as a four-dimensional analogue of chiral topologically massive gravity, or of critical 'new massive gravity' with a cosmological constant, in three dimensions. We find that the on-shell energy for the remaining massless gravitons vanishes. There are also logarithmic spin-2 modes, which have positive energy. The mass and entropy of standard Schwarzschild-type black holes vanish. The critical theory might provide a consistent toy model for quantum gravity in four dimensions.

Lue, H. [China Economics and Management Academy, Central University of Finance and Economics, Beijing 100081 (China); Institute for Advanced Study, Shenzhen University, Nanhai Avenue 3688, Shenzhen 518060 (China); Pope, C. N. [George P. and Cynthia Woods Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, Texas 77843 (United States); DAMTP, Centre for Mathematical Sciences, Cambridge University, Wilberforce Road, Cambridge CB3 OWA (United Kingdom)

2011-05-06T23:59:59.000Z

359

PRECLOSURE CRITICALITY ANALYSIS PROCESS REPORT  

SciTech Connect

This report describes a process for performing preclosure criticality analyses for a repository at Yucca Mountain, Nevada. These analyses will be performed from the time of receipt of fissile material until permanent closure of the repository (preclosure period). The process describes how criticality safety analyses will be performed for various configurations of waste in or out of waste packages that could occur during preclosure as a result of normal operations or event sequences. The criticality safety analysis considers those event sequences resulting in unanticipated moderation, loss of neutron absorber, geometric changes, or administrative errors in waste form placement (loading) of the waste package. The report proposes a criticality analyses process for preclosure to allow a consistent transition from preclosure to postclosure, thereby possibly reducing potential cost increases and delays in licensing of Yucca Mountain. The proposed approach provides the advantage of using a parallel regulatory framework for evaluation of preclosure and postclosure performance and is consistent with the U.S. Nuclear Regulatory Commission's approach of supporting risk-informed, performance-based regulation for fuel cycle facilities, ''Yucca Mountain Review Plan, Final Report'', and 10 CFR Part 63. The criticality-related criteria for ensuring subcriticality are also described as well as which guidance documents will be utilized. Preclosure operations and facilities have significant similarities to existing facilities and operations currently regulated by the U.S. Nuclear Regulatory Commission; therefore, the design approach for preclosure criticality safety will be dictated by existing regulatory requirements while using a risk-informed approach with burnup credit for in-package operations.

A.E. Danise

2004-10-25T23:59:59.000Z

360

Enhanced photoluminescence from free-standing microstructures fabricated on MBE grown PbSe-PbSrSe MQW structure  

Science Conference Proceedings (OSTI)

Fabrication of microrods from multi-quantum well (MQW) PbSe-PbSrSe structure grown in molecular beam epitaxy (MBE) followed by its morphological as well as optical characterizations are described. Pulsed PL intensity is increased by 64 times per unit ... Keywords: MBE, MQW microrod, MQW microtube, Photoluminescence, SEM

S. Mukherjee; S. Jain; F. Zhao; J. P. Kar; D. Li; Z. Shi

2008-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Nuclear data for criticality safety  

SciTech Connect

A brief overview is presented on emerging requirements for new criticality safety analyses arising from applications involving nuclear waste management, facility remediation, and the storage of nuclear weapons components. A derivation of criticality analyses from the specifications of national consensus standards is given. These analyses, both static and dynamic, define the needs for nuclear data. Integral data, used primarily for analytical validation, and differential data, used in performing the analyses, are listed, along with desirable margins of uncertainty. Examples are given of needs for additional data to address systems having intermediate neutron energy spectra and/or containing nuclides of intermediate mass number.

Westfall, R.M.

1994-09-01T23:59:59.000Z

362

Nuclear Criticality Safety | More Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Criticality Safety Criticality Safety SHARE Criticality Safety Nuclear Criticality Safety ORNL is the lead national laboratory responsible for supporting the National Nuclear Security Administration (NNSA) in managing the US Nuclear Criticality Safety Program. NCSP is chartered to maintain the technical infrastructure (integral experiments, computational tools, training, data, etc.) needed to support safe, efficient fissionable material operations. ORNL has extensive expertise in the area of nuclear criticality safety (NCS) based upon years of experience in the following areas: Operations Support: providing fissionable material operations support for enrichment, fabrication, production, and research; Critical Experiments: performing experiments at the Y-12 Critical Experiment Facility;

363

CRITICALITY SAFETY QUALIFICATION STANDARD REFERENCE GUIDE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Criticality Criticality Safety Qualification Standard Reference Guide APRIL 2011 This page is intentionally blank. Table of Contents i FIGURES ...................................................................................................................................... iii PURPOSE ...................................................................................................................................... 1 SCOPE ........................................................................................................................................... 1 PREFACE ...................................................................................................................................... 1 ACKNOWLEDGEMENTS ......................................................................................................... 2

364

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

365

Nuclear criticality safety: 2-day training course  

SciTech Connect

This compilation of notes is presented as a source reference for the criticality safety course. At the completion of this training course, the attendee will: be able to define terms commonly used in nuclear criticality safety; be able to appreciate the fundamentals of nuclear criticality safety; be able to identify factors which affect nuclear criticality safety; be able to identify examples of criticality controls as used as Los Alamos; be able to identify examples of circumstances present during criticality accidents; have participated in conducting two critical experiments; be asked to complete a critique of the nuclear criticality safety training course.

Schlesser, J.A. [ed.] [comp.

1997-02-01T23:59:59.000Z

366

A Critical History of Renormalization  

E-Print Network (OSTI)

The history of renormalization is reviewed with a critical eye, starting with Lorentz's theory of radiation damping, through perturbative QED with Dyson, Gell-Mann & Low, and others, to Wilson's formulation and Polchinski's functional equation, and applications to "triviality", and dark energy in cosmology.

Huang, Kerson

2013-01-01T23:59:59.000Z

367

Midea: Noncompliance Determination (2010-SE-0110) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0-SE-0110) 0-SE-0110) Midea: Noncompliance Determination (2010-SE-0110) October 5, 2011 DOE issued a Notice of Noncompliance Determination to Midea America Corporation finding that basic model number HS-390C, a chest freezer, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Midea must immediately notify each person (or company) to whom Midea distributed the noncompliant product that the product does not meet Federal standards. In addition, Midea must provide to DOE documents and records showing the number of units Midea distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Midea: Noncompliance Determination (2010-SE-0110) More Documents & Publications

368

Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402) Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402) Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402) August 10, 2010 DOE issued a Notice of Allowance to Resume Distribution, authorizing Fuzhou Sunlight Lighting Electrical Appliance Company, Ltd. to resume distribution of eleven models of lamps. DOE had previously found certain Fuzhou products did not comport with the applicable energy conservation standards based on Fuzhou's testing. After determining that the original testing was not performed in accordance with DOE procedures, Fuzhou Sunlight provided new test data to DOE demonstrating that eleven models meet the applicable energy conservation standard when tested in accordance with DOE test procedures. Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402)

369

Grainger: Noncompliance Determination (2013-SE-1411) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Noncompliance Determination (2013-SE-1411) Noncompliance Determination (2013-SE-1411) Grainger: Noncompliance Determination (2013-SE-1411) April 29, 2013 DOE issued a Notice of Noncompliance Determination to Grainger International Inc. finding that freezer models, privately labeled as the Dayton 5NTX4, the Dayton 5NTX5, and the Dayton 5NTX6 do not comport with the energy conservation standards. Grainger must immediately notify each person (or company) to whom Grainger distributed the noncompliant products that the products do not meet Federal standards. In addition, Grainger must provide to DOE documents and records showing the number of units Grainger distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Grainger: Noncompliance Determination (2013-SE-1411)

370

Lattice vibrations of pure and doped GaSe  

Science Conference Proceedings (OSTI)

The Bridgman method is used to grow especially undoped and doped single crystals of GaSe. Composition and impurity content of the grown crystals were determined using X-ray fluorescence (XRF) method. X-ray diffraction, Raman scattering, photoluminescence (PL), and IR transmission measurements were performed at room temperature. The long wavelength lattice vibrations of four modifications of GaSe were described in the framework of modified one-layer linear-chain model which also takes into consideration the interaction of the selenium (Se) atom with the second nearest neighbor gallium (Ga) atom in the same layer. The existence of an eight-layer modification of GaSe is suggested and the vibrational frequencies of this modification are explained in the framework of a lattice dynamical model considered in the present work. Frequencies and the type of vibrations (gap, local, or resonance) for the impurity atoms were calculated and compared with the experimental results.

Allakhverdiev, K. [Materials Institute, Marmara Research Center, TUBITAK, Gebze/Kocaeli 41470 (Turkey) and Institute of Physics, Azerbaijan National Academy of Sciences, Baku AZ1143 (Azerbaijan)]. E-mail: kerim.allahverdi@mam.gov.tr; Baykara, T. [Materials Institute, Marmara Research Center, TUBITAK, Gebze/Kocaeli 41470 (Turkey); Ellialtioglu, S. [Department of Physics, Middle East Technical University, Ankara 06531 (Turkey); Hashimzade, F. [Institute of Physics, Azerbaijan National Academy of Sciences, Baku AZ1143 (Azerbaijan); Huseinova, D. [Institute of Physics, Azerbaijan National Academy of Sciences, Baku AZ1143 (Azerbaijan); Kawamura, K. [Institute of Materials Science, University of Tsukuba 305-8573 (Japan); Kaya, A.A. [Materials Institute, Marmara Research Center, TUBITAK, Gebze/Kocaeli 41470 (Turkey); Kulibekov, A.M. [Department of Physics, Mugla University, Mugla 48000 (Turkey); Onari, S. [Institute of Materials Science, University of Tsukuba 305-8573 (Japan)

2006-04-13T23:59:59.000Z

371

GE Lighting Solutions: Proposed Penalty (2013-SE-4901) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GE Lighting Solutions: Proposed Penalty (2013-SE-4901) GE Lighting Solutions: Proposed Penalty (2013-SE-4901) GE Lighting Solutions: Proposed Penalty (2013-SE-4901) March 5, 2013 DOE alleged in a Notice of Proposed Civil Penalty that General Electric Lighting Solutions manufactured and distributed noncompliant traffic signal modules in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. GE Lighting Solutions: Proposed Penalty (2013-SE-4901) More Documents & Publications Act One: NPCP (2013-CE-49001) Excellence Opto: Proposed Penalty (2013-CE-49002)

372

Thermo Products: Proposed Penalty (2011-SE-1603) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Thermo Products: Proposed Penalty (2011-SE-1603) Thermo Products: Proposed Penalty (2011-SE-1603) Thermo Products: Proposed Penalty (2011-SE-1603) September 28, 2011 DOE issued this Notice of Proposed Civil Penalty Notice to Thermo Products, LLC, alleging that the company certified several models of residential air conditioning heat pumps without performing testing required by DOE regulations. DOE regulations require a manufacturer (which includes importers) to submit reports certifying that its products have been tested and meet the applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Thermo Products: Proposed Penalty (2011-SE-1603) More Documents & Publications

373

GE Lighting Solutions: Proposed Penalty (2013-SE-4901) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Penalty (2013-SE-4901) Proposed Penalty (2013-SE-4901) GE Lighting Solutions: Proposed Penalty (2013-SE-4901) March 5, 2013 DOE alleged in a Notice of Proposed Civil Penalty that General Electric Lighting Solutions manufactured and distributed noncompliant traffic signal modules in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. GE Lighting Solutions: Proposed Penalty (2013-SE-4901) More Documents & Publications Watermark: Proposed Penalty (2011-SW-2908) Act One: NPCP (2013-CE-49001)

374

Engineered Products: Proposed Penalty (2012-SE-5401) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Penalty (2012-SE-5401) Proposed Penalty (2012-SE-5401) Engineered Products: Proposed Penalty (2012-SE-5401) July 19, 2012 DOE alleged in a Notice of Proposed Civil Penalty that Engineered Products Company manufactured/privately-labeled and distributed a number of units of noncompliant basic model 15701, a metal halide lamp fixture with a magnetic probe-start ballast in the U.S. Federal law subjects manufacturers and private labelers to civil penalties if those parties distribute in the U.S. products that do not meet applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Engineered Products: Proposed Penalty (2012-SE-5401) More Documents & Publications

375

Hydac: Noncompliance Determination (2012-SE-4107) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2012-SE-4107) Noncompliance Determination (2012-SE-4107) Hydac: Noncompliance Determination (2012-SE-4107) November 19, 2012 DOE issued a Notice of Noncompliance Determination to Hydac Technology Corporation finding that a variety of electric motor basic models do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. Hydac must immediately notify each person (or company) to whom Hydac distributed the noncompliant products that the products do not meet Federal standards. In addition, Hydac must provide to DOE documents and records showing the number of units Hydac distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Hydac: Noncompliance Determination (2012-SE-4107)

376

Haier: Noncompliance Determination (2011-SE-1428) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Haier: Noncompliance Determination (2011-SE-1428) Haier: Noncompliance Determination (2011-SE-1428) Haier: Noncompliance Determination (2011-SE-1428) April 23, 2013 DOE issued a Notice of Noncompliance Determination to Haier America Trading, LLC finding that Haier model HMCM106EA, a freezer, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Haier must immediately notify each person (or company) to whom Haier distributed the noncompliant products that the product does not meet Federal standards. In addition, Haier must provide to DOE documents and records showing the number of units Haier distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Haier: Noncompliance Determination (2011-SE-1428)

377

ET Industries: Noncompliance Determination (2012-SE-2902) | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Noncompliance Determination (2012-SE-2902) Noncompliance Determination (2012-SE-2902) ET Industries: Noncompliance Determination (2012-SE-2902) May 24, 2013 DOE issued a Notice of Noncompliance Determination to ET Industries, Inc. finding that showerhead basic model TH-1 does not comport with the water conservation standards. DOE determined the product was noncompliant based on DOE testing. ET Industries must immediately notify each person (or company) to whom ET Industries distributed the noncompliant products that the product does not meet Federal standards. In addition, ET Industries must provide to DOE documents and records showing the number of units ET Industries distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. ET Industries: Noncompliance Determination (2012-SE-2902)

378

Royal Pacific: Proposed Penalty (2013-SE-33004) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Proposed Penalty (2013-SE-33004) Proposed Penalty (2013-SE-33004) Royal Pacific: Proposed Penalty (2013-SE-33004) July 5, 2013 DOE alleged in a Notice of Proposed Civil Penalty that Royal Pacific, Ltd. failed to certify ceiling fans, ceiling fan light kits, medium base compact fluorescent lamps, and illuminated exit signs as compliant with the applicable energy conservation standards. DOE regulations require a manufacturer (which includes importers) to submit reports certifying that its products have been tested and meet the applicable energy conservation standards. This civil penalty notice advises the company of the potential penalties and DOE's administrative process, including the company's right to a hearing. Royal Pacific: Proposed Penalty (2013-SE-33004) More Documents & Publications

379

Aspen: Noncompliance Determination (2010-SE-0305) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0-SE-0305) 0-SE-0305) Aspen: Noncompliance Determination (2010-SE-0305) May 28, 2010 DOE issued a Notice of Noncompliance Determination to Aspen Manufacturing finding that a variety of basic models of split-system air conditioning heat pumps do not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Aspen must immediately notify each person (or company) to whom Aspen distributed the noncompliant products that the product does not meet Federal standards. In addition, Aspen must provide to DOE documents and records showing the number of units Aspen distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Aspen: Noncompliance Determination (2010-SE-0305)

380

Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sunlight Lighting: Notice of Allowance (2010-SE-1402) Sunlight Lighting: Notice of Allowance (2010-SE-1402) Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402) October 8, 2010 DOE issued a Notice of Allowance to Resume Distribution, authorizing Fuzhou Sunlight Lighting Electrical Appliance Company, Ltd. to resume distribution of one model of lamp. DOE had previously found certain Fuzhou products did not comport with the applicable energy conservation standards based on Fuzhou's testing. After determining that the original testing was not performed in accordance with DOE procedures, Fuzhou Sunlight provided new test data to DOE demonstrating that one model meets the applicable energy conservation standard when tested in accordance with DOE test procedures. Fuzhou Sunlight Lighting: Notice of Allowance (2010-SE-1402)

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

382

AGING FACILITY CRITICALITY SAFETY CALCULATIONS  

Science Conference Proceedings (OSTI)

The purpose of this design calculation is to revise and update the previous criticality calculation for the Aging Facility (documented in BSC 2004a). This design calculation will also demonstrate and ensure that the storage and aging operations to be performed in the Aging Facility meet the criticality safety design criteria in the ''Project Design Criteria Document'' (Doraswamy 2004, Section 4.9.2.2), and the functional nuclear criticality safety requirement described in the ''SNF Aging System Description Document'' (BSC [Bechtel SAIC Company] 2004f, p. 3-12). The scope of this design calculation covers the systems and processes for aging commercial spent nuclear fuel (SNF) and staging Department of Energy (DOE) SNF/High-Level Waste (HLW) prior to its placement in the final waste package (WP) (BSC 2004f, p. 1-1). Aging commercial SNF is a thermal management strategy, while staging DOE SNF/HLW will make loading of WPs more efficient (note that aging DOE SNF/HLW is not needed since these wastes are not expected to exceed the thermal limits form emplacement) (BSC 2004f, p. 1-2). The description of the changes in this revised document is as follows: (1) Include DOE SNF/HLW in addition to commercial SNF per the current ''SNF Aging System Description Document'' (BSC 2004f). (2) Update the evaluation of Category 1 and 2 event sequences for the Aging Facility as identified in the ''Categorization of Event Sequences for License Application'' (BSC 2004c, Section 7). (3) Further evaluate the design and criticality controls required for a storage/aging cask, referred to as MGR Site-specific Cask (MSC), to accommodate commercial fuel outside the content specification in the Certificate of Compliance for the existing NRC-certified storage casks. In addition, evaluate the design required for the MSC that will accommodate DOE SNF/HLW. This design calculation will achieve the objective of providing the criticality safety results to support the preliminary design of the Aging Facility. As the ongoing design evolution remains fluid, the results from this design calculation should be evaluated for applicability to any new or modified design. Consequently, the results presented in this document are limited to the current design. The information contained in this document was developed by Environmental and Nuclear Engineering and is intended for the use of Design and Engineering in its work regarding the various criticality related activities performed in the Aging Facility. Yucca Mountain Project personnel from Environmental and Nuclear Engineering should be consulted before the use of the information for purposes other than those stated herein or use by individuals other than authorized personnel in Design and Engineering.

C.E. Sanders

2004-09-10T23:59:59.000Z

383

Critical Operating Constraint Forecasting (COCF)  

Science Conference Proceedings (OSTI)

This document represents the progress report and Task 1 letter report of the California Institute for Energy and Environment (CIEE) contract funded by the California Energy Commission (CEC), Critical Operating Constraint Forecasting (COCF) for California Independent System Operator (CAISO) Planning Phase. Task 1 was to accomplish the following items: Collect data from CAISO to set up the WECC power flow base case representing the CAISO system in the summer of 2006 Run TRACE for maximizing California Impo...

2006-06-30T23:59:59.000Z

384

Running with Java  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC Powering Scientific Discovery Since 1974 Login Site Map | My NERSC search... Go Home About Overview NERSC Mission Contact us Staff Org Chart NERSC History NERSC Stakeholders...

385

Keyword programming in Java  

E-Print Network (OSTI)

Keyword programming is a novel technique for reducing the need to remember details of programming language syntax and APIs, by translating a small number of unordered keywords provided by the user into a valid expression. ...

Little, Danny Greg

386

High Critical Current Coated Conductors  

Science Conference Proceedings (OSTI)

One of the important critical needs that came out of the DOE’s coated conductor workshop was to develop a high throughput and economic deposition process for YBCO. Metal-organic chemical vapor deposition (MOCVD) technique, the most critical steps in high technical micro fabrications, has been widely employed in semiconductor industry for various thin film growth. SuperPower has demonstrated that (Y,Gd)BCO films can be deposited rapid with world record performance. In addition to high critical current density with increased film thickness, flux pinning properties of REBCO films needs to be improved to meet the DOE requirements for various electric-power equipments. We have shown that doping with Zr can result in BZO nanocolumns, but at substantially reduced deposition rate. The primary purpose of this subtask is to develop high current density MOCVD-REBCO coated conductors based on the ion-beam assisted (IBAD)-MgO deposition process. Another purpose of this subtask is to investigate HTS conductor design optimization (maximize Je) with emphasis on stability and protection issues, and ac loss for REBCO coated conductors.

Paranthaman, M. P.; Selvamanickam, V. (SuperPower, Inc.)

2011-12-27T23:59:59.000Z

387

Networks, deregulation, and risk : the politics of critical infrastructure protection  

E-Print Network (OSTI)

Standards for Critical Infrastructure Protection. Docket RMStandards for Critical Infrastructure Protection. Docket RM2- 13; GAO. ?Critical Infrastructure Protection: Multiple

Ellis, Ryan Nelson

2011-01-01T23:59:59.000Z

388

First-principles study of Se-intercalated graphite  

DOE Green Energy (OSTI)

Se-intercalated graphite compounds (Se-GICs) are considered as promising candidates for room-temperature thermoelectric cooling devices. Here the authors analyze the crystallographic structure and electronic properties of these materials within the framework of density-functional theory. First, the Adaptive-Coordinate Real-space Electronic Structure (ACRES) code is used to determine the stable structure of a representative stage-2 Se-GIC by relaxing atomic positions. The stable configuration is found to be a pendant-type structure, in which each selenium is bonded covalently to two atoms within the same carbon layer, causing a local distortion of the in-plane conjugation of the graphite. Then, they use the full potential linearized augmented plane wave (FP-LAPW) method to calculate the electronic band structure of the material and discuss its properties. Near the Fermi energy E{sub F}, there are wide bands originating from the host graphitic electronic structure and a few very narrow bands mainly of Se 4p character. The latter bands contribute to high peaks in the density of states close to E{sub F}. They show that this feature, although typical of many good thermoelectrics, does not necessarily imply high thermopower in the case of Se-GICs.

BARTKOWIAK,M.; MODINE,NORMAND A.; SOFO,J.O.; MAHAN,G.D.

2000-05-11T23:59:59.000Z

389

High-Temperature Microfluidic Synthesis of CdSe Nanocrystals in Nanoliter Droplets  

E-Print Network (OSTI)

Microfluidic Synthesis of CdSe Nanocrystals in Nanolitertemperature synthesis of CdSe nanocrystals in nanoliter-produced high quality CdSe nanocrystals, as verified by

Chan, Emory M.; Alivisatos, A. Paul; Mathies, Richard A.

2005-01-01T23:59:59.000Z

390

Mechanical and electronic-structure properties of compressed CdSe tetrapod nanocrystals  

E-Print Network (OSTI)

properties of compressed CdSe tetrapod nanocrystals Joshuamechanical properties of CdSe tetrapods under directionalstructural transformations in CdSe nanocrystals, it has only

Schrier, Joshua; Lee, Byounghak; Wang, Lin-Wang

2008-01-01T23:59:59.000Z

391

Leader Electronics: Noncompliance Determination (2010-SE-2301) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2010-SE-2301) Noncompliance Determination (2010-SE-2301) Leader Electronics: Noncompliance Determination (2010-SE-2301) August 24, 2010 DOE issued a Notice of Noncompliance Determination to Leader Electronics, Inc. finding that "NU50-2093400-I3(NU50-21090-300F)" and "MU03-F050040-A1(MU03-Fl050-AKOS)" of external power supplies do not comport with the energy conservation standards. DOE determined the product was noncompliant based on the company's own testing. Leader Electronics must immediately notify each person (or company) to whom Leader Electronics distributed the noncompliant products that the products do not meet Federal standards. In addition, Leader Electronics must provide to DOE documents and records showing the number of units Leader Electronics

392

Central Moloney: Noncompliance Determination (2013-SE-4702) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Central Moloney: Noncompliance Determination (2013-SE-4702) Central Moloney: Noncompliance Determination (2013-SE-4702) Central Moloney: Noncompliance Determination (2013-SE-4702) March 11, 2013 DOE issued a Notice of Noncompliance Determination to Central Moloney, Inc. finding that liquid-immersed distribution transformer basic models 30300150 and 32500095 do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. Central Moloney must immediately notify each person (or company) to whom Central Moloney distributed the noncompliant products that the products do not meet Federal standards. In addition, Central Moloney must provide to DOE documents and records showing the number of units Central Moloney distributed and to whom. The manufacturer and/or private labeler

393

Hicon: Noncompliance Determination (2013-SE-1426) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hicon: Noncompliance Determination (2013-SE-1426) Hicon: Noncompliance Determination (2013-SE-1426) Hicon: Noncompliance Determination (2013-SE-1426) February 14, 2013 DOE issued a Notice of Noncompliance Determination to Ningbo Hicon International Industry Company, Ltd. finding that model number BD-200, a compact chest freezer, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Hiicon must immediately notify each person (or company) to whom Hicon distributed the noncompliant products that the product does not meet Federal standards. In addition, Hicon must provide to DOE documents and records showing the number of units Hicon distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil

394

Universal: Noncompliance Determination (2013-SE-26004) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Universal: Noncompliance Determination (2013-SE-26004) Universal: Noncompliance Determination (2013-SE-26004) Universal: Noncompliance Determination (2013-SE-26004) September 6, 2013 DOE issued a Notice of Noncompliance Determination to Universal Lighting Technologies, Inc. finding that fluorescent lamp ballast model B140R277HP does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Universal must immediately notify each person (or company) to whom Universal distributed the noncompliant products that the product does not meet Federal standards. In addition, Universal must provide to DOE documents and records showing the number of units Universal distributed and to whom. The manufacturer and/or private labeler of the product may be subject to

395

SeQuential Biofuels LLC | Open Energy Information  

Open Energy Info (EERE)

SeQuential Biofuels LLC SeQuential Biofuels LLC Jump to: navigation, search Name SeQuential Biofuels LLC Place Portland, Oregon Zip 97231 Sector Biofuels Product A biofuels marketing and distribution company with several offices in Oregon. Coordinates 45.511795°, -122.675629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":45.511795,"lon":-122.675629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

396

Fuzhou Sunlight: Noncompliance Determination (2010-SE-1402) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sunlight: Noncompliance Determination (2010-SE-1402) Sunlight: Noncompliance Determination (2010-SE-1402) Fuzhou Sunlight: Noncompliance Determination (2010-SE-1402) June 16, 2010 DOE issued a Notice of Noncompliance Determination to Fuzhou Sunlight Lighting Electrical Appliance Co., Ltd. finding that a variety of models of incandescent reflector lamps do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. Fuzhou Sunlight must immediately notify each person (or company) to whom Fuzhou Sunlight distributed the noncompliant products that the products do not meet Federal standards. In addition, Fuzhou Sunlight must provide to DOE documents and records showing the number of units Fuzhou Sunlight distributed and to whom. The manufacturer

397

GE Lighting Solutions: Noncompliance Determination (2013-SE-4901) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2013-SE-4901) Noncompliance Determination (2013-SE-4901) GE Lighting Solutions: Noncompliance Determination (2013-SE-4901) January 11, 2013 DOE issued a Notice of Noncompliance Determination to General Electric Lighting Solutions finding that various models of traffic signal modules do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. GE Lighting Solutions must immediately notify each person (or company) to whom GE Lighting Solutions distributed the noncompliant products that the products do not meet Federal standards. In addition, GE Lighting Solutions must provide to DOE documents and records showing the number of units GE Lighting Solutions distributed and to whom. The manufacturer

398

Aspen: Noncompliance Determination (2011-SE-1602) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aspen: Noncompliance Determination (2011-SE-1602) Aspen: Noncompliance Determination (2011-SE-1602) Aspen: Noncompliance Determination (2011-SE-1602) October 3, 2011 DOE issued a Notice of Noncompliance Determination to Aspen Manufacturing finding that indoor unit model AEW244 and outdoor unit model NCPC-424-3010 of residential split system central air conditioning system do not comport with the energy conservation standards. DOE determined the product was noncompliant based on the company's own testing. Aspen must immediately notify each person (or company) to whom Aspen distributed the noncompliant products that the product does not meet Federal standards. In addition, Aspen must provide to DOE documents and records showing the number of units Aspen distributed and to whom. The manufacturer and/or private labeler of

399

Precision: Noncompliance Determination (2013-SE-1410) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Precision: Noncompliance Determination (2013-SE-1410) Precision: Noncompliance Determination (2013-SE-1410) Precision: Noncompliance Determination (2013-SE-1410) April 10, 2013 DOE issued a Notice of Noncompliance Determination to Precision Trading Corp. finding that Precision model Premium PFR515M, a freezer, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Precision must immediately notify each person (or company) to whom Precision distributed the noncompliant products that the product does not meet Federal standards. In addition, Precision must provide to DOE documents and records showing the number of units Precision distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties.

400

Philips: Noncompliance Determination (2012-SE-2605) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2012-SE-2605) Noncompliance Determination (2012-SE-2605) Philips: Noncompliance Determination (2012-SE-2605) August 31, 2012 DOE issued a Notice of Noncompliance Determination to Philips Lighting Electronics N. A. finding that basic model VEL-1S40-SC, a fluorescent lamp ballast, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on the company's own testing. Philips must immediately notify each person (or company) to whom Philips distributed the noncompliant products that the product does not meet Federal standards. In addition, Philips must provide to DOE documents and records showing the number of units Philips distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties.

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Universal: Noncompliance Determination (2013-SE-26004) | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Universal: Noncompliance Determination (2013-SE-26004) Universal: Noncompliance Determination (2013-SE-26004) Universal: Noncompliance Determination (2013-SE-26004) September 6, 2013 DOE issued a Notice of Noncompliance Determination to Universal Lighting Technologies, Inc. finding that fluorescent lamp ballast model B140R277HP does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Universal must immediately notify each person (or company) to whom Universal distributed the noncompliant products that the product does not meet Federal standards. In addition, Universal must provide to DOE documents and records showing the number of units Universal distributed and to whom. The manufacturer and/or private labeler of the product may be subject to

402

Sears: Noncompliance Determination (2011-SE-1418) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Sears: Noncompliance Determination (2011-SE-1418) Sears: Noncompliance Determination (2011-SE-1418) Sears: Noncompliance Determination (2011-SE-1418) June 26, 2012 DOE issued a Notice of Noncompliance Determination to Sears, Roebuck & Co. finding that Kenmore-brand model number 255.19502010 ("19502") and Kenmore-brand model number 255.19702010 ("19702"), compact chest freezers, do not comport with the energy conservation standards. DOE determined the products were noncompliant based on DOE testing. Sears must immediately notify each person (or company) to whom Sears distributed the noncompliant products that the products do not meet Federal standards. In addition, Sears must provide to DOE documents and records showing the number of units Sears distributed and to whom. The manufacturer and/or private labeler of

403

Cooper: Noncompliance Determination (2012-SE-4701) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cooper: Noncompliance Determination (2012-SE-4701) Cooper: Noncompliance Determination (2012-SE-4701) Cooper: Noncompliance Determination (2012-SE-4701) June 12, 2012 DOE issued a Notice of Noncompliance Determination to Cooper Power Systems, LLC finding that basic models 277-99.28, 277-99.26, and 277-99.22 of distribution transformers do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. Cooper must immediately notify each person (or company) to whom Cooper distributed the noncompliant products that the products do not meet Federal standards. In addition, Cooper must provide to DOE documents and records showing the number of units Cooper distributed and to whom. The manufacturer and/or private labeler of the product may

404

Teddico: Noncompliance Determination (2012-SE-5409) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Teddico: Noncompliance Determination (2012-SE-5409) Teddico: Noncompliance Determination (2012-SE-5409) Teddico: Noncompliance Determination (2012-SE-5409) November 20, 2012 DOE issued a Notice of Noncompliance Determination to The Electrical Design, Development and Implementation Company d/b/a Teddico finding that a variety of basic models of magnetic probe-start metal halide lamp fixtures do not comport with the energy conservation standards. DOE determined the products were noncompliant based on the company's own testing. Teddico must immediately notify each person (or company) to whom Teddico distributed the noncompliant products that the products do not meet Federal standards. In addition, Teddico must provide to DOE documents and records showing the number of units Teddico distributed and to whom. The

405

Simkar: Noncompliance Determination (2012-SE-5408) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2012-SE-5408) Noncompliance Determination (2012-SE-5408) Simkar: Noncompliance Determination (2012-SE-5408) December 5, 2012 DOE issued a Notice of Noncompliance Determination to Simkar Corporation finding that magnetic probe-start and pulse-start basic models of metal halide lamp fixtures do not comport with the energy conservation standards. DOE determined the products were noncompliant based on Simkar's own testing. Simkar must immediately notify each person (or company) to whom Simkar distributed the noncompliant products that the products do not meet Federal standards. In addition, Simkar must provide to DOE documents and records showing the number of units Simkar distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties.

406

Felix Storch: Noncompliance Determination (2011-SE-1420) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Felix Storch: Noncompliance Determination (2011-SE-1420) Felix Storch: Noncompliance Determination (2011-SE-1420) Felix Storch: Noncompliance Determination (2011-SE-1420) October 5, 2011 DOE issued a Notice of Noncompliance Determination to Felix Storch, Inc., finding that model number CF11ES, a chest freezer does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Felix Storch must immediately notify each person (or company) to whom Felix Storch distributed the noncompliant products that the product does not meet Federal standards. In addition, Felix Storch must provide to DOE documents and records showing the number of units Felix Storch distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil

407

Bigwall: Noncompliance Determination (2013-SE-1412) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bigwall: Noncompliance Determination (2013-SE-1412) Bigwall: Noncompliance Determination (2013-SE-1412) Bigwall: Noncompliance Determination (2013-SE-1412) April 10, 2013 DOE issued a Notice of Noncompliance Determination to Bigwall Enterprises, Inc. finding that freezer model W1CF106 under the Wellington brand (''the Wellington W1CF106") does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Bigwall Enterprises, Inc. must immediately notify each person (or company) to whom Bigwall distributed the noncompliant products that the product does not meet Federal standards. In addition, Bigwall must provide to DOE documents and records showing the number of units Bigwall distributed and to whom. The manufacturer and/or private labeler of the

408

Leader Electronics: Notice of Allowance (2010-SE-2301) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Leader Electronics: Notice of Allowance (2010-SE-2301) Leader Electronics: Notice of Allowance (2010-SE-2301) Leader Electronics: Notice of Allowance (2010-SE-2301) September 13, 2010 DOE issued a Notice of Allowance to Resume Distribution to Leader Electronics Inc., authorizing Leader Electronics to resume distribution of the external power supply model "MU03-F050040-A1(MU03-F1050-AKOS)". DOE had previously issued a Notice of Non-Compliance Determination based on test results submitted by Leader Electronics showing that certain models were noncompliant. After an internal review, Leader Electronics determined that the original test results reported to DOE were incorrect. Leader has submitted complete test data, which DOE has reviewed closely, and DOE has determined that the model complies with the applicable energy conservation

409

CNA: Noncompliance Determination (2013-SE-1430) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Noncompliance Determination (2013-SE-1430) Noncompliance Determination (2013-SE-1430) CNA: Noncompliance Determination (2013-SE-1430) July 1, 2013 DOE issued a Notice of Noncompliance Determination to CNA International, Inc., d/b/a MC Appliance Corp. finding that Magic Chef-brand model HMCF7W ("CNA model HMCF7W") does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. CNA must immediately notify each person (or company) to whom CNA distributed the noncompliant products that the product does not meet Federal standards. In addition, CNA must provide to DOE documents and records showing the number of units CNA distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties.

410

Golden Opportunity: Noncompliance Determination (2013-SE-1418) | Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Noncompliance Determination (2013-SE-1418) Noncompliance Determination (2013-SE-1418) Golden Opportunity: Noncompliance Determination (2013-SE-1418) April 24, 2013 DOE issued a Notice of Noncompliance Determination to Golden Opportunity, Inc. finding that freezer models Golden GFC51 and Golden GFC69 do not comport with the energy conservation standards. DOE determined the products were noncompliant based on DOE testing. Golden Opportunity must immediately notify each person (or company) to whom Golden Opportunity distributed the noncompliant products that the products do not meet Federal standards. In addition, Golden Opportunity must provide to DOE documents and records showing the number of units Golden Opportunity distributed and to whom. The manufacturer and/or private labeler of the products may be

411

Bigwall: Noncompliance Determination (2013-SE-1412) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Noncompliance Determination (2013-SE-1412) Noncompliance Determination (2013-SE-1412) Bigwall: Noncompliance Determination (2013-SE-1412) April 10, 2013 DOE issued a Notice of Noncompliance Determination to Bigwall Enterprises, Inc. finding that freezer model W1CF106 under the Wellington brand (''the Wellington W1CF106") does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Bigwall Enterprises, Inc. must immediately notify each person (or company) to whom Bigwall distributed the noncompliant products that the product does not meet Federal standards. In addition, Bigwall must provide to DOE documents and records showing the number of units Bigwall distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties.

412

The Structural Transition Behavior of CdSe/ZnS Core/shell Quantum Dots under High Pressure  

Science Conference Proceedings (OSTI)

The structural phase transition of CdSe/ZnS core/shell quantum dots (QDs) has been studied by in situ angle-dispersive X-ray diffraction under high pressure up to 53.6?GPa. The CdSe core transforms from wurtzite to rock-salt structure near 6.3?GPa and then to Cmcm or distorted Cmcm structure probably occurs at 45.1?GPa which has not been observed in CdSe nanomaterials before. The critical pressure from wurtzite to rock-salt and the bulk modulus of rock-salt phase are much higher than those for bulky and uncapped nanoparticle CdSe. The released sample can be kept in rock-salt phase for a certain time, verified by photoluminescence (PL) spectra, quite different from the reversible transition for pure CdSe. A reasonable interpretation of the experimental phenomena is given by comparing the bulk modulus of the core and shell and studying the stress sate of the core after decompression. Our study suggests that capping a hard shell is an effective approach to quench the high pressure phase of nanomaterial with a reversible phase transition.

Z Li; L Wang; B Liu; J Wang; B Liu; Q Li; B Zou; T Cui; Y Meng; H Mao

2011-12-31T23:59:59.000Z

413

Excitons in single and double GaAs/AlGaAs/ZnSe/Zn(Cd)MnSe heterovalent quantum wells  

Science Conference Proceedings (OSTI)

Exciton photoluminescence spectra, photoluminescence excitation spectra, and magnetophotoluminescence spectra of single (GaAs/AlGaAs/ZnMnSe) and double (GaAs/AlGaAs/ZnSe/ZnCdMnSe) heterovalent quantum wells formed by molecular beam epitaxy are studied. It is shown that the exciton absorption spectrum of such quantum wells mainly reproduces the resonant exciton spectrum expected for usual quantum wells with similar parameters, while the radiative exciton recombination have substantial distinctions, in particular the additional localization mechanism determined by defects generated by heterovalent interface exists. The nature of these localization centers is not currently clarified; their presence leads to broadening of photoluminescence lines and to an increase in the Stokes shift between the peaks of luminescence and absorption, as well as determining the variation in the magnetic g factor of bound exciton complexes.

Toropov, A. A., E-mail: toropov@beam.ioffe.ru; Kaibyshev, V. Kh.; Terent'ev, Ya. V.; Ivanov, S. V.; Kop'ev, P. S. [Russian Academy of Sciences, Ioffe Physical Technical Institute (Russian Federation)

2011-02-15T23:59:59.000Z

414

Research on polycrystalline thin-film CuGaInSe[sub 2] solar cells  

DOE Green Energy (OSTI)

This report describes research to fabricate high-efficiency CdZnS/CuInGaSe[sub 2] (CIGS) thin-film solar cells, and to develop improved transparent conductor window layers such as ZnO. A specific technical milestone was the demonstration of an air mass (AM) 1.5 global, 13% efficient, 1-cm[sup 2]-total-area CIGS thin-film solar cell. Our activities focused on three areas. First, a CIGS deposition: system was modified to double its substrate capacity, thus increasing throughput, which is critical to speeding the process development by providing multiple substrates from the same CIGS run. Second, new tooling was developed to enable an investigation of a modified aqueous CdZnS process. The goal was to improve the yield of this critical step in the device fabrication process. Third, our ZnO sputtering system was upgraded to improve its reliability, and the sputtering parameters were further optimized to improve its properties as a transparent conducting oxide. The characterization of the new CIGS deposition system substrate fixturing was completed, and we produced good thermal uniformity and adequately high temperatures for device-quality CIGS deposition. Both the CIGS and ZnO deposition processes were refined to yield a ZnO//Cd[sub 0.82]Zn[sub 0.18]S/CuIn[sub 0.80]Ga[sub 0.20]Se[sub 2] cell that was verified at NREL under standard testing conditions at 13.1% efficiency with V[sub oc] = 0.581 V, J[sub sc] = 34.8 mA/cm[sup 2], FF = 0.728, and a cell area of 0.979 cm[sup 2].

Stanbery, B.J.; Chen, W.S.; Devaney, W.E.; Stewart, J.W. (Boeing Co., Seattle, WA (United States). Defense and Space Systems Group)

1992-11-01T23:59:59.000Z

415

Strong downslope wind events in Ammassalik, SE Greenland  

Science Conference Proceedings (OSTI)

Ammassalik in SE Greenland is known for strong winds events that can reach hurricane intensity and cause severe destruction in the local town. Yet, these winds and their impact on the nearby fjord and shelf region have not been studied in detail.

M. Oltmanns; F. Straneo; G. W. K. Moore; S. H. Mernild

416

Surface Enhanced Raman Spectroscopy of Pyridine on CdSe/ZnBeSe Quantum Dots Grown by MBE  

SciTech Connect

Using Surface Enhanced Raman Spectroscopy (SERS), we observed Raman enhancements (104-105) for pyridine molecules adsorbed on a II-VI semiconductor CdSe/ZnBeSe sample of uncapped self-assembled quantum dots produced by molecular beam epitaxy. When a monolayer of pyridine is adsorbed on these structures, excitation at 488 nm produces intense Raman spectra a very large enhancement of the a1, b1 and b2 modes. This indicates the presence of charge-transfer as a contributor to the enhacement.

Livingstone, Richard [City College of New York, New York, NY (United States)

2010-08-06T23:59:59.000Z

417

Fusion algebra of critical percolation  

E-Print Network (OSTI)

We present an explicit conjecture for the chiral fusion algebra of critical percolation considering Virasoro representations with no enlarged or extended symmetry algebra. The representations we take to generate fusion are countably infinite in number. The ensuing fusion rules are quasi-rational in the sense that the fusion of a finite number of these representations decomposes into a finite direct sum of these representations. The fusion rules are commutative, associative and exhibit an sl(2) structure. They involve representations which we call Kac representations of which some are reducible yet indecomposable representations of rank 1. In particular, the identity of the fusion algebra is a reducible yet indecomposable Kac representation of rank 1. We make detailed comparisons of our fusion rules with the recent results of Eberle-Flohr and Read-Saleur. Notably, in agreement with Eberle-Flohr, we find the appearance of indecomposable representations of rank 3. Our fusion rules are supported by extensive numerical studies of an integrable lattice model of critical percolation. Details of our lattice findings and numerical results will be presented elsewhere.

Jorgen Rasmussen; Paul A. Pearce

2007-06-19T23:59:59.000Z

418

Manhattan Project: CP-1 Going Critical  

Office of Scientific and Technical Information (OSTI)

Painting of CP-1 Going Critical Events > The Plutonium Path to the Bomb, 1942-1944 Events > The Plutonium Path to the Bomb, 1942-1944 > CP-1 Goes Critical, Met Lab, December 2,...

419

Tensile Strain Switched Ferromagnetism in Layered NbS2 and NbSe2  

SciTech Connect

Developing approaches to effectively induce and control the magnetic states is critical to the use of magnetic nanostructures in quantum information devices but is still challenging. Here we have demonstrated, by employing the density functional theory calculations, an existence of infinite magnetic sheets with structural integrity and magnetic homogeneity. Examination from a series of transition metal dichalcogenides shows that the biaxial tensile strained NbS2 and NbSe2 structures can be magnetized with a ferromagnetic character due to the competitive effects of through-bond interaction and through-space interaction. The estimated Curie temperatures (387 and 542 K under the 10% strain for NbS2 and NbSe2 structures, respectively) suggest that the unique ferromagnetic character can be achieved above room temperature. The self-exchange of population between 4d orbitals of Nb atom that leads to the exchange splitting is the mechanism behind the transition of the spin moment. The induced magnetic moments can be significantly enhanced by the tensile strain, even giving rise to half-metallic character with the strong spin polarization around the Fermi level. Given the recent progress that the desired strain can be achieved on two-dimensional nanostructures, such as graphene and BN layer in a controlled way, we believe that our calculated results are suitable for experimental verification and implementation opening a new path to explore the spintronics in pristine two-dimensional nanostructures.

Zhou, Yungang; Wang, Zhiguo; Yang, Ping; Zu, Xiaotao; Yang, Li; Sun, Xin; Gao, Fei

2012-11-01T23:59:59.000Z

420

CRITICALITY SAFETY QUALIFICATION STANDARD REFERENCE GUIDE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9, 2010 Page 1 of 47 9, 2010 Page 1 of 47 Criticality Safety Qualification Standard Reference Guide 2010 For use with DOE-STD 1173-2009, CRITICALITY SAFETY FUNCTIONAL AREA QUALIFICATION STANDARD September 9, 2010 Page 2 of 47 PURPOSE....................................................................................................................... 5 SCOPE............................................................................................................................ 5 1. Criticality safety personnel must demonstrate a working-level knowledge of the fission process. .......................................................................................................... 6 2. Criticality safety personnel must demonstrate a working-level knowledge of the

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Nuclear Criticality Safety: Current Activities - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Safety Materials Disposition Decontamination & Decommissioning Nuclear Criticality Safety Nuclear Data Program Nuclear Waste Form Modeling Departments Engineering...

422

Nuclear Criticality Safety - Nuclear Engineering Division (Argonne...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Safety Materials Disposition Decontamination & Decommissioning Nuclear Criticality Safety Nuclear Data Program Nuclear Waste Form Modeling Departments Engineering...

423

Anomalies of Nuclear Criticality, Revision 6  

SciTech Connect

This report is revision 6 of the Anomalies of Nuclear Criticality. This report is required reading for the training of criticality professionals in many organizations both nationally and internationally. This report describes many different classes of nuclear criticality anomalies that are different than expected.

Clayton, E. D.; Prichard, Andrew W.; Durst, Bonita E.; Erickson, David; Puigh, Raymond J.

2010-02-19T23:59:59.000Z

424

Criticality control in shipments of fissile materials  

SciTech Connect

This paper describes a procedure for finite-array criticality analysis to ensure criticality safety of shipments of fissile materials in US DOE-certified packages. After the procedure has been performed, one can obtain the minimum transport index and determine the maximum number of fissile packages allowable in a shipment that meets the 10 CFR 71 criticality safety requirements.

Liaw, J. R.; Liu, Y. Y.

2000-03-14T23:59:59.000Z

425

Critical Point Symmetries in Nuclei  

E-Print Network (OSTI)

Critical Point Symmetries (CPS) appear in regions of the nuclear chart where a rapid change from one symmetry to another is observed. The first CPSs, introduced by F. Iachello, were E(5), which corresponds to the transition from vibrational [U(5)] to gamma-unstable [O(6)] behaviour, and X(5), which represents the change from vibrational [U(5)] to prolate axially deformed [SU(3)] shapes. These CPSs have been obtained as special solutions of the Bohr collective Hamiltonian. More recent special solutions of the same Hamiltonian, to be described here, include Z(5) and Z(4), which correspond to maximally triaxial shapes (the latter with ``frozen'' gamma=30 degrees), as well as X(3), which corresponds to prolate shapes with ``frozen'' gamma=0. CPSs have the advantage of providing predictions which are parameter free (up to overall scale factors) and compare well to experiment. However, their mathematical structure [with the exception of E(5)] needs to be clarified.

Bonatsos, D; Petrellis, D; Terziev, P A; Yigitoglu, I; Bonatsos, Dennis

2006-01-01T23:59:59.000Z

426

Critical heat flux test apparatus  

DOE Patents (OSTI)

An apparatus for testing, in situ, highly irradiated specimens at high temperature transients is provided. A specimen, which has a thermocouple device attached thereto, is manipulated into test position in a sealed quartz heating tube by a robot. An induction coil around a heating portion of the tube is powered by a radio frequency generator to heat the specimen. Sensors are connected to monitor the temperatures of the specimen and the induction coil. A quench chamber is located below the heating portion to permit rapid cooling of the specimen which is moved into this quench chamber once it is heated to a critical temperature. A vacuum pump is connected to the apparatus to collect any released fission gases which are analyzed at a remote location.

Welsh, R.E.; Doman, M.J.; Wilson, E.C.

1990-01-01T23:59:59.000Z

427

Critical heat flux test apparatus  

DOE Patents (OSTI)

An apparatus for testing, in situ, highly irradiated specimens at high temperature transients is provided. A specimen, which has a thermocouple device attached thereto, is manipulated into test position in a sealed quartz heating tube by a robot. An induction coil around a heating portion of the tube is powered by a radio frequency generator to heat the specimen. Sensors are connected to monitor the temperatures of the specimen and the induction coil. A quench chamber is located below the heating portion to permit rapid cooling of the specimen which is moved into this quench chamber once it is heated to a critical temperature. A vacuum pump is connected to the apparatus to collect any released fission gases which are analyzed at a remote location.

Welsh, R.E.; Doman, M.J.; Wilson, E.C.

1990-12-31T23:59:59.000Z

428

File:EIA-PSJ-SE-GAS.pdf | Open Energy Information  

Open Energy Info (EERE)

PSJ-SE-GAS.pdf PSJ-SE-GAS.pdf Jump to: navigation, search File File history File usage Paradox-San Juan Basin, Southeast Part By 2001 Gas Reserve Class Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(5,100 × 6,600 pixels, file size: 13.13 MB, MIME type: application/pdf) Description Paradox-San Juan Basin, Southeast Part By 2001 Gas Reserve Class Sources Energy Information Administration Authors Samuel H. Limerick; Lucy Luo; Gary Long; David F. Morehouse; Jack Perrin; Robert F. King Related Technologies Oil, Natural Gas Creation Date 2005-09-01 Extent Regional Countries United States UN Region Northern America States Utah, Colorado, New Mexico, Arizona File history Click on a date/time to view the file as it appeared at that time.

429

Haier: Noncompliance Determination (2011-SE-1408) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

08) 08) Haier: Noncompliance Determination (2011-SE-1408) October 18, 2011 DOE issued a Notice of Noncompliance Determination to Haier America Trading, L.L.C. finding that model number HNCM070, a chest freezer, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Haier must immediately notify each person (or company) to whom Haier distributed the noncompliant products that the product does not meet Federal standards. In addition, Haier must provide to DOE documents and records showing the number of units Haier distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Haier: Noncompliance Determination (2011-SE-1408) More Documents & Publications

430

Advanced Distributor Products: Noncompliance Determination (2010-SE-0304) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advanced Distributor Products: Noncompliance Determination Advanced Distributor Products: Noncompliance Determination (2010-SE-0304) Advanced Distributor Products: Noncompliance Determination (2010-SE-0304) May 28, 2010 DOE issued a Notice of Noncompliance Determination to Advanced Distributor Products finding that basic model N2H348A(G)KB* + H,GE50560 + *8MPV125 and basic model N2H360A(G)KB* + H,GE50560 + MV16J22**B* do not comport with the energy conservation standards. DOE determined the products were noncompliant based on ADP's certification. ADP must immediately notify each person (or company) to whom ADP distributed the noncompliant products that the product does not meet Federal standards. In addition, ADP must provide to DOE documents and records showing the number of units ADP distributed and to whom. The manufacturer and/or private labeler of the

431

Localizing Micro-grids Research for the SE Asian Region  

NLE Websites -- All DOE Office Websites (Extended Search)

Localizing Micro-grids Research for the SE Asian Region Localizing Micro-grids Research for the SE Asian Region Speaker(s): Cheng-Guan (Michael) Quah Valerie Choy Date: December 3, 2010 - 12:00pm Location: 90-3122 This presentation discusses developments (and test-beds) of micro-grids and distributed generation systems that are on-going in Singapore and poses the question as to whether simpler versions of such systems would be applicable to meet the challenges of rural electrification and energy poverty particularly those of its closest neighbors. Southeast Asia is an ethnically and culturally diverse region comprising more than 10 nations where 160 million people still live without electricity. Off-grid electrification for rural village communities and eco-resorts using DG and micro-grid systems are conceivable but many technical, political, cultural

432

Haier: Noncompliance Determination (2011-SE-1428) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

28) 28) Haier: Noncompliance Determination (2011-SE-1428) April 23, 2013 DOE issued a Notice of Noncompliance Determination to Haier America Trading, LLC finding that Haier model HMCM106EA, a freezer, does not comport with the energy conservation standards. DOE determined the product was noncompliant based on DOE testing. Haier must immediately notify each person (or company) to whom Haier distributed the noncompliant products that the product does not meet Federal standards. In addition, Haier must provide to DOE documents and records showing the number of units Haier distributed and to whom. The manufacturer and/or private labeler of the product may be subject to civil penalties. Haier: Noncompliance Determination (2011-SE-1428) More Documents & Publications

433

File:EIA-PSJ-SE-BOE.pdf | Open Energy Information  

Open Energy Info (EERE)

SE-BOE.pdf SE-BOE.pdf Jump to: navigation, search File File history File usage Paradox-San Juan Basin, Southeast Part By 2001 BOE Reserve Class Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(5,100 × 6,600 pixels, file size: 13.15 MB, MIME type: application/pdf) Description Paradox-San Juan Basin, Southeast Part By 2001 BOE Reserve Class Sources Energy Information Administration Authors Samuel H. Limerick; Lucy Luo; Gary Long; David F. Morehouse; Jack Perrin; Robert F. King Related Technologies Oil, Natural Gas Creation Date 2005-09-01 Extent Regional Countries United States UN Region Northern America States Utah, Colorado, New Mexico, Arizona File history Click on a date/time to view the file as it appeared at that time.

434

A Se-mash Hit | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

A Se-mash Hit A Se-mash Hit Developer Data Web Services Source Code Challenges Semantic Web Blogs Let's Talk Developers You are here Data.gov » Communities » Developers A Se-mash Hit Submitted by Data.gov Administrator on Tue, 12/18/2012 - 6:11pm Data.gov Mash-A-Thon 1 builds Web 3.0 apps and enthusiasm A lecture by Professor Jim Hendler at the Data.gov Mash-a-Thon 2010 For two days in August, a classroom in Washington, D.C.'s Dupont Circle filled with Federal developers, students and semantic web experts. They shared one purpose: to create a new generation of "linked-data" applications called "mashups" that use Data.gov's free public data in new and innovative ways. The U.S. government is in the vanguard of understanding and using the semantic web, which will transform the World Wide Web. Data will "talk" to one another,

435

Kinetics of Ge-Se-In Film Growth  

SciTech Connect

The processes of vacuum evaporation and condensation in the Ge-Se-In system were investigated. Thin amorphous films were deposited by modified thermal evaporation from previously synthesized non-crystalline (GeSe{sub y}){sub 1-x}In{sub x} ingots, where x = 0, 5, 10, 15, 20 and y = 4, 5 and 6. The specific evaporation rate was determined by measuring of the mass of evaporator before evaporation and the mass of empty evaporator after evaporation in temperature range of evaporation (500-800) K. The substrate temperature was varied in the range (300-430) K to study the condensation process and specific condensation rate was determined by measuring of the substrate mass before and after condensation. The condensation energy of the (GeSe{sub y}){sub 1-x}In{sub x} layers steady increases at indium addition.The thin films studied by transmission electron microscopy (TEM) and electron microdiffraction (EMD) reveal homogeneous and amorphous structure. The layer composition determined by Auger electron spectroscopy is close to that of the corresponded bulk samples.

Stoilova, A.; Petkov, P.; Nedeva, Y. [Department of Physics, University of Chemical Technology and Metallurgy, 1756 Sofia (Bulgaria); Monchev, B. [Institute of Electrochemistry and Energy Systems, BAS, 1113 Sofia (Bulgaria)

2010-01-21T23:59:59.000Z

436

Wireless System Considerations When Implementing NERC Critical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireless System Considerations When Implementing NERC Critical Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards Energy asset owners are facing a monumental challenge as they address compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Standards (CIP-002 through CIP-009). The increased use of wireless technologies and their introduction into control center networks and field devices compound this challenge, as ambiguity exists regarding the applicability of the CIP requirements to wireless networking technologies. Wireless System Considerations When Implementing NERC Critical Infrastructure Protection Standards More Documents & Publications

437

Criticality safety and facility design considerations  

SciTech Connect

Operations with fissile material introduce the risk of a criticality accident that may be lethal to nearby personnel. In addition, concerns over criticality safety can result in substantial delays and shutdown of facility operations. For these reasons, it is clear that the prevention of a nuclear criticality accident should play a major role in the design of a nuclear facility. The emphasis of this report will be placed on engineering design considerations in the prevention of criticality. The discussion will not include other important aspects, such as the physics of calculating limits nor criticality alarm systems.

Waltz, W.R.

1991-06-01T23:59:59.000Z

438

Criticality safety basics, a study guide  

SciTech Connect

This document is a self-study and classroom guide, for criticality safety of activities with fissile materials outside nuclear reactors. This guide provides a basic overview of criticality safety and criticality accident prevention methods divided into three parts: theory, application, and history. Except for topic emphasis, theory and history information is general, while application information is specific to the Idaho National Engineering and Environmental Laboratory (INEEL). Information presented here should be useful to personnel who must know criticality safety basics to perform their assignments safely or to design critically safe equipment or operations. However, the guide's primary target audience is fissile material handler candidates.

V. L. Putman

1999-09-01T23:59:59.000Z

439

Criticality safety basics, a study guide  

SciTech Connect

This document is a self-study and classroom guide, for criticality safety of activities with fissile materials outside nuclear reactors. This guide provides a basic overview of criticality safety and criticality accident prevention methods divided into three parts: theory, application, and history. Except for topic emphasis, theory and history information is general, while application information is specific to the Idaho National Engineering and Environmental Laboratory (INEEL). Information presented here should be useful to personnel who must know criticality safety basics to perform their assignments safely or to design critically safe equipment or operations. However, the guide's primary target audience is fissile material handler candidates.

V. L. Putman

1999-09-01T23:59:59.000Z

440

2011 Annual Criticality Safety Program Performance Summary  

SciTech Connect

The 2011 review of the INL Criticality Safety Program has determined that the program is robust and effective. The review was prepared for, and fulfills Contract Data Requirements List (CDRL) item H.20, 'Annual Criticality Safety Program performance summary that includes the status of assessments, issues, corrective actions, infractions, requirements management, training, and programmatic support.' This performance summary addresses the status of these important elements of the INL Criticality Safety Program. Assessments - Assessments in 2011 were planned and scheduled. The scheduled assessments included a Criticality Safety Program Effectiveness Review, Criticality Control Area Inspections, a Protection of Controlled Unclassified Information Inspection, an Assessment of Criticality Safety SQA, and this management assessment of the Criticality Safety Program. All of the assessments were completed with the exception of the 'Effectiveness Review' for SSPSF, which was delayed due to emerging work. Although minor issues were identified in the assessments, no issues or combination of issues indicated that the INL Criticality Safety Program was ineffective. The identification of issues demonstrates the importance of an assessment program to the overall health and effectiveness of the INL Criticality Safety Program. Issues and Corrective Actions - There are relatively few criticality safety related issues in the Laboratory ICAMS system. Most were identified by Criticality Safety Program assessments. No issues indicate ineffectiveness in the INL Criticality Safety Program. All of the issues are being worked and there are no imminent criticality concerns. Infractions - There was one criticality safety related violation in 2011. On January 18, 2011, it was discovered that a fuel plate bundle in the Nuclear Materials Inspection and Storage (NMIS) facility exceeded the fissionable mass limit, resulting in a technical safety requirement (TSR) violation. The TSR limits fuel plate bundles to 1085 grams U-235, which is the maximum loading of an ATR fuel element. The overloaded fuel plate bundle contained 1097 grams U-235 and was assembled under an 1100 gram U-235 limit in 1982. In 2003, the limit was reduced to 1085 grams citing a new criticality safety evaluation for ATR fuel elements. The fuel plate bundle inventories were not checked for compliance prior to implementing the reduced limit. A subsequent review of the NMIS inventory did not identify further violations. Requirements Management - The INL Criticality Safety program is organized and well documented. The source requirements for the INL Criticality Safety Program are from 10 CFR 830.204, DOE Order 420.1B, Chapter III, 'Nuclear Criticality Safety,' ANSI/ANS 8-series Industry Standards, and DOE Standards. These source requirements are documented in LRD-18001, 'INL Criticality Safety Program Requirements Manual.' The majority of the criticality safety source requirements are contained in DOE Order 420.1B because it invokes all of the ANSI/ANS 8-Series Standards. DOE Order 420.1B also invokes several DOE Standards, including DOE-STD-3007, 'Guidelines for Preparing Criticality Safety Evaluations at Department of Energy Non-Reactor Nuclear Facilities.' DOE Order 420.1B contains requirements for DOE 'Heads of Field Elements' to approve the criticality safety program and specific elements of the program, namely, the qualification of criticality staff and the method for preparing criticality safety evaluations. This was accomplished by the approval of SAR-400, 'INL Standardized Nuclear Safety Basis Manual,' Chapter 6, 'Prevention of Inadvertent Criticality.' Chapter 6 of SAR-400 contains sufficient detail and/or reference to the specific DOE and contractor documents that adequately describe the INL Criticality Safety Program per the elements specified in DOE Order 420.1B. The Safety Evaluation Report for SAR-400 specifically recognizes that the approval of SAR-400 approves the INL Criticality Safety Program. No new source requirements were released in 2011. A revision to LRD-18001 is

Andrea Hoffman

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

2011 Annual Criticality Safety Program Performance Summary  

SciTech Connect

The 2011 review of the INL Criticality Safety Program has determined that the program is robust and effective. The review was prepared for, and fulfills Contract Data Requirements List (CDRL) item H.20, 'Annual Criticality Safety Program performance summary that includes the status of assessments, issues, corrective actions, infractions, requirements management, training, and programmatic support.' This performance summary addresses the status of these important elements of the INL Criticality Safety Program. Assessments - Assessments in 2011 were planned and scheduled. The scheduled assessments included a Criticality Safety Program Effectiveness Review, Criticality Control Area Inspections, a Protection of Controlled Unclassified Information Inspection, an Assessment of Criticality Safety SQA, and this management assessment of the Criticality Safety Program. All of the assessments were completed with the exception of the 'Effectiveness Review' for SSPSF, which was delayed due to emerging work. Although minor issues were identified in the assessments, no issues or combination of issues indicated that the INL Criticality Safety Program was ineffective. The identification of issues demonstrates the importance of an assessment program to the overall health and effectiveness of the INL Criticality Safety Program. Issues and Corrective Actions - There are relatively few criticality safety related issues in the Laboratory ICAMS system. Most were identified by Criticality Safety Program assessments. No issues indicate ineffectiveness in the INL Criticality Safety Program. All of the issues are being worked and there are no imminent criticality concerns. Infractions - There was one criticality safety related violation in 2011. On January 18, 2011, it was discovered that a fuel plate bundle in the Nuclear Materials Inspection and Storage (NMIS) facility exceeded the fissionable mass limit, resulting in a technical safety requirement (TSR) violation. The TSR limits fuel plate bundles to 1085 grams U-235, which is the maximum loading of an ATR fuel element. The overloaded fuel plate bundle contained 1097 grams U-235 and was assembled under an 1100 gram U-235 limit in 1982. In 2003, the limit was reduced to 1085 grams citing a new criticality safety evaluation for ATR fuel elements. The fuel plate bundle inventories were not checked for compliance prior to implementing the reduced limit. A subsequent review of the NMIS inventory did not identify further violations. Requirements Management - The INL Criticality Safety program is organized and well documented. The source requirements for the INL Criticality Safety Program are from 10 CFR 830.204, DOE Order 420.1B, Chapter III, 'Nuclear Criticality Safety,' ANSI/ANS 8-series Industry Standards, and DOE Standards. These source requirements are documented in LRD-18001, 'INL Criticality Safety Program Requirements Manual.' The majority of the criticality safety source requirements are contained in DOE Order 420.1B because it invokes all of the ANSI/ANS 8-Series Standards. DOE Order 420.1B also invokes several DOE Standards, including DOE-STD-3007, 'Guidelines for Preparing Criticality Safety Evaluations at Department of Energy Non-Reactor Nuclear Facilities.' DOE Order 420.1B contains requirements for DOE 'Heads of Field Elements' to approve the criticality safety program and specific elements of the program, namely, the qualification of criticality staff and the method for preparing criticality safety evaluations. This was accomplished by the approval of SAR-400, 'INL Standardized Nuclear Safety Basis Manual,' Chapter 6, 'Prevention of Inadvertent Criticality.' Chapter 6 of SAR-400 contains sufficient detail and/or reference to the specific DOE and contractor documents that adequately describe the INL Criticality Safety Program per the elements specified in DOE Order 420.1B. The Safety Evaluation Report for SAR-400 specifically recognizes that the approval of SAR-400 approves the INL Criticality Safety Progra

Andrea Hoffman

2011-12-01T23:59:59.000Z

442

Range of Neutronic Parameters for Repository Criticality Analyses  

SciTech Connect

The ''Range of Neutronic Parameters for Repository Criticality Analyses'' technical report contains a summary of the benchmark criticality analyses (including the laboratory critical experiment [LCEs] and the commercial reactor criticals [CRCs]) used to support the validation of the criticality evaluation methods. This report also documents the development of the Critical Limits (CLs) for the repository criticality analyses.

W.J. Anderson

1999-09-28T23:59:59.000Z

443

SILENE Benchmark Critical Experiments for Criticality Accident Alarm Systems  

SciTech Connect

In October 2010 a series of benchmark experiments was conducted at the Commissariat a Energie Atomique et aux Energies Alternatives (CEA) Valduc SILENE [1] facility. These experiments were a joint effort between the US Department of Energy (DOE) and the French CEA. The purpose of these experiments was to create three benchmarks for the verification and validation of radiation transport codes and evaluated nuclear data used in the analysis of criticality accident alarm systems (CAASs). This presentation will discuss the geometric configuration of these experiments and the quantities that were measured and will present some preliminary comparisons between the measured data and calculations. This series consisted of three single-pulsed experiments with the SILENE reactor. During the first experiment the reactor was bare (unshielded), but during the second and third experiments it was shielded by lead and polyethylene, respectively. During each experiment several neutron activation foils and thermoluminescent dosimeters (TLDs) were placed around the reactor, and some of these detectors were themselves shielded from the reactor by high-density magnetite and barite concrete, standard concrete, and/or BoroBond. All the concrete was provided by CEA Saclay, and the BoroBond was provided by Y-12 National Security Complex. Figure 1 is a picture of the SILENE reactor cell configured for pulse 1. Also included in these experiments were measurements of the neutron and photon spectra with two BICRON BC-501A liquid scintillators. These two detectors were provided and operated by CEA Valduc. They were set up just outside the SILENE reactor cell with additional lead shielding to prevent the detectors from being saturated. The final detectors involved in the experiments were two different types of CAAS detectors. The Babcock International Group provided three CIDAS CAAS detectors, which measured photon dose and dose rate with a Geiger-Mueller tube. CIDAS detectors are currently in use at Y-12 in the newly constructed Highly Enriched Uranium Materials Facility. The second CAAS detector used a {sup 6}LiF TLD to absorb neutrons and a silicon detector to count the charge particles released by these absorption events. Lawrence Livermore National Laboratory provided four of these detectors, which had formerly been used at the Rocky Flats facility in the United States.

Miller, Thomas Martin [ORNL; Reynolds, Kevin H. [Y-12 National Security Complex

2011-01-01T23:59:59.000Z

444

Critical Casimir forces in cellular membranes  

E-Print Network (OSTI)

Recent experiments suggest that membranes of living cells are tuned close to a miscibility critical point in the 2D Ising universality class. We propose that one role for this proximity to criticality in live cells is to provide a conduit for relatively long-ranged critical Casimir forces. Using techniques from conformal field theory we calculate potentials of mean force between membrane bound inclusions mediated by their local interactions with the composition order parameter. We verify these calculations using Monte-Carlo where we also compare critical and off-critical results. Our findings suggest that membrane bound proteins experience weak yet long range forces mediated by critical composition fluctuations in the plasma membranes of living cells.

Benjamin B. Machta; Sarah L. Veatch; James P. Sethna

2012-03-09T23:59:59.000Z

445

Critical Operating Constraints Forecast-- Functional Specification  

Science Conference Proceedings (OSTI)

Critical operating constraints that could result in curtailments of load may occur in a transmission grid with areas of potential generation deficit and limited transmission import capacities. In such situations, it is crucial that the grid operators have a tool to predict when and where critical operating constraints would occur. This report describes the functional specification of such a decision support tool, called the COCF (Critical Operating Constraint Forecast).

2008-03-04T23:59:59.000Z

446

Criticality Safety Information Meeting for the Hanford Plutonium...  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety and Security (HSS), conducted a criticality safety information meeting with Hanford site criticality safety engineers on May 14, 2012, to discuss criticality safety...

447

Spectroscopy, photo-physics, and time resolved exciton dynamics of GaSe quantum dots  

E-Print Network (OSTI)

of Carrier Relaxation Dynamics in Type II CdSe/CdTe TetrapodHigh Quality Zinc Blende CdSe Nanocrystals”, J. Phys. Chem.Shape Tuning of Type II CdTe-CdSe Colloidal Nanocrystal

Mirafzal, Hoda

2011-01-01T23:59:59.000Z

448

Shape dependence of band-edge exciton fine structure in CdSe nanocrystals  

E-Print Network (OSTI)

exciton fine structure in CdSe nanocrystals Qingzhong Zhao,fine structure of wurtzite CdSe nanocrystals is investigatedexciton fine structure of CdSe nanocrystals is determined by

Zhao, Qingzhong

2008-01-01T23:59:59.000Z

449

Strain-dependent photoluminescence behavior in three geometries of CdSe/CdS nanocrystals  

E-Print Network (OSTI)

X. et al. Shape control of CdSe nanocrystals. Nature 404,of nearly monodisperse CdSe/CdS core/shell nanocrystalsgrowth of highly luminescent CdSe/CdS nanoheterostructures

Choi, Charina L

2010-01-01T23:59:59.000Z

450

Critical Minerals Policy Act” (S. 1113)  

Science Conference Proceedings (OSTI)

Jul 23, 2012 ... surveys and production to research and recycling – and, in particular, to see that additional critical mineral supplies can ... Exploration. Strategic ...

451

THE LONG TERM CALIBRATION STABILITY OF CRITICAL ...  

Science Conference Proceedings (OSTI)

... through nf flow tubes with circular cross section, ... Real Gas Eflects in Critical Flow through Nozzles ... of the Effects of Heat Transfer and Compressible ...

2012-10-29T23:59:59.000Z

452

FAQS Reference Guide – Criticality Safety (NNSA)  

Energy.gov (U.S. Department of Energy (DOE))

This reference guide has been developed to address the competency statements in DOE-STD-1173-2009, Criticality Safety Functional Area Qualification Standard.

453

July 1995, Department's Criticality Safety Assessment Program...  

NLE Websites -- All DOE Office Websites (Extended Search)

Company at the Lynchburg Research Center; and two-and-a-half years as a Criticality Safety Analyst for General Electric Company at the Wilmington Fuel Fabrication Facility....

454

Properties of Neutron Star Critical Collapses  

E-Print Network (OSTI)

Critical phenomena in gravitational collapse opened a new mathematical vista into the theory of general relativity and may ultimately entail fundamental physical implication in observations. However, at present, the dynamics of critical phenomena in gravitational collapse scenarios are still largely unknown. My thesis seeks to understand the properties of the threshold in the solution space of the Einstein field equations between the black hole and neutron star phases, understand the properties of the neutron star critical solution and clarify the implication of these results on realistic astrophysical scenarios. We develop a new set of neutron star-like initial data to establish the universality of the neutron star critical solution and analyze the structure of neutron star and neutron star-like critical collapses via the study of the phase spaces. We also study the different time scales involved in the neutron star critical solution and analyze the properties of the critical index via comparisons between neutron star and neutron star-like initial data. Finally, we explore the boundary of the attraction basin of the neutron star critical solution and its transition to a known set of non-critical fixed points.

Mew-Bing Wan

2010-01-10T23:59:59.000Z

455

Computing criticality of lines in power systems  

E-Print Network (OSTI)

Abstract — We propose a computationally efficient method based on nonlinear optimization to identify critical lines, failure of which can cause severe blackouts. Our method computes criticality measure for all lines at a time, as opposed to detecting a single vulnerability, providing a global view of the system. This information on criticality of lines can be used to identify multiple contingencies by selectively exploring multiple combinations of broken lines. The effectiveness of our method is demonstrated on the IEEE 30 and 118 bus systems, where we can very quickly detect the most critical lines in the system and identify severe multiple contingencies. I.

Ali P?nar; Adam Reichert; Bernard Lesieutre

2007-01-01T23:59:59.000Z

456

SE-MA-NO Electric Coop | Open Energy Information  

Open Energy Info (EERE)

MA-NO Electric Coop MA-NO Electric Coop Jump to: navigation, search Name SE-MA-NO Electric Coop Place Missouri Utility Id 16851 Utility Location Yes Ownership C NERC Location SERC NERC SERC Yes Activity Distribution Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png Municipal HPS 100 W Lighting Municipal HPS 250 W Lighting Residential Residential Residential/Commercial HPS 100 W Lighting Residential/Commercial HPS 250 W Lighting Average Rates Residential: $0.0804/kWh Commercial: $0.0763/kWh Industrial: $0.0649/kWh References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a"

457

STATE OF WASHINGTON DEPARTMENT OF COMMERCE 1011 Plum Street SE  

NLE Websites -- All DOE Office Websites (Extended Search)

STATE OF WASHINGTON STATE OF WASHINGTON DEPARTMENT OF COMMERCE 1011 Plum Street SE ï‚Ÿ PO Box 42525 ï‚Ÿ Olympia, Washington 98504-2525 ï‚Ÿ (360) 725-4000 www.commerce.wa.gov July 33, 2013 Roland J. Risser Building Technologies Program Manager Office of Energy Efficiency and Renewable Energy U.S. Department of Energy 1000 Independence Avenue SW, Mail Stop EE-2J Washington, DC 20585-0121 RE: State Certification of Residential and Commercial Building Energy Codes Dear Mr. Risser: In compliance with Title III of the Energy Conservation and Production Act (ECPA) of 1976, as amended, this is to certify that the State of Washington has adopted the 2012 Edition, Washington State Energy Code, which meets or exceeds the 2012 version of the International Energy Conservation Code (IECC) for low-rise residential

458

File:EIA-PSJ-SE-LIQ.pdf | Open Energy Information  

Open Energy Info (EERE)

File File Edit with form History Facebook icon Twitter icon » File:EIA-PSJ-SE-LIQ.pdf Jump to: navigation, search File File history File usage Paradox-San Juan Basin, Southeast Part By 2001 Liquids Reserve Class Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(5,100 × 6,600 pixels, file size: 13.12 MB, MIME type: application/pdf) Description Paradox-San Juan Basin, Southeast Part By 2001 Liquids Reserve Class Sources Energy Information Administration Authors Samuel H. Limerick; Lucy Luo; Gary Long; David F. Morehouse; Jack Perrin; Robert F. King Related Technologies Oil, Natural Gas Creation Date 2005-09-01 Extent Regional Countries United States UN Region Northern America States Utah, Colorado, New Mexico, Arizona

459

Critical infrastructure protection: The vulnerability conundrum  

Science Conference Proceedings (OSTI)

Critical infrastructure and key resources (CIKR) refer to a broad array of assets which are essential to the everyday functionality of social, economic, political and cultural systems in the United States. The interruption of CIKR poses significant threats ... Keywords: Critical infrastructure, Fortification, Interdiction, Policy, Protection, Strategies, Vulnerability

Alan T. Murray; Tony H. Grubesic

2012-02-01T23:59:59.000Z

460

Steady water waves with multiple critical layers  

E-Print Network (OSTI)

We construct small-amplitude periodic water waves with multiple critical layers. In addition to waves with arbitrarily many critical layers and a single crest in each period, two-dimensional sets of waves with several crests and troughs in each period are found. The setting is that of steady two-dimensional finite-depth gravity water waves with vorticity.

Mats Ehrnström; Joachim Escher; Erik Wahlén

2010-04-29T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

NCIS - a Nuclear Criticality Information System (overview)  

SciTech Connect

A Nuclear Criticality Information System (NCIS) is being established at the Lawrence Livermore National Laboratory (LLNL) in order to serve personnel responsible for safe storage, transport, and handling of fissile materials and those concerned with the evaluation and analysis of nuclear, critical experiments. Public concern for nuclear safety provides the incentive for improved access to nuclear safety information.

Koponen, B.L.; Hampel, V.E.

1983-07-01T23:59:59.000Z

462

Language choice for safety critical applications  

Science Conference Proceedings (OSTI)

The programming languages currently most popular among software engineers for writing safety critical applications are C and, more recently, C++. The Ada language has been designed with software safety in mind. Although Ada is not perfect concerning ... Keywords: safety, safety-critical

James S. Rogers

2011-11-01T23:59:59.000Z

463

2011 Critical Materials Strategy | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Critical Materials Strategy 1 Critical Materials Strategy 2011 Critical Materials Strategy This report examines the role that rare earth metals and other key materials play in clean energy technologies such as wind turbines, electric vehicles, solar cells and energy-efficient lighting. The report found that several clean energy technologies use materials at risk of supply disruptions in the short term, with risks generally decreasing in the medium and long terms. Supply challenges for five rare earth metals (dysprosium, neodymium, terbium, europium and yttrium) may affect clean energy technology deployment in the years ahead. DOE_CMS2011_FINAL_Full.pdf DOE_CMS_2011_Summary.pdf More Documents & Publications 2010 Critical Materials Strategy ARPA-E Workshop on Rare Earth and Critical Materials

464

CRITICALITY CURVES FOR PLUTONIUM HYDRAULIC FLUID MIXTURES  

SciTech Connect

This Calculation Note performs and documents MCNP criticality calculations for plutonium (100% {sup 239}Pu) hydraulic fluid mixtures. Spherical geometry was used for these generalized criticality safety calculations and three geometries of neutron reflection are: {sm_bullet}bare, {sm_bullet}1 inch of hydraulic fluid, or {sm_bullet}12 inches of hydraulic fluid. This document shows the critical volume and critical mass for various concentrations of plutonium in hydraulic fluid. Between 1 and 2 gallons of hydraulic fluid were discovered in the bottom of HA-23S. This HA-23S hydraulic fluid was reported by engineering to be Fyrquel 220. The hydraulic fluid in GLovebox HA-23S is Fyrquel 220 which contains phosphorus. Critical spherical geometry in air is calculated with 0 in., 1 in., or 12 inches hydraulic fluid reflection.

WITTEKIND WD

2007-10-03T23:59:59.000Z

465

Critical phenomena in N=2* plasma  

E-Print Network (OSTI)

We use gauge theory/string theory correspondence to study finite temperature critical behaviour of mass deformed N=4 SU(N) supersymmetric Yang-Mills theory at strong coupling, also known as N=2* gauge theory. For certain range of the mass parameters, N=2* plasma undergoes a second-order phase transition. We compute all the static critical exponents of the model and demonstrate that the transition is of the mean-field theory type. We show that the dynamical critical exponent of the model is z=0, with multiple hydrodynamic relaxation rates at criticality. We point out that the dynamical critical phenomena in N=2* plasma is outside the dynamical universality classes established by Hohenberg and Halperin.

A. Buchel; C. Pagnutti

2010-10-16T23:59:59.000Z

466

Criticality Safety Controls Implementation Inspection Criteria, Approach,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Criticality Safety Controls Implementation Inspection Criteria, Criticality Safety Controls Implementation Inspection Criteria, Approach, and Lines of Inquiry, October 23, 2009, (HSS CRAD 64-18, Rev 0 ) Criticality Safety Controls Implementation Inspection Criteria, Approach, and Lines of Inquiry, October 23, 2009, (HSS CRAD 64-18, Rev 0 ) DOE has set expectations for implementing criticality safety controls that are selected to provide preventive and/or mitigative functions for specific potential accident scenarios. There are additional expectations for criticality safety controls that are also designated as Specific Administrative Controls (SACs) (see HSS CRAD 64-32). Also, in instances when the review addresses functionality and operability of structures, systems, and components (SSCs) of nuclear facilities specifically required

467

GalaxyCount: a JAVA calculator of galaxy counts and variances in multiband wide-field surveys to 28 AB mag  

E-Print Network (OSTI)

We provide a consistent framework for estimating galaxy counts and variances in wide-field images for a range of photometric bands. The variances include both Poissonian noise and variations due to large scale structure. We demonstrate that our statistical theory is consistent with the counts in the deepest multiband surveys available. The statistical estimates depend on several observational parameters (e.g. seeing, signal to noise ratio), and include a sophisticated treatment of detection completeness. The JAVA calculator is freely available and offers the user the option to adopt our consistent framework or a different scheme. We also provide a summary table of statistical measures in the different bands for a range of different fields of view. Reliable estimation of the background counts has profound consequences in many areas of observational astronomy. We provide two such examples. One is from a recent study of the Sculptor galaxy NGC 300 where stellar photometry has been used to demonstrate that the outer disc extends to 10 effective radii, far beyond what was thought possible for a normal low-luminosity spiral. We confirm this finding by a reanalysis of the background counts. Secondly, we determine the luminosity function of the galaxy cluster Abell 2734, both through spectroscopically determined cluster membership, and through statistical subtraction of the background galaxies using the calculator and offset fields. We demonstrate very good agreement, suggesting that expensive spectroscopic follow-up, or off-source observations, may often be bypassed via determination of the galaxy background with GalaxyCount.

S. C. Ellis; J. Bland-Hawthorn

2006-02-27T23:59:59.000Z

468

SAFETY INSTRUMENTED FUNCTIONS AS CRITICALITY DEFENSES  

SciTech Connect

The objective of this paper is to share the SRS methodology for identifying the reliability requirements and documenting the expected performance of Safety Instrumented Functions (SIFs) used as criticality defenses. Nuclear Criticality SIFs are comprised of sensors, logic solvers, and final control elements, which may be either automatic or manual, to detect a process hazard and respond to prevent a criticality. The Savannah River Site (SRS) has invoked the chemical process industry safety standard (ANSI/ISA 84.00.01) for the design of safety significant instrumented systems. The ISA standard provides a graded approach to design based on the amount of risk reduction that is required of an SIF. SRS is embarking on application of this standard to nuclear criticality defenses, thus integrating criticality safety requirements with verifiable design methodology. Per the DOE G 421.1-1 discussion of the double contingency principle, guidance for a single contingency barrier includes, ''The estimated probability that the control will fail (when called upon for protection) is not greater than 1 in 100 demands''. The application of this standard to nuclear criticality SIFs will provide clear requirements in terms of safety availability and testing to assure that the instrumented criticality system as designed, installed, and maintained will meet is performance requirements. The paper identifies the numerous challenges presented by this initiative and the benefits of this approach.

Suttinger, L; William Hearn, W

2007-03-26T23:59:59.000Z

469

Assessment of criticality safety in DOE facilities  

SciTech Connect

A study was made to assess nuclear criticality safety in DOE Facilities and to assess the effects of various types of possible improvements. The accident statistics in DOE operations show that the fatalities caused by Nuclear Criticality accidents are small compared to other accident categories. The data show the safety performance after 1965, compared to prior years, was considerably improved indicating that overall safety programs have been effective. Data on criticality safety violations were collected from eight major facilities. These data were categorized by severity indexes and causes were assigned. A total of 421 violations were used in the data base for analysis in a fault tree model. Calculations were made using the fault tree methodology to show expected improvement in safety (reduction in probability of a criticality accident) for a fixed reduction in the number of criticality violations. Based on this analysis, about equal emphasis should be placed on reducing mechanical failures and operator errors as efforts in these two areas will likely produce the most significant improvements in safety. A criticality safety infraction form was prepared to facilitate uniformity in recording data on infractions for subsequent analysis. Discussions with Nuclear Safety Specialists working in the field instilled confidence that criticality safety is being handled by concerned, capable, and knowledgable persons.

Lloyd, R.C.; Clayton, E.D.; Converse, W.E.; Kottwitz, D.A.

1981-05-01T23:59:59.000Z

470

Critical Mission Support Through Energy Secuirty  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Critical Mission Support Critical Mission Support Through Energy Security Development of an Army Energy Security Assessment Model FUPWG Mr. Chuck Tremel, CTC 21 October 2010 2 2 Purpose * Provide an overview of the Army Energy Security Assessment (ESA) methodology - Being developed by Concurrent Technologies Corporation - Monitored by the US Army Corps of Engineers (USACE), Engineering Research and Development-Construction Engineering Research Laboratory (ERDC-CERL) * Engage Utility and Government Stakeholders 3 3 Overall Program Objectives * Develop/enhance the draft ESA methodology demonstrated under the Army Power and Energy Initiative (APEI) - Leverage existing processes (e.g., Anti-terrorism/Force Protection) - Critical Mission focused * Validate the methodology at an Army installation

471

Statistical Uncertainty Analysis Applied to Criticality Calculation  

Science Conference Proceedings (OSTI)

In this paper, we present an uncertainty methodology based on a statistical approach, for assessing uncertainties in criticality prediction using monte carlo method due to uncertainties in the isotopic composition of the fuel. The methodology has been applied to criticality calculations with MCNP5 with additional stochastic input of the isotopic fuel composition. The stochastic input were generated using the latin hypercube sampling method based one the probability density function of each nuclide composition. The automatic passing of the stochastic input to the MCNP and the repeated criticality calculation is made possible by using a python script to link the MCNP and our latin hypercube sampling code.

Hartini, Entin; Andiwijayakusuma, Dinan; Susmikanti, Mike; Nursinta, A. W. [Centre for Nuclear Informatics Development, National Nuclear Energy Agency of Indonesia (Indonesia)

2010-06-22T23:59:59.000Z

472

The International Criticality Safety Benchmark Evaluation Project  

SciTech Connect

Most safety concerns associated with operations at nuclear facilities are very similar to the safety concerns associated with operations at non-nuclear facilities. The potential for a nuclear criticality accident is one concern that is unique to the nuclear industry. However, if managed properly, the risk of a criticality accident can be reduced to an acceptable level. In fact, the risk of a criticality accident can generally be reduced to a level that is much lower than the risk associated with non-nuclear activities that have similar consequences.

Briggs, Joseph Blair; Dean, V. F.; Presic, M.

2002-10-01T23:59:59.000Z

473

Systematics of Reconstructed Process Facility Criticality Accidents  

SciTech Connect

The systematics of the characteristics of twenty-one criticality accidents occurring in nuclear processing facilities of the Russian Federation, the United States, and the United Kingdom are examined. By systematics the authors mean the degree of consistency or agreement between the factual parameters reported for the accidents and the experimentally known conditions for criticality. The twenty-one reported process criticality accidents are not sufficiently well described to justify attempting detailed neutronic modeling. However, results of classic hand calculations confirm the credibility of the reported accident conditions.

Pruvost, N.L.; McLaughlin, T.P.; Monahan, S.P.

1999-09-19T23:59:59.000Z

474

Quality Assurance for Critical Decision Reviews RM  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this Quality Assurance for Capital Project Critical Decision Review Module (QA RM) is to identify, integrate, and clarify the QA performance objectives, criteria, and guidance needed...

475

Automated Demand Response for Critical Peak Pricing  

NLE Websites -- All DOE Office Websites (Extended Search)

Automated Demand Response for Critical Peak Pricing Speaker(s): Naoya Motegi Date: June 9, 2005 - 12:00pm Location: Bldg. 90 California utilities have been exploring the use of...

476

Neutron absorbing coating for nuclear criticality control  

DOE Patents (OSTI)

A neutron absorbing coating for use on a substrate, and which provides nuclear criticality control is described and which includes a nickel, chromium, molybdenum, and gadolinium alloy having less than about 5% boron, by weight.

Mizia, Ronald E. (Idaho Falls, ID); Wright, Richard N. (Idaho Falls, ID); Swank, William D. (Idaho Falls, ID); Lister, Tedd E. (Idaho Falls, ID); Pinhero, Patrick J. (Idaho Falls, ID)

2007-10-23T23:59:59.000Z

477

Nuclear criticality safety department training implementation  

SciTech Connect

The Nuclear Criticality Safety Department (NCSD) is committed to developing and maintaining a staff of qualified personnel to meet the current and anticipated needs in Nuclear Criticality Safety (NCS) at the Oak Ridge Y-12 Plant. The NCSD Qualification Program is described in Y/DD-694, Qualification Program, Nuclear Criticality Safety Department This document provides a listing of the roles and responsibilities of NCSD personnel with respect to training and details of the Training Management System (TMS) programs, Mentoring Checklists and Checksheets, as well as other documentation utilized to implement the program. This document supersedes Y/DD-696, Revision 2, dated 3/27/96, Training Implementation, Nuclear Criticality Safety Department. There are no backfit requirements associated with revisions to this document.

Carroll, K.J.; Taylor, R.G.; Worley, C.A.

1996-09-06T23:59:59.000Z

478

A critical programmer searches for professionalism  

Science Conference Proceedings (OSTI)

The phrase "critical programmer" in this article's title is meant to be thought of as the programmer who carefully, respectfully, questions conventional wisdom. The particular conventional wisdom under consideration here (held mainly by those who do ...

Robert Schaefer

2006-07-01T23:59:59.000Z

479

Technical information resources for criticality safety  

SciTech Connect

This paper will discuss some basic technical information resources that would be helpful to the novice nuclear criticality safety specialist. These include bibliographic and benchmark compilations, handbooks, and online resources. The specialist should also be familiar with benchmark quality experimental data needed for code validation. This paper will also discuss the critical experiment data obtained in the 1950s and 1960s at the Lawrence Livermore National Laboratory.

Heinrichs, D.P.; Koponen, B.L.

1997-06-25T23:59:59.000Z

480

Quantifying the severity of criticality limit violations  

SciTech Connect

Since August of 1994, the Los Alamos National Laboratory has been using the LANL Categorization Criteria Matrix for determining the need for and level of reporting criticality safety limit violations. The LANL Categorization Criteria Matrix is DOE approved, and is cited in a DOE approved SAR for the LANL Plutonium Facility as the method used to determine whether a criticality limit violation is reportable to DOE via 5000.3B ``Occurrence Categorization, notification and Reporting Requirements`` (replaced by DOE O 232.1). The use of the LANL Categorization Criteria Matrix provides a framework that allows criticality limit violations to be objectively reviewed in terms of what were the consequences of the criticality safety limit violation. Using the LANL Categorization Criteria Matrix helps the criticality safety engineer and line supervision explain to others, in a quantifiable manner, the significance of the criticality limit violation, the levels of margin of safety built into operations, and demonstrate the difference between evaluated conditions and working conditions.

Vessard, S.G. [Los Alamos National Lab., NM (United States); Steele, C.M. [Dept. of Energy, Los Alamos, NM (United States). Los Alamos Area Office

1997-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "java se critical" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Criticality Safety Basics for INL Emergency Responders  

Science Conference Proceedings (OSTI)

This document is a modular self-study guide about criticality safety principles for Idaho National Laboratory emergency responders. This guide provides basic criticality safety information for people who, in response to an emergency, might enter an area that contains much fissionable (or fissile) material. The information should help responders understand unique factors that might be important in responding to a criticality accident or in preventing a criticality accident while responding to a different emergency. This study guide specifically supplements web-based training for firefighters (0INL1226) and includes information for other Idaho National Laboratory first responders. However, the guide audience also includes other first responders such as radiological control personnel. For interested readers, this guide includes clearly marked additional information that will not be included on tests. The additional information includes historical examples (Been there. Done that.), as well as facts and more in-depth information (Did you know …). INL criticality safety personnel revise this guide as needed to reflect program changes, user requests, and better information. Revision 0, issued May 2007, established the basic text. Revision 1 incorporates operation, program, and training changes implemented since 2007. Revision 1 increases focus on first responders because later responders are more likely to have more assistance and guidance from facility personnel and subject matter experts. Revision 1 also completely reorganized the training to better emphasize physical concepts behind the criticality controls that help keep emergency responders safe. The changes are based on and consistent with changes made to course 0INL1226.

Valerie L. Putman

2012-08-01T23:59:59.000Z

482

DOE/EM Criticality Safety Needs Assessment  

SciTech Connect

The issue of nuclear criticality safety (NCS) in Department of Energy Environmental Management (DOE/EM) fissionable material operations presents challenges because of the large quantities of material present in the facilities and equipment that are committed to storage and/or material conditioning and dispositioning processes. Given the uncertainty associated with the material and conditions for many DOE/EM fissionable material operations, ensuring safety while maintaining operational efficiency requires the application of the most-effective criticality safety practices. In turn, more-efficient implementation of these practices can be achieved if the best NCS technologies are utilized. In 2002, DOE/EM-1 commissioned a survey of criticality safety technical needs at the major EM sites. These needs were documented in the report Analysis of Nuclear Criticality Safety Technology Supporting the Environmental Management Program, issued May 2002. Subsequent to this study, EM safety management personnel made a commitment to applying the best and latest criticality safety technology, as described by the DOE Nuclear Criticality Safety Program (NCSP). Over the past 7 years, this commitment has enabled the transfer of several new technologies to EM operations. In 2008, it was decided to broaden the basis of the EM NCS needs assessment to include not only current needs for technologies but also NCS operational areas with potential for improvements in controls, analysis, and regulations. A series of NCS workshops has been conducted over the past years, and needs have been identified and addressed by EM staff and contractor personnel. These workshops were organized and conducted by the EM Criticality Safety Program Manager with administrative and technical support by staff at Oak Ridge National Laboratory (ORNL). This report records the progress made in identifying the needs, determining the approaches for addressing these needs, and assimilating new NCS technologies into EM fissionable material operations. In addition, the report includes projections of future EM needs and associted recommendations.

Westfall, Robert Michael [ORNL; Hopper, Calvin Mitchell [ORNL

2011-02-01T23:59:59.000Z

483

Line tensions, correlation lengths, and critical exponents in lipid membranes near critical points  

E-Print Network (OSTI)

Membranes containing a wide variety of ternary mixtures of high chain-melting temperature lipids, low chain-melting temperature lipids, and cholesterol undergo lateral phase separartion into coexisting liquid phases at a miscibility transition. When membranes are prepared from a ternary lipid mixture at a critical composition, they pass through a miscibility critical point at the transition temperature. Since the critical temperature is typically on the order of room temperature, membranes provide an unusual opportunity in which to perform a quantitative study of biophysical systems that exhibit critical phenomena in the two-dimensional Ising universality class. As a critical point is approached from either high or low temperature, the scale of fluctuations in lipid composition, set by the correlation length, diverges. In addition, as a critical point is approached from low temperature, the line tension between coexisting phases decreases to zero. Here we quantitatively evaluate the temperature dependence of line tension between liquid domains and of fluctuation correlation lengths in lipid membranes in order to extract a critical exponent, nu. We obtain nu=1.2 plus or minus 0.2, consistent with the Ising model prediction nu=1. We also evaluate the probability distributions of pixel intensities in fluoresence images of membranes. From the temperature dependence of these distributions above the critical temperature, we extract an independent critical exponent beta=0.124 plus or minus 0.03 which is consistent with the Ising prediction of beta=1/8.

Aurelia R. Honerkamp-Smith; Pietro Cicuta; Marcus D. Collins; Sarah L. Veatch; Marcel den Nijs; M. Schick; Sarah L. Keller

2008-02-20T23:59:59.000Z

484

Criticality Safety Evaluation of a LLNL Training Assembly for Criticality Safety (TACS)  

SciTech Connect

Hands-on experimental training in the physical behavior of multiplying systems is one of ten key areas of training required for practitioners to become qualified in the discipline of criticality safety as identified in DOE-STD-1135-99, ''Guidance for Nuclear Criticality Safety Engineer Training and Qualification''. This document is a criticality safety evaluation of the training activities (or operations) associated with HS-3200, ''Laboratory Class for Criticality Safety''. These activities utilize the Training Assembly for Criticality Safety (TACS). The original intent of HS-3200 was to provide LLNL fissile material handlers with a practical hands-on experience as a supplement to the academic training they receive biennially in HS-3100, ''Fundamentals of Criticality Safety'', as required by ANSI/ANS-8.20-1991, ''Nuclear Criticality Safety Training''. HS-3200 is to be enhanced to also address the training needs of nuclear criticality safety professionals under the auspices of the NNSA Nuclear Criticality Safety Program.

Heinrichs, D P

2006-06-26T23:59:59.000Z

485

Determination of Grain Boundary Charging in Cu(In,Ga)Se2 Thin Films: Preprint  

DOE Green Energy (OSTI)

Surface potential mapping of Cu(In,Ga)Se2 (CIGS) thin films using scanning Kelvin probe force microscopy (SKPFM) aims to understand the minority-carrier recombination at the grain boundaries (GBs) of this polycrystalline material by examining GB charging, which has resulted in a number of publications. However, the reported results are highly inconsistent. In this paper, we report on the potential mapping by measuring wide-bandgap or high-Ga-content films and by using a complementary atomic force microscopy-based electrical technique of scanning capacitance microscopy (SCM). The results demonstrate consistent, positively charged GBs on our high-quality films with minimal surface defects/charges. The potential image taken on a low-quality film with a 1.2-eV bandgap shows significantly degraded potential contrast on the GBs and degraded potential uniformity on grain surfaces, resulting from the surface defects/charges of the low-quality film. In contrast, the potential image on an improved high-quality film with the same wide bandgap shows significantly improved GB potential contrast and surface potential uniformity, indicating that the effect of surface defects is critical when examining GB charging using surface potential data. In addition, we discuss the effect of the SKPFM setup on the validity of potential measurement, to exclude possible artifacts due to improper SKPFM setups. The SKPFM results were corroborated by using SCM measurements on the films with a CdS buffer layer. The SCM image shows clear GB contrast, indicating different electrical impedance on the GB from the grain surface. Further, we found that the GB contrast disappeared when the CdS window layer was deposited after the CIGS film was exposed extensively to ambient, which was caused by the creation of CIGS surface defects by the ambient exposure.

Jiang, C. S.; Contreras, M. A.; Repins, I.; Moutinho, H. R.; Noufi, R.; Al-Jassim, M. M.

2012-06-01T23:59:59.000Z

486

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS June 28, 2013 V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability The vulnerability addresses the possibility of a heap overflow condition June 27, 2013 V-187: Mozilla Firefox Multiple Vulnerabilities These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. June 19, 2013 V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 Multiple vulnerabilities were reported in Oracle Java. June 14, 2013 V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and

487

Definition: Critical Peak Rebates | Open Energy Information  

Open Energy Info (EERE)

Rebates Rebates Jump to: navigation, search Dictionary.png Critical Peak Rebates When utilities observe or anticipate high wholesale market prices or power system emergency conditions, they may call critical events during pre-specified time periods (e.g., 3 p.m.-6 p.m. summer weekday afternoons), the price for electricity during these time periods remains the same but the customer is refunded at a single, predetermined value for any reduction in consumption relative to what the utility deemed the customer was expected to consume.[1] Related Terms electricity generation References ↑ https://www.smartgrid.gov/category/technology/critical_peak_rebates [[C LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ategory: Smart Grid Definitions|Template:BASEPAGENAME]]

488

Definition: Critical Peak Pricing | Open Energy Information  

Open Energy Info (EERE)

Pricing Pricing Jump to: navigation, search Dictionary.png Critical Peak Pricing When utilities observe or anticipate high wholesale market prices or power system emergency conditions, they may call critical events during a specified time period (e.g., 3 p.m.-6 p.m. on a hot summer weekday), the price for electricity during these time periods is substantially raised. Two variants of this type of rate design exist: one where the time and duration of the price increase are predetermined when events are called and another where the time and duration of the price increase may vary based on the electric grid's need to have loads reduced;[1] Related Terms electricity generation References ↑ https://www.smartgrid.gov/category/technology/critical_peak_pricing Ret LikeLike UnlikeLike

489

Processes for Software in Safety Critical Systems  

E-Print Network (OSTI)

Two complementary standards are compared, both of which are concerned with the production of quality software. One, IEC 61508, is concerned with the safety of software intensive systems and the other, ISO/IEC TR 15504, takes a process view of software capability assessment. The standards are independent, though both standards build on ISO/IEC 12207. The paper proposes a correspondence between the safety integrity levels (SILs) of 61508 and the capability levels (CLs) of 15504, and considers the appropriateness of the 15504 reference model as a framework for assessing safety critical software processes. Empirical work from the SPICE trials and COCOMO II is used to support the arguments of the paper as well as to investigate their consequences. The development of a 15504 compatible assessment model for software in safety critical systems is proposed. Keywords Process assessment, safety critical software, international standards 1

Benediktsson Hunter And; O Benediktsson; R B Hunter; A D Mcgettrick

1999-01-01T23:59:59.000Z

490

Critical reaction rates in hypersonic combustion chemistry  

DOE Green Energy (OSTI)

High Mach number flight requires that the scramjet propulsion system operate at a relatively low static inlet pressure and a high inlet temperature. These two constraints can lead to extremely high temperatures in the combustor, yielding high densities of radical species and correspondingly poor chemical combustion efficiency. As the temperature drops in the nozzle expansion, recombination of these excess radicals can produce more product species, higher heat yield, and potentially more thrust. The extent to which the chemical efficiency can be enhanced in the nozzle expansion depends directly on the rate of the radical recombination reactions. A comprehensive assessment of the important chemical processes and an experimental validation of the critical rate parameters is therefore required if accurate predictions of scramjet performance are to be obtained. This report covers the identification of critical reactions, and the critical reaction rates in hypersonic combustion chemistry. 4 refs., 2 figs.

Oldenborg, R.C.; Harradine, D.M.; Loge, G.W.; Lyman, J.L.; Schott, G.L.; Winn, K.R.

1989-01-01T23:59:59.000Z

491

Aqueous synthesis and characterization of CdSe/ZnO core-shell nanoparticles  

Science Conference Proceedings (OSTI)

Core-shell nanomaterials based on CdSe as the core and ZnO as the shell were prepared using an aqueous route involving the use of Cd salt and NaBH4 in reaction with Se to generate CdSe in the presence of thioglycerol (TG) as a stabilizer. ...

B. P. Rakgalakane; M. J. Moloto

2011-01-01T23:59:59.000Z

492

Synthesis and characterization of blue emitting ZnSe quantum dots  

Science Conference Proceedings (OSTI)

In this work we show a new experimental methodology to obtain ZnSe nanocrystals in aqueous solution aiming their application as biophotonic probes. The nanocrystals were obtained using a simple procedure based on the arrested precipitation of ZnSe in ... Keywords: Blue emission, Colloidal synthesis, Water soluble quantum dots, ZnSe

J. J. Andrade; A. G. Brasil, Jr.; P. M. A. Farias; A. Fontes; B. S. Santos

2009-03-01T23:59:59.000Z

493

Photodeposition of Pt on Colloidal CdS and CdSe/CdS Semiconductor Nanostructures  

E-Print Network (OSTI)

on Colloidal CdS and CdSe/CdS Semiconductor Nanostructuresof Pt on colloidal CdS and CdSe/CdS core/shell nanocrystals.photoexcitation of CdS and CdSe/CdS in the presence of an

Dukovic, Gordana

2008-01-01T23:59:59.000Z

494

Criticality Safety Basics for INL Emergency Responders  

SciTech Connect

This document is a modular self-study guide about criticality safety principles for Idaho National Laboratory emergency responders. This guide provides basic criticality safety information for people who, in response to an emergency, might enter an area that contains much fissionable (or fissile) material. The information should help responders understand unique factors that might be important in responding to a criticality accident or in preventing a criticality accident while responding to a different emergency.

This study guide specifically supplements web-based training for firefighters (0INL1226) and includes information for other Idaho National Laboratory first responders. However, the guide audience also includes other first responders such as radiological control personnel.

For interested readers, this guide includes clearly marked additional information that will not be included on tests. The additional information includes historical examples (Been there. Done that.), as well as facts and more in-depth information (Did you know …).

INL criticality safety personnel revise this guide as needed to reflect program changes, user requests, and better information. Revision 0, issued May 2007, established the basic text. Revision 1 incorporates operation, program, and training changes implemented since 2007. Revision 1 increases focus on first responders because later responders are more likely to have more assistance and guidance from facility personnel and subject matter experts. Revision 1 also completely reorganized the training to better emphasize physical concepts behind the criticality controls that help keep emergency responders safe. The changes are based on and consistent with changes made to course 0INL1226.

Valerie L. Putman

2012-08-01T23:59:59.000Z

495

CRITICALITY EXCURSION OF NOVEMBER 10, 1961  

DOE Green Energy (OSTI)

A criticality excursion occurred at the Oak Ridge Critical Experiments Laboratory on November l0, l961 as enriched uranium metal, neutron reflected and moderated by hydrogen, was being assembled. It is estimated that the energy yield was between 10/sup 15/ and 10/sup 16/ fissions. There was no personnel exposure or property damage. Fission product contamination, both airborne and contained in the metal, decayed sufficiently overnight to allow unhindered continuation of the experiment. The excursion was caused by a too rapid approach of the two sections of uranium constituting the experiment. (auth)

Callihan, D.

1962-02-13T23:59:59.000Z

496

HANFORD NUCLEAR CRITICALITY SAFETY PROGRAM DATABASE  

Science Conference Proceedings (OSTI)

The Hanford Database is a useful information retrieval tool for a criticality safety practitioner. The database contains nuclear criticality literature screened for parameter studies. The entries, characterized with a value index, are segregated into 16 major and six minor categories. A majority of the screened entries have abstracts and a limited number are connected to the Office of Scientific and Technology Information (OSTI) database of full-size documents. Simple and complex searches of the data can be accomplished very rapidly and the end-product of the searches could be a full-size document. The paper contains a description of the database, user instructions, and a number of examples.

TOFFER, H.

2005-05-02T23:59:59.000Z

497

Critical Magnetic Field Determination of Superconducting Materials  

Science Conference Proceedings (OSTI)

Superconducting RF technology is becoming more and more important. With some recent cavity test results showing close to or even higher than the critical magnetic field of 170-180 mT that had been considered a limit, it is very important to develop a way to correctly measure the critical magnetic field (H{sup RF}{sub c}) of superconductors in the RF regime. Using a 11.4 GHz, 50-MW, electric field at the sample surface. A model of the system is presented in this paper along with a discussion of preliminary experimental data.

Canabal, A.; Tajima, T.; /Los Alamos; Dolgashev, V.A.; Tantawi, S.G.; /SLAC; Yamamoto, T.; /Tsukuba, Natl. Res. Lab. Metrol.

2011-11-04T23:59:59.000Z

498

Basic criticality relations for gas core design  

DOE Green Energy (OSTI)

Minimum critical fissile concentrations are calculated for U-233, U-235, Pu-239, and Am-242m mixed homogeneously with hydrogen at temperatures to 15,000K. Minimum critical masses of the same mixtures in a 1000 liter sphere are also calculated. It is shown that propellent efficiencies of a gas core fizzler engine using Am-242m as fuel would exceed those in a solid core engine as small as 1000L operating at 100 atmospheres pressure. The same would be true for Pu-239 and possibly U-233 at pressures of 1000 atm. or at larger volumes.

Tanner, J.E.

1992-05-22T23:59:59.000Z

499

Probaability of Criticality for MOX SNF  

Science Conference Proceedings (OSTI)

The purpose of this calculation is to provide a conservative (upper bound) estimate of the probability of criticality for mixed oxide (MOX) spent nuclear fuel (SNF) of the Westinghouse pressurized water reactor (PWR) design that has been proposed for use. with the Plutonium Disposition Program (Ref. 1, p. 2). This calculation uses a Monte Carlo technique similar to that used for ordinary commercial SNF (Ref. 2, Sections 2 and 5.2). Several scenarios, covering a range of parameters, are evaluated for criticality. Parameters specifying the loss of fission products and iron oxide from the waste package are particularly important. This calculation is associated with disposal of MOX SNF.

P. Gottlieb

1999-09-28T23:59:59.000Z

500

Definition and Means of Maintaining the Criticality Prevention Design Features Portion of the PFP Safety Envelope  

SciTech Connect

The purpose of this document is to record the technical evaluation of the Operational Safety Requirements described in the Plutonium Finishing Plant Final (PFP) Operational Safety Requirements, WHC-SD-CP-OSR-010. Rev. 0-N , Section 3.1.1, ''Criticality Prevention System.'' This document, with its appendices, provides the following: (1) The results of a review of Criticality Safety Analysis Reports (CSAR), later called Criticality Safety Evaluation Reports (CSER), and Criticality Prevention Specifications (CPS) to determine which equipment or components analyzed in the CSER or CPS are considered as one of the two unlikely, independent, and concurrent changes before a criticality accident is possible. (2) Evaluations of equipment or components to determine the safety boundary for the system (Section 4). (3) A list of essential drawings that show the safety system or component (Appendix A). (4) A list of the safety envelope (SE) equipment (Appendix B). (5) Functional requirements for the individual safety envelope equipment (Sections 3 and 4). (6) A list of the operational and surveillance procedures necessary to maintain the system equipment within the safety envelope (Section 5).

RAMBLE, A.L.

2000-07-28T23:59:59.000Z