Powered by Deep Web Technologies
Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA  

E-Print Network [OSTI]

PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA A Thesis Submitted Technical Report TR2010-665 #12;Abstract Message authentication with low latency is necessary to ensure- tication solutions by our lab and others looked at single messages and incurred no- ticeable latency

2

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version)  

E-Print Network [OSTI]

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version security, and yet incurs minimal end-to-end communication latency. Keywords: SCADA network security, bump links between devices in legacy Supervisory Con- trol And Data Acquisition (SCADA) systems, on which

3

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network [OSTI]

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang in Supervisory Control And Data Acquisition (SCADA) systems. Previous BITW solutions fail to provide minimal end-to-end communication latency. A microcontroller prototype of our solution is under development

4

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems  

E-Print Network [OSTI]

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems Patrick P. Tsang-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA) systems Supervisory Control And Data Acquisition (SCADA) systems, on which the proper operations of critical

Smith, Sean W.

5

Office of Electricity Delivery and Energy Reliability Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On...

6

ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR  

SciTech Connect (OSTI)

Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data transmission in place of NSA Type 1 devices.

Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

2011-08-03T23:59:59.000Z

7

MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA  

E-Print Network [OSTI]

MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA BY TEOMAN GULER B assessment studies and the quantification of the economics of secure power system operations security and the economics of secure operations in the competitive market environment. The advent

Gross, George

8

Security-Constrained Adequacy Evaluation of Bulk Power System Reliability  

E-Print Network [OSTI]

Security-Constrained Adequacy Evaluation of Bulk Power System Reliability Fang Yang, Student Member contingency selection, (b) effects analysis, and (c) reliability index computation. Effects analysis and reliability index computations. The methodology is demonstrated with the IEEE reliability test system. Index

9

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

10

Reliable Process for Security Policy Deployment  

E-Print Network [OSTI]

We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

2009-01-01T23:59:59.000Z

11

Reliable and Adaptable Security Engineering for Database-Web Services  

E-Print Network [OSTI]

Reliable and Adaptable Security Engineering for Database-Web Services Martin Wimmer , Daniela,ehrnlech}@db.fmi.uni-passau.de Abstract. The situation in engineering security for Web services that access databases is as follows of sophisticated access control concepts for e-services. When engineering Web services that depend on databases

Kemper, Alfons

12

Secure and reliable operation of our  

E-Print Network [OSTI]

of threats: · Attacks upon the power system. In this case, the electricity infrastructure itself could use power plant cooling towers, for example, to disperse chem- ical or biological agents to national and international economy, security, and quality of life. Massoud Amin, Electric Power Research

Amin, S. Massoud

13

Microgrids and Heterogeneous Security, Quality, Reliability, and Availability  

E-Print Network [OSTI]

and Energy Reliability, Distribution System Integrationand Energy Reliability, Distribution System Integration

Marnay, Chris

2007-01-01T23:59:59.000Z

14

Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid  

E-Print Network [OSTI]

1 Communication Capacity Requirement for Reliable and Secure State Estimation in Smart Grid Husheng, Cookeville, TN Abstract-- Secure system state estimation is an important issue in smart grid to assure the information the- oretic perspective. The smart grid is modeled as a linear dynamic system. Then, the channel

Qiu, Robert Caiming

15

North American Electricity Infrastructure: System Security, Quality, Reliability, Availability, and Efficiency  

E-Print Network [OSTI]

1 North American Electricity Infrastructure: System Security, Quality, Reliability, Availability for reliable and disturbance-free electricity. The massive power outages in the United States, Canada, UK and Italy in 2003 underscored electricity infrastructure's vulnerabilities [1-11]. This vital yet complex

Amin, S. Massoud

16

Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program  

SciTech Connect (OSTI)

The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

Crawford, Cary E.; de Boer, Gloria; De Castro, Kara; Landers, John; Rogers, Erin

2010-10-01T23:59:59.000Z

17

Reliable fuel source | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to theNewsCenterandGasAlternating GradientReliable

18

Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks  

E-Print Network [OSTI]

Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks CIGDEM the energy-latency-reliability trade-off for broadcast in WSNs by presenting a new protocol called PBBF. Essentially, for a given reliability level, energy and latency are found to be inversely related and our study

Paris-Sud XI, Université de

19

Nuclear Weapons Latency  

E-Print Network [OSTI]

......................................................................... 14 Fig. 4. Conceptual flow of Latency tool Petri Net simulation. ........................................ 18 Fig. 5. Overall flow of Latency Tool. .............................................................................. 19 Fig. 6. Latency... density function bound simulations. .............. 43 xi Fig. 14. The expansion of one transition into a series of transitions. A simple Petri net with (a) 1 transition T1, (b) T1 replaced by two transitions in series, T1a and T1b, both half...

Sweeney, David J

2014-07-25T23:59:59.000Z

20

Electric Power Infrastructure Reliability and Security (EPIRS) Reseach and Development Initiative  

SciTech Connect (OSTI)

Power systems have become increasingly complex and face unprecedented challenges posed by population growth, climate change, national security issues, foreign energy dependence and an aging power infrastructure. Increased demand combined with increased economic and environmental constraints is forcing state, regional and national power grids to expand supply without the large safety and stability margins in generation and transmission capacity that have been the rule in the past. Deregulation, distributed generation, natural and man-made catastrophes and other causes serve to further challenge and complicate management of the electric power grid. To meet the challenges of the 21st century while also maintaining system reliability, the electric power grid must effectively integrate new and advanced technologies both in the actual equipment for energy conversion, transfer and use, and in the command, control, and communication systems by which effective and efficient operation of the system is orchestrated - in essence, the 'smart grid'. This evolution calls for advances in development, integration, analysis, and deployment approaches that ultimately seek to take into account, every step of the way, the dynamic behavior of the system, capturing critical effects due to interdependencies and interaction. This approach is necessary to better mitigate the risk of blackouts and other disruptions and to improve the flexibility and capacity of the grid. Building on prior Navy and Department of Energy investments in infrastructure and resources for electric power systems research, testing, modeling, and simulation at the Florida State University (FSU) Center for Advanced Power Systems (CAPS), this project has continued an initiative aimed at assuring reliable and secure grid operation through a more complete understanding and characterization of some of the key technologies that will be important in a modern electric system, while also fulfilling an education and outreach mission to provide future energy workforce talent and support the electric system stakeholder community. Building upon and extending portions of that research effort, this project has been focused in the following areas: (1) Building high-fidelity integrated power and controls hardware-in-the-loop research and development testbed capabilities (Figure 1). (2) Distributed Energy Resources Integration - (a) Testing Requirements and Methods for Fault Current Limiters, (b) Contributions to the Development of IEEE 1547.7, (c) Analysis of a STATCOM Application for Wind Resource Integration, (d) Development of a Grid-Interactive Inverter with Energy Storage Elements, (e) Simulation-Assisted Advancement of Microgrid Understanding and Applications; (3) Availability of High-Fidelity Dynamic Simulation Tools for Grid Disturbance Investigations; (4) HTS Material Characterization - (a) AC Loss Studies on High Temperature Superconductors, (b) Local Identification of Current-Limiting Mechanisms in Coated Conductors; (5) Cryogenic Dielectric Research; and (6) Workshops, education, and outreach.

Rick Meeker; L. Baldwin; Steinar Dale; Alexander Domijan; Davild Larbalestier; Hui Li; Peter McLaren; Sastry Pamidi; Horatio Rodrigo; Michael Steurer

2010-03-31T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code  

E-Print Network [OSTI]

to reject the submission of widgets that do not meet the site's security policies. To show the practicality

Livshits, Ben

22

Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program  

SciTech Connect (OSTI)

The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

2009-10-19T23:59:59.000Z

23

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

24

Dell Latitude 5000 Series Outstanding reliability and security in the world's most manageable  

E-Print Network [OSTI]

solid state hybrid drives or performance solid state drive options for large, reliable storage capacity points · Longer battery life with Intel 4th Generation Core processors · Optional touchscreen and Windows

Fiebig, Peter

25

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

26

Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security Reliability Criteria  

E-Print Network [OSTI]

Transmission System Expansion Plans in View Point of Deterministic, Probabilistic and Security control system as well as reasonable strength of grid originally. Because investment for power system the stability, and dynamic characteristics of the new system. A main reason of the separated work process

27

Optimal Resource Allocation for Security in Reliability Systems M. N. Azaiez  

E-Print Network [OSTI]

systems, about protecting nuclear power plants against terrorist attacks or sabotage, or about ensuring, the threat is usually assumed to be static, rather than responding in an adaptive way to the defenses to defense against intentional threats to security have dealt either with components in isolation (Major

Wang, Hai

28

Human Reliability Program Overview  

SciTech Connect (OSTI)

This presentation covers the high points of the Human Reliability Program, including certification/decertification, critical positions, due process, organizational structure, program components, personnel security, an overview of the US DOE reliability program, retirees and academia, and security program integration.

Bodin, Michael

2012-09-25T23:59:59.000Z

29

Microgrids and Heterogeneous Power Quality and Reliability  

E-Print Network [OSTI]

high security, quality, reliability, and availability”, IEEELave, and Marija Ilic: “Creating Reliability Choice: HowBuilding Less Reliability into Electric Power Grids Could

Marnay, Chris

2008-01-01T23:59:59.000Z

30

Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.  

SciTech Connect (OSTI)

Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

2012-09-01T23:59:59.000Z

31

PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY  

E-Print Network [OSTI]

. Introduction The United States built the power grid half a century ago, when network-based attacks were rare a partially unsecured slow legacy network. This network connects substations and control centers. In a control Processor (FEP), which exchanges messages with Data Ag- gregators (DA) in substations. A FEP and a DA

Smith, Sean W.

32

Java Parallel Secure Stream for Grid Computing  

SciTech Connect (OSTI)

The emergence of high speed wide area networks makes grid computing a reality. However grid applications that need reliable data transfer still have difficulties to achieve optimal TCP performance due to network tuning of TCP window size to improve the bandwidth and to reduce latency on a high speed wide area network. This paper presents a pure Java package called JPARSS (Java Par-allel Secure Stream) that divides data into partitions that are sent over several parallel Java streams simultaneously and allows Java or Web applications to achieve optimal TCP performance in a gird environment without the necessity of tuning the TCP window size. Several experimental results are provided to show that using parallel stream is more effective than tuning TCP window size. In addi-tion X.509 certificate based single sign-on mechanism and SSL based connection establishment are integrated into this package. Finally a few applications using this package will be discussed.

Chen, Jie; Akers, Walter; Chen, Ying; Watson, William

2001-09-01T23:59:59.000Z

33

POWER GRID RELIABILITY AND SECURITY  

SciTech Connect (OSTI)

This project has led to the development of a real-time simulation platform for electric power grids called Grid Simulator or GridSim for simulating the dynamic and information network interactions of large- scale power systems. The platform consists of physical models of power system components including synchronous generators, loads and control, which are simulated using a modified commercial power simulator namely Transient Stability Analysis Tool (TSAT) [1] together with data cleanup components, as well as an emulated substation level and wide-area power analysis components. The platform also includes realistic representations of communication network middleware that can emulate the real-time information flow back and forth between substations and control centers in wide-area power systems. The platform has been validated on a realistic 6000-bus model of the western American power system. The simulator GridSim developed in this project is the first of its kind in its ability to simulate real-time response of large-scale power grids, and serves as a cost effective real-time stability and control simulation platform for power industry.

Bose, Anjan; Venkatasubramanian, Vaithianathan; Hauser, Carl; Bakken, David; Anderson, David; Zhao, Chuanlin; Liu, Dong; Yang, Tao; Meng, Ming; Zhang, Lin; Ning, Jiawei; Tashman, Zaid

2014-09-30T23:59:59.000Z

34

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

35

Low Latency Stochastic Filtering Software Firewall Architecture  

E-Print Network [OSTI]

. . . . . . . . . . . . . . . . . . . . . 29 V METHODOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . 31 VI RESULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 v VI-A. Incremental Cleared Bloom Filter . . . . . . . . . . . 37 VI-A.1. Latency... . . . . . . . . . . . . . . . . . . . . . . 37 VI-A.2. Bandwidth . . . . . . . . . . . . . . . . . . . . 39 VI-A.3. Reduction in Dropped Packets . . . . . . . . . 40 VI-A.4. False Positive Rate . . . . . . . . . . . . . . . . 42 VI-B. Cold Cleared Bloom Filter...

Ghoshal, Pritha

2012-08-29T23:59:59.000Z

36

Human Reliability Program Workshop  

SciTech Connect (OSTI)

A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security and the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.

Landers, John; Rogers, Erin; Gerke, Gretchen

2014-05-18T23:59:59.000Z

37

absolute latency plasma: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the low-latency gravitational-wave triggers. The results of the electromagnetic image analysis will be described elsewhere. Results. Over the course of the science... ,...

38

Low latency and persistent data storage  

DOE Patents [OSTI]

Persistent data storage is provided by a method that includes receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd E

2014-02-18T23:59:59.000Z

39

Method of data communications with reduced latency  

DOE Patents [OSTI]

Data communications with reduced latency, including: writing, by a producer, a descriptor and message data into at least two descriptor slots of a descriptor buffer, the descriptor buffer comprising allocated computer memory segmented into descriptor slots, each descriptor slot having a fixed size, the descriptor buffer having a header pointer that identifies a next descriptor slot to be processed by a DMA controller, the descriptor buffer having a tail pointer that identifies a descriptor slot for entry of a next descriptor in the descriptor buffer; recording, by the producer, in the descriptor a value signifying that message data has been written into descriptor slots; and setting, by the producer, in dependence upon the recorded value, a tail pointer to point to a next open descriptor slot.

Blocksome, Michael A; Parker, Jeffrey J

2013-11-05T23:59:59.000Z

40

Low latency and persistent data storage  

DOE Patents [OSTI]

Persistent data storage is provided by a computer program product that includes computer program code configured for receiving a low latency store command that includes write data. The write data is written to a first memory device that is implemented by a nonvolatile solid-state memory technology characterized by a first access speed. It is acknowledged that the write data has been successfully written to the first memory device. The write data is written to a second memory device that is implemented by a volatile memory technology. At least a portion of the data in the first memory device is written to a third memory device when a predetermined amount of data has been accumulated in the first memory device. The third memory device is implemented by a nonvolatile solid-state memory technology characterized by a second access speed that is slower than the first access speed.

Fitch, Blake G; Franceschini, Michele M; Jagmohan, Ashish; Takken, Todd

2014-11-04T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Integer-valued Levy processes and low latency financial econometrics  

E-Print Network [OSTI]

Integer-valued L´evy processes and low latency financial econometrics Ole E. Barndorff Abstract Motivated by features of low latency data in financial econometrics we study in detail integer- valued L´evy processes as the basis of price processes for high frequency econometrics. We propose using

Wolfe, Patrick J.

42

Variable Latency Turbo Codes for Wireless Multimedia Applications  

E-Print Network [OSTI]

Variable Latency Turbo Codes for Wireless Multimedia Applications Matthew C. Valenti and Brian D acceptable latency and Bit Error Rate BER or Frame Error Rate FER. In turbo coded systems a tradeo between an adaptive turbo coding strategy for wire- less multimedia communications that incor- porates a set

Valenti, Matthew C.

43

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

2010-10-19T23:59:59.000Z

44

Low latency memory access and synchronization  

DOE Patents [OSTI]

A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

2007-02-06T23:59:59.000Z

45

Lessons Learned from Cyber Security Assessments of SCADA and...  

Broader source: Energy.gov (indexed) [DOE]

of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY...

46

A Study of Networking Software Induced Latency Alexander Beifu1  

E-Print Network [OSTI]

A Study of Networking Software Induced Latency Alexander BeifuĂ?1 , Daniel Raumer2 , Paul Emmerich2, Emmerich et al. [16] described practical know-how on throughput measurement of Open vSwitch in which

Carle, Georg

47

A Latency-Determining/User Directed Firefox Browser Extension  

E-Print Network [OSTI]

" Mozilla Firefox extension which was originally developed by Sterbenz et. al., in 2002. This these describes the architecture and prototype implementation, followed with an analysis of its effectiveness to predict latency and future work...

Mein, Philip

2012-12-31T23:59:59.000Z

48

Low-latency network coding for streaming video multicast  

E-Print Network [OSTI]

Network coding has been successfully employed to increase throughput for data transfers. However, coding inherently introduces packet inter-dependencies and adds decoding delays which increase latency. This makes it difficult ...

Tay, Kah Keng

2008-01-01T23:59:59.000Z

49

Electricity Reliability  

E-Print Network [OSTI]

Electricity Delivery and Energy Reliability High Temperature Superconductivity (HTS) Visualization in the future because they have virtually no resistance to electric current, offering the possibility of new electric power equipment with more energy efficiency and higher capacity than today's systems

50

Scalla: Structured Cluster Architecture for Low Latency Access  

SciTech Connect (OSTI)

Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

2012-03-20T23:59:59.000Z

51

Energy Infrastructure Events and Expansions Infrastructure Security...  

Broader source: Energy.gov (indexed) [DOE]

Year-in-Review: 2010 Energy Infrastructure Events and Expansions Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability U.S....

52

Reliability Assessment The Reliability of the  

E-Print Network [OSTI]

2006 Long-Term Reliability Assessment The Reliability of the Bulk Power Systems In North America North American Electric Reliability Council October 2006 #12;TABLE OF CONTENTS Page 2 NERC 2006 Long-Term Reliability Assessment TABLE OF CONTENTS INTRODUCTION

53

Reliable low latency I/O in torus-based interconnection networks  

E-Print Network [OSTI]

In today's high performance computing environment I/O remains the main bottleneck in achieving the optimal performance expected of the ever improving processor and memory technologies. Interconnection networks therefore combines processing units...

Azeez, Babatunde

2007-04-25T23:59:59.000Z

54

Data Communication Principles Reliable Data Transfer  

E-Print Network [OSTI]

Principles Switching Reliable Data Transfer Data Rate of a Communication Channel Transmission Media Data Principles Switching Reliable Data Transfer Data Rate of a Communication Channel Transmission Media Data Transmission Fiber vs Copper Wire Weight vs bandwidth Cost Security 11 / 52 #12;Data Communication Principles

Ramkumar, Mahalingam

55

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

56

Weld: A Multithreading Technique Towards Latency-tolerant VLIW Processors  

E-Print Network [OSTI]

Weld: A Multithreading Technique Towards Latency- tolerant VLIW Processors Emre Ă?zer, Thomas M architecture model, named Weld, for VLIW processors. Weld integrates multithreading support into a VLIW a novel hardware technique called operation welding that merges operations from different threads

Conte, Thomas M.

57

Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks  

E-Print Network [OSTI]

- ing MAC protocols are optimized to conserve energy, trad- ing off latency, throughput and other of sensor nodes with minimum latency and without requir- ing any cooperation or pre-scheduling among the application demands better perfor- mance at the expense of some additional energy. If latency

Namboodiri, Vinod

58

Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini  

E-Print Network [OSTI]

Results of Comparing Bandwidth Usage and Latency: Service Location Protocol and Jini Javier Govea. This paper focuses on analyzing and evaluating two of these limitations, bandwidth usage and latency, of two present the results of our bandwidth usage analysis and the results a comparison of latency of SLP

Barbeau, Michel

59

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

60

NREL: Performance and Reliability R&D - Photovoltaic Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and AchievementsResearchReliability Workshops

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Seeking Reliability in Freedom: The Case of F/OSS  

E-Print Network [OSTI]

Chapter 15 Seeking Reliability in Freedom: The Case of F/OSS Hamid R. Ekbia and Les Gasser Abstract The risks and hazards involved in computerized environments have turned "reliability" into a major is that more reliable, secure, and efficient software can be produced under the free/open source software (F

Indiana University

62

Strengthening Global Security The central mission of the Laboratory  

E-Print Network [OSTI]

, security, and reliability of the U.S. nuclear deterrent while reducing the global threat of nuclear: Ensuring the safety, security, and reliability of the U.S. nuclear deterrent; Reducing global threatsStrengthening Global Security The central mission of the Laboratory is to ensure the safety

63

Software Reliability Xiangyu Zhang  

E-Print Network [OSTI]

1 Software Reliability Xiangyu Zhang Pronounced as Shang You Zang CS590F Software Reliability Software Reliability Why Reliable Software is Important? Software bugs cost the U.S. economy about $59 in Spacecraft Accidents (http://sunnyday.mit.edu/papers/jsr.pdf) CS590F Software Reliability Why ? ­ FSE'06

Zhang, Xiangyu

64

apparatus-localized latency determinant: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

65

a-bomb survivors latency: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(SCADA) systems, on which the proper operations of critical-to-end communication latency. 1 Introduction 1.1 SCADA Systems Supervisory Control And Data Acquisition (SCADA)...

66

Short-term and long-term reliability studies in the deregulated power systems  

E-Print Network [OSTI]

-term reliability in deregulated power systems. Short-term reliability is for operational purposes and is mainly concerned with security. Thus the way energy is dispatched and the actions the system operator takes to remedy an insecure system state...

Li, Yishan

2006-04-12T23:59:59.000Z

67

Grid Reliability- An Electric Utility Company's Perspective  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers Southern Company's business continuity, North American Electric Reliability Corporation (NERC) cybersecurity, and homeland security as well as physical recovery after a major outage, and five questions to ask your local utility.

68

Sandia National Laboratories: Inverter Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit atVehicleEnergyPolydotsMicroReliability 2013

69

Logic Synthesis for FPGA Reliability  

E-Print Network [OSTI]

for FPGA Reliability . . . . . . . . . . . . . Hard ErrorsStochastic Resynthesis for FPGA Reliability . . . . . .In-Place Reconfiguration for FPGA Reliability . . . . . .

Feng, Zhe

2013-01-01T23:59:59.000Z

70

Exploiting concurrency to improve latency and throughput in a hybrid storage system  

E-Print Network [OSTI]

Exploiting concurrency to improve latency and throughput in a hybrid storage system Xiaojian Wu, A the problem of how to improve the performance of hybrid storage system employing solid state disks and hard parallelism in the storage system effectively to improve through- put and latency simultaneously. We

Reddy, Narasimha

71

Measuring and Improving Latency to Avoid Test Suite Wear Out Shin Yoo & Mark Harman  

E-Print Network [OSTI]

Measuring and Improving Latency to Avoid Test Suite Wear Out Shin Yoo & Mark Harman King's College London Centre for Research on Evolution, Search & Testing (CREST) London, UK {shin.yoo, mark introduces the concept of test suite latency. The more latent a test suite, the more it is possible

Singer, Jeremy

72

DESIGN AND IMPLEMENTATION OF OPTIMISTIC CONSTRUCTS FOR LATENCY MASKING IN ONLINE VIDEO GAMES  

E-Print Network [OSTI]

, optimistic execution, software design patterns for games. ABSTRACT To achieve interactive experiences difficult issue faced by developers of online games is that of latency. In many cases, the latency on experiences in using these components in the development of a simple trading game to validate

Katchabaw, Michael James

73

Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems  

E-Print Network [OSTI]

Solving Energy-Latency Dilemma: Task Allocation for Parallel Applications in Heterogeneous Embedded Systems 1. Introduction Parallel applications with energy and low-latency constraints are emerging monitoring. However, conventional energy-driven task allocation schemes for a cluster of embedded nodes only

Xie, Tao

74

Thin Film Reliability SEMICONDUCTORS  

E-Print Network [OSTI]

Thin Film Reliability SEMICONDUCTORS Our goal is to develop new ways to evaluate the reliability $250 billion per year. As semiconductor devices become ultra miniaturized, reliability testing becomes-world conditions as possible will enable product designers to better balance performance and reliability

75

Reliability-Centered Maintenance  

Broader source: Energy.gov [DOE]

Reliability-centered maintenance leverages the same practices and technologies of predictive maintenance.

76

North American Electric Reliability Corporation (NERC): Reliability...  

Broader source: Energy.gov (indexed) [DOE]

and winter and summer forecasts; monitors the bulk power systems; and educates, trains, and certifies industry personnel. North American Electric Reliability Corporation...

77

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

78

Communication Reliability in Network on Chip Designs  

E-Print Network [OSTI]

The performance of low latency Network on Chip (NoC) architectures, which incorporate fast bypass paths to reduce communication latency, is limited by crosstalk induced skewing of signal transitions on link wires. As a result of crosstalk...

Kumar, Reeshav

2012-10-19T23:59:59.000Z

79

ATLAS SCT L1 Trigger Latency Budget Specification V1.00 15-Oct-1999 ATLAS Specification  

E-Print Network [OSTI]

Page 1 ATLAS SCT L1 Trigger Latency Budget Specification V1.00 15-Oct-1999 ATLAS Specification Name: ATLAS SCT L1 Trigger Latency Budget Version: 1.00 Revision History Revision Change Description, Pages-Oct-1999 #12;Page 2 ATLAS SCT L1 Trigger Latency Budget Specification V1.00 15-Oct-1999 Table

California at Santa Cruz, University of

80

Power electronics reliability analysis.  

SciTech Connect (OSTI)

This report provides the DOE and industry with a general process for analyzing power electronics reliability. The analysis can help with understanding the main causes of failures, downtime, and cost and how to reduce them. One approach is to collect field maintenance data and use it directly to calculate reliability metrics related to each cause. Another approach is to model the functional structure of the equipment using a fault tree to derive system reliability from component reliability. Analysis of a fictitious device demonstrates the latter process. Optimization can use the resulting baseline model to decide how to improve reliability and/or lower costs. It is recommended that both electric utilities and equipment manufacturers make provisions to collect and share data in order to lay the groundwork for improving reliability into the future. Reliability analysis helps guide reliability improvements in hardware and software technology including condition monitoring and prognostics and health management.

Smith, Mark A.; Atcitty, Stanley

2009-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Reliable Networking Infrastructures A Brief Overview of Research in Reliable Networking  

E-Print Network [OSTI]

Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11­2009 #12;Security Reliable Networking structure (RNI) Group Launched by Dr.Yacine Rebahi and Dragos Ving arzan at Fraunhofer FOKUS. Senior at the Fraunhofer FOKUS competence center NGNI. Prior to joining FOKUS in 2002, he worked at Ericsson in Voice over

Wichmann, Felix

82

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

83

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

84

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

85

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

86

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

87

Sandia National Laboratories: PV Systems Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLSMolten-SaltReliability PV Systems Reliability Sandia recognizes

88

Sandia National Laboratories: PV Systems Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLSMolten-SaltReliability PV Systems Reliability Sandia

89

Sandia National Laboratories: Inverter Reliability Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit atVehicleEnergyPolydotsMicroReliabilityReliability

90

The four `R's of energy security1 Larry Hughes  

E-Print Network [OSTI]

security, this paper introduces the "four `R's of energy security": review (understanding the problem 2002). Energy security, the reliable supply of energy at an affordable price (IEA 2001), is becoming to the general public, policy analysts, and politicians. The methodology consists of four `R's: review

Hughes, Larry

91

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

92

A High-Performance Optoelectronic Interconnect Router: Using Increased Bandwidth to Enable Latency Reduction  

E-Print Network [OSTI]

D R A FT 1 A High-Performance Optoelectronic Interconnect Router: Using Increased Bandwidth optoelectronic interconnection network router capable of supplying and efficiently utilizing higher bandwidth routing, interconnection network, latency hiding/reduction techniques, optoelectronic router. 1

Pinkston, Timothy M.

93

Sandia National Laboratories: photovoltaic plant reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1developmentturbine bladelifetime ismobileparallelplant reliability Sandia-Electric

94

Human Reliability | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Human Reliability SHARE Human Reliability The Structured Trusted Employee Program (STEP) Evaluation is an example of a method for identifying, assessing, and retaining reliable and...

95

Reliability Results of NERSC Systems  

E-Print Network [OSTI]

Reliability Results of NERSC Systems Akbar Mokhtarani,analysis of systems reliability and component failure rates,reported to operation. Reliability Data HPSS and the IBM SP

Mokhtarani, Akbar; Petascale Data Storage Institute (PDSI)

2008-01-01T23:59:59.000Z

96

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

97

Medical Aspects of Reliability  

SciTech Connect (OSTI)

This presentation covers the medical evaluation as part of a human reliability program, particularly the various medical qualifications and potential disqualifiers.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

98

Towards a Scalable and Reliable Real Time In-Network Data Analysis Infrastructure  

SciTech Connect (OSTI)

The smart grid applications requires real time analysis, response within the order of milliseconds and high-reliability because of the mission critical structure of the power grid system. The only way to satisfy these requirements is in network data analysis and build-in redundancy routing for failures. To achieve this, we propose a data dissemination system that builds routes using network flow algorithms, have in network processing of the data and utilize data encoding to cope with high latencies.

Ciraci, Selim; Yin, Jian

2011-12-01T23:59:59.000Z

99

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

100

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

102

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

103

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

104

Medical Device Reliability BIOMATERIALS  

E-Print Network [OSTI]

NEMI Medical Electronics team to address short- and long-term reliability issues with medical devices. OurMedical Device Reliability BIOMATERIALS Our goal is to provide medical device manufacturers, and consistency of active implantable medical devices. These devices, including pacemakers, cardiac defibrillators

105

Hawaii electric system reliability.  

SciTech Connect (OSTI)

This report addresses Hawaii electric system reliability issues; greater emphasis is placed on short-term reliability but resource adequacy is reviewed in reference to electric consumers' views of reliability %E2%80%9Cworth%E2%80%9D and the reserve capacity required to deliver that value. The report begins with a description of the Hawaii electric system to the extent permitted by publicly available data. Electrical engineering literature in the area of electric reliability is researched and briefly reviewed. North American Electric Reliability Corporation standards and measures for generation and transmission are reviewed and identified as to their appropriateness for various portions of the electric grid and for application in Hawaii. Analysis of frequency data supplied by the State of Hawaii Public Utilities Commission is presented together with comparison and contrast of performance of each of the systems for two years, 2010 and 2011. Literature tracing the development of reliability economics is reviewed and referenced. A method is explained for integrating system cost with outage cost to determine the optimal resource adequacy given customers' views of the value contributed by reliable electric supply. The report concludes with findings and recommendations for reliability in the State of Hawaii.

Silva Monroy, Cesar Augusto; Loose, Verne William

2012-09-01T23:59:59.000Z

106

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

107

NREL: Performance and Reliability R&D - Real-Time Reliability R&D  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and AchievementsResearchReliability WorkshopsReal-Time Reliability

108

Photovoltaic system reliability  

SciTech Connect (OSTI)

This paper discusses the reliability of several photovoltaic projects including SMUD`s PV Pioneer project, various projects monitored by Ascension Technology, and the Colorado Parks project. System times-to-failure range from 1 to 16 years, and maintenance costs range from 1 to 16 cents per kilowatt-hour. Factors contributing to the reliability of these systems are discussed, and practices are recommended that can be applied to future projects. This paper also discusses the methodology used to collect and analyze PV system reliability data.

Maish, A.B.; Atcitty, C. [Sandia National Labs., NM (United States); Greenberg, D. [Ascension Technology, Inc., Lincoln Center, MA (United States)] [and others

1997-10-01T23:59:59.000Z

109

Reliability and Safety  

Broader source: Energy.gov [DOE]

DOE solar reliability and safety research and development (R&D) focuses on testing photovoltaic (PV) modules, inverters, and systems for long-term performance, and helping investors, consumers,...

110

Reliability Standards Owner  

Broader source: Energy.gov [DOE]

This position is located in the Internal Operations and Asset Management group of Planning and Asset Management (TP). A successful candidate in this position will serve as the Reliability Standards...

111

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

112

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

113

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

114

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

115

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

116

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

117

Parametric probability distributions in reliability  

E-Print Network [OSTI]

Parametric probability distributions in reliability F.P.A. Coolen Department of Mathematical parametric probability distributions which are frequently used in reliability. We present some main as models for specific reliability scenarios. Keywords: Binomial distribution, Exponential distribution

Coolen, Frank

118

Gearbox Reliability Collaborative Update (Presentation)  

SciTech Connect (OSTI)

This presentation was given at the Sandia Reliability Workshop in August 2013 and provides information on current statistics, a status update, next steps, and other reliability research and development activities related to the Gearbox Reliability Collaborative.

Sheng, S.

2013-10-01T23:59:59.000Z

119

An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks  

E-Print Network [OSTI]

nodes to a sink through a unidirectional tree. In this paper, we propose DMAC, an energy efficient gathering trees in sensor networks, DMAC provides significant energy savings and latency re- duction whileAn Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks

Krishnamachari, Bhaskar

120

Techniques for Reducing Read Latency of Core Bus Wrappers Roman L. Lysecky, Frank Vahid, Tony D. Givargis  

E-Print Network [OSTI]

Techniques for Reducing Read Latency of Core Bus Wrappers Roman L. Lysecky, Frank Vahid, Tony D with their internal logic separated from their bus wrapper. This separation may introduce extra read latency. Pre. In this paper, we introduce a technique for automatically designing a pre-fetch unit that satisfies user

Vahid, Frank

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Photovoltaic module reliability workshop  

SciTech Connect (OSTI)

The paper and presentations compiled in this volume form the Proceedings of the fourth in a series of Workshops sponsored by Solar Energy Research Institute (SERI/DOE) under the general theme of photovoltaic module reliability during the period 1986--1990. The reliability Photo Voltaic (PV) modules/systems is exceedingly important along with the initial cost and efficiency of modules if the PV technology has to make a major impact in the power generation market, and for it to compete with the conventional electricity producing technologies. The reliability of photovoltaic modules has progressed significantly in the last few years as evidenced by warranties available on commercial modules of as long as 12 years. However, there is still need for substantial research and testing required to improve module field reliability to levels of 30 years or more. Several small groups of researchers are involved in this research, development, and monitoring activity around the world. In the US, PV manufacturers, DOE laboratories, electric utilities and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in this field were brought together under SERI/DOE sponsorship to exchange the technical knowledge and field experience as related to current information in this important field. The papers presented here reflect this effort.

Mrig, L. (ed.)

1990-01-01T23:59:59.000Z

122

The Role of Back-Pressure in Implementing Latency-Insensitive Systems  

E-Print Network [OSTI]

Figure 1. Shell encapsulation, relay station insertion and channel back-pressure. practical advantagesThe Role of Back-Pressure in Implementing Latency-Insensitive Systems Luca P. Carloni Department of Computer Science Columbia University in the City of New York, New York, NY Abstract Back-pressure

Carloni, Luca

123

Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud  

E-Print Network [OSTI]

Service-Oriented Heterogeneous Resource Sharing for Optimizing Service Latency in Mobile Cloud for mobile cloud applications and services. In this paper, we propose an architecture and mathematical frame- work for heterogeneous resource sharing based on the key idea of service-oriented utility functions

Mandayam, Narayan

124

On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack  

E-Print Network [OSTI]

On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

125

An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems  

E-Print Network [OSTI]

i An AWGR based Low-Latency Optical Switch for Data Centers and High Performance Computing Systems based optical switch for data centers and high performance computing systems that builds upon several for Data Centers and High Performance Computing Systems ..i ABSTRACT .....................................

Kolner, Brian H.

126

The path inference filter: model-based low-latency map matching of probe  

E-Print Network [OSTI]

of automation onboard vehicles have created a very fertile ground for GPS data sources from probe vehicles for example [4], and the paradigm of connected (and automated) vehicles does not automatically translateThe path inference filter: model-based low-latency map matching of probe vehicle data Timothy

Abbeel, Pieter

127

A Framework for Optimization of Operational Latency in Wireless Networks Eun-Sook Sung  

E-Print Network [OSTI]

utilization to achieve maximum throughput, minimization of energy usage by reducing low-power nodes' idle time a scheduling method. To complete collision-free transmission in minimum time slots a graph-coloring scheme, and minimization of latency to serve time-critical applications. We consider networks consisting of energy

Potkonjak, Miodrag

128

Understanding optimal data gathering in the energy and latency domains of a wireless sensor network  

E-Print Network [OSTI]

of city districts. In typical applications, sensors monitor their neighboring area, extract informationUnderstanding optimal data gathering in the energy and latency domains of a wireless sensor network Telekommunikation Wien (ftw.), Donau City Strae 1, 1220 Wien, Austria Received 14 October 2005; received in revised

Melodia, Tommaso

129

Low-Latency Multi-Datacenter Databases using Replicated Hatem A. Mahmoud, Alexander Pucher, Faisal Nawab,  

E-Print Network [OSTI]

Low-Latency Multi-Datacenter Databases using Replicated Commits Hatem A. Mahmoud, Alexander Pucher to provide the same ACID transac- tional guarantees for multi-datacenter databases with fewer cross- datacenter communication trips, compared to replicated logging, by using a more efficient architecutre

California at Santa Barbara, University of

130

TONAK: A Distributed Low-latency and Scalable Optical Switch Architecture  

E-Print Network [OSTI]

. Simulations results for a 128-port switch show high throughput and low average packet latency for offered loads of up to 75%, while achieving an energy efficiency of 50pJ/bit. Introduction The ever-growing demand for cloud-based services and high-performance computing is posing major challenges

Yoo, S. J. Ben

131

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

132

Microgrids and Heterogeneous Security, Quality, Reliability, andAvailability  

SciTech Connect (OSTI)

This paper describes two stylized alternative visions inpopular currencyof how the power system might evolve to meet futurerequirements for the high quality electricity service that modern digitaleconomies demand, a supergrids paradigm and a dispersed paradigm. Some ofthe economics of the dispersed vision are explored. Economic perspectivesare presented on both the choice of homogeneous universal power qualityupstream in the electricity supply, and also on the extremelyheterogeneous require-ments of end-use loads. Finally, the potential roleof microgrids in delivering heterogeneous power quality is demonstratedby reference to two ongoing microgrid tests in the U.S. andJapan.

Marnay, Chris

2007-01-31T23:59:59.000Z

133

Secure, Reliable and Dynamic Access to Distributed Clinical Data  

E-Print Network [OSTI]

or settles, as to compose differing opinions, or reconciles, as reconciles contending factions. 15. COMPUTES

Glasgow, University of

134

Office of Electricity Delivery and Energy Reliability Cyber Security  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F SSales LLC OrderEfficiencyOceanOctober XX,/2012 1Conference

135

Reliability, Safety, and Security in Everyday Embedded Systems  

E-Print Network [OSTI]

lives. From automobiles to elevators, kitchen appliances to televisions, and water heaters to cell. A domestic hot water heater that overheats water, causing scalding burns on a child. A thermostat that doesn't turn on heat when needed, causing household water pipes to freeze and burst. A microwave oven

Koopman, Philip

136

Sandia National Laboratories: Blade Reliability Collaborative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy Advanced NuclearBASF latentBiofuelsBiomassReliability

137

Sandia National Laboratories: Blade Reliability Collaborative  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy Advanced NuclearBASF latentBiofuelsBiomassReliabilityBlade

138

Sandia National Laboratories: Inverter Reliability Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS Exhibit atVehicleEnergyPolydotsMicroReliability

139

Increasing the Reliability of Reliability Jochen Brocker1,  

E-Print Network [OSTI]

Increasing the Reliability of Reliability Diagrams Jochen Br¨ocker1, and Leonard A. Smith1,2 1 University Oxford, UK Corresponding Author, cats@lse.ac.uk November 9, 2006 #12;Abstract The reliability are reliable. Further, an alternative presentation of the same information on probability paper easies

Stevenson, Paul

140

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

A systems-theoretic security model for large scale, complex systems applied to the US air transportation system  

E-Print Network [OSTI]

Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from ...

Laracy, Joseph R. (Joseph Raymond)

2007-01-01T23:59:59.000Z

142

RELIABILITY PLANNING IN DISTRIBUTED ELECTRIC ENERGY SYSTEMS  

E-Print Network [OSTI]

RESILIENCE; OR RELIABILITY SENSITIVITy .. RiskReliability Planning: Preliminary Definitions.Dioision, Ext. 6782 Reliability Planning in Distributed

Kahn, E.

2011-01-01T23:59:59.000Z

143

North American Electric Reliability Corporation Interconnections...  

Office of Environmental Management (EM)

North American Electric Reliability Corporation Interconnections North American Electric Reliability Corporation Interconnections Map of the North American Electric Reliability...

144

Software Reliability Modeling James LEDOUX  

E-Print Network [OSTI]

Software Reliability Modeling James LEDOUX Centre de Math´ematiques INSA & IRMAR 20 Avenue des an overview of some aspects of Software Reliability (SR) engineering. Most systems are now driven by software in reliability engineering, particularly in terms of cost. But predicting software reliability is not easy

Paris-Sud XI, Université de

145

Reliability of Electrical Interconnects (Presentation)  

SciTech Connect (OSTI)

This presentation discusses the status of NREL's research on the reliability of electrical interconnects.

Devoto, D.

2014-06-01T23:59:59.000Z

146

Sandia National Laboratories: reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1developmentturbineredox-active perovskite oxideplatformregional-scalereliability

147

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

148

TABLE OF CONTENTS Risk Analysis Methods Adapted to Computer Security (Revised Paper)  

E-Print Network [OSTI]

Security e Espionage e Terrorism e Nuclear Theft Environmental Risk Computer Reliability Health & Safety#12;TABLE OF CONTENTS Title Page Risk Analysis Methods Adapted to Computer Security (Revised Security Lattice Management c. T. Fe~guson & c. B. Murphy . . . · · . . . 15 Gould Computer Systems

149

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

150

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

151

Advances in high-throughput speed, low-latency communication for embedded instrumentation ( 7th Annual SFAF Meeting, 2012)  

ScienceCinema (OSTI)

Scott Jordan on "Advances in high-throughput speed, low-latency communication for embedded instrumentation" at the 2012 Sequencing, Finishing, Analysis in the Future Meeting held June 5-7, 2012 in Santa Fe, New Mexico.

Jordan, Scott [Physik Instrumente

2013-02-11T23:59:59.000Z

152

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network [OSTI]

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

153

Reliable solar: powering communities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecentRegionalReliability Technology earns

154

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

155

A Network-on-Chip Router for Low-Latency and High-Throughput Dimension-Order Routing  

E-Print Network [OSTI]

and darker lines indicate higher link utilization. ...................................................................................... 6 Figure 2.1: A virtual-channel router with 5 VCs per input port ......................................... 8 Figure 2... – 5 VCs per port ...... 36 Figure 6.2: Load-latency curves (cycle-level) – Uniform Random – 6 VCs per port ...... 36 Figure 6.3: Load-latency curves (cycle-level) – Uniform Random – 7 VCs per port ...... 37 Figure 6.4: Scaling of saturation...

Rasheed, Shalimar

2014-04-24T23:59:59.000Z

156

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

157

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

158

ARMY VEHICLE DURABILITY OPTIMIZATION & RELIABILITY  

E-Print Network [OSTI]

ARMY VEHICLE DURABILITY OPTIMIZATION & RELIABILITY How to Optimize the Vehicle Design to Minimize/Reduce the Weight? Under These Uncertainties, How to Achieve Component Level Reliability? Under These Uncertainties, How to Achieve System Level Reliability? Dynamics Analysis FE Model System Model Dynamic Stress

Kusiak, Andrew

159

FIELD RELIABILITY OF ELECTRONIC SYSTEMS  

E-Print Network [OSTI]

I Ww i 1 i FIELD RELIABILITY OF ELECTRONIC SYSTEMS wcwotoias R I S 0 - M - 2 4 1 8 An analytical study of in-the fiald axparlanca of electronics reliability Tag© Elm Rise National Laboratory, DK-4000 Roskilde, Denmark February 1 0 8 4 #12;RIS�-M-2418 FIELD RELIABILITY OP ELECTRONIC SYSTEMS An analytical

160

Reliability onMultilayerModels  

E-Print Network [OSTI]

Network Reliability Analysis Based onMultilayerModels László Jereb, Péter Bajor, Attila Kiss a reliability analysis approach which is based on the multilayer model of the telecommunication network. Simple two­state reliability models are assigned to the network elements making it possible to describe

László, Jereb

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Testing for PV Reliability (Presentation)  

SciTech Connect (OSTI)

The DOE SUNSHOT workshop is seeking input from the community about PV reliability and how the DOE might address gaps in understanding. This presentation describes the types of testing that are needed for PV reliability and introduces a discussion to identify gaps in our understanding of PV reliability testing.

Kurtz, S.; Bansal, S.

2014-09-01T23:59:59.000Z

162

DOE Human Reliability Program Removals Report 2004-2006  

SciTech Connect (OSTI)

This report presents results of the comprehensive data analysis and assessment of all U.S. Department of Energy (DOE) and National Nuclear Security Administration (NNSA) facilities that have positions requiring workers to be certified in the Human Reliability Program (HRP). Those facilities include: Albuquerque, Amarillo, DOE Headquarters, Hanford, Idaho, Nevada, Oak Ridge, Oakland, and Savannah River. The HRP was established to ensure, through continuous review and evaluation, the reliability of individuals who have access to the DOE’s most sensitive facilities, materials, and information.

Center for Human Reliability Studies

2007-02-01T23:59:59.000Z

163

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

164

The Y-12 National Security Complex 4-1 4. The Y-12 National Security Complex  

E-Print Network [OSTI]

of the Nuclear Detection and Sensor Testing Center and the Nuclear Materials Information Program Library, a premier manufacturing facility operated by B&W Y-12 for NNSA, plays a vital role in DOE's Nuclear Security a safe and reliable US nuclear weapons deterrent. The complex also retrieves and stores nuclear materials

Pennycook, Steve

165

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

166

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

167

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

168

Maximal Reliability for Unit-weighted Composites  

E-Print Network [OSTI]

precisely measure scale reliability. In H. Yanai, A. Okada,A useful indicator of reliability? Personality & IndividualJ. M. F. (2000). Linking reliability and factor analysis:

Peter M. Bentler

2011-01-01T23:59:59.000Z

169

RELIABILITY IMPROVEMENT OF BART TRAIN CONTROL  

E-Print Network [OSTI]

it was a response to the reliability problems introduced by~atelyowned rights. RELIABILITY IMPROVEMENT OF BART VEHICLEtask group to improve the reliability of the Bay Area Rapid

Turner, D.B.

2011-01-01T23:59:59.000Z

170

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

171

Power Reliability at BASF Corporation  

E-Print Network [OSTI]

Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power... of overcoming these problems. The approach of addressing the reliability of its utility systems is common within BASF. This paper will address one of BASF?s approaches to addressing Power Reliability. PROBLEM RECOGNITION: The first issue to address...

Theising, T. R.

2011-01-01T23:59:59.000Z

172

Power Reliability at BASF Corporation  

E-Print Network [OSTI]

Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power... of overcoming these problems. The approach of addressing the reliability of its utility systems is common within BASF. This paper will address one of BASF?s approaches to addressing Power Reliability. PROBLEM RECOGNITION: The first issue to address...

Theising, T. R.

2012-01-01T23:59:59.000Z

173

Recent applications of thermal imagers for security assessment  

SciTech Connect (OSTI)

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01T23:59:59.000Z

174

CSD Safety and Reliability Data  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Reliability Data Forecourt CSD Workshop Argonne National Laboratory Kevin Harrison 20-Mar-2013 2 Approach - Composite Data Products CDPs DDPs Results Internal analysis completed...

175

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

176

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

177

Real Time Grid Reliability Management 2005  

SciTech Connect (OSTI)

The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

2008-07-07T23:59:59.000Z

178

NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance...  

Broader source: Energy.gov (indexed) [DOE]

NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance Report NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL: Preliminary Disturbance Report The following information...

179

Applying Reliability Models to the Space Shuttle  

E-Print Network [OSTI]

Applying Reliability Models to the Space Shuttle Norman F. Schneidewind Ted W. Keller #12;What are Reliability Models? Reliability Models are tools that Help Us: · Predict software Reliability. · Control software Reliability. · Assess software Reliability. This functions let an organization determine

Feitelson, Dror

180

FORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY MODELING  

E-Print Network [OSTI]

FORMAL SEMANTICS AND VERIFICATION OF DYNAMIC RELIABILITY BLOCK DIAGRAMS FOR SYSTEM RELIABILITY captured by existing reliability modeling tools. In this paper, we introduce a new reliability modeling tool, called dynamic reliability block diagrams (DRBD), for modeling dynamic relationships between

Xu, Haiping

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Photovoltaic performance and reliability workshop  

SciTech Connect (OSTI)

This workshop was the sixth in a series of workshops sponsored by NREL/DOE under the general subject of photovoltaic testing and reliability during the period 1986--1993. PV performance and PV reliability are at least as important as PV cost, if not more. In the US, PV manufacturers, DOE laboratories, electric utilities, and others are engaged in the photovoltaic reliability research and testing. This group of researchers and others interested in the field were brought together to exchange the technical knowledge and field experience as related to current information in this evolving field of PV reliability. The papers presented here reflect this effort since the last workshop held in September, 1992. The topics covered include: cell and module characterization, module and system testing, durability and reliability, system field experience, and standards and codes.

Mrig, L. [ed.

1993-12-01T23:59:59.000Z

182

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

183

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

184

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

185

Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project  

E-Print Network [OSTI]

Sinnott,R.O. Stell,A.J. Bayer,M.M. Koetsier,J. The First International Conference on Availability, Reliability and Security (ARES-2006), Vienna, Austria, April, 2006.

Sinnott, R.O.

186

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

187

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

188

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

189

OTRA-THS MAC to reduce Power Outage Data Collection Latency in a smart meter network  

SciTech Connect (OSTI)

The deployment of advanced metering infrastructure by the electric utilities poses unique communication challenges, particularly as the number of meters per aggregator increases. During a power outage, a smart meter tries to report it instantaneously to the electric utility. In a densely populated residential/industrial locality, it is possible that a large number of smart meters simultaneously try to get access to the communication network to report the power outage. If the number of smart meters is very high of the order of tens of thousands (metropolitan areas), the power outage data flooding can lead to Random Access CHannel (RACH) congestion. Several utilities are considering the use of cellular network for smart meter communications. In 3G/4G cellular networks, RACH congestion not only leads to collisions, retransmissions and increased RACH delays, but also has the potential to disrupt the dedicated traffic flow by increasing the interference levels (3G CDMA). In order to overcome this problem, in this paper we propose a Time Hierarchical Scheme (THS) that reduces the intensity of power outage data flooding and power outage reporting delay by 6/7th, and 17/18th when compared to their respective values without THS. Also, we propose an Optimum Transmission Rate Adaptive (OTRA) MAC to optimize the latency in power outage data collection. The analysis and simulation results presented in this paper show that both the OTRA and THS features of the proposed MAC results in a Power Outage Data Collection Latency (PODCL) that is 1/10th of the 4G LTE PODCL.

Garlapati, Shravan K [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL; Buehrer, Richard M [ORNL] [ORNL; Reed, Jeffrey H [ORNL] [ORNL

2014-01-01T23:59:59.000Z

190

Applying New Network Security Technologies to SCADA Systems.  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

2006-11-01T23:59:59.000Z

191

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

192

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

193

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

194

Photovoltaics performance and reliability workshop  

SciTech Connect (OSTI)

This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

Mrig, L. [ed.] [ed.

1992-11-01T23:59:59.000Z

195

Photovoltaics performance and reliability workshop  

SciTech Connect (OSTI)

This document consists of papers and viewgraphs compiled from the proceedings of a workshop held in September 1992. This workshop was the fifth in a series sponsored by NREL/DOE under the general subject areas of photovoltaic module testing and reliability. PV manufacturers, DOE laboratories, electric utilities and others exchanged technical knowledge and field experience. The topics of cell and module characterization, module and system performance, materials and module durability/reliability research, solar radiation, and applications are discussed.

Mrig, L. (ed.) [ed.

1992-01-01T23:59:59.000Z

196

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

197

On-Chip Copper-Based vs. Optical Interconnects: Delay Uncertainty, Latency, Power, and Bandwidth Density Comparative Predictions  

E-Print Network [OSTI]

On-Chip Copper-Based vs. Optical Interconnects: Delay Uncertainty, Latency, Power, and Bandwidth. Albonesi, Philippe M. Fauchet, and Eby G. Friedman Department of Electrical and Computer Engineering of Rochester, Rochester, New York, 14627 Department of Electrical and Computer Engineering,Cornell University

Friedman, Eby G.

198

NaNet: a Low-Latency, Real-Time, Multi-Standard Network Interface Card with GPUDirect Features  

E-Print Network [OSTI]

While the GPGPU paradigm is widely recognized as an effective approach to high performance computing, its adoption in low-latency, real-time systems is still in its early stages. Although GPUs typically show deterministic behaviour in terms of latency in executing computational kernels as soon as data is available in their internal memories, assessment of real-time features of a standard GPGPU system needs careful characterization of all subsystems along data stream path. The networking subsystem results in being the most critical one in terms of absolute value and fluctuations of its response latency. Our envisioned solution to this issue is NaNet, a FPGA-based PCIe Network Interface Card (NIC) design featuring a configurable and extensible set of network channels with direct access through GPUDirect to NVIDIA Fermi/Kepler GPU memories. NaNet design currently supports both standard - GbE (1000BASE-T) and 10GbE (10Base-R) - and custom - 34~Gbps APElink and 2.5~Gbps deterministic latency KM3link - channels, bu...

Lonardo, A; Ammendola, R; Biagioni, A; Frezza, O; Lamanna, G; Cicero, F Lo; Martinelli, M; Paolucci, P S; Pastorelli, E; Pontisso, L; Rossetti, D; Simeone, F; Simula, F; Sozzi, M; Tosoratto, L; Vicini, P

2014-01-01T23:59:59.000Z

199

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect (OSTI)

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

200

Use of a hybrid technology in a critical security system.  

SciTech Connect (OSTI)

Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

Trujillo, David J.

2010-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Use of a hybrid technology in a critical security system.  

SciTech Connect (OSTI)

Assigning an acceptable level of power reliability in a security system environment requires a methodical approach to design when considering the alternatives tied to the reliability and life of the system. The downtime for a piece of equipment, be it for failure, routine maintenance, replacement, or refurbishment or connection of new equipment is a major factor in determining the reliability of the overall system. In addition to these factors is the condition where the system is static or dynamic in its growth. Most highly reliable security power source systems are supplied by utility power with uninterruptable power source (UPS) and generator backup. The combination of UPS and generator backup with a reliable utility typically provides full compliance to security requirements. In the energy market and from government agencies, there is growing pressure to utilize alternative sources of energy other than fossil fuel to increase the number of local generating systems to reduce dependence on remote generating stations and cut down on carbon effects to the environment. There are also conditions where a security system may be limited on functionality due to lack of utility power in remote locations. One alternative energy source is a renewable energy hybrid system including a photovoltaic or solar system with battery bank and backup generator set. This is a viable source of energy in the residential and commercial markets where energy management schemes can be incorporated and systems are monitored and maintained regularly. But, the reliability of this source could be considered diminished when considering the security system environment where stringent uptime requirements are required.

Scharmer, Carol; Trujillo, David J.

2010-08-01T23:59:59.000Z

202

Reliability Assessment Using Discriminative Sampling and Metamodeling  

E-Print Network [OSTI]

1 05M-400 Reliability Assessment Using Discriminative Sampling and Metamodeling G. Gary Wang Dept ABSTRACT Reliability assessment is the foundation for reliability engineering and reliability-based design optimization. It has been a difficult task, however, to perform both accurate and efficient reliability

Wang, Gaofeng Gary

203

Supervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis  

E-Print Network [OSTI]

cyber-infrastructures (ranging from defense and banking to health care and power distribution sys- temsSupervisory Control Strategies for Enhancing System Security and Privacy Christoforos N. Hadjicostis Abstract-- Enhancing the security and reliability of auto- mated systems that control vital

Hadjicostis, Christoforos

204

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

Goldberg, Sharon

205

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

206

Assessing reliability in energy supply systems  

E-Print Network [OSTI]

R.N. , 1984. Power-system reliability in perspective, in:L. (Eds. ), 1991. Applied Reliability Assessment in ElectricR. , Allan, R.N. , 1996. Reliability Evaluation of Power

McCarthy, Ryan W.; Ogden, Joan M.; Sperling, Daniel

2007-01-01T23:59:59.000Z

207

Reliability Assessment Incorporating Operational Considerations and Economic  

E-Print Network [OSTI]

PSERC Reliability Assessment Incorporating Operational Considerations and Economic Aspects Engineering Research Center Reliability Assessment Incorporating Operational Considerations and Economic Center (PSERC) research project titled "Reliability Assessment Incorporating Operational Considerations

208

Assessing Reliability in Energy Supply Systems  

E-Print Network [OSTI]

R.N. , 1984. Power-system reliability in perspective, in:L. (Eds. ), 1991. Applied Reliability Assessment in ElectricR. , Allan, R.N. , 1996. Reliability Evaluation of Power

McCarthy, Ryan; Ogden, Joan M.; Sperling, Dan

2008-01-01T23:59:59.000Z

209

Arnold Schwarzenegger REAL-TIME GRID RELIABILITY  

E-Print Network [OSTI]

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real Laboratory Consortium for Electric Reliability Technology Solutions APPENDIXC October 2008 CEC-500 (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliability

210

Constructing Reliable Distributed Communication Systems with CORBA  

E-Print Network [OSTI]

Constructing Reliable Distributed Communication Systems with CORBA Silvano Maffeis Douglas C model to support reliable data- and process- oriented distributed systems that communicate through syn distributed object computing systems with CORBA. First, we examine the question of whether reliable applica

Schmidt, Douglas C.

211

NREL's Gearbox Reliability Collaborative leads to wind turbine gearbox reliability, lowering the cost of energy.  

E-Print Network [OSTI]

NREL's Gearbox Reliability Collaborative leads to wind turbine gearbox reliability, lowering operations. In 2007, the National Renewable Energy Laboratory (NREL) initi- ated the Gearbox Reliability that contribute to reduced gearbox reliability. In contrast to private investigations of these problems, GRC

212

Cloud Operations Excellence & Reliability Page 1 Excellence &  

E-Print Network [OSTI]

and our sites secure from attack, while protecting the privacy of personally identifiable information

Chaudhuri, Surajit

213

Recommendations to Address Power Reliability Concerns Raised...  

Broader source: Energy.gov (indexed) [DOE]

to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns...

214

Comments of North American Electric Reliability Corporation ...  

Broader source: Energy.gov (indexed) [DOE]

North American Electric Reliability Corporation (NERC) to DOE Smart Grid RFI: Addressing Policy and Logistical Challenges Comments of North American Electric Reliability...

215

NREL Publishes Gearbox Reliability Collaborative Findings Report...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

NREL Publishes Gearbox Reliability Collaborative Findings Report NREL Publishes Gearbox Reliability Collaborative Findings Report October 3, 2011 - 12:56pm Addthis This is an...

216

Sandia National Laboratories: Third Annual Continuous Reliability...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ClimateECEnergyThird Annual Continuous Reliability Enhancement for Wind (CREW) Database Report Now Available Third Annual Continuous Reliability Enhancement for Wind (CREW)...

217

Funding Opportunity Announcement: PHYSICS OF RELIABILITY: EVALUATING...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

PHYSICS OF RELIABILITY: EVALUATING DESIGN INSIGHTS FOR COMPONENT TECHNOLOGIES IN SOLAR 2 (PREDICTS 2) Funding Opportunity Announcement: PHYSICS OF RELIABILITY: EVALUATING DESIGN...

218

Smart Grid Investments Improve Grid Reliability, Resilience,...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Investments Improve Grid Reliability, Resilience, and Storm Responses (November 2014) Smart Grid Investments Improve Grid Reliability, Resilience, and Storm Responses (November...

219

Sandia National Laboratories: Continuous Reliability Enhancement...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

StandardsContinuous Reliability Enhancement for Wind (CREW) Database and Analysis Program Continuous Reliability Enhancement for Wind (CREW) Database and Analysis Program 2013 CREW...

220

Information Concerning Reliability Impacts under Various System...  

Broader source: Energy.gov (indexed) [DOE]

Concerning Reliability Impacts under Various System Configurations of the Mirant Potomac River Plant Information Concerning Reliability Impacts under Various System Configurations...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Thermoelectric Materials By Design: Mechanical Reliability (Agreement...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

By Design: Mechanical Reliability (Agreement 14957) Thermoelectric Materials By Design: Mechanical Reliability (Agreement 14957) Presentation from the U.S. DOE Office of Vehicle...

222

Distributed Generation Operational Reliability and Availability...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Reliability and Availability Database, Final Report, January 2004 Distributed Generation Operational Reliability and Availability Database, Final Report, January 2004 This final...

223

Electricity Delivery and Energy Reliability PROGRAM DESCRIPTION  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

32 Electricity Delivery and Energy Reliability PROGRAM DESCRIPTION The Office of Electricity Delivery and Energy Reliability (OE) leads national efforts to modernize the electric...

224

Electricity & Energy Reliability (WFP) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Electricity & Energy Reliability (WFP) Electricity & Energy Reliability (WFP) The purpose of the workforce Plan is to provide focus and direction to Human Resources (HR) strategy....

225

NNSA PRISM Center for Prediction of Reliability, Integrity and Survivability of Microsystems  

E-Print Network [OSTI]

NNSA PRISM Center for Prediction of Reliability, Integrity and Survivability of Microsystems NEED Mexico will collaborate in PRISM. Purdue is one of five centers funded under NNSA's Predictive Science Nuclear Security Administration (NNSA) $4.2 million in matching funds from Purdue and its partners

Ginzel, Matthew

226

A Reliable Fault-Tolerant Scheduling Algorithm for Real Time Embedded Systems  

E-Print Network [OSTI]

/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, Toulouse : France (2013)" #12;2 Chafik Arar, Hamoudi Kalla, Salim Kalla, and Hocine Riadh Scheduling algorithm architecture specification distribution constraints

Paris-Sud XI, Université de

227

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

228

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

229

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

230

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

231

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

232

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

233

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

234

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

235

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

236

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

237

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

238

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

239

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

240

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

NREL: Performance and Reliability R&D - Webmaster  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and AchievementsResearchReliability WorkshopsReal-Time

242

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

243

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

244

Low latency, high bandwidth data communications between compute nodes in a parallel computer  

DOE Patents [OSTI]

Methods, parallel computers, and computer program products are disclosed for low latency, high bandwidth data communications between compute nodes in a parallel computer. Embodiments include receiving, by an origin direct memory access (`DMA`) engine of an origin compute node, data for transfer to a target compute node; sending, by the origin DMA engine of the origin compute node to a target DMA engine on the target compute node, a request to send (`RTS`) message; transferring, by the origin DMA engine, a predetermined portion of the data to the target compute node using memory FIFO operation; determining, by the origin DMA engine whether an acknowledgement of the RTS message has been received from the target DMA engine; if the an acknowledgement of the RTS message has not been received, transferring, by the origin DMA engine, another predetermined portion of the data to the target compute node using a memory FIFO operation; and if the acknowledgement of the RTS message has been received by the origin DMA engine, transferring, by the origin DMA engine, any remaining portion of the data to the target compute node using a direct put operation.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2010-11-02T23:59:59.000Z

245

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

246

TRAVEL DEMAND AND RELIABLE FORECASTS  

E-Print Network [OSTI]

TRAVEL DEMAND AND RELIABLE FORECASTS FOR TRANSIT MARK FILIPI, AICP PTP 23rd Annual Transportation transportation projects § Develop and maintain Regional Travel Demand Model § Develop forecast socio in cooperative review during all phases of travel demand forecasting 4 #12;Cooperative Review Should Include

Minnesota, University of

247

Ris-M-2584 RELIABILITY CALCULATIONS  

E-Print Network [OSTI]

Risø-M-2584 RELIABILITY CALCULATIONS Improvements of methods intended for calculation of reliability of structures and systems Kurt E. Petersen Abstract. Risk and reliability analysis is increasingly being used in evaluations of plant safety and plant reliability. The analysis can be performed either

248

Reliability Failure Mode, Effects, and Criticality Analysis  

E-Print Network [OSTI]

Reliability Failure Mode, Effects, and Criticality Analysis Addendum 1; HFE ~ ATM501 PAGE I I. Hiebert Reliability Engineer HFE · B-1 f #12;~~.~-~ -_ ~ ~ Reliability Failure Mode, Effects were slight adjustment in the linearizing resistors. The reliability is effected upward by the deletion

Rathbun, Julie A.

249

The design of a reliable reputation system  

E-Print Network [OSTI]

reliability by spreading its transactions evenly across all 20 peers in the system (shown by Distribution

Swamynathan, Gayatri; Almeroth, Kevin C.; Zhao, Ben Y.

2010-01-01T23:59:59.000Z

250

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

251

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

252

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

253

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

254

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

255

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

256

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

257

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

258

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

259

National Center for Nuclear Security - NCNS  

ScienceCinema (OSTI)

As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

None

2015-01-09T23:59:59.000Z

260

National Center for Nuclear Security - NCNS  

SciTech Connect (OSTI)

As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

None

2014-11-12T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

262

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

263

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

264

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

265

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

266

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

267

Gearbox Reliability Collaborative Bearing Calibration  

SciTech Connect (OSTI)

NREL has initiated the Gearbox Reliability Collaborative (GRC) to investigate the root cause of the low wind turbine gearbox reliability. The GRC follows a multi-pronged approach based on a collaborative of manufacturers, owners, researchers and consultants. The project combines analysis, field testing, dynamometer testing, condition monitoring, and the development and population of a gearbox failure database. At the core of the project are two 750kW gearboxes that have been redesigned and rebuilt so that they are representative of the multi-megawatt gearbox topology currently used in the industry. These gearboxes are heavily instrumented and are tested in the field and on the dynamometer. This report discusses the bearing calibrations of the gearboxes.

van Dam, J.

2011-10-01T23:59:59.000Z

268

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

269

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

270

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

271

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

272

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

273

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

274

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

275

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

276

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

277

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

278

Sandia National Laboratories: energy reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1development Sandia, NRELdeep-waterbiofuelssituations EC, DHS'senergy

279

Sandia National Laboratories: PV Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLSMolten-Salt StorageNoLongAnalysisPVPublications PVReliability

280

Sandia National Laboratories: Component Reliability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMappingCombustionBiofuelsCompass

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

The Materials Reliability Division has established several capabilities for analyzing the reliability of  

E-Print Network [OSTI]

The Materials Reliability Division has established several capabilities for analyzing the reliability of small scale structures, including a number of custom instruments developed specifically@boulder.nist.gov FACILITIES Measurement Facilities: Small-Scale Mechanical Reliability Materials Science and Engineering

282

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

283

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

284

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

285

Reliability Challenges for Solar Energy (Presentation)  

SciTech Connect (OSTI)

Presentation that reviews reliability issues related to various types of photovoltaic tecnnologies, including crystalline silicon, thin films, and concentrating PV.

Kurtz, S.

2009-12-08T23:59:59.000Z

286

LUNAR MASS SPECTROMETER RELIABILITY LOGIC DIAGRAM  

E-Print Network [OSTI]

point (A) to (F). The block diagram also defines the reliability functions for the purpose of FMEA 1

Rathbun, Julie A.

287

SOFTWARE RELIABILITY SIMULATION Robert C. Tausworthe  

E-Print Network [OSTI]

CHAPTER 16 SOFTWARE RELIABILITY SIMULATION Robert C. Tausworthe Jet Propulsion Laboratory, together with their attributes and interrelationships, that are related to reliability 1 comprise what we here refer to as the reliability process. The artifacts of the software life cycle include doc­ uments

Lyu, Michael R.

288

Arnold Schwarzenegger REAL-TIME GRID RELIABILITY  

E-Print Network [OSTI]

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT Scoping Study Report Reliability Technology Solutions APPENDIXG October 2008 CEC-500-2008-049-APG #12;#12;Prepared By: Lawrence for Electric Reliability Technology Solutions and was funded by the California Energy Commission's Public

289

Network Reliability: Models, Measures and Analysis  

E-Print Network [OSTI]

Network Reliability: Models, Measures and Analysis #3; L.Jereb Department of Telecommunications y quality services when the network elements apt to random failures. Several network reliability models have of network reliability analysis and summarizes the critical issues. A possible solution taking into account

László, Jereb

290

Dispatcher Reliability Analysis : SPICA-RAIL Experiments  

E-Print Network [OSTI]

Dispatcher Reliability Analysis : SPICA-RAIL Experiments Fabien Belmonte, Jean-Louis Boulanger of scenarios and evaluate the behaviour of human operators. A state of the art in human reliability is pre coupled to a traffic simulator. It allows to gather data for human reliability evaluation and man

Paris-Sud XI, Université de

291

RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION  

E-Print Network [OSTI]

RELIABILITY-BASED CASTING PROCESS DESIGN OPTIMIZATION Richard Hardin1 , K.K. Choi1 , and Christoph 52242-1527 Keywords: Casting Process Design, Optimization, Reliability-Based Design Optimization purpose reliability-based design optimization (RBDO) software tool previously developed at the University

Beckermann, Christoph

292

Reliability Prediction -Array D Redundant Command Receiver  

E-Print Network [OSTI]

Reliability Prediction - Array D Redundant Command Receiver ATM 981 I PAGI 1 OP 16 DATE 26 Feb. 1971 This Reliability Prediction was prepared by Motorola's Government Electronics Division as required combiner· .. There was a reliability design goal of · 998 for a two-year mission on the ... lunar surface

Rathbun, Julie A.

293

Arnold Schwarzenegger REAL-TIME GRID RELIABILITY  

E-Print Network [OSTI]

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT Prototype Phasor-Based Real Reliability Technology Solutions APPENDIXE October 2008 CEC-500-2008-049-APE #12;#12;Prepared By: Lawrence in this report. #12;Slide 0 Consortium for Electric Reliability Technology Solutions Real-Time Dynamics

294

Reliability Analysis of Microelectronic Components and Materials  

E-Print Network [OSTI]

1 Reliability Analysis of Microelectronic Components and Materials Increasing numbers of the degradation processes relevant to soldered joints is crucial for more reliable life-cycle predictions. Joining methods are critical for the reliable use of electronic packages. In particular, since the advent

Berlin,Technische Universität

295

Transductive Reliability Estimation for Kernel Based Classifiers  

E-Print Network [OSTI]

Transductive Reliability Estimation for Kernel Based Classifiers Dimitris Tzikas1 , Matjaz Kukar2@cs.uoi.gr Abstract. Estimating the reliability of individual classifications is very important in several applications such as medical diagnosis. Recently, the transductive approach to reliability estimation has been

Likas, Aristidis

296

Reliability Meets Big Data: Opportunities and Challenges  

E-Print Network [OSTI]

Reliability Meets Big Data: Opportunities and Challenges William Q. Meeker Department of Statistics, 2013 Abstract Reliability field data such as that obtained from warranty claims and maintenance records products, the nature of field reliability data is changing dramatically. In particular, products can

297

Arnold Schwarzenegger REAL-TIME GRID RELIABILITY  

E-Print Network [OSTI]

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT Prototype Phasor-Based Real Research Program Prepared By: Lawrence Berkeley National Laboratory Consortium for Electric Reliability in this report. #12;#12;USER GUIDE Version 3 August 2005 Prepared by: for Consortium for Electric Reliability

298

RELIABILITY IN PERSONAL POSITIONING Heidi Kuusniemi1*  

E-Print Network [OSTI]

RELIABILITY IN PERSONAL POSITIONING Heidi Kuusniemi1* , GĂ©rard Lachapelle2 , Jarmo Takala1 1 interference effects lead to measurement errors, and reliability monitoring in terms of proper fault detection in future new possibilities to provide integrity and reliability information to the user both at signal

Calgary, University of

299

RELIABILITY ENGINEERING: OLD PROBLEMS AND NEW CHALLENGES  

E-Print Network [OSTI]

1 RELIABILITY ENGINEERING: OLD PROBLEMS AND NEW CHALLENGES E. Zio Dept. of Energy, Polytechnic: enrico.zio@polimi.it Abstract The first recorded usage of the word reliability dates back to the 1800s, albeit referred to a person and not a technical system. Since then, the concept of reliability has become

Paris-Sud XI, Université de

300

The Whereabouts of Reliability Education: Challenges & Opportunities  

E-Print Network [OSTI]

. There is a gap between reliability theory and practice, between school and industry, book knowledge and real The probability that the system is still operating at time t. where f(t) probability density function h(t) failure changing and getting higher. #12;Some Reliability books in ... 1960s Igor Bazovsky (1961), Reliability

Bernstein, Joseph B.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

302

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

303

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

304

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

305

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

306

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

307

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

308

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

309

Can Software Reliability Outperform Hardware Reliability in High-Performance Interconnects?  

E-Print Network [OSTI]

Can Software Reliability Outperform Hardware Reliability in High-Performance Interconnects? A Case, Myrinet, InfiniBand, and others HPC networks are generally quite reliable without additional protocols link With this in mind, how should reliability be implemented? 3 #12;Onload or Offload? Some networks

Panda, Dhabaleswar K.

310

Reliable computation of homogeneous azeotropes  

SciTech Connect (OSTI)

It is important to determine the existence and composition of homogeneous azeotropes in the analysis of phase behavior and in the synthesis and design of separation systems, from both theoretical and practical standpoints. A new method for reliably locating any and all homogeneous azeotropes for multicomponent mixtures is presented. The method also verifies the nonexistence of homogeneous azeotropes if none are present. The method is based on interval analysis, in particular an interval-Newton/generalized-bisection-algorithm providing a mathematical and computational guarantee that all azeotropes are located. This general-purpose technique can be applied in connection with any thermodynamic models. The technique is illustrated in several example problems using the Wilson, NRTL, and UNIQUAC activity-coefficient models.

Maier, R.W.; Brennecke, J.F.; Stadtherr, M.A. [Univ. of Notre Dame, IN (United States). Dept. of Chemical Engineering] [Univ. of Notre Dame, IN (United States). Dept. of Chemical Engineering

1998-08-01T23:59:59.000Z

311

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

312

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

313

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

314

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

315

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

316

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

317

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

318

Real Time Grid Reliability Management 2005  

E-Print Network [OSTI]

Reactive Power Reserve Work Group, Western ElectricityReactive Voltage Security Assessment Wide Area Network Western Area Power Administration Western Electricity

Eto, Joe

2008-01-01T23:59:59.000Z

319

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

320

Human Reliability Program 10 CFR, part 712 Subpart B Medical Standards  

Broader source: Energy.gov [DOE]

HRP Policy is the responsibility of the Office of Departmental Personnel Security Policy (HS-1.4). The Office of Worker Safety and Health Assistance (HS-12), has responsibility within the DOE Human Reliability Programs (HRP) to ensure appropriate policies and procedures are in place and used at HQ and the DOE sites to monitor HRP-designated worker's health and fitness-for-duty.

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Manufacturing Metrology for c-Si Module Reliability/Durabiltiy...  

Broader source: Energy.gov (indexed) [DOE]

Manufacturing Metrology for c-Si Module ReliabilityDurabiltiy Manufacturing Metrology for c-Si Module ReliabilityDurabiltiy Presented at the PV Module Reliability Workshop,...

322

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

323

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

324

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

325

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

326

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

327

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

328

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

329

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

330

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

331

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

332

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

333

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

334

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

335

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

336

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

337

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

338

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

339

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

340

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

342

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

343

Secure Interoperable Open Smart Grid Demonstration Project  

SciTech Connect (OSTI)

The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

Magee, Thoman

2014-12-31T23:59:59.000Z

344

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

345

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

346

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

347

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

348

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

349

Insulator damage endangers public, power reliability; ratepayers...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Insulator-damage-endangers-public-power-reliability-ratepayers-foot-repair-bill Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us...

350

General Order Ensuring Reliable Electric Service (Louisiana)  

Broader source: Energy.gov [DOE]

The standards set forth herein have been developed to provide consumers, the Louisiana Public Service Commission, and jurisdictional electric utilities with a uniform method of ensuring reliable...

351

Mechanical Reliability of Piezo-Stack Actuators  

Broader source: Energy.gov (indexed) [DOE]

Review Guidelines Mechanical Reliability of Piezo-Stack Actuators (Agreement 13329) Andrew A. Wereszczak, Hong Wang, and Hua-Tay Lin Oak Ridge National Laboratory Oak Ridge, TN...

352

Improving Wind Turbine Gearbox Reliability: Preprint  

SciTech Connect (OSTI)

This paper describes a new research and development initiative to improve gearbox reliability in wind turbines begun at the National Renewable Energy Laboratory (NREL) in Golden, Colorado, USA.

Musial, W.; Butterfield, S.; McNiff, B.

2007-06-01T23:59:59.000Z

353

Power as a function of reliability  

SciTech Connect (OSTI)

Many studies employ multiple measurement instruments such as human raters, observers, judges, or mechanical gauges to record subject data. It is well known that the consistency of these instruments, commonly called rater reliability, limits the extent to which conclusions should be drawn from the observed data. However, the degree to which rater reliability limits conclusions has traditionally been assessed in only subjective manners. In this paper, a method is developed for objectively quantifying the impact of rate reliability on the statistical analysis of data from a commonly used collection scheme. This method allows the inclusion of a reliability index in statistical power calculations and is an invaluable tool in the planning of experiments.

Abate, M.L. [Sandia National Labs., Albuquerque, NM (United States); McCabe, G.P.; Lynch, M.P. [Purdue Univ., Lafayette, IN (United States)

1995-10-01T23:59:59.000Z

354

Commentary: Risk Management and Reliability Design for Buildings  

SciTech Connect (OSTI)

Where there is a significant actuarial basis for decision making (e.g., the occurrence of fires in single-family dwellings), there is little incentive for formal risk management. Formal risk assessments are most useful in those cases where the value of the structure is high, many people may be affected, the societal perception of risk is high, consequences of a mishap would be severe, and the actuarial uncertainty is large. For these cases, there is little opportunity to obtain the necessary experiential data to make informed decisions, and the consequences in terms of money, lives, and societal confidence are severe enough to warrant a formal risk assessment. Other important factors include the symbolic value of the structure and vulnerability to single point failures. It is unlikely that formal risk management and assessment practices will or should replace the proven institutions of building codes and engineering practices. Nevertheless, formal risk assessment can provide valuable insights into the hazards threatening high-value and high-risk (perceived or actual) buildings and structures, which can in turn be translated into improved public health, safety, and security. The key is to choose and apply the right assessment tool to match the structure in question. Design-for-reliability concepts can be applied to buildings, bridges, transportation sys- tems, dams, and other structures. The use of these concepts could have the dual benefits of lowering life-cycle costs by reducing the necessity for maintenance and repair and of enhancing the saiiety and security of the structure's users.

Berry, Dennis L.; Cranwell, Robert M.; Hunter, Regina L.

1999-05-28T23:59:59.000Z

355

Reliability Module By: Alex Miller and Mark Robinson  

E-Print Network [OSTI]

Reliability Module By: Alex Miller and Mark Robinson Material Summarized from Reliability Module://spacese.spacegrant.org/). #12;Key Concepts Understanding the importance of reliability as an engineering discipline to calculate reliability Mathematically Visually (block diagrams) Source: Exploration Systems Engineering

Rhoads, James

356

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

357

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

358

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

359

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

360

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Fundamental mechanisms of micromachine reliability  

SciTech Connect (OSTI)

Due to extreme surface to volume ratios, adhesion and friction are critical properties for reliability of Microelectromechanical Systems (MEMS), but are not well understood. In this LDRD the authors established test structures, metrology and numerical modeling to conduct studies on adhesion and friction in MEMS. They then concentrated on measuring the effect of environment on MEMS adhesion. Polycrystalline silicon (polysilicon) is the primary material of interest in MEMS because of its integrated circuit process compatibility, low stress, high strength and conformal deposition nature. A plethora of useful micromachined device concepts have been demonstrated using Sandia National Laboratories' sophisticated in-house capabilities. One drawback to polysilicon is that in air the surface oxidizes, is high energy and is hydrophilic (i.e., it wets easily). This can lead to catastrophic failure because surface forces can cause MEMS parts that are brought into contact to adhere rather than perform their intended function. A fundamental concern is how environmental constituents such as water will affect adhesion energies in MEMS. The authors first demonstrated an accurate method to measure adhesion as reported in Chapter 1. In Chapter 2 through 5, they then studied the effect of water on adhesion depending on the surface condition (hydrophilic or hydrophobic). As described in Chapter 2, they find that adhesion energy of hydrophilic MEMS surfaces is high and increases exponentially with relative humidity (RH). Surface roughness is the controlling mechanism for this relationship. Adhesion can be reduced by several orders of magnitude by silane coupling agents applied via solution processing. They decrease the surface energy and render the surface hydrophobic (i.e. does not wet easily). However, only a molecular monolayer coats the surface. In Chapters 3-5 the authors map out the extent to which the monolayer reduces adhesion versus RH. They find that adhesion is independent of RH up to a threshold value, depending on the coating chemistry. The mechanism for the adhesion increase beyond this threshold value is that the coupling agent reconfigures from a surface to a bulk phase (Chapter 3). To investigate the details of how the adhesion increase occurs, the authors developed the mechanics for adhesion hysteresis measurements. These revealed that near-crack tip compression is the underlying cause of the adhesion increase (Chapter 4). A vacuum deposition chamber for silane coupling agent deposition was constructed. Results indicate that vapor deposited coatings are less susceptible to degradation at high RH (Chapter 5). To address issues relating to surfaces in relative motion, a new test structure to measure friction was developed. In contrast to other surface micromachined friction test structures, uniform apparent pressure is applied in the frictional contact zone (Chapter 6). The test structure will enable friction studies over a large pressure and dynamic range. In this LDRD project, the authors established an infrastructure for MEMS adhesion and friction metrology. They then characterized in detail the performance of hydrophilic and hydrophobic films under humid conditions, and determined mechanisms which limit this performance. These studies contribute to a fundamental understanding for MEMS reliability design rules. They also provide valuable data for MEMS packaging requirements.

DE BOER,MAARTEN P.; SNIEGOWSKI,JEFFRY J.; KNAPP,JAMES A.; REDMOND,JAMES M.; MICHALSKE,TERRY A.; MAYER,THOMAS K.

2000-01-01T23:59:59.000Z

362

PV Performance and Reliability Validation Capabilities at Sandia...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Performance and Reliability Validation Capabilities at Sandia National Laboratories PV Performance and Reliability Validation Capabilities at Sandia National Laboratories This...

363

Assessment of microelectronics packaging for high temperature, high reliability applications  

SciTech Connect (OSTI)

This report details characterization and development activities in electronic packaging for high temperature applications. This project was conducted through a Department of Energy sponsored Cooperative Research and Development Agreement between Sandia National Laboratories and General Motors. Even though the target application of this collaborative effort is an automotive electronic throttle control system which would be located in the engine compartment, results of this work are directly applicable to Sandia`s national security mission. The component count associated with the throttle control dictates the use of high density packaging not offered by conventional surface mount. An enabling packaging technology was selected and thermal models defined which characterized the thermal and mechanical response of the throttle control module. These models were used to optimize thick film multichip module design, characterize the thermal signatures of the electronic components inside the module, and to determine the temperature field and resulting thermal stresses under conditions that may be encountered during the operational life of the throttle control module. Because the need to use unpackaged devices limits the level of testing that can be performed either at the wafer level or as individual dice, an approach to assure a high level of reliability of the unpackaged components was formulated. Component assembly and interconnect technologies were also evaluated and characterized for high temperature applications. Electrical, mechanical and chemical characterizations of enabling die and component attach technologies were performed. Additionally, studies were conducted to assess the performance and reliability of gold and aluminum wire bonding to thick film conductor inks. Kinetic models were developed and validated to estimate wire bond reliability.

Uribe, F.

1997-04-01T23:59:59.000Z

364

Nevada National Security Site Groundwater Program  

ScienceCinema (OSTI)

From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

None

2014-10-28T23:59:59.000Z

365

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

366

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

367

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

368

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

369

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

370

Reliability Meets Big Data: Opportunities and Challenges  

E-Print Network [OSTI]

products, the nature of field reliability data is changing dramatically. In particular, products can 1, 2013 Abstract Reliability field data such as that obtained from warranty claims and maintenance, however, many other potential applications for using such data. In this paper we review some applications

McCalley, James D.

371

Demand Response and Electric Grid Reliability  

E-Print Network [OSTI]

Demand Response and Electric Grid Reliability Paul Wattles Senior Analyst, Market Design & Development, ERCOT CATEE Conference, Galveston October 10, 2012 2 North American Bulk Power Grids CATEE Conference October 10, 2012 ? The ERCOT... adequacy ? ?Achieving more DR participation would . . . displace some generation investments, but would achieve the same level of reliability... ? ?Achieving this ideal requires widespread demand response and market structures that enable loads...

Wattles, P.

2012-01-01T23:59:59.000Z

372

Engineering Reliability into Web Sites: Google SRE  

E-Print Network [OSTI]

Engineering Reliability into Web Sites: Google SRE Alex Perry alex.perry@google.com Santa Monica SRE, Google #12;Abstract This talk introduces Site Reliability Engineering (SRE) at Google, explaining team responsibilities by site Failures and instability consuming manpower Engineering being applied

Tomkins, Andrew

373

Reliable Distributed Computing for Decision Support Systems  

E-Print Network [OSTI]

Reliable Distributed Computing for Decision Support Systems Taha Osman, Andrzej Bargiela Department of application tasks on the currently avail- able computing nodes. Distributed Systems Reliability Due decision-support systems such as water distribution net- works, involving hundreds or even thousands

Bargiela, Andrzej

374

Wind Energy Facility Reliability and Maintenance  

E-Print Network [OSTI]

Wind Energy Facility Reliability and Maintenance Eunshin Byon, Lewis Ntaimo, Chanan Singh and Yu related to wind energy facility reliability and mainte- nance focused more on qualitative aspects. In this chapter, we provide a comprehensive account of the existing research regarding wind energy facility

Ding, Yu

375

An integrated security framework for GOSS power grid analytics platform  

SciTech Connect (OSTI)

In power grid operations, security is an essential component for any middleware platform. Security protects data against unwanted access as well as cyber attacks. GridOpticsTM Software System (GOSS) is an open source power grid analytics platform that facilitates ease of access between applications and data sources and promotes development of advanced analytical applications. GOSS contains an API that abstracts many of the difficulties in connecting to various heterogeneous data sources. A number of applications and data sources have already been implemented to demonstrate functionality and ease of use. A security framework has been implemented which leverages widely accepted, robust JavaTM security tools in a way such that they can be interchanged as needed. This framework supports the complex fine-grained, access control rules identified for the diverse data sources already in GOSS. Performance and reliability are also important considerations in any power grid architecture. An evaluation is done to determine the overhead cost caused by security within GOSS and ensure minimal impact to performance.

Gibson, Tara D.; Ciraci, Selim; Sharma, Poorva; Allwardt, Craig H.; Rice, Mark J.; Akyol, Bora A.

2014-06-23T23:59:59.000Z

376

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect (OSTI)

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

377

OPTIMAL RELIABILITY ALLOCATION IN SERIES-PARALLEL SYSTEMS FROM COMPONENTS' DISCRETE COST -RELIABILITY DATA SETS  

E-Print Network [OSTI]

OPTIMAL RELIABILITY ALLOCATION IN SERIES-PARALLEL SYSTEMS FROM COMPONENTS' DISCRETE COST - RELIABILITY DATA SETS: A NESTED SIMULATED ANNEALING APPROACH Subba Rao V. Majety# , Srikanth It is generally accepted that a component's cost is an increasing function of its reliability. Most researchers

Smith, Alice E.

378

Accepted for publication in Reliability Engineering and System Safety Analyzing the topological, electrical and reliability  

E-Print Network [OSTI]

Accepted for publication in Reliability Engineering and System Safety Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical of the system the reliability and electrical characteristics of its components. In each phase of the analysis: i

Paris-Sud XI, Université de

379

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

380

Reducing Damage Assessment Latency in Survivable Indrakshi Ray1, Ross M. McConnell1, Monte Lunacek1, and Vijay Kumar2  

E-Print Network [OSTI]

Reducing Damage Assessment Latency in Survivable Databases Indrakshi Ray1, Ross M. McConnell1 of Missouri-Kansas City kumarv@umkc.edu Abstract. Traditional recovery mechanisms are not adequate on other data items can help spread the damage. To prevent the damage from spreading, it is important

Ray, Indrakshi

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A 76.8 GB/s 46 mW Low-latency Network-on-Chip for Real-time Object Recognition Processor  

E-Print Network [OSTI]

has been widely used in various applications such as mobile robot navigation, autonomous vehicle consumption. The NoC is implemented in 0.13µm CMOS process and provides 76.8 GB/s aggregated bandwidth at 400 computing power and required complex data synchronization mechanism. In this paper, a low-latency and energy

Yoo, Hoi-Jun

382

Reliability and the Federal Energy Regulatory Commission  

Broader source: Energy.gov [DOE]

Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers the Federal Energy Regulatory Commission (FERC) strategic plan, the Federal Power Act (FPA), current energy security posture, and more.

383

ME 379M-Nuclear Safety and Security ABET EC2000 syllabus  

E-Print Network [OSTI]

ME 379M- Nuclear Safety and Security Page 1 ABET EC2000 syllabus ME 379M Nuclear Safety assessment models and nuclear non-proliferation. Failure classifications, failure modes, effects, and criticality analysis (FMECA), fault and event trees, reliability block diagrams. Specific areas from the code

Ben-Yakar, Adela

384

Cyber Security in the Smart Grid: Survey and Challenges$ Wenye Wanga,  

E-Print Network [OSTI]

Cyber Security in the Smart Grid: Survey and Challenges$ Wenye Wanga, , Zhuo Lua a The Smart Grid, generally referred to as the next-generation power system, is considered as a revolutionary and communication technologies, the Smart Grid is expected to greatly enhance efficiency and reliability of future

Wang, Wenye

385

Northwest Regional Technology Center, April 2013 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network [OSTI]

a venue for information sharing and education about cybersecurity concerns, advancements and resources Office of Electricity Delivery & Energy Reliability · Samara Moore, National Security Staff; Director is National 9-1-1 Education Month, and public organizations are working to educate the community about

386

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

387

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

388

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

389

Reliability and economy -- Hydro electricity for Iran  

SciTech Connect (OSTI)

Reliability is the probability that a device or system will perform its function adequately, for the period of time intended, under the operating conditions intended. Reliability and economy are two important factors in operating any system, especially in power generation. Due to the high rate in population growth in Iran, the experts have estimated that the demand for electricity will be about 63,000 MW in the next 25 years, the installed power is now about 26,000 MW. Therefore, the energy policy decision made in Iran is to go to power generation by hydroelectric plants because of reliability, availability of water resources and the economics of hydroelectric power.

Jahromi-Shirazi, M.J.; Zarbakhsh, M.H. [Teleh Shofage Co., Ghazvin (Iran, Islamic Republic of)

1998-12-31T23:59:59.000Z

390

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

391

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

392

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

393

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

394

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

395

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

396

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

397

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

398

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

399

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

400

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

402

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

403

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

404

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

405

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

406

o secure a safe, reliable and low-carbon energy future, we must alter  

E-Print Network [OSTI]

encourage energyefficiency,andsoaddressglobalenvi- ronmentalchallengessuchasclimatechange9 . I examined

Kammen, Daniel M.

407

Introduction of First Passage Time (FPT) Analysis for Software Reliability and Network Security  

E-Print Network [OSTI]

Zhanshan (Sam) Ma Axel W. Krings Richard C. Millar ma@vandals.uidaho.edu krings@uidaho.edu rcmillar mostly emerged in the last two to three decades. Assuming that X(t) is a one-dimensional stochastic stochastic process such as Brownian motion, then the FPT approach may be applied to find the closed- form

Krings, Axel W.

408

Assuring the Safety, Security, and Reliability of Medical-Device Cyber-  

E-Print Network [OSTI]

· Difibtech external defibrillators (2007) ­ Self-test resets low-battery status · Baxter's Colleague Infusion of adverse events associated with the use of infusion pumps - 1% deaths, 34% serious injuries - 87 infusion and Radiological Health. White Paper: Infusion Pump Improvement Initiative, April 2010 Infusion Pump Safety #12

Hu, Fei

409

Infrastructure Security and Energy Restoration Office of Electricity Delivery and Energy Reliability  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana.ProgramJulietipDepartment ofTheDepartmentEnergy IndustryISSO is1,

410

Chapter II: Increasing the Resilience, Reliability, Safety, and Asset Security of TS&D Infrastructure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed New Substation SitesStanding FriedelIron-Sulfur3-1 November8-1 November 2012

411

Adaptive Reliability Analysis of Excavation Problems  

E-Print Network [OSTI]

. This analysis couples the adaptive design capabilities of the observational method with updated reliability indices, to be used in risk-based design decisions. A probabilistic framework is developed to predict three-dimensional deformation profiles due...

Park, Jun Kyung

2012-10-19T23:59:59.000Z

412

Reliability-Based Optimization Using Evolutionary Algorithms  

E-Print Network [OSTI]

Uncertainties in design variables and problem parameters are often inevitable and must be considered in an optimization task if reliable optimal solutions are sought. Besides a number of sampling techniques, there exist ...

Deb, Kalyanmoy

413

Photovoltaic Reliability and Engineering (Revised) (Fact Sheet)  

SciTech Connect (OSTI)

Capabilities fact sheet for the National Center for Photovoltaics: Photovoltaic Reliability and Engineering. One-sided sheet that includes Scope, Core Competencies and Capabilities, and Contact/Web information.

Not Available

2011-06-01T23:59:59.000Z

414

Sandia National Laboratories: Physics of Reliability: Evaluating...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physics of Reliability: Evaluating Design Insights for Component Technologies in Solar program Sandia R&D Funded under New DOE SunShot Program On November 27, 2013, in Energy,...

415

Reliability Issues for Photovoltaic Modules (Presentation)  

SciTech Connect (OSTI)

Si modules good in field; new designs need reliability testing. CdTe & CIGS modules sensitive to moisture; carefully seal. CPV in product development stage; benefits from expertise in other industries.

Kurtz, S.

2009-10-01T23:59:59.000Z

416

PV Module Reliability Research (Fact Sheet)  

SciTech Connect (OSTI)

This National Center for Photovoltaics sheet describes the capabilities of its PV module reliability research. The scope and core competencies and capabilities are discussed and recent publications are listed.

Not Available

2013-06-01T23:59:59.000Z

417

Apply reliability centered maintenance to sealless pumps  

SciTech Connect (OSTI)

This paper reports on reliability centered maintenance (RCM) which is considered a crucial part of future reliability engineering. RCM determines the maintenance requirements of plants and equipment in their operating context. The RCM method has been applied to the management of critical sealless pumps in fire/toxic risk services, typical of the petrochemical industry. The method provides advantages from a detailed study of any critical engineering system. RCM is a team exercise and fosters team spirit in the plant environment. The maintenance strategy that evolves is based on team decisions and relies on maximizing the inherent reliability built into the equipment. RCM recommends design upgrades where this inherent reliability is being questioned. Sealless pumps of canned motor design are used as main reactor charge pumps in PVC plants. These pumps handle fresh vinyl chloride monomer (VCM), which is both carcinogenic and flammable.

Pradhan, S. (Exxon Chemicals Canada, Ontario (Canada))

1993-01-01T23:59:59.000Z

418

Demand Response For Power System Reliability: FAQ  

SciTech Connect (OSTI)

Demand response is the most underutilized power system reliability resource in North America. Technological advances now make it possible to tap this resource to both reduce costs and improve. Misconceptions concerning response capabilities tend to force loads to provide responses that they are less able to provide and often prohibit them from providing the most valuable reliability services. Fortunately this is beginning to change with some ISOs making more extensive use of load response. This report is structured as a series of short questions and answers that address load response capabilities and power system reliability needs. Its objective is to further the use of responsive load as a bulk power system reliability resource in providing the fastest and most valuable ancillary services.

Kirby, Brendan J [ORNL

2006-12-01T23:59:59.000Z

419

Reliability of copper interconnects in integrated circuits  

E-Print Network [OSTI]

As dimensions shrink and current densities increase, the reliability of metal interconnects becomes a serious concern. In copper interconnects, the dominant diffusion path is along the interface between the copper and the ...

Choi, Zung-Sun

2007-01-01T23:59:59.000Z

420

Reliability of lightning resistant overhead distribution lines  

SciTech Connect (OSTI)

An assessment of the 32 year historical reliability of the 13.8 kV electrical distribution system at the Oak Ridge National Laboratory (ORNL) in Tennessee has yielded several conclusions useful In the planning of Industrial power Systems. The system configuration at ORNL has essentially remained unchanged in the last 32 years which allows a meaningful comparison of reliability trends for the plant`s eight overhead distribution lines, two of which were built in the 1960`s with lightning resistant construction techniques. Meticulous records indicating the cause, duration, and location of 135 electric outages in the plant`s distribution system have allowed a reliability assessment to be performed. The assessment clearly shows how differences in voltage construction class, length, age, and maximum elevation above a reference elevation influence the reliability of overhead power distribution lines. Comparisons are also made between the ORNL historical data and predicted failure rates from ANSI and IEEE industry surveys.

Tolbert, L.M.; Cleveland, J.T.; Degenhardt, L.J.

1995-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

422

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

423

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

424

Gearbox Reliability Collaborative (GRC) Description and Loading  

SciTech Connect (OSTI)

This document describes simulated turbine load cases in accordance to the IEC 61400-1 Ed.3 standard, which is representative of the typical wind turbine design process. The information presented herein is intended to provide a broad understanding of the gearbox reliability collaborative 750kW drivetrain and turbine configuration. In addition, fatigue and ultimate strength drivetrain loads resulting from simulations are presented. This information provides the bases for the analytical work of the gearbox reliability collaborative effort.

Oyague, F.

2011-11-01T23:59:59.000Z

425

Reliability and Functional Availability of HVAC Systems  

E-Print Network [OSTI]

RELIABILITY AND FUNCTIONAL AVAILABILITY OF HVAC SYSTEMS Sonny Myrefelt Dep. of Build. Serv. Eng., KTH, 10044 Stockholm, Sweden, and SKANSKA Sydost, V?xj?, Sweden Summary This paper presents a model to calculate the reliability... system, therefore, there must be sufficient documentation of design airflow rates. The compulsory ventilation checks performed in Sweden have focused on the importance of maintaining the design air flow rates. More about this activity can be seen...

Myrefelt, S.

2004-01-01T23:59:59.000Z

426

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

427

-Reliability Patrick Th. Eugster Rachid Guerraoui Petr Kouznetsov  

E-Print Network [OSTI]

-Reliability Patrick Th. Eugster Rachid Guerraoui Petr Kouznetsov Swiss Federal Institute of the reliability of broadcast algorithms, called - Reliability. This measure quantifies the reliability of practical broadcast algorithms that, on the one hand, were devised with some form of reliability in mind

Guerraoui, Rachid

428

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

429

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

430

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

431

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

432

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

433

Extreme Scale Computing to Secure the Nation  

SciTech Connect (OSTI)

Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear testing, a progam to: (1) Support a focused, multifaceted program to increase the understanding of the enduring stockpile; (2) Predict, detect, and evaluate potential problems of the aging of the stockpile; (3) Refurbish and re-manufacture weapons and components, as required; and (4) Maintain the science and engineering institutions needed to support the nation's nuclear deterrent, now and in the future'. This program continues to fulfill its national security mission by adding significant new capabilities for producing scientific results through large-scale computational simulation coupled with careful experimentation, including sub-critical nuclear experiments permitted under the CTBT. To develop the computational science and the computational horsepower needed to support its mission, SBSS initiated the Accelerated Strategic Computing Initiative, later renamed the Advanced Simulation & Computing (ASC) program (sidebar: 'History of ASC Computing Program Computing Capability'). The modern 3D computational simulation capability of the ASC program supports the assessment and certification of the current nuclear stockpile through calibration with past underground test (UGT) data. While an impressive accomplishment, continued evolution of national security mission requirements will demand computing resources at a significantly greater scale than we have today. In particular, continued observance and potential Senate confirmation of the Comprehensive Test Ban Treaty (CTBT) together with the U.S administration's promise for a significant reduction in the size of the stockpile and the inexorable aging and consequent refurbishment of the stockpile all demand increasing refinement of our computational simulation capabilities. Assessment of the present and future stockpile with increased confidence of the safety and reliability without reliance upon calibration with past or future test data is a long-term goal of the ASC program. This will be accomplished through significant increases in the scientific bases that underlie the computational tools. Computer codes must be de

Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

2009-11-10T23:59:59.000Z

434

Measurement Practices for Reliability and Power Quality  

SciTech Connect (OSTI)

This report provides a distribution reliability measurement ''toolkit'' that is intended to be an asset to regulators, utilities and power users. The metrics and standards discussed range from simple reliability, to power quality, to the new blend of reliability and power quality analysis that is now developing. This report was sponsored by the Office of Electric Transmission and Distribution, U.S. Department of Energy (DOE). Inconsistencies presently exist in commonly agreed-upon practices for measuring the reliability of the distribution systems. However, efforts are being made by a number of organizations to develop solutions. In addition, there is growing interest in methods or standards for measuring power quality, and in defining power quality levels that are acceptable to various industries or user groups. The problems and solutions vary widely among geographic areas and among large investor-owned utilities, rural cooperatives, and municipal utilities; but there is still a great degree of commonality. Industry organizations such as the National Rural Electric Cooperative Association (NRECA), the Electric Power Research Institute (EPRI), the American Public Power Association (APPA), and the Institute of Electrical and Electronics Engineers (IEEE) have made tremendous strides in preparing self-assessment templates, optimization guides, diagnostic techniques, and better definitions of reliability and power quality measures. In addition, public utility commissions have developed codes and methods for assessing performance that consider local needs. There is considerable overlap among these various organizations, and we see real opportunity and value in sharing these methods, guides, and standards in this report. This report provides a ''toolkit'' containing synopses of noteworthy reliability measurement practices. The toolkit has been developed to address the interests of three groups: electric power users, utilities, and regulators. The report will also serve to support activities to develop and share information among industry and regulatory participants about critical resources and practices. The toolkit has been developed by investigating the status of indices and definitions, surveying utility organizations on information sharing, and preparing summaries of reliability standards and monitoring requirements--the issues, needs, work under way, existing standards, practices and guidelines--for the following three classifications: (1) terms and definitions of reliability; (2) power quality standards, guidelines, and measurements; and (3) activities and organizations developing and sharing information on distribution reliability. As these synopses of reliability measurement practices are provided, it must be noted that an economic penalty may be associated with requiring too high a reliability level from the distribution system for all customers. It may be appropriate for the distribution system to supply only some base, generally accepted level of reliability. This base level would be adequate for the majority of customers. Users who need a higher level may find it economical to supply using distributed energy resources (DER) and other local solutions to reliability and power quality needs. Local solutions implemented by the customer may be the most cost-effective method for addressing the more stringent needs of a digital economy. These local solutions include energy storage, small distributed generators, and microgrids. This report also considers the market's role in addressing reliability issues and requirements. The customer's needs are discussed in view of issues such as power quality requirements of digital electronic equipment, the cost of outages, the cost of storage and new infrastructure, and natural gas prices. The market role in addressing these issues and requirements is explored. The economic considerations associated with the reliability issues are discussed, as well as the levels at which these economic decisions could be made. Finally, a discussion is provided of the role DER could play in addressing

Kueck, JD

2005-05-06T23:59:59.000Z

435

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

436

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

437

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

438

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

439

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

440

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

442

Fast, multi-channel real-time processing of signals with microsecond latency using graphics processing units  

SciTech Connect (OSTI)

Fast, digital signal processing (DSP) has many applications. Typical hardware options for performing DSP are field-programmable gate arrays (FPGAs), application-specific integrated DSP chips, or general purpose personal computer systems. This paper presents a novel DSP platform that has been developed for feedback control on the HBT-EP tokamak device. The system runs all signal processing exclusively on a Graphics Processing Unit (GPU) to achieve real-time performance with latencies below 8 ?s. Signals are transferred into and out of the GPU using PCI Express peer-to-peer direct-memory-access transfers without involvement of the central processing unit or host memory. Tests were performed on the feedback control system of the HBT-EP tokamak using forty 16-bit floating point inputs and outputs each and a sampling rate of up to 250 kHz. Signals were digitized by a D-TACQ ACQ196 module, processing done on an NVIDIA GTX 580 GPU programmed in CUDA, and analog output was generated by D-TACQ AO32CPCI modules.

Rath, N., E-mail: Nikolaus@rath.org; Levesque, J. P.; Mauel, M. E.; Navratil, G. A.; Peng, Q. [Department of Applied Physics and Applied Mathematics, Columbia University, 500 W 120th St, New York, New York 10027 (United States)] [Department of Applied Physics and Applied Mathematics, Columbia University, 500 W 120th St, New York, New York 10027 (United States); Kato, S. [Department of Information Engineering, Nagoya University, Nagoya (Japan)] [Department of Information Engineering, Nagoya University, Nagoya (Japan)

2014-04-15T23:59:59.000Z

443

Low latency search for Gravitational waves from BH-NS binaries in coincidence with Short Gamma Ray Bursts  

E-Print Network [OSTI]

We propose a procedure to be used in the search for gravitational waves from black hole-neutron star coalescing binaries, in coincidence with short gamma-ray bursts. It is based on two recently proposed semi-analytic fits, one reproducing the mass of the remnant disk surrounding the black hole which forms after the merging as a function of some binary parameters, the second relating the neutron star compactness, i.e. the ratio of mass and radius, with its tidal deformability. Using a Fisher matrix analysis and the two fits, we assign a probability that the emitted gravitational signal is associated to the formation of an accreting disk massive enough to supply the energy needed to power a short gamma ray burst. This information can be used in low-latency data analysis to restrict the parameter space searching for gravitational wave signals in coincidence with short gamma-ray bursts, and to gain information on the dynamics of the coalescing system and on the internal structure of the components. In addition, when the binary parameters will be measured with high accuracy, it will be possible to use this information to trigger the search for off-axis gamma-ray bursts afterglows.

Andrea Maselli; Valeria Ferrari

2014-02-24T23:59:59.000Z

444

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

445

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

446

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

447

RELIABILITY OF WIND POWER FROM DISPERSED SITES: A PRELIMINARY ASSESSMENT  

E-Print Network [OSTI]

addresses itself to the reliability benefit of geograph-is a function of its reliability. typically want electricityI..I.ND DOCUMENTS SŁCTION Reliability of Wind Power From

Kahn, E.

2011-01-01T23:59:59.000Z

448

Reliability Optimization of Redundant Software with Correlated Failures  

E-Print Network [OSTI]

Reliability Optimization of Redundant Software with Correlated Failures Walter J. Gutjahr \\Lambda of reliability optimization of modular software with redundancy. At present, these approaches seem to be limited to generalize these reliability optimization techniques by taking such correlations explicitly

Gutjahr, Walter

449

Reliability Based Vegetation Management Through Intelligent System Monitoring  

E-Print Network [OSTI]

Reliability Based Vegetation Management Through Intelligent System Monitoring Final Project Report Research Center since 1996 PSERC #12;Power Systems Engineering Research Center Reliability Based Vegetation project titled "Reliability Based Vegetation Maintenance Through Intelligent System Monitoring (T-27)." We

450

Reliability of ENSO Dynamical Predictions YOUMIN TANG AND RICHARD KLEEMAN  

E-Print Network [OSTI]

Reliability of ENSO Dynamical Predictions YOUMIN TANG AND RICHARD KLEEMAN Courant Institute, the authors have explored several important issues relating to ENSO predictability including reliability measures of ENSO dynamical predictions and the dominant precursors that control reliability. It was found

Tang, Youmin

451

Reliability based assessment of FRP rehabilitation of reinforced concrete girders  

E-Print Network [OSTI]

J.P. SE 224 Structural Reliability and Risk Analysis, CourseL.A. Statistical Methods for Reliability Data. AppliedA.S. ; Collins, K.R. Reliability of Structures; McGraw-Hill

Wilcox, Patrick Carlo

2008-01-01T23:59:59.000Z

452

Culture Representation in Human Reliability Analysis  

SciTech Connect (OSTI)

Understanding human-system response is critical to being able to plan and predict mission success in the modern battlespace. Commonly, human reliability analysis has been used to predict failures of human performance in complex, critical systems. However, most human reliability methods fail to take culture into account. This paper takes an easily understood state of the art human reliability analysis method and extends that method to account for the influence of culture, including acceptance of new technology, upon performance. The cultural parameters used to modify the human reliability analysis were determined from two standard industry approaches to cultural assessment: Hofstede’s (1991) cultural factors and Davis’ (1989) technology acceptance model (TAM). The result is called the Culture Adjustment Method (CAM). An example is presented that (1) reviews human reliability assessment with and without cultural attributes for a Supervisory Control and Data Acquisition (SCADA) system attack, (2) demonstrates how country specific information can be used to increase the realism of HRA modeling, and (3) discusses the differences in human error probability estimates arising from cultural differences.

David Gertman; Julie Marble; Steven Novack

2006-12-01T23:59:59.000Z

453

Integration of NDE Reliability and Fracture Mechanics  

SciTech Connect (OSTI)

The Pacific Northwest Laboratory is conducting a four-phase program for measuring and evaluating the effectiveness and reliability of in-service inspection (lSI} performed on the primary system piping welds of commercial light water reactors (LWRs). Phase I of the program is complete. A survey was made of the state of practice for ultrasonic rsr of LWR primary system piping welds. Fracture mechanics calculations were made to establish required nondestrutive testing sensitivities. In general, it was found that fatigue flaws less than 25% of wall thickness would not grow to failure within an inspection interval of 10 years. However, in some cases failure could occur considerably faster. Statistical methods for predicting and measuring the effectiveness and reliability of lSI were developed and will be applied in the "Round Robin Inspections" of Phase II. Methods were also developed for the production of flaws typical of those found in service. Samples fabricated by these methods wilI be used in Phase II to test inspection effectiveness and reliability. Measurements were made of the influence of flaw characteristics {i.e., roughness, tightness, and orientation) on inspection reliability. These measurernents, as well as the predictions of a statistical model for inspection reliability, indicate that current reporting and recording sensitivities are inadequate.

Becker, F. L.; Doctor, S. R.; Heas!er, P. G.; Morris, C. J.; Pitman, S. G.; Selby, G. P.; Simonen, F. A.

1981-03-01T23:59:59.000Z

454

Modelling Reliability of Train Arrival Times  

E-Print Network [OSTI]

This paper deals with the scheduling of trains so as to minimise train trip times, whilst maximising reliability of arrival times. The amount of risk of delay associated with a schedule is used as the reliability component of a constrained schedule optimisation model. The paper outlines the model developed to quantify the risk of delays to individual trains, as well as to specific track segments and to the schedule as a whole. The risk model, which deals with single track operations, can be used to estimate the likely impact on reliability of arrival times of changes in train frequencies and operating practices; track and station infrastructure investment strategies; and train technology upgrading. An application of the model to the optimisation of schedules on a track corridor is described. The results obtained using the model are compared with the schedules used by train operations planning staff, in terms of overall delay and timetable reliability. The results highlight the significance of including a measure of timetable reliability, such as risk of delays, in the objective function for scheduling optimisation.

L. Ferreira; A. Higgins

455

Securing the future  

SciTech Connect (OSTI)

The article is an excerpt from a presentation given by the authors at NEI's annual briefing for Wall Street financial analysts held at the Waldorf Astoria on February 6, 2004 in New York, NY. The article covers highlights from 2003, including industry performance and programs to increase the value of the 103 nuclear reactors that provide 20 percent of U.S. electricity, and, just as important, are the backbone of a reliable electricity grid. Secondly, some challenges are discussed, along with how they're being managed. The third area is an update on industry programs leading to construction of new nuclear plants. Lastly, observations are presented about the year to come and what is expected in terms of policy and political initiatives.

Colvin, Joe F.; Hintz, Donald C.

2004-06-01T23:59:59.000Z

456

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

457

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

458

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

459

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

460

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

462

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

463

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

464

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

465

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

466

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

467

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

468

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

469

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

470

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

471

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

472

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

473

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

474

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

475

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

476

Transmission Reliability "Load as a Resource" Peer Review Materials...  

Broader source: Energy.gov (indexed) [DOE]

Transmission Reliability "Load as a Resource" Peer Review Materials Now Available Transmission Reliability "Load as a Resource" Peer Review Materials Now Available September 25,...

477

BPA Fact Sheet - Preparing for reliability entity registration...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Preparing for reliability entity registration Based on the NERC Functional Model The Energy Policy Act of 2005 (EPAct 2005) strongly emphasized reliability of the nation's bulk...

478

Reliability of islanded microgrids with stochastic generation and prioritized load  

E-Print Network [OSTI]

The potential to improve distribution system reliability is a primary motivation behind the development and deployment of microgrids. Previous studies have illustrated substantial reliability benefits of dispatchable ...

Marden, Mirjana Milosevic

479

The Business Case for Fuel Cells 2013: Reliability, Resiliency...  

Broader source: Energy.gov (indexed) [DOE]

3: Reliability, Resiliency & Savings The Business Case for Fuel Cells 2013: Reliability, Resiliency & Savings This report, compiled by Fuel Cells 2000 with support from the Fuel...

480

Reliability Tools for Resonance Inspection of Light Metal Castings...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Reliability Tools for Resonance Inspection of Light Metal Castings Reliability Tools for Resonance Inspection of Light Metal Castings 2012 DOE Hydrogen and Fuel Cells Program and...

Note: This page contains sample records for the topic "latency reliability security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Data Center Efficiency and IT Equipment Reliability at Wider...  

Broader source: Energy.gov (indexed) [DOE]

Center Efficiency and IT Equipment Reliability at Wider Operating Temperature and Humidity Ranges Data Center Efficiency and IT Equipment Reliability at Wider Operating Temperature...

482

Washington DC Reliability Requirements and the Need to Operate...  

Broader source: Energy.gov (indexed) [DOE]

Washington DC Reliability Requirements and the Need to Operate Mirant's Potomac River Generation Station to Support Local Area Reliability (Oak Ridge National Laboratory 2005)...

483

Now Available: Smart Grid Investments Improve Grid Reliability...  

Energy Savers [EERE]

Smart Grid Investments Improve Grid Reliability, Resilience, and Storm Responses (November 2014) Now Available: Smart Grid Investments Improve Grid Reliability, Resilience, and...

484

Texas Uses Phasors to Increase Electricity Reliability | Department...  

Broader source: Energy.gov (indexed) [DOE]

Texas Uses Phasors to Increase Electricity Reliability Texas Uses Phasors to Increase Electricity Reliability March 31, 2011 - 12:57pm Addthis Merrill Smith Program Manager, Office...

485

Agenda for the PV Module Reliability Workshop, February 26 -...  

Broader source: Energy.gov (indexed) [DOE]

Agenda for the PV Module Reliability Workshop, February 26 - 27 2013, Golden, Colorado Agenda for the PV Module Reliability Workshop, February 26 - 27 2013, Golden, Colorado This...

486

Letter from Pepco Holdings Regarding the Reliability of Electric...  

Broader source: Energy.gov (indexed) [DOE]

from Pepco Holdings Regarding the Reliability of Electric Service in the District of Columbia Letter from Pepco Holdings Regarding the Reliability of Electric Service in the...

487

High Reliability, High TemperatureThermoelectric Power Generation...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Reliability, High TemperatureThermoelectric Power Generation Materials and Technologies High Reliability, High TemperatureThermoelectric Power Generation Materials and Technologies...

488

Guide to Using Combined Heat and Power for Enhancing Reliability...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Guide to Using Combined Heat and Power for Enhancing Reliability and Resiliency in Buildings Guide to Using Combined Heat and Power for Enhancing Reliability and Resiliency in...

489

Combined Heat and Power System Enables 100% Reliability at Leading...  

Broader source: Energy.gov (indexed) [DOE]

Enables 100% Reliability at Leading Medical Campus - Case Study, 2013 Combined Heat and Power System Enables 100% Reliability at Leading Medical Campus - Case Study, 2013 Thermal...

490

Effect of Jatropha based Biodiesel, on Engine Hardware Reliability...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Jatropha based Biodiesel, on Engine Hardware Reliability, Emission and Performance Effect of Jatropha based Biodiesel, on Engine Hardware Reliability, Emission and Performance...

491

Office of Electricity Delivery and Energy Reliability Recovery...  

Broader source: Energy.gov (indexed) [DOE]

Electricity Delivery and Energy Reliability Recovery Program Plan Office of Electricity Delivery and Energy Reliability Recovery Program Plan Microsoft Word - OE PSRP June 5 2009...

492

The Office of Electricity Delivery and Energy Reliability is...  

Broader source: Energy.gov (indexed) [DOE]

The Office of Electricity Delivery and Energy Reliability is Closely Monitoring Hurricane Irene (2011) The Office of Electricity Delivery and Energy Reliability is Closely...

493

Office of Electricity Delivery & Energy Reliability FY 2012 Budget...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation Office of Electricity Delivery & Energy Reliability FY 2012 Budget Request Presentation...

494

The effect of an experimental thymidine kinase negative bovine herpesvirus-I vaccine on virus shedding, antibody response, and latency in cattle  

E-Print Network [OSTI]

THE EFFECT OF AN EXPERIMENTAL THYMIDINE KINASE NEGATIVE BOVINE HERPESVIRUS-I VACCINE ON VIRUS SHEDDING, ANTIBODY RESPONSE, AND LATENCY IN CATTLE. A Thesis by PEGGY MCCARVER BILLINGSLEY Submitted to the Graduate College of Texas ASM University... in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August 1985 Major Subject: Veterinary Microbiology THE EFFECT OF AN EXPERIMENTAL THYMIDINE KINASE NEGATIVE BOVINE HERPESVIRUS-I VACCINE ON SHEDDING, ANTIBODY RESPONSE...

Billingsley, Peggy McCarver

2012-06-07T23:59:59.000Z

495

A study of the performance and reliability of microprocessor based controls  

SciTech Connect (OSTI)

The microprocessor based distribution feeder protection unit is designed for the protection of radial feeders. Since the recloser is one of the most important normal and emergency controllers, it must retain its normal basic operations such as fault detection, timing, and fault interruption under adverse operating environments to provide complete protection and reliability needed by the distribution system. In view of the importance of this recloser to the security and reliable operation of the distribution system, it must undergo rigorous laboratory, environmental and electromagnetic interference (EMI) and field tests before installation is contemplated. To achieve these objectives, a test current from the feeder simulator was applied to the controller and was observed as it stepped through its sequence of tripping and reclosing.

Teshome, A.; Aitken, M.W.

1995-12-31T23:59:59.000Z

496

ORISE: How to Find Reliable HIV/AIDS Treatment on the Internet  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&DNuclear fuelOPTICSAugusto TentoriFolamiFind Reliable

497

NREL: Performance and Reliability R&D - Photovoltaic Performance and  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and AchievementsResearchReliability Workshops Photovoltaic

498

Technique for Measuring Hybrid Electronic Component Reliability  

SciTech Connect (OSTI)

Materials compatibility studies of aged, engineered materials and hardware are critical to understanding and predicting component reliability, particularly for systems with extended stockpile life requirements. Nondestructive testing capabilities for component reliability would significantly enhance lifetime predictions. For example, if the detection of crack propagation through a solder joint can be demonstrated, this technique could be used to develop baseline information to statistically determine solder joint lifelengths. This report will investigate high frequency signal response techniques for nondestructively evaluating the electrical behavior of thick film hybrid transmission lines.

Green, C.C.; Hernandez, C.L.; Hosking, F.M.; Robinson, D.; Rutherford, B.; Uribe, F.

1999-01-01T23:59:59.000Z

499

Gearbox Reliability Collaborative Update: A Brief (Presentation)  

SciTech Connect (OSTI)

This presentation is an update on the Gearbox Reliability Collaborative (GRC) for the AWEA Wind Project Operations, Maintenance & Reliability Seminar. GRC accomplishments are: (1) Failure database software deployed - partners see business value for themselves and customers; (2) Designed, built, instrumented, and tested two gearboxes - (a) Generated unprecedented public domain test data from both field testing and dynamometer testing, (b) Different responses from 'identical' gearboxes, (c) Demonstrated importance of non-torque loading and modeling approach; and (3) Active collaborative, with wide industry support, leveraging DOE funding - Modeling round robin and Condition Monitoring round robin.

Sheng, S.; Keller, J.; McDade, M.

2012-01-01T23:59:59.000Z

500

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z